Should I turn of Mac firewall to allow Cyber Security firewall to work without interference ?

Recently purchased Cyber Security Pro and that company said I need to turn off Mac firewall so it won't interfere with their firewall. Is that the right decision ?

1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
☞ It can easily be disabled or overridden by the user.
☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
Software from an untrustworthy source
☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
Software that is plainly illegal or does something illegal
☞ High-priced commercial software such as Photoshop is "cracked" or "free."
☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
Conditional or unsolicited offers from strangers
☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
☞ You win a prize in a contest you never entered.
☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
☞ Anything online that you would expect to pay for is "free."
Unexpected events
☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
Why shouldn't you use commercial AV products?
☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
☞ Most importantly, a false sense of security is dangerous.
8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Similar Messages

  • On my mac should i turn on the firewall; and file vault or just leave them off?

    On my mac should I turn on the firewall; and file vault or just leave them off?

    Yes, you should turn on your Firewall, and in the advanced options, select 'stealth mode'.
    Unless you want to encrypt your hard drive, you don't need File Vault and can leave it off.

  • New mac won't allow me to add files to my old external hard drives.

    Hi there,
    I've been trying my hardest to figure out how to do this without having to delete all of my files and reformatting my external HD, but I haven't been able to find a solution. Maybe I'm not using the right keywords when I search for solutions?
    Anyway...
    I recently purchased a new MacBook Pro, and have since been unable to transfer any files (photos/video/documents) from this new Mac, to any external HD's (that worked fine on my previous Mac as well as other Macs).
    However, I am able to drag files from the external HD to my mac, and transferring files to a small USB works without an issue.
    How do I fix this, without deleting/wiping the external HD so I can transfer files onto it?
    Thanks so much for any help!

    You are still under warranty.  Call Apple Care. Make sure you get a case number as all repairs have an additional 90 days of warranty. 
    #1 - You have 14 days from the date of purchase to return your computer with no questions asked.
    #2 - You have 90 days of FREE phone tech support.
    #3 - You have the standard one year Apple warranty.
    #4 - If you've purchased an AppleCare Protection Plan, your warranty last for 3 years.  You can obtain AppleCare anytime up to the first year of the purchase of your computer.
    Take FULL advantage of your warranty.  Posting on a message board should be done as a last resort and if you are out of warranty or Apple Care has expired.

  • Should I turn off my Mac Pro when not in use or leave it running?

    I have been told I should never turn off my computer by some people, and others say that I should always turn it off when not in use!  I use my Mac Pro primarily for music recording/editing in my home studio or word processing.  Now that I have an iPad I use that for web browsing, email, FBing, etc. and I find myself on my Mac Pro a lot less.  I get the basis behind both trains of thought; those who leave it on feel always stopping and starting up puts unnecessary wear on the moving disks, and those who shut down think if the parts are always moving they are bound to wear out faster.  I am not as concerned with conserving power as I am with keeping my machine safe!  If you have any information on this topic I would love to hear it. Thanks!

    Providing you have a robust firewal and are not worried as a result about being hacked then leave it turned on and allow it to sleep. Make sure you allow the screen to sleep as well a that is the item that is more prone to damage by being left on all the time.
    I never turn my machine off, never have with any of my Macs ever since my first one back in 1979-ish and have never suffered any adverse affects. Today, the power drain is so small when allowed to sleep that I doubt they would offend even the ardent 'turn off everything and pull out the plug to save the planet' person.
    If you have an iPad or iPod synced with the Mac for email and iCal and address Book etc. then if you leave it on it should be up to date as soon as you return home, mine is anyway. With iCloud coming out very soon that may come into play even more so with all its advance pushing etc. Just a thought.
    One advantage in leaving the machine on (sleep) is that you can access it from anywhere in the world should the need arise with the appropriate settings, which you can't if you turn it off.
    Leave it on.

  • Firewall - should I turn it on ??

    Am I protected when surfing if I do not? When I was using Windows XP I always bought Norton Internet Security software (firewall and virus). Should I use Apple's firewall and why is it turned off by default?

    The Firewall is turned off by default in OS X because it complicates certain services such as iChat and iTunes music sharing. Most Mac users are likely unaware of its existence. Certainly, if your Mac is used as a server, that is you are purposely making it available over the internet to serve files or web pages, you should configure the Firewall appropriately. That would mean enabling it and blocking all ports/services that your Mac does not serve.
    For normal usage, especially if you are behind a typically configured router, you can ignore the Firewall settings and leave it off. In almost all cases, your Mac will not be able to be seen from the outside world.
    Just my opinion, of course.
    bd

  • I just bought a mac book pro and airport time capsule. Which one should I turn on first to get it going. We do have an existing router and old PC in the house.

    Hi
    I just brought home a mac book pro 13" with retina and the airport time capsule . What one should I turn on/ hook up first? We have an existing router in the home and an old PC.
    Suggestions?

    Turn off you cable/DSL modem, your computer, and the old router. Disconnect the computer's Ethernet cable from the old router. Replace the old router with the Time Capsule. Connect the Ethernet cable from the modem to the WAN port on the Time Capsule. Connect the computer's Ethernet port to one of the LAN ports on the Time Capsule using an Ethernet cable.
    Turn on the modem and wait until the status lights indicate connection with the ISP. Turn on the Time Capsule and wait for the amber light to begin flashing. Open Airport Utility in your Utilities folder to configure the Time Capsule.
    If a user guide came with the Time Capsule I suggest you follow it's instructions.

  • HT1339 My ipod is stuck at step 9 in this guide. Itunes told me to keep my ipod connected to itunes, and my Ipod shows the Apple logo as it should (though I can´t see any progress bar). Do anybody know how  long step 9 takes. I have turned off my firewall

    My ipod is stuck at step 9 in this guide. Itunes told me to keep my ipod connected to itunes, and my Ipod shows the Apple logo as it should (though I can´t see any progress bar). Do anybody know how  long step 9 takes. I have turned off my firewall.
    Please Help!

    If it happens again and the reset (home + power buttons) doesn't work, just let the battery drain; you'll know when the screen shuts off. Charge it back up and it should be fine. Frankly, I'm surprised this worked for you. Usually I hear people with this problem say that holding both buttons doesn't work, and they have to do the battery drain.
    If the issue is incurable next time, you have a one-year warranty from the date of purchase.

  • Sorry might sound dumb but am new to this. I'm getting loads of junk emails. I've noticed my firewall is turned off should I turn it on?

    Sorry might sound dumb but am new to this. I'm getting loads of junk emails. I've noticed my firewall is turned off should I turn it on?

    No, a firewall is for blocking connections based on ports and protocols.  You could block all of your email with it by blocking pop or imap ports, but then you would get no emails at all.
    You already are protected from direct connections initiated from the internet if you have a router.  Don't turn anything else on.  Unsubscribe to any mailing lists that you might be on and filter your junk email in your mail application.

  • Mac firewall security flaw in Adobe CS3

    Security experts are warning of an issue within Adobe CS3's Version Cue application which can disable a Mac's built-in firewall.
    An alert from the experts at Secunia warns that Adobe Version Cue disables a Mac's firewall when it is installed. It does so in order to set certain ports up for "controlled access through the firewall", the experts said.
    The probelm is that the installer doesn't re-enable the firewall once installation is complete, leaving certain system services vulnerable to attacks.
    The security issue is reported in Adobe Version Cue CS3 Server, installed as part of Adobe Creative Suite 3 Design Premium, Design Standard, Web Premium, or Web Standard editions, Secunia explains.
    There is a simple fix to the flaw, which is rated as "less critical" – users simply need to re-enable their Mac OS X firewall in System Preferences once installation is complete.
    http://www.macworld.co.uk/procreative/news/index.cfm?newsid=18066&pagtype=allcha ndate
    I'm rather surprised that an application can simply turn off the firewall without any red flags to the user.
    Any comments?

    ..."From a user perspective, I did give authorization to install the software - I did not give authorization to turn the firewall off and keep it off."...
    That's the thing though - you may not think you gave it authorization to modify the firewall, but by providing an "admin" password, you actually did. It is a matter of education, but users must be made to recognize that inputing an "admin" password is giving the process that asked for it carte blanche powers. Such an arrangement seems to be fairly typical in personal computing. Installers that use Apple's installer do sometimes break things down a little and providing a bit of detail to what right is being requested, but from what I recall, Adobe uses something else.
    ..."Apple should probably have provided some safety net. After all, we are talking "firewall" here, not just some preference setting. "...
    I guess it's beside the point but in this case, this installer legitimately needed to modify firewall settings - you told it to install a type of server. It just happened that, there was a bug so it didn't restore the firewall after it was done. How does the system know that you didn't really want to turn off the firewall? Considering the diverse functions software can perform, it would probably be overly intrusive for the OS to try to second guess a programme every time it tried to do something. Changing any sort of user preference setting would not have required a password at all. If a programme asks for your "admin" password, that is the tip off that it intends to make changes to the system. The requirement for a password is actually a huge "safety net".
    With anything related to security, there's always a compromise between security and convenience. The presumption is that as the "admin", you are a person with authority over the computer and have some level of trust in the software you are about to install. If you think about it, compared to the alternative, the current arrangement saves you from having to click "Cancel" or "Allow" for every single file that the installer is going to create, or approve every individual port it wanted to open in the firewall (keeping in mind you are installing some sort of server), and in particular, from learning the ins and outs of every detail of the guts of OS X so you fully understand what it is that you are agreeing to. Now if it turns out that your trust in Adobe's intent or competence were misplaced, the result will unfortunately be the occasional problem like this one.
    ..."I wonder what happens if changes to the firewall are locked? Can a software install just override this without any authorization?"...
    With your "admin" password, yes. Files can be locked in certain ways where an installer or other process wouldn't be able to modify them, but as far as simply turning off the firewall, I don't think you could prevent something with authorization from your "admin" password from doing so.

  • Mac Firewall Settings

    I cannot get my iPhone to connect to my mac's airport wifi when I have the firewall turned on. I would like to be able to keep the firewall on but cannot figure out how to configure it to allow my iPhone to use my internet connection being broadcast from my mac.
    If anyone knows what ports I need to open or how to tweak the firewall that would be great.
    I should add that if I have the firewall turned off I can connect my iPhone, my nintendo ds, and my printer with out problems. It is only when I turn on the firewall that it fails.
    My firewall is set to stealth mode and I allow UDP traffic (without this the ds doesn't work)

    I'm sorry to say but that is not a very good advice. You should not disable your firewall unless you are behind a router you own at least.
    Enable the firewall logging under Tiger, check what kind of traffic is being blocked and create a rule to allow it.

  • I would like to find out how I can setup my Mac Air to allow me to have an email template open up in Outlook instead of Mail when I click on an email address on a website.

    Can anyone help me with setting up my Mac Air, to allow me to have an email template open up in Outlook instead of Mail when I click on an email address on a website?

    All the limits you mention 100 e-mails at a time and 500 in a four hour time frame are limitations imposed by your mail provider, not Thunderbird. Thunderbird places no restrictions on the maximum number of recipients.
    Have you tried turning your computer off for a few minutes?

  • Looking for an iPad(iPad/Mac) app that allows for playlists to migrate to iPad

    I am specifially and exclusively looking for recommendations for an iPad(iPad/Mac) app that allows for my playlists to be migrated to iPad intact and playable.
    iTunes -> Podcast/Music/Videos does not support mixed (music/video/podcast) playlits or video playlist at all. The app(s) should be able to easily create these playlist on the Mac (and manage content) much like iTunes (10).
    On the phone with tech support today and they agree this is missing functionality from Apple. They suggested I reach out on to other users that may have a thrid party solution.

    Requires each device/user have an unique Apple ID(verifiable email address):
    http://itunes.apple.com/us/app/find-my-friends/id466122094?mt=8
    Otherwise you can use Find My Phone, but requires logging in for each separate user. Find My Friends(built by Apple) will show everyone's location on one device.

  • I have a 13 inch Macbook Pro. I have bought it just 5 months back. All of a sudden, i am unable to turn the mac on. It doesn't even get Charged. What could be the issue ?

    I have a 13 inch Macbook Pro. I have bought it just 5 months back. All of a sudden, i am unable to turn the mac on. It doesn't even get Charged. What could be the issue ?

    If you're unable to turn it on, let alone even charge it then it definitely sounds like a battery issue to me. I'd wait for someone else to reply just to be sure but I think somehow the battery by the sounds of it must have died. However, I could be very wrong.
    If you're still under applecare which you should be then it should be an easy free fix. Hope this helps!

  • Brand new Mac, had to erase drive through disk utility as time machine back up failed. Now disk utility only has the option to install Mountain Lion which my Mac won't allow. Anyone any ideas as my Mac won't load anything up but disc utility!

    Brand new Mac, had to erase drive through disk utility as time machine back up failed on initial setup, USB cable popped out Now can only access disk utility as won't load to log in screen. The only has the option in disc utility is to re-install Mountain Lion which my Mac won't allow or loading another time machine back up but after an hour of it processing, that didn't resolve the issue either! The time machine back up is the latest back up of my Mac Book Pro which was using OS X Maverix. I'm guessing I'm going to have to take my Mac to the store but that would be a hassle so does anyone have any ideas?

    Follow this guide using another Mac.
    Insert your newly created Mavericks USB into you Mac, press the power button and then hold down 'option,' until it gives you an option to boot from the USB. You will then be able to erase the internal disk with Disk Utility and reinstall Mavericks straight after.
    After that you should be able to use Migration Assistant to restore your applications and user data.

  • Mac firewall issues w. cs3/ftp

    I'm running DW CS3 in a new Mac.
    I have the native Mac firewall going, plus "Little Snitch", firewall app.
    Everytime I start DW (and only on the 1st FTP attempt), I get this system message (likely from the Mac firewall - not a Little Snitch type window) ...
    In the Mac Firewall, the allow rult for DW is there; I tried nuking the rule and give it permission once more, but this annoying box still comes back.
    any thoughts on this?
    thanks,
    Gary

    I'm also running into the same issue. I have a public domain name, and have run Windows FTP servers for about 5 years without any problems. My ISP doesn't provide reverse DNS. So Because I own the Domain name mycompany.com that points to my public IP 24..*. , if you do DNS lookup from anywhere in the world for my domain name you will get my public IP but if you do a reverse lookup for my IP you will get random123.dyn.optonline.net. When ever a client tries to connect to the FTP it takes a very long time about 60 seconds to even get the authentication. If the Users are able to authenticate its so slow it's not even usable. What is strange is that AFP over the internet works perfect, I guess it doesn't rely on reverse DNS. I also tried to add the dyn.optonline.net zone to the internal DNS server but still didn't help.
    ANYONE have any suggestions??

Maybe you are looking for

  • Can I download to a Blu-ray Player

    I currently have my internet set up to download to my Directv for Video on Demand and other Apps. I have a Blu-ray player that has a USB port. My Question : Can I also download a movie/video to my Blu-Ray player via the USB or Is there a way of downl

  • Why does my iBook not have a file size on the iBookstore?

    Hi everyone, I apologise if this has already been answered, however, I could not find an answer anywhere. Basically, I submitted a children's iBook (The Tale Of Blob-Ba-Cus) to the iBookstore in June. In the section on the iBookstore where is says au

  • DLL needs to be in the same folder as LabView85.exe

    I initialise a spectrometer using a call to a dll through a call function library node. The dll was supplied with the spectrometer (which also came with its own stand alone software) and was installed in the spectrometer folders in C:\Program Files\S

  • Changing Asset Base Value

    I have bought one asset on 2006. It is getting depreciated every year. After 3 years I find that my asset value is higher than it should actually be. I want to change the asset value. Can I make the changes, if yes, How?

  • Dynamically invoking a web service.

    How can i dynamically invoke a web service using jax-ws proxy?