Should I concern myself with antivirus programs for Mac and iPhone?

Should I concern myself with antivirus software?  I have both Mac desktop, MacBook Pro and iPhone 6+ and since there has been some hacking, I want to make sure everything's safe

From my experience any AV software on Apple equipment stands a much greater chance of causing problems then offer any sort of protection. For this reason, I say that you are best served by avoiding them.
If you are the least bit sensible about where you go on the web and where you get your downloads from, you should be safe. A good site to read about sites to avoid using for downloads is http://www.thesafemac.com/boycott-cnets-download-com/

Similar Messages

  • I have the new macbook pro with retina and I am trying to back up with wd passport for mac and is telling me it is going to take 7days

    I have the new macbook pro with retina and I am trying to back it up, with wd passport for mac and is telling me it is going to take 7days. Any Ideas? Im afraid that means there is something wrong with my hard drive. I have verified the disk and it says everthing is ok.

    It seems to be a common problem that those drives don't perform well, at least not with Time Machine.
    If you have more than one user account, these instructions must be carried out as an administrator.
    Launch the Console application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Console in the icon grid.
    Make sure the title of the Console window is All Messages. If it isn't, select All Messages from the SYSTEM LOG QUERIES menu on the left.
    Enter the word "Starting" (without the quotes) in the String Matching text field. You should now see log messages with the words "Starting * backup," where * represents any of the words "automatic," "manual," or "standard." Note the timestamp of the last such message. Clear the text field and scroll back in the log to that time. Post the messages timestamped from then until the end of the backup, or the end of the log if that's not clear.
    Post the log text, please, not a screenshot. If there are runs of repeated messages, post only one example of each. Don't post many repetitions of the same message.
    When posting a log extract, be selective. Don't post more than is requested.
    Please do not indiscriminately dump thousands of lines from the log into a message.
    Some personal information, such as the names of your files, may be included — edit that out, too, but don’t remove the context.

  • Palm Desktop replacement for Mac and iPhone?

    Since Palm Desktop is no longer in active development, is there a Palm Desktop replacement for Mac and iPhone?
    http://kb.palm.com/wps/portal/kb/common/article/33219_en.html#mac
    I mean, a single application (not a bunch of them like Address Book, iCal etc) that works on Mac (desktop) and that can sync with the iPhone. Including all data from the current Palm Desktop:
    1. Address List
    2. To Do List
    3. Memo List
    4. Date Book
    Thanks.

    If only Apple did something like that (all-in-one-application personal organizer with contacts, memos, calendar, to do lists, etc)
    Well, they offer all those functions--Mail has Notes and To-dos show up in both Mail and iCal, plus Address Book. Clearly someone made the fundamental decision that separate integrated programs were better than an all-in-one, so I wouldn't expect an all-in-one from Apple in any foreseeable future. But you can send a feature request, if you like:
    http://apple.com/feedback
    What would be interesting---and may exist, I haven't looked---would be if a third-party used the open access to iCal/Address Book info to build an all-in-one that integrated with Apple's separate apps, which could provide seamless iPhone/OS X integration while still letting people have the unified interface. Postbox uses Address Book but I didn't see any calendar/notes features in my quick check. Lots of apps build better replacements for Apple's individual programs--BusyCal, I think a Mail replacement, etc---but nothing unified that I've heard of.
    However, my point was that you may be better off grabbing Entourage 2008 while it is still available than waiting for Outlook 2011, which is going to be a different program. Sometimes features go backwards, and Missing Sync compatibility may change or be delayed with Outlook 2011. I don't see the advantage of hanging onto PD until the very last minute.
    ETA re the tech guarantee:
    http://www.microsoft.com/mac/products/Office2008/office-2011-upgrade.mspx
    Message was edited by: Daiya

  • Hi. Dear users. What about Web Browsers for Mac and IPhone 4S devices

    Hi. Dear users. What about Web Browsers for Mac and IPhone 4S devices?
    Test Labs: THG and something else.
    Thanks for responses and future responses.
    Big Thanks.

    "What about?" Both come with Safari as a Web Browser.
    Can you be a little more specific as to the information you are requesting?

  • Skype not working at all for Mac and iPhone

    Hi! I'm running Skype ver.7.10 (777) on OSX Yosemite (10.10.3) on my MacBook Pro. I'm also running Skype ver.5.14.72 on my iPhone 5s on iOS 8.4. I've been having problems with Skype for Mac for the past week. It started with lagging messages in Group Chats (We have around 23 people in there, though usually only half would be online at the same time). It would take anywhere from 2 to 15 minutes to send a single word. Later, I would receive messages 30 minutes after it was sent from friends. Now, I can neither send or receive messages on Skype for Mac. Also, I would be able to chat with my contacts in private one on one chats, but when I tried to uninstall and reinstall the application, I could no longer chat with them and they would appear offline to me, even though I can confirm through webversion of Skype that they are indeed online.  As for Skype for iPhone, I noticed I stopped receiving messages late yesterday, but I only got the chance to check it out now. I can no longer send or receive messages from my groups or people I've chatted with on Skype for Mac. In short, my Skype for iPhone now has the same problem for Skype for Mac.  So far, I've only tried uninstalling, restarting my MacBook and reinstalling Skype. Same goes for my iPhone; uninstall, restart, reinstall. Really need help here since I have an important Skype conference call scheduled in a few hours. I'm not sure if webversion of Skype supports conference calls...? I hope this issue will be resolved soon though for now, any help will be appreciated. 

    I've been having a similar issue that began at approximately 7:00 pm EST last night - really hoping there's a solution soon! I've begun to receive messages from a group chat I'm in, but they're still few and far between.

  • Best air print photo printer for mac and iPhone

    looking to purchase a new all in one photo printer for both mac and iphone, any recomendations

    If you want a really good fast printer I recommend the Office jet Pro 8600

  • What is the best antivirus program for mac

    Can somebody tell me what the best antivirus program is at this moment for macbook air?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Apple recommended antivirus protection programs for Mac and IOS

    Recommended antivirus software for windows 8 and mac

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I am running my canon camera on the EOS utility program for mac, and i was wondering if there is a keyboard shortcut to start video recording, instead of using the mouse.

    I am using EOS utility for MAC to run my canon camera at work. I have a foot switch connected to my macbook that allows me to take snapshots with my foot while i work ( i am a dentist and i have my camera hooked to a microscope). the way i did that is by programming a keyboard shortcut that snaps photos on EOS utility, to the foot switch software.
    So my question is: On EOS there is a video recording function, so i was wondering if there is a keyboard shortcut or if i can create a keyboard shortcut for the start/stop record function for video recording..

    Hi
    How much free space do you have on your boot disk ( Macintosh HD)?
    You may also like to add your current OS ;-)
    CCT

  • Do I need antivirus software for iPad and iPhone

    I'm new to the apple world and enjoying the gadgets.  Just wondering if I need to purchase antivirus software for my iPad and iPhone.

    Anti virus software doesnt' really exist because it's not needed. The way things are coded viruses won't run on the iPad's operating system.

  • Two different icloud Apple id's for Mac and iphone

    Hi,
    These icloud passwords are driving me mad!
    When I first set icloud up it wouldn't recognise my apple id but I made a new apple id and then managed somehow to get my apple ID for itunes store and icloud to be the same.  However, I have just updated my iphone operating system and when it asked me in the initial setting up process for my Apple ID which is an email address it wouldn't recognise it again! Grrr! So the only way to get into my phone was to create another Apple ID for icloud on Iphone. 
    I now have one apple ID for my iphone icloud, for online icloud and for itunes purchases, and another for the support communities and icloud on my macbook!  When I tried to log into the 'manage my account' with the new ID it switched mid process to my old one?!  What the **** is going on!  Why can't apple just allow me to manage my ID, where are the options?! 
    I can't upload my photostream from my Mac because the online icloud is using the new ID but I can't change the Apple ID in icloud system preferences anywhere! Anyone got any ideas on how to solve this?
    Thanks.

    Incase anyone else has this problem, I just had to sign out of my macbook icloud, (and in the process delete everything that had been synced) and sign back in with the new Apple ID.  Frustration got the better of me!
    Thanks for looking.

  • Accounting software for mac and iphone

    Hi I am looking for a accounting software which is compatible with my macbook air and iphone.  any suggestions?

    Not sure if you mean personal finance software, but iBank is one good option for that and it has both Mac and mobile versions:
    http://www.iggsoftware.com/ibank/
    http://www.iggsoftware.com/ibankmobile/index.php

  • Library management software for Mac and iPhone

    Hi all,
    This is not a support question, but I thought someone here might have an idea for me. Googling around hasn't helped much with a question I have. I have a lot of books, and would like to have software to manage them that runs on both my Mac and my iPhone, and syncs well between the two. Has anyone had good luck with anything along those lines?

    I found a couple by searching the iTunes library for "Library management", but nothing that does exactly what you want. You may want to look into a general database app such as HanDBase, which is not specifically for books, but has a lot of available pre-defined databases, can do barcode scanning, and has a desktop version that it can sync with. I've been using it going back to my Palm Pilot days.

  • ITunes invoice management sofware for mac and iPhone

    hy all
    I'm looking for a management software for mac/iphone. I would like to save my iTunes invoices somehow. I can't print my iTunes invoices, I would like to organize them. I need some kind of app or something for management. Can anybody help me? I'm looking for my problem for a while...and I can't belive I'm the only one in this world who want to organize the iTunes Invoices.
    Regards
    (sorry for my english, not perfect)

    What do you mean by "manage" them? Manage them how? The receipts are just email messages which can be saved out to a text file and from there they are just normal documents. You're going to need to be more explict as to what you wish to accomplish with this "management" before anyone will be able to offer much in the way of useful suggestions.
    Regards.

  • Audio IM for Mac and iPhone?

    Hey there,
    A Chinese friend of mine has a cool app that allows him to send audio snippets like IM to his friends.  Of course though, the app is in Chinese.  Skype used to have this function but now because of audio live chat and video chat it seems to have been deemed redundant.  There are several "walky talky" style apps out there but they are not quite what I am looking for.
    I was wondering if anyone knew of an app that would allow a mac to send IM to an iPhone, not only by text, but also audio snippets where one can record a message and send it, and the reciever can play it when they are ready? 
    Thanks.

    Not sure if you mean personal finance software, but iBank is one good option for that and it has both Mac and mobile versions:
    http://www.iggsoftware.com/ibank/
    http://www.iggsoftware.com/ibankmobile/index.php

Maybe you are looking for

  • Automatic generation of enum members from name Strings

    I have a program in which I read information about Target objects from a text file. I store some of this information as an enum property of the target. }else if (itemKey.equalsIgnoreCase( "type")) { currentTarget.descriptor= itemValue; currentTarget.

  • Searching a string in a pdf blob

    Hi, My requirement is finding a string in a blob data. I am using dbms_lob.INSTR(FILE_DATA, utl_raw.cast_to_raw('Tag Switch'),1,1) > 0 approach. It is working properly for doc htm, text formats. But when we try to search in pdf blobs, it isn't workin

  • Mail and Keychain

    I have about 10 different mail accounts, on 2 of them only, the password won't register with my keychain even though I keep checking the box and then again only some of the times Any ideas ?

  • Change "Update distribution points on a schedule" in SCCM 2007 via powershell script

    Hi I would like to change the Custom Schedule start time in the "Update distribution points on a schedule" on a package in SCCM 2007 with out logging into the SCCM console. I have following line code to query the package. Get-WmiObject -Namespace "R

  • I can´t log in my creative cloud

    I can´t log in my creative cloud