Suggestions needed for backing up MacBook?

What's the easiest way for my daughter to back-up her MacBook? She has a USB external hard drive. Thanks, Bill

Basic Backup
Get an external Firewire drive at least equal in size to the internal hard drive and make (and maintain) a bootable clone/backup. You can make a bootable clone using the Restore option of Disk Utility. You can also make and maintain clones with good backup software. My personal recommendations are (order is not significant):
1. Retrospect Desktop (Commercial - not yet universal binary)
2. Synchronize! Pro X (Commercial)
3. Synk (Backup, Standard, or Pro)
4. Deja Vu (Shareware)
5. PsynchX 2.1.1 and RsyncX 2.1 (Freeware)
6. Carbon Copy Cloner (Freeware - 3.0 is a Universal Binary)
7. SuperDuper! (Commercial)
The following utilities can also be used for backup, but cannot create bootable clones:
1. Backup (requires a .Mac account with Apple both to get the software and to use it.)
2. Toast
3. Impression
4. arRSync
Apple's Backup is a full backup tool capable of also backing up across multiple media such as CD/DVD. However, it cannot create bootable backups. It is primarily an "archiving" utility as are the other two.
Impression and Toast are disk image based backups, only. Particularly useful if you need to backup to CD/DVD across multiple media.
Visit The XLab FAQs and read the FAQs on maintenance, optimization, virus protection, and backup and restore. Also read How to Back Up and Restore Your Files.
Although a USB drive will also work they are much slower than Firewire drives.

Similar Messages

  • What charger do I need for my 2008 macbook pro 15"

    what charger do I need for my 2008 macbook pro 15"?

    This one:
    http://store.apple.com/us/product/MC556LL/B/apple-85w-magsafe-power-adapter-for- 15-and-17-inch-macbook-pro
    Ciao.

  • Is an anti-virus needed for a new macbook pro?

    Is an anti-virus needed for a new macbook pro with retina display?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • How much space do I need for back up when I upgrade?

    Hi All,
    I'm going to upgrade to 10.8 from 10.6.8.
    I have never used time machine before, but am planning to do so now to back up before upgrading.
    My disc is around 600GB in total.
    If all goes fine, after a few days I plan to back up again with the new osx, continue from that point making regular back ups in 10.8.
    Question: Do these new back ups in 10.8 start from scratch as its a new OS, or will Time Machine just add the changes to the first one I did, like it would normally do.
    The reason I ask is that I'll have no need for the 10.6.8 back up once all is installed and working fine and backed up in 10.8.  So if its a fully new back up, then I'd like to delete the inital one so I'm not using 500gb of space twice.
    Thanks for your help.
    Richard

    If you perform an upgrade to Mountain Lion, Time Machine will carry on using the backup you started with Snow Leopard, so it will continue making incremental backups. Also, it will keep your Snow Leopard backups

  • Best hard drives for backing up macbook pro?

    What is the best harddrive for backing up my macbook pro?

    ALL HD WILL FAIL, so asking about A (single , one) HD is always the wrong question, its redundancy and more redundancy.
    huge storage, low cost, high quality, very small and portable.
    BEST FOR THE COST, Toshiba "tiny giant" 15mm thick  2TB drive (have several of them, lots of storage in tiny package)    $100
    http://www.amazon.com/Toshiba-Canvio-Connect-Portable-HDTC720XK3C1/dp/B00CGUMS48    /ref=sr_1_3?ie=UTF8&qid=1390020791&sr=8-3&keywords=toshiba+2tb
    best options for the price, and high quality HD:
    Quality 1TB drives are $50 per TB on 3.5" or  $65 per TB on 2.5"
    Perfect 1TB for $68
    http://www.amazon.com/Toshiba-Canvio-Portable-Hard-Drive/dp/B005J7YA3W/ref=sr_1_ 1?ie=UTF8&qid=1379452568&sr=8-1&keywords=1tb+toshiba
    Nice 500gig for $50. ultraslim perfect for use with a notebook
    http://www.amazon.com/Toshiba-Canvio-Portable-External-Drive/dp/B009F1CXI2/ref=s    r_1_1?s=electronics&ie=UTF8&qid=1377642728&sr=1-1&keywords=toshiba+slim+500gb
    *This one is the BEST portable  external HD available that money can buy:
    HGST Touro Mobile 1TB USB 3.0 External Hard Drive $88
    http://www.amazon.com/HGST-Mobile-Portable-External-0S03559/dp/B009GE6JI8/ref=sr    _1_1?ie=UTF8&qid=1383238934&sr=8-1&keywords=HGST+Touro+Mobile+Pro+1TB+USB+3.0+7 2 00+RPM
    Most storage experts agree on the Hitachi 2.5"
    Hitachi is the winner in hard drive reliability survey:
    Hitachi manufacturers the safest and most reliable hard drives, according to the Storelab study. Of the hundreds of Hitachi hard drives received, not a single one had failed due to manufacturing or design errors. Adding the highest average lifespans and the best relationship between failures and market share, Hitachi can be regarded as the winner.
    Methodology to protect your data. Backups vs. Archives. Long-term data protection
    Hard drives aren't prone to failure…hard drives are guaranteed to fail (the very same is true of SSD). Hard drives dont die when aged, hard drives die at any age, and peak in death when young and slowly increase in risk as they age.
    Never practice at any time for any reason the false premise and unreal sense of security in thinking your data is safe on any single external hard drive. This is never the case and has proven to be the single most common horrible tragedy of data loss that exists.
    Many hundreds of millions of hours of work and data are lost each year due to this single common false security. This is an unnatural disaster that can be avoided by making all data redundant and then redundant again. If you let a $60 additional redundant hard drive and 3 hours of copying stand between you and years of work, then you've made a fundamental mistake countless thousands of people each year have come to regret.
    Countless people think they're safe and doing well having a single external backup of their vital data they worked months, years, and sometimes decades on. Nothing could be further from the truth. Never let yourself be in situation of having a single external copy of your precious data at any time.

  • Is Recovery Disk Needed for Early 2011 MacBook Pro (A1278)

    Early 2011 MacBook Pro (A1278)
    I'm planning on putting in a new hard-drive (SSD) after a little scare with my factory hard-drive and the mounting bracket coming loose.
    The plan was to open it up, install the hard drive, restart with Command-R held down, enter OS X Recovery, and finally restore from my Time Machine back-up.
    However... I've heard that my model may not have the ability to enter OS X Recovery without a DVD that was shipped with the hardware. First, is this true? When I had issues with the current hard drive, I was able to use Command-R to enter OS X Recovery. It even appeared to have me connect to the internet and looked like it downloaded the application. Does that indicate that I should be able to do that again? Or did that get pulled from the hard-drive somehow? Second, if I need a disk - I did NOT get a disk from Apple when I purchased my device from the store. I do NOT throw things away (I have all the little inserts and everything still in the box, even the receipt). Can I obtain this disk from Apple for free?

    The Early 2011 MacBook Pro supports 16 GB of RAM, although Apple says it only supports 8 GB of RAM.
    You can buy more RAM at OWC or Crucial > http://eshop.macsales.com/shop/memory/Apple_MacBook_MacBook_Pro/Upgrade/DDR3_133 3MHz_SDRAM You can find memory compatible with Macs in other sites, but I recommend those two sites because you can be sure that the RAM will be compatible.
    If you need help installing memory > http://support.apple.com/kb/ht1270

  • Urgent Suggestions needed for best way to solve the problm

    Hi Everybody,
    I am working on an application which has to graphically show the data in the database. We are using JSP for the front end (the view for the time being will be simple, with text boxes and frames and DHTML) and tomcat as the Server. The data is huge and there ain't much business logic involvd (the user when he clicks on a URL I get the data pertaining to that particular table or column). Now my question is can Tomcat handle such huge data. What do u guys suggest, should I cache data at my server and server to the clients (instead of connecting to the DB for each and every request) If yes, can you guys please suggest a good way to cache data, I mean hat TableModel or HashMap will store data from different tables. Also the DB isn't updated for a while everyday. Also let me know if any of u guys still think a 3 -tier approach is advisable instead of the 2-tir approach
    Thanks guys who made it this far

    Well, of course a 3-tier approach is advisable. Also, yes, Tomcat can handle what you are doing. As far as caching data on the server, that is going to depend on your database and other requirements. Now about the graphical nature, you aren't going to be able to use JSP to draw graphics. The only way you can do it is to draw the graphics on the server-side, write out JPG files, but then the JSP won't know anything about where the image is, unless you always write the same number of images, in the same place, every time. Otherwise, you need an Applet. Hope that helps.

  • ........ Expert  suggestion needed for Loading Data in DB

    Hi all
    The current requirement we have is to Load data from Excel File to oracle Databases.
    The Excel file has around 30 Sheets , each corresponds to a table, ( means 30 tables in the database) .
    Currently we are using sqlldr commands to load data from CSV files to the Oracle Database. The only problem is that sometime the DBA has to go out or is busy workign on somthing else, so May i kindy get some expert suggestions on how to automate this DataLoading Task.
    Somebody has suggested to My Manager ( who is not aware of oracle and IT at all) that data can be loaded via ODBC. It is suggested to him that all we need to do is to place the CSV files on the Server at a particular folder and Oracle will do the rest.
    I am not that proficient in Data loading methods.. so may i know any technique which will simplify/automate the Task.
    I mean how can we automate so that every time , the the sql loader scripts run at command promt. I think data base ( Oracle ) as nothing to do with command promt i feel. isnt it ..
    Kindly have ur expert./experienced suggestions.
    I would be highly grateful to all
    Regards

    To automate sqlldr scripts, you would usually write a OS script file that will periodically looks for files in a given directory and run the sqlldr commands:
    - on Windows: .bat or .wsh files to be scheduled with "at" command or windows scheduled tasks tool
    - on Unix: a script shell in the crontab.
    Much more complicate but without any OS script:
    - write a PL/SQL code to read, parse the file to be loaded using UTL_FILE
    package
    - this PL/SQL code must also generate INSERT statements and process errors ...
    - this PL/SQL code can be scheduled with DBMS_JOB package to run a periodic intervals.
    Message was edited by:
    Pierre Forstmann

  • Buying suggestion needed?  iMac or Macbook Pro?

    I'm looking to purchase a new computer within weeks, but i couldn't decide which one to go for.(im using a Macbook Core Duo 2G now) The reason of buying a new one if cuz im getting into video and picture editing stuff, and i feel the need of a powerful machine. My budget is about 1600-2000, which includes the higher end 20" iMac, the lower end 24" and the entry level Macbook Pro. Will the iMac be a little faster than the Macbook Pro? Which one would you guys recommend?
    PS. I travel to Asia ones a year for 4-6 weeks. Otherwise i would have no prb choosing the iMac.
    Thanks in advance

    i would go for imac and add another gb of ram for performance
    http://www.apple.com/imac/specs.html
    http://www.apple.com/macbookpro/specs.html
    macbook pro has only 17" monitor size which would be harder on your eyes for your photo/video stuffs (where did you get the 24" size?) the entry level of macbookpro is 15"
    imac on the other hand has 20" and 24" monitor size

  • Best method for backing up macbook air?

    Please tell me what would be the best method to back up my macbook air?

    Yes, this i know, Since I have nearly 100 HD laying around, when I clone my system, its bootable, and the second HD becomes the defacto recovery
    at the very worst, you can reload the OS online.       But yes, youre correct, but Superduper is FREE, and CCC surely isnt.
    as a "clone it all" option, Superduper is great for HD upgrading and emergency backup for laptop HD.  Since laptops HD are prone to failure (not SSD as in the AIR), keeping a cloned backup is a great idea.
    But yes, your right, ......I consider a second cloned HD a "recovery HD", ......but not in the sense you imply.......  
    An ERROR that both superduper and CCC make in a CLONE, however, is they write the BOOT FILES in a diff. location, so if you install the replacement HD after a crash, it will (not 1st time which is always slow) cause slightly slower startup from poweron.......in which case you have to reinstall the OS on the CLONE...........that IS if you care that much about a few extra seconds boot time on your replacement cloned HD.
    But LION and MOUNTAIN LION systems *also* have "Network Recovery", which can download and install without a recovery volume.

  • Hi , Need Help Understanding proper software needed for my new macbook first time having it

    im using a macbook pro 13inch and i just want to know what software i have to install to keep it up to date and safe from the flashplayer problem

    Keep the system software up to date is all you really need to do. The malware to which you refer had nothing to do with Adobe's Flashplayer.
    Helpful Links Regarding Malware Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
              Mac OS X Snow Leopard and malware detection
              OS X Lion- Protect your Mac from malware
              OS X Mountain Lion- Protect your Mac from malware
              About file quarantine in OS X
    If you require anti-virus protection I recommend using ClamXav.
    You should upgrade OS X to the latest version, 10.8.3, provided your computer is able to run Mountain Lion:
    Upgrading to Mountain Lion
    To upgrade to Mountain Lion you must have Snow Leopard 10.6.8 or Lion installed. Purchase and download Mountain Lion from the App Store. Sign in using your Apple ID. Mountain Lion is $19.99 plus tax. The file is quite large, over 4 GBs, so allow some time to download. It would be preferable to use Ethernet because it is nearly four times faster than wireless.
         OS X Mountain Lion - System Requirements
           Macs that can be upgraded to OS X Mountain Lion
             1. iMac (Mid 2007 or newer) - Model Identifier 7,1 or later
             2. MacBook (Late 2008 Aluminum, or Early 2009 or newer) - Model Identifier 5,1 or later
             3. MacBook Pro (Mid/Late 2007 or newer) - Model Identifier 3,1 or later
             4. MacBook Air (Late 2008 or newer) - Model Identifier 2,1 or later
             5. Mac mini (Early 2009 or newer) - Model Identifier 3,1 or later
             6. Mac Pro (Early 2008 or newer) - Model Identifier 3,1 or later
             7. Xserve (Early 2009) - Model Identifier 3,1 or later
    To find the model identifier open System Profiler in the Utilities folder. It's displayed in the panel on the right.
         Are my applications compatible?
             See App Compatibility Table - RoaringApps.
         For a complete How-To introduction from Apple see Upgrade to OS X Mountain Lion.

  • Suggestions needed for NAS

    I'm looking at upgrading my home kit. I want to ditch the MDD and get a laptop instead (it's a space issue). As this is going to remove 1TB of available storage, I'm after a NAS to replace it. Can anyone recommend one based on the following criteria, in order of importance:
    1. It must be quiet. This is non-negotiable. I have a small flat and there's nowhere discreet to put a noisy box.
    2. There must be some data safety. Ideally, I'd like to use this as the backup device for the laptop as well as bulk data storage and I'd like to RAID it if possible. So a single disk is out.
    3. Future-proof. Ideally, it'll be upgradeable. I may need more space in the future.
    I've been looking at QNAP, Netgear's ReadyNAS and D-Link's DNS323, but there's very little info on noise specs. And I don't take marketing speak at face value, so personal recommendations please.

    Basic Backup
    Get an external Firewire drive at least equal in size to the internal hard drive and make (and maintain) a bootable clone/backup. You can make a bootable clone using the Restore option of Disk Utility. You can also make and maintain clones with good backup software. My personal recommendations are (order is not significant):
    1. Retrospect Desktop (Commercial - not yet universal binary)
    2. Synchronize! Pro X (Commercial)
    3. Synk (Backup, Standard, or Pro)
    4. Deja Vu (Shareware)
    5. PsynchX 2.1.1 and RsyncX 2.1 (Freeware)
    6. Carbon Copy Cloner (Freeware - 3.0 is a Universal Binary)
    7. SuperDuper! (Commercial)
    The following utilities can also be used for backup, but cannot create bootable clones:
    1. Backup (requires a .Mac account with Apple both to get the software and to use it.)
    2. Toast
    3. Impression
    4. arRSync
    Apple's Backup is a full backup tool capable of also backing up across multiple media such as CD/DVD. However, it cannot create bootable backups. It is primarily an "archiving" utility as are the other two.
    Impression and Toast are disk image based backups, only. Particularly useful if you need to backup to CD/DVD across multiple media.
    Visit The XLab FAQs and read the FAQs on maintenance, optimization, virus protection, and backup and restore. Also read How to Back Up and Restore Your Files.
    Although a USB drive will also work they are much slower than Firewire drives.

  • What kind of firewire do I need for a Black MacBook?

    I am trying to hook my Canon 3CCd Digital Video Camcorder to my Black MacBook, and I want to make sure that I get the correct Firewire cable.  What is the name and kind of cable that I need?

    Your MacBook uses 'FireWire 400'.....what the camera needs I do not know....

  • What specific HD replacement do I need for a 2010 macbook air A1327?

    I need to replace the HD in a 2010 macbook air A1327.  Is there a specific one that I need to get?

    Your model does not have an HDD. It has an SSD that cannot be replaced by the user.

  • What OS do I need for my 2007 MacBook?

    I was given a MacBook 2007 - but it was wiped clean and does not have an OS installed. Which on can I purchase for this? It has a Core 2 CPU,  2.2 GHz, 1 GB RAM AND 120 GB HDD.
    Thanks
    J

    A Late 2007 MacBook with Core 2 Duo processor can run Leopard (no longer available from Apple) or Snow Leopard (available from the on-line Apple store for $20 US.  With Snow Leopard it is also possible to purchase ($20 US) Lion and download from the on-line store.  Snow Leopard is necessary to build Lion on top of.
    See: http://store.apple.com/us/search/snow-leopard
    for Snow Leopard and Lion ordering.
    With only 1 GB memory it would be a good idea to add more memory, OWC, http://www.macsales.com and Crucial, http://www.crucial.com are the best sources of reliable, guaranteed to work memory for a Mac.

Maybe you are looking for

  • Problems with photoshop CC on a windows 8

    I have downloaded the trial of CC on Windows 8 and the photoshop does not work. I saw there is a lot of people with the same problem, and i've tried the solutions in this forum and it is still not working. I'm willing to buy the photoshop +  lightroo

  • GRC AC 10- HR Triggers

    Hi, Please refer to the note number SAP Note 1591291 - GRC 10.0 - HR Trigger configuration for HR Trigger configuration. The materials are in below like: https://sapmats-de.sap-ag.de/download/download.cgi?id=5KU0MSXE2SCM78GJU8MM5W3P21VXU8IXYNAYO135V6

  • IPhoto'11 crashed and deleted all my photos

    I've recently updated to iPhoto'11 as prompted. Last night I had just uploaded over 200 photos and now all I can see are black thumbnails with no photos, all the cover albums are of the same photos. When I opened up one of the album, it crashed then

  • Apple Watch Pre Order Ship Date?

    I pre-ordered the apple watch at 12:05 am PST. My delivery date says May 13th-May 27th...even though I thought it was supposed to arrive on April 24th. I am actually moving May 15th, so I'm not sure if I should change my shipping location? Any sugges

  • Command line creating of users fails to correctly set afp:// based home dir

    i'm using a script to make users. they come and go quite a lot, don't want to be using a mouse all day long. i thought it would be simple. dscl /LDAPv3/127.0.0.1 -create /Users/user1 NFSHomeDirectory /network/servers/some.server.here/path with some o