Should I be concerned with these temperatures?

While gaming on my new 13" MBP, the fans take a few minutes to respond. After about 5 minutes, I've seen temps of over 100 C on the CPU before the fans kick in. Once the fans spin up, the CPU seems to stabilize around 84 C.
It's not uncommon for me to play for 3 or 4 hours straight, should I be concerned about these temps?
edit: temperatures according to istat nano v2.2, laptop on flat surface.
Message was edited by: Zerohm
Message was edited by: Zerohm

to manually bump the fan speeds up when temps are getting hot, download and run this application:
http://www.eidac.de/?cat=40
It is called smcFanControl and many of the people on this forum use it. I use it on my MBPro 15" to bump my fans up just to be on the safe side.
The current version allows you to select different fan speed profiles based on whether you Mac is charging, on battery power, or on AC power.
Very usefull APP.

Similar Messages

  • Should I be concerned with the recent news about Java on my mac

    Have been hearing all the news about the concerns with Java from Homeland Security and that users should disable from their computers temporarily.  I am by no means a techie, however I see that Mac uses Java applet.  Is this something I should look at temporrily disabling from my Mac?  I wasn't sure how to proceed.  Can some one give some advise and in layman terms.......

    Java is only a potential problem if you have it installed and enabled in your Internet browser. Safari has had it disabled as the default for a while now.
    To check to make sure it is disabled in your browser. Open Safari->Preferences->Security and make sure Enable Java is not checked
    Note: Java and JavaScript are two different languages and are not to be confused. JavaScript is fine to have enabled.
    regards

  • Should I be concerned about these permisions?

    Hi,
    As I keep trying to avoid the kernel panics in my MBP, everytime I run repair permission I get the following:
    Repairing permissions for “Macintosh HD”
    Reading permissions database.
    Reading the permissions database can take several minutes.
    Permissions differ on "System/Library/Frameworks/CoreVideo.framework/Versions/A/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/Components/AudioCodecs.component/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/Components/CoreMediaAuthoringPrivateComponents.component/Conten ts/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PrivateFrameworks/CoreMediaAuthoringPrivate.framework/Versions/ A/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PrivateFrameworks/CoreMediaPrivate.framework/Versions/A/CodeRes ources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/QuickTime/AppleProResDecoder.component/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTMediaKeys.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTMime.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTAdvance d.prefPane/Contents/Resources/QTTransport.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTPlugIn. prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTRegiste r.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTRegiste r.prefPane/Contents/Resources/QTAbout.bundle/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTStreami ng.prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    Permissions differ on "System/Library/PreferencePanes/QuickTime.prefPane/Contents/Resources/QTUpdate. prefPane/Contents/CodeResources", should be -rw-r--r-- , they are lrw-r--r-- .
    No matter how many times I repair permissions, the same thing keeps popping up. Should I be concerned?
    Thanks..

    No, that's fine. Permissions Repair in Leopard is somewhat 'broken'.
    http://support.apple.com/kb/TS1448
    If you uncheck the Show Details box, those minor (unrepairable) errors won't show up, only major ones.

  • Should I be concerned with file sizes of my images I post using iWeb?

    Should I condense and compress my images down so they won't take up as much bandwidth when I use iWeb?

    I think the real answer has been covered in another thread, but I'll try to recap. iWeb 1.0 used to convert everything to .png. And as many have complained, the png that is created by iWeb (even in 1.0.1) is oftentimes larger than the original .jpg (for really small ones under 100k). Starting with 1.0.1, iWeb will leave .jpg's alone and copy them straight over if you do not add any shadows or reflections or rotations. Anytime you add these effects, iWeb will create a properly reduced .png file and leave the .jpg out of it.
    So there is a little bit of a dilemma for us users. If we have really tiny .jpg's (like a bunch of 20k elements), we should want iWeb to use them directly without creating a .png. But this means avoiding applying effects. And then if we have really big .jpgs (like 3mb photos), we should want iWeb to convert them to .png without copying over the original .jpg. And it will do exactly that, provided you apply some kind of effect.
    From my experience, iWeb behaves exactly as described above. The only effect that will still result in the full file being copied over (and used on the web page! A 3mb photo!) is masking. You can add a reflection or shadow box to a masked photo and iWEb will create a smaller .png, but it will still copy over the large .jpg. I scale my photos down to 640x480 for about 150k .jpg and the .pngs that iWeb creates are still 300-400k for a no effects image. This is a problem, but I try to remember to apply some effects which cuts the files down to 20k or so. Strange.
    James
    http://www.dirtdoog.com/

  • Should I be concerned with losing existing data (projects or events) when updating from FCPX to FCPX 10.1?)

    I purchased a Macbook Pro loaded with FCPX from a private party. I now want to update from FCPX to FCPX 10.1 should I be concered about losing my exhisting projects and events? The previous version of FCPX is registered to another person and wondered if this could potentially overwrite anything. I backed everything up to another drive but, just wondered if anyone has done this sucessfully?

    The project files are put where FCP X wants to put them. If you render anything, it puts the rendering where it wants to put it.
    FCP X has three opportunities to lose something - it can't find your project, it can't find the event, the event can't find the media. We see it on this forum all the time and right now 10.1 is managing all that and screwing it up for some people. We see FCP X updating events and projects...
    With Motion 5, I put my project file where I want - in a folder for that project. In that same folder, I have all my media. It's not necessary to have a feature where it moves my files for me to another drive, etc. I simply drag that folder anywhere I want and all the links are in tact because the links are relative.
    With FCP X, even if I don't copy the media to the events folder and leave it where I want, it still creates a folder with its own hierarchy - Backups, Old Versions, Original Media, Render Files, Transcoded Media...
    FCP X's method opens people up to more problems, obviously. You don't see people on the Motion forum talking about how Motion moved media or put it in the trash etc. The only thing that can happen is the small XML project file can't find the media and so you simply relink and you can use Spotlight for that.
    Seems like there are more headaches with FCP X's method.

  • Pending Charges: Should I be concerned?

    Hello Folks,I've been thinking over this for about a week now. Last week, I noticed a couple of small pending charges on my Chase card. Two, from YopMail.com, were a credit and debit of $1 exactly. The other, was for something along the lines of Kalinchita.com for about 91 cents. Obviously, I have no knowledge of either of those sites, and none of the charges wound up getting confirmed.I know that in many cases, scammers will test the water with small transactions such as these before hitting with a big one. Should I be concerned about these? If so, what should I do?Thanks.

    YupYup413 wrote:
    Hello Folks,I've been thinking over this for about a week now. Last week, I noticed a couple of small pending charges on my Chase card. Two, from YopMail.com, were a credit and debit of $1 exactly. The other, was for something along the lines of Kalinchita.com for about 91 cents. Obviously, I have no knowledge of either of those sites, and none of the charges wound up getting confirmed.I know that in many cases, scammers will test the water with small transactions such as these before hitting with a big one. Should I be concerned about these? If so, what should I do?Thanks.Absolutely ! The same happened to me on my US Bank Cash Rewards card, but I check my accounts all throughout the day (I've done it since I discovered unauthorized charges some clown did in Missouri for an Onstar purchase a few years ago). Contact Chase NOW & let them know you do not know those charges.

  • Why does my mac sometimes start with a black and white fizzy screen at times? Should i be concerned?

    Why does my mac sometimes start with a black and white fizzy screen at times? Should i be concerned?

    Nope, not ever. Take it in for service.

  • Concern with bug fix in V9 SP14

    My team is concerned with the following fix in V9 SP14 of SAP Sourcing:
    2945814/2013
    Property contracts.Enable_publish_to_supplier_check.External_Phase has been
    introduced to control the behavior of phase change of contract document using “Publish to
    supplier” Checkbox .
    When set to true, the contract document can be changed to external phase only when “Publish to supplier” Checkbox is checked on the Header tab of MA.
    When Set to false, the contract document can be changed to external phase irrespective of the status of the publish to supplier check box (checked or not checked) on the Header tab of MA
    The issue being, if you do not check the "Publish to Supplier" checkbox and move to an external phase, the supplier receives email notification but does not have access to the contract in the system.  We were hoping to get a better understanding of the purpose of this "fix" as it seems to us that it would just cause confusion to the supplier.  I'm hoping someone can provide some additional information on the purpose of putting this fix in place.

    Hello
    Contract Documents that are moving from an Internal Only phase to an Externally visible one can only be seen by their suppliers if the Publish to Supplier checkbox is checked (and the publish date is in the past) on the relative Agreement document.  Some of our customers want to be warned when they have not checked the Publish to Supplier checkbox on the agreement and others do not want to be warned.  We added a new system property to provide our customers with the ability to choose how they want CLM to behave.
    If the new system property contracts.Enable_publish_to_supplier_check.External_Phase is set to FALSE (default value) CLM will behave as it did prior to SP14.   This means that you can change a contract document to a phase that is visible to the suppliers without checking the Publish to Supplier Checkbox on the header tab of the related Agreement.
    However even though the Contract Document is in an external phase (example: Supplier Draft or Executed), the suppliers still cannot access it from the Supplier portal unless the Publish to Supplier Checkbox is checked.  Alerts to the Supplier of the newly visible contract document were triggered by the contract document phase change. Suppliers were receiving the Alert even though the Agreement owner forgot to check the Publish to Supplier checkbox on the Agreement.  This is the main problem we were trying to address.
    If the new system property contracts.Enable_publish_to_supplier_check.External_Phase is set to TRUE then you are prevented from changing the phase of a contract document from an Internal Only to Externally visible to suppliers unless the Publish to Supplier Checkbox is checked on the Agreement.   This ensures that any externally visible contract documents can be accessed by the suppliers by ensuring that the Agreement owner has remembered to check the Publish to Supplier checkbox on the relative agreement.
    Many of our customers do not wish their suppliers to use the Supplier Portal to see Agreements right now but plan to use that feature in the future.  Even though they have configured some of their contract document phases as external they don't want Suppliers to see externally visible contract documents until they are ready to check the Publish to Supplier Checkbox.   In the meantime they don't want to be prevented from changing the phase of a contract documents to Executed (for example).  These customer should leave the new property set to FALSE.
    For those customers that want their suppliers to see the contract documents that are in an Externally visible phase and need to be reminded to check the Publish to Supplier checkbox first should set the new system property to TRUE.   
    I hope this helps.
    Anne McClelland

  • Should we be concerned about this?

    We were reading about this virus that effects 10.5.6 here.
    Should we be concerned about it? How real is it? Thanks.

    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:
    http://www.clamxav.com/
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More information on Mac security can be found here:
    http://macscan.securemac.com/
    The MacScan application can be downloaded from here:
    http://macscan.securemac.com/buy/
    You can download a 30 day trail copy which enables you to do a full scan of your hard disk. After that it costs $29.95.
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    As to the current 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially *********** sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications.

  • Am I the only one with these various problems...??

    Hi all,
    I start my first post and introduction ever on this forum with a imposing problem with Aperture 3.03
    I just did the upgrade to Aperture 3 & 3.03. Coming off Aperture 2, I was able to rotate, crop and do all the things I wanted by just placing the pointer while clicking, holding, and moving all at the same time with no issues. With Aperture 3.03, no such luck. I've noticed that now if I want to rotate an image or even crop an image the first effort to move anything is ignored. It shows all the signs of being ready to move something, but nothing happens, nothing moves on first try. If I stop the click and place click the second time it is responsive as usual....What gives???
    Here is another issue. Cropping is all over the place and never right on the first try. Even if I have a set aspect ratio it does not provide me with the one I selected. I'm always getting the wrong aspect ratio even though the right one is selected. If I pick "Master Aspect Ratio", I get a variable ratio instead of a fixed ratio??? If I click again it changes again. This program is not stable!!
    One other thing has anyone noticed that you cannot use the arrow keys to move from one picture to another after editing the photo?? It is happening to me. If I complete an edit and want to move to the next photo, the program will not respond to key commands in any way. I'm forced to return to Browser mode and even then it seems hit or miss whether is responds to key commands again. navigating seems to be a big impediment when actively editing.
    So, am I the only one with these problems???
    Lets hear your story...
    Note: just installed the newest stability update for Snow Leopard/Aperture 3 just made available on August 18, 2010. No change...
    Steve,
    Bethlehem, Pa.
    Message was edited by: hdskullfire2

    I don't see any of these issues! You have listed several, disconnected issues. Perhaps you should pick one of them, and give us a blow-by-blow of your action steps.
    For rotation, click that button at the bottom of the View window, and then use one of the [ or ] bracket keys as listed for direction.
    Ernie

  • What's Wrong with These Rules?

    I can't see what's wrong with these rules. Does any one see the problem?
    Passport data is verified if
    Database provides an exact match for the passport number and date of birth.
    Photo matching is required if
    Passport data is verified.
    Passport photo matches evidentiary photo if
    Photo matching is required and
    Photo match is valid.
    Photo match is valid if
    Photo matching is required and
    user states that photo matches evidentiary photo.
    The investigation session asks the question "does Database provide an exact match ..." Response is True.
    "Photo matching is request" is set to true because "Passport data is verified" is true.
    Then the investigation stops. It doesn't go on and ask if "user states that photo ...". This arrtibute has the value of <unknown>. All the identifiers (red numbers) match up correctly. I just can't see what is wrong.
    Thanks,
    Terry

    Thanks, Brandon,
    Your idea was helpful. It was a goal, but not a top level goal. By checking the data at each step, I found that a higher level rule that was dependent on these rules was the culprit. I should have had an "and" when I had wrote the rule with an "or". I don't entirely understand why this higher level rule needed to have "and" instead of "or", but it works now and that's all I care about.
    Terry

  • Third-party cookies: Should I be concerned that I am forced to accept in order to access a site, if I delete them after every Firefox session?

    Friday 16 August, 2012
    My internet service provider (https://my.gci.net/) blocks my entry to eMailGuard (a GCI spam and virus isolator) when I have third-party cookies disabled
    When I allow third-party cookies I am able to access eMailGuard. I have used GCI eMailGuard and Firefox together for years and have had no such difficulty in the past.
    This problem commenced 2-3 weeks ago.
    I have followed all directions at http://support.mozilla.org/en-US/kb/websites-say-cookies-are-blocked-unblock-them to clear all cookies and cache, with no change. Also, my default setting (see below) is to “Clear history when Firefox closes.” If I understand correctly, clearing history will also clear cookies and cache, so I do it every time I close Firefox.
    Has Firefox changed third-party cookies parameters recently? GCI of course claims this is a browser issue. Should I be concerned about third-party cookies if I delete them after every Firefox session? Any comments or thoughts are greatly appreciated.
    My current version is Firefox v.14.0.1
    My Privacy settings are:
    • Tools\Options\Privacy
    • Use custom settings for history
    My selected (checked) custom settings are as follows:
    • Remember my browsing history
    • Remember download history
    • Remember search and form history
    • Accept cookies from sites (third-party cookies not selected)
    • Keep until: I close Firefox
    • Clear history when Firefox closes
    Thanks,
    James Lavery
    Anchorage, Alaska
    ISP my.GCI.net

    ''Keep until: I close Firefox''
    That's what I use for all cookies. If you start a new session every time you start Firefox, i.e., you don't resume the same session over and over, websites cannot track you 'across sessions' using cookies; you are a new person to them during each session (unless/until you log in).
    Note that "Flash cookies" need to be managed separately.
    As for this particular site, if you want to spend some time research it, you could install an add-on such as Firebug or the external Fiddler2 proxy. Both will show you each request made by the browser when you load a page. Then you can see which third party sites are involved and if you like make a specific entry to allow them in the Exceptions dialog.
    * https://addons.mozilla.org/en-US/firefox/addon/firebug/
    * http://www.fiddler2.com/fiddler2/ (more difficult to use for HTTPS sessions)

  • Performance concern with directory server implementation

    performance concern with directory server implementation
    I first posted this at metalink forum, and was suggested to post it here instead.
    Hi,
    I'd like to get any feedback regarding performance of oracle directory server implementation. Below is what I copy&patested from 9i Net Services Administrator's Guide, I found no 'directory server vendor documentation', so anything regarding this is welcome too.
    Performance
    Connect identifiers are stored in a directory server for all clients to access.
    Depending on the number of clients, there can be a significant load on a directory
    server.
    During a connect identifier lookup, a name is searched under a specific Oracle
    Context. Because of the scope of the lookup, you probably want users to experience
    relatively quick performance so that the database connect time is not affected. Users
    may begin to notice slow connect times if lookups takes more than one second.
    You can resolve performance problems changing the network topology or
    implementing replication.
    See Also: Directory server vendor documentation for details on
    resolving performance issues
    Thanks.
    Shannon

    Shannon,
    you can find some tuning advises in the following
    a) OiD Capacity Planning Considerations
    http://download-west.oracle.com/docs/cd/B10501_01/network.920/a96574/cap_plan.htm#1030019
    b) Tuning Considerations
    http://download-west.oracle.com/docs/cd/B10501_01/network.920/a96574/tuning.htm#999468
    c) oracle net services
    http://download-west.oracle.com/docs/cd/B10501_01/network.920/a96579/products.htm#1005697
    you should start with a) to get an overview what to be aware of
    --Olaf

  • Strange Mobile device tried to connect to my iMac via Bluetooth! Should I be concerned?

    I woke up this morning with a pop-up message saying that a mobile device tried to pair with my system but was rejected most likely from an incorrect password. I've always had "bluetooth" enabled. Never used it though, I have a wired mouse and keyboard. I never thought about possible threats occuring from this until now. I originally had all default settings turned on for bluetooth but no sharing enabled. I clicked off "discoverable" and turned bluetooth off altogether. My concern is that I am seeing a "T-Mobile myTouch Q" Smartphone in the list. I don't own this type of phone. I've never had a t-mobile phone or know anybody who does. I tried to "browse" the device but I get an error. I am unable to remove the device from my list.
    It doesn't appear to be connect or ever have been connected to my knownledge but I would like it taken off.
    Is there any way somebody can hack your iMac via a mobile device? I went on a researching rampage this morning but am unsure of what to think at this point. If bluetooth only operates up to 30 feet of range, who could possibly have wanted to connect at 4-5 am in the morning? Also, if they were paired, exacly what information can they gain from being paired via bluetooth to a mobile device?
    Should I be concerned about this? I have Mac firewall enabled in stealth mode. Have Sophos installed and up to date and running. All sharing is turned off. What else can I do and how can I remove this device from the list so I can use bluetooth in the near future without any worries?
    Thanks for any help!

    WZZZ wrote:
    Csound1 wrote:
    Bluetooth is very limited, in range (20 to 40ft on a good day)....
    The Bluetooth on my wife's iPad, before I turned it off, put out a signal much further than that. Out of curiosity, I took it down to the lobby of our building, easily a hundred feet or more--just guessing--through one floor and a number of walls. It was still getting a healthy signal there. Maybe the Mac's Bluetooth isn't so powerful. Probably depends on the device being used. I know if I move my mouse not far away from the Mac the connection is quickly lost.
    That is an extraordinary connection distance for BlueTooth, did you happen to investigate the data rate at that range?
    This really only applies to older Blutooth devices (so should exclude an iPad)
    Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation.[citation needed] Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do.[clarification needed]
    The spec for Bluetooth is a bit vague but here is some general info.
    But wireless is a bit like playing Roulette

  • Can I use the iPod touch 3rd generation with these speakers?

    I wanna buy some speakers. But now I feel a bit uneasy. My question:
    Can I use the iPos touch 3rd generation ( http://store.apple.com/ch-de/browse/home/shopipod/family/ipodtouch 32 GB ) with these speakers ( http://store.apple.com/ch-de/product/TR142ZM/A?fnode=MTY1NDA1NA&mco=MTE0MDM5Mzg ) ?
    I know that only first & 2 Generation is. But if I want to buy cool speakers, which should I buy then?
    Thanks for help
    (and sorry for my english, I'm swiss xD)

    You cannot.
    You would have to buy a new one.
    Apple will gie you a 10% discount on a new ipod if you bring in an old one for recycling.

Maybe you are looking for

  • Sony handycam 8cm DVD footage

    i have about 30 8cm DVD's that i need to log and capture that were shot on a sony handycam dvd camera. How do i go about setting up FCP and using the disks to get the footage into FCP. The footage on the disks would be compressed as mpeg2 already rig

  • N95 Video - bad audio tracks!

    hello again, i have an annoying problem: - i can use and correctly play videos from the N95 (mainly i use quicktime pro) but now i just realized, that with another beloved program (proshow) there is a loud tucking sound if the video/audio is played.

  • Select count distinct problem

    Hi, I have a tabe "M" that as messages, each message has a priority and is part of a departement. Now i wanted to create a report that count the number of messeges by departement group by priority and the total.............. something like this: Depa

  • FMZBVT - FM Area Balance carryforward

    Hi Experts We have around 100 company codes and each company code has its own FM area. 1:1 Relationship. Now we are in the process of closing fiscal year 2008 and we try to carryforward the balance of all the FM area to Fiscal Year 2009.  But in the

  • Am I able to extend the desktop when a 27" display is attached to my IMAC 27"

    Am I able to extend the desktop when I use a 27" IMAC and a 27" extra display?