System-level EQ for iMac speakers?

Hello,
I just got a 24" iMac (aluminum), and it's amazing.
Well, the speakers aren't. They are not terrible, just kind of so-so. And in general, that's okay with me. I have a set of external speakers I could repurpose to my iMac, but I'd rather leave them where they are.
So, I played around with iTunes' equalizer to figure out what would make it more acceptable to me. I think Treble Boost would make it sound satisfactory for my current purposes. But I wish I could get such an EQ system-wide, so that it doesn't sound "off" when I'm toying in GarageBand or watching movies.
Anybody know of any fixes? User-friendly / AppleScript / Automator / 3rd Party (preferably free, but I'm open to paying for well-made products) are all welcome.

After a while, I've noticed that the EQ on the iMac doesn't bother me any more.
Either it was fine all along, or it's not fine and I got used to it, or I was too used to my laptop's speakers before I got the iMac. (Heh.)
Anywho, if anybody does know of any utilities to adjust system-wide EQ, I'd still be interested, so please do share.

Similar Messages

  • Is there any system level support for RAW files from an Olympus XZ-10 camera.  I use Lion and iPhoto version 9.4.2

    Is there any system level support for RAW files from an Olympus XZ-10 camera.  I use Lion and iPhoto version 9.4.2

    If there is I can not find it - Google provides a list of possible methods form Adobe and others
    LN

  • Best anti virus and system administration software for iMac?

    I am wondering if there is software to maintain, clean my Mac, like there is with a PC.  To ensure optimal performance.

    How to maintain a Mac
    1. Make redundant backups, keeping at least one off site at all times. One backup is not enough. Don’t back up your backups; all should be made directly from the original data. Don’t rely completely on any single backup method, such as Time Machine. If you get an indication that a backup has failed, don't ignore it.
    2. Keep your software up to date. In the App Store or Software Update preference pane (depending on the OS version), you can configure automatic notifications of updates to OS X and other Mac App Store products. Some third-party applications from other sources have a similar feature, if you don’t mind letting them phone home. Otherwise you have to check yourself on a regular basis.
    Keeping up to date is especially important for complex software that modifies the operating system, such as device drivers. Before installing any Apple update, you must check that all such modifications that you use are compatible. Incompatibility with third-party software is by far the most common cause of trouble with system updates.
    3. Don't install crapware, such as “themes,” "haxies," “add-ons,” “toolbars,” “enhancers," “optimizers,” “accelerators,” "boosters," “extenders,” “cleaners,” "doctors," "tune-ups," “defragmenters,” “firewalls,” "barriers," “guardians,” “defenders,” “protectors,” most “plugins,” commercial "virus scanners,” "disk tools," or "utilities." With very few exceptions, such stuff is useless or worse than useless. Above all, avoid any software that purports to change the look and feel of the user interface.
    The more heavily promoted the product, the more likely it is to be garbage. The most extreme example is the “MacKeeper” scam.
    As a rule, the only software you should install is that which directly enables you to do the things you use a computer for — such as creating, communicating, and playing — and does not modify the way other software works. Use your computer; don't fuss with it.
    Safari extensions, and perhaps the equivalent for other web browsers, are a partial exception to the above rule. Most are safe, and they're easy to get rid of if they don't work. Some may cause the browser to crash or otherwise malfunction.  Some are malicious. Use with caution, and install only well-known extensions from relatively trustworthy sources, such as the Safari Extensions Gallery.
    Never install any third-party software unless you know how to uninstall it. Otherwise you may create problems that are very hard to solve.
    4. Beware of malware. Malware is malicious software that circulates on the Internet. This kind of attack on OS X used to be so rare that it was hardly a concern, but it's now increasingly common, and increasingly dangerous.
    There is some built-in protection against downloading malware, but you can’t rely on it — the attackers are always at least one day ahead of the defense. You can’t rely on third-party protection either. What you can rely on is common-sense awareness — not paranoia, which only makes you more vulnerable.
    Never install software from an untrustworthy or unknown source. If in doubt, do some research. Any website that prompts you to install a “codec” or “plugin” that comes from the same site, or an unknown site, is untrustworthy. Software with a corporate brand, such as Adobe Flash Player, must come directly from the developer's website. No intermediary is acceptable, and don’t trust links unless you know how to parse them. Any file that is automatically downloaded from the web, without your having requested it, should go straight into the Trash. A web page that tells you that your computer has a “virus,” or that anything else is wrong with it, is a scam.
    In OS X 10.7.5 or later, downloaded applications and Installer packages that have not been digitally signed by a developer registered with Apple are blocked from loading by default. The block can be overridden, but think carefully before you do so.
    Because of recurring security issues in Java, it’s best to disable it in your web browsers, if it’s installed. Few websites have Java content nowadays, so you won’t be missing much. This action is mandatory if you’re running any version of OS X older than 10.6.8 with the latest Java update. Note: Java has nothing to do with JavaScript, despite the similar names. Don't install Java unless you're sure you need it. Most people don't.
    5. Don't fill up your boot volume. A common mistake is adding more and more large files to your home folder until you start to get warnings that you're out of space, which may be followed in short order by a boot failure. This is more prone to happen on the newer Macs that come with an internal SSD instead of the traditional hard drive. The drive can be very nearly full before you become aware of the problem.
    While it's not true that you should or must keep any particular percentage of space free, you should monitor your storage use and make sure you're not in immediate danger of using it up. According to Apple documentation, you need at least 9 GB of free space on the startup volume for normal operation.
    If storage space is running low, use a tool such as OmniDiskSweeper to explore the volume and find out what's taking up the most space. Move seldom-used large files to secondary storage.
    6. Relax, don’t do it. Besides the above, no routine maintenance is necessary or beneficial for the vast majority of users; specifically not “cleaning caches,” “zapping the PRAM,” "resetting the SMC," “rebuilding the directory,” "defragmenting the drive," “running periodic scripts,” “dumping logs,” "deleting temp files," “scanning for viruses,” "purging memory," "checking for bad blocks," "testing the hardware," or “repairing permissions.” Such measures are either completely pointless or are useful only for solving problems, not for prevention.
    Let go of the Windows mentality that every computer needs regular maintenance such as "defragging" and "registry cleaning." Those concepts do not apply to the Mac platform.
    The very height of futility is running an expensive third-party application called “Disk Warrior” when nothing is wrong, or even when something is wrong and you have backups, which you must have. Disk Warrior is a data-salvage tool, not a maintenance tool, and you will never need it if your backups are adequate. Don’t waste money on it or anything like it.

  • Windows "system restore" equivalent for iMac

    After some reading, it is my understanding that the most equivalent of a windows "system restore" for the Mac would be via a 3rd party application such as SuperDuper. Am I correct? I believe I understand that "restoring" the system with Time Machine to a specific date/time requires utilizing the install disk, selecting the Time Machine volume and then picking the "snapshot" you want.
    I'm a new Mac user after 20 years with PC's. Please forgive my elementary knowledge of MacIntosh.

    wamcgeemd,
    It is pretty common knowledge that the Windows "registry" is an absolute nightmare, where the installation of even (otherwise) innocuous software can cause serious conflicts that can cripple a Windows installation. Even during updates to Windows itself, a file in the registry might be written improperly or incompletely (for example), and the results could be disastrous. It is for this reason that Windows automatically creates "restore points" before updates. The problem has (historically) been prevalent enough to make this necessary. In short, a Windows user's ability to "roll back" to an earlier state exists simply because it is frequently needed.
    This is not the case in OS X, which contains nothing even remotely like the "registry." While there have been (perhaps) a handful of updates to OS X- in all its variations- that have "broken" specific functionalities, almost all of these incidents have been cases where incompatibilities have occurred with the hardware or firmware of third-party peripherals. If the problem originated with the update itself, a fix has always been forthcoming very quickly from Apple. In all other cases, the fix has been new firmware from the device manufacturer. Of course, there have also been a few cases of third-party software being "broken" by a given update to OS X. I should stress here that all of these above occurrences have been very, very few and far between.
    By far, the most common problem with updates is that they have the potential to cause disk errors. It is not that the update, itself, causes problems, but that the nature of an OS update is such that it can expose weaknesses in the file system. When the file system fails, a disk error occurs and data is often lost. Since the data being handled at the time of the disk error is all critical system data, a disk error like this will most likely cripple the OS.
    Since a disk error of this nature necessitates a complete erasure of the hard drive in order to be properly fixed, what is required is not a "roll back," but a completely new installation on a newly formatted volume.
    So, we have two potential cases: 1) Something in one's environment gets "broken" by an update, and 2) One encounters a disk error during an update. It is true that in case #1 above, some ability to "roll back" would be helpful. This functionality does exist with Time Machine, although it may not be as quick or simple as using a Windows "restore point." On the other hand, this type of problem is vanishingly rare (I have never encountered it). In case #2 above, a "roll back" wouldn't work or be desired, even if it existed.
    The moral to all this is that restore points and "roll back" make sense for Windows, and Time Machine makes sense for OS X.
    Scott

  • BindByName system level setting

    Is there or will there ever be a system level parameter for OracleCommand.BindByName. It's very frustrating to have to set it everywhere, especially if you have common frameworks that use the generate IDbCommand/IDbConnection interfaces with a Connection factory.
    We had to put an explicit type test into our Persistance framework just to see if it was an OracleCommand and set that property. That means EVERY call regardless of the target database has to go through that check.

    G'day,
    Open the Java Console and execute "dump system and
    deployment properties" which shows property values,
    and see if what you want is there.Thanks, but I don't think I can use these at the system level, can I?
    I did try using ${user.home} but that doesn't work.
    So, are there any variables other than $USER_HOME and $JRE_HOME that can be used when setting system level properties?
    More info, http://java.sun.com/j2se/1.5.0/docs/guide/deployment/deployment-guide/properties.html
    Thanks,
    Chris.

  • What are the system requirements for iMac for Photoshop CS6?

    What are the system requirements for iMac for Photoshop CS6?
    Just installed it and get a message saying it doesn't work on "this type of Mac".
    I have an iMac a few years old.....and Dual Core.

    System requirements | Photoshop

  • Just purchased Quicktime Pro 7, for iMac G5 with system OS X 10.4.11, AND cannot get at Quick Pro 7 despite the keys.

    Just purchased Quicktime Pro 7, for iMac G5 with system OS X 10.4.11, AND cannot get at Quick Pro 7 despite the keys.

    If the Pro registration worked the word Pro has been removed from many menu options.
    The application remains just QuickTime Player 7 but the Pro features have been enabled.

  • Is there settng source system level for master data delta loading perfo

    Hi Viwers,
    Good Morning,
    I am loading data from the source to target level for Master data it is taking too much time,I would like to know the how to increase the master data delta loading performance.
    I would like to know the source system level is there any setting requited & target system level also.
    Please give your inputs..........
    Thanks & Regards,
    Venkat Vanarasi.

    Venkat -
            Are u deleting the indexes of data target before delta loading ? If not,delete the indexes of data target before delta loading  and recreate them after delta loading is done.This procedure increase load performance.You can perform whole procedure in process chain.
    Anesh B

  • Would system level backups be acceptable for storing old db backups?

    Lets say that you use RMAN to make and then store backup images on a centralized on-line storage media. Access to recent backup data can be acquired via the online storage but eventually data must be removed or archived to another media or storage.
    Would it be an acceptable practice to use system level backups (backups of the whole on-line storage server) and then use that as the source to retrieve archived database data?
    If not, can you list some reasons why this would not be acceptable?
    Thanks

    Thanks for the quick response. The scenario that I was describing entails having the full RMAN backup images including archive logs on on-line storage media. This centralized storage media may be storing many instances and for each instance there may be several backup images.
    I thought that since each database may have it own archiving requirements that lumping all of the changed files from the whole online storage server and making a copy of that might introduce issues when it came time to trying to restore data for a specific database.
    I guess the main issue (if it is even an issue) would be system-level vs database-level archiving to tape.
    If RMAN is used to store backup images online and then those need to be moved to tape is this usually done at the database level or system level?
    While I know Oracle internals pretty well I don't have much experience in best practices for backing up database to tape and needing to get to that data in the future.
    Thanks again.

  • What is the Highest Level of MAC OS X level for iMAC G4?

    What is the Highest Level of MAC OS X level for iMAC G4?
    Right now, I'm running MAC OS X version 10.3.9.
    Can I run Aperture iMAC G4?

    OK,
    I am now officially an certified idiot. I have 10.5.8 running, and was told that 10.4 makes a G4 run smoother. I did notice that, however I blamed it on firefox, safari and mail. Also I noticed that pages and word take quite some time to start up.
    My apologies for all the confusion. But before I consider reinstalling 10.4, I thought I'd pop the question on this forum.
    Do you think it will make a difference, and what are your thoughts on security risks if it is true that with 10.4 you can't run the latest versions of Safari and Firefox?
    Thanks bluebird

  • Requirements for iMac G4

    i found an iMac G4 for sale on craigslist and was thinking about buying it. these are the specs:
    Apple iMac G4 17"
    Model M6498
    G4/1.25GHz, 256MB, 80GB
    Super Drive, 10/100, 56K
    GeForceFX5200Ultra 64MB
    -1.25GHz PowerPC G4 processor
    -256K on-chip level 2 cache running at 1.25GHz
    -256MB of DDR SDRAM; supports up to 1GB
    -80GB Ultra ATA hard drive
    -SuperDrive (DVD-R/CD-RW)
    -17-inch (viewable) widescreen active-matrix LCD display with easy height, tilt, and swivel adjustment
    -NVIDIA GeForce FX 5200 graphics processor with 64MB of DDR video memory
    -Built-in 56K V.92 modem and telephone cable
    -Built-in 10/100BASE-T Ethernet (external DSL and cable modem ready)
    -Two FireWire 400 ports; three high-speed USB 2.0 ports; two USB 1.1 ports on keyboard
    -Ready for AirPort Extreme wireless networking
    -Audio: integrated microphone; Apple speaker minijack; headphone jack; audio line in minijack
    -Apple Pro Speakers
    -VGA video output; S-video and composite video output
    -Apple Keyboard and Apple Mouse
    -Easy Internet access
    -Included software: Mac OS, Mac OS X Mail, iChat, Safari, Sherlock, Address Book, QuickTime, iLife (includes iTunes, iPhoto, iMovie, iDVD), iSync, iCal, DVD Player, AppleWorks, AOL, Quicken 2003 Deluxe, World Book 2003 Edition, Mac OS X Chess, Sound Studio, Acrobat Reader
    -Meets ENERGY STAR and TCO 95 requirements
    i wanted to know if these specs were enough for a simple computer user to download and listen to music, store photos, and basic word processing. the ram looks a little low, but it has DDR ram, so i figured that wouldn't be too hard to upgrade. any suggestions on whether or not to buy it? thanks.

    Sadf,
    i noticed it has SODIMM as the "user" ram, and DIMM as the "factory" ram...
    The factory RAM is on the logic board and accessing this RAM requires that the bottom of the lower housing has to come off. Not a trivial procedure.
    This is from the service manual regarding the factory RAM:
    "Make sure that the memory installed on the logic board is compatible with the system. The computer accepts double-data rate (DDR) SDRAM DIMMs. DIMMs used in this slot must fit the following specification: PC2700 SDRAM DDR333 DIMMs for 167 MHz systems."
    and for the user installed RAM:
    "Note:
    DIMMs used in this slot should be a low-profile PC2700 (DDR333) SO-DIMM. Only
    the SO-DIMM slot is accessible by the user."
    Low End Mac:
    http://www.lowendmac.com/imacs/17in-imac-g4-1.25-ghz.html
    Notes that:
    "RAM: 256 MB, expandable to 2 GB using PC2700 (333 MHz) DDR SDRAM (officially supported to 1 GB by Apple)"
    OWC shows 1 GB modules for the user installed RAM:
    http://tinyurl.com/ahal5p
    Richard

  • HT1338 Is anti virus necessary for iMac? if so, what is the best software?

    Is anti virus necessary for iMac? if so, what is the best software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Surround sound for iMac

    I have Creative Inspire 4.1 4400 (http://static.clickbd.com/global/classified/item_img/895644_0_original.jpg), and I would like to get surround sound from speakers when I watch movies. I have done some research for some time, and I have no idea how to connect this to iMac.
    The speaker system has green and black cables (3.5mm). For now, I only have green cable connected to iMac, and I somehow get sound from all 4 speakers + subwoofer. But it is not a true surround effect since the sounds from rear speakers are the same as front speakers.
    This is what the speaker system looks like: http://img140.imageshack.us/img140/995/dsc02837n.jpg
    So, what do I need to get to have surround sound on iMac?

    Here is the video of the set-up: http://www.youtube.com/watch?v=HKA7nbdyAaQ&feature=youtu.be
    Again, this is what my speaker is: http://static.clickbd.com/global/classified/item_img/895644_0_original.jpg
    Here is the picture of the back of the subwoofer:http://img140.imageshack.us/img140/995/dsc02837n.jpg
    The green cable is for front speakers while black cable is for rear speakers. It doesn't have a separate cable for subwoofer.
    After doing some research, I've read that this speaker system is "not compatible with optical SPDIF sound cards." Is that related to the sound card I bought?

  • Installer DVDs for iMacs

    Hello Everyone,
    1. Can a pair of installer DVDs that came with one Intel iMac work on another iMac of the same model? I'm interested to know because I've just finished installing 18 of such iMacs in our office and I am considering keeping only a pair or two of the DVDs for troubleshooting purposes and distributing the rest to our technicians and others in the office to make them handy in case needed.
    2. Suppose I lose or misplace the installer DVDs that came with our MacBook Pro or a MacBook, can I also use the DVDs that came with an Intel iMac on these laptops in case I need to reinstall the operating system?
    Thank you
    MacBook Pro, PowerPC G4 Mac OS X (10.4.8) iLife -06
    PowerBook G4   Mac OS X (10.4.6)   iLife -06

    Yes, if the discs are for the exact same model (all same vintage Intel iMacs. Will not work, however, if you have Core Duo and Core 2 Duo models.)
    Obviously your site must have an appropriate site license because otherwise installing a single-user license on more than one CPU at the same time violates the license agreement.
    You cannot use any version of OS X that comes with a given Intel Mac model on a different Intel model. The builds and distributed versions are different for MacBooks and MacBook Pros, for iMacs, and for Mac Pros. They are also different for Core Duo and Core 2 Duo versions of the same model.
    Until Leopard is released next year there is currently no "universal" OS X installer for Intel Mac models.
    Why reward points?(Quoted from Discussions Terms of Use.)
    The reward system helps to increase community participation. When a community member gives you (or another member) a reward for providing helpful advice or a solution to their question, your accumulated points will increase your status level within the community.
    Members may reward you with 5 points if they deem that your reply is helpful and 10 points if you post a solution to their issue. Likewise, when you mark a reply as Helpful or Solved in your own created topic, you will be awarding the respondent with the same point values.

  • Option to disable iTunes volume control for remote speakers?

    I have noticed that with iTunes 10, the option to disable the volume control for remote speakers seems to have disappeared from Preferences>Devices. If you click the "?" button, the help window gives an explanation of what its for but the option to check/uncheck it clearly isn't there. Since iTunes 10, streaming my music from my iMac to my Denon receiver via Airtunes/Airplay with an Airport Express has been disappointing. The volume is far too low. With version 9 and every version prior, the volume control option was always there in preferences and I always had it disabled; music came through loud and clear but since this option appears to no longer exist, the volume through the Denon receiver fails to impress, even with the iTunes volume slider at max.
    Anyone else noticed steaming volume too low? If so, agree that it's a bug?
    Message was edited by: Brian I.

    I wholeheartedly agree with "I also used to disable the volume control to reduce the amount that my computer interferes with the sound before it gets to the external DAC." There is no reason why Apple shouldn't restore this important setting option as the volume control does negatively affect sound quality in a high-end set-up and we'd rather not just take their word for it that the volume control's maximum setting is the same as disabling it. Why does the volume slider change the output level even when using the Airport Express' digital output? It shouldn't, and it seems the sound is now being force sent through a stupid digital volume control for no good reason. If for no other reason the "disable" option should be restored to avoid inadvertent volume changes via the Remote app for iPod Touch and iPhone. Strangely as compared to several other posts here, my perceived volume level now seems louder than before, not softer as others are reporting. People that are serious about sound quality do not want iTunes or AirPlay (formerly AirTunes) to manipulate the volume level or any other aspect of the sound at all ever, as it can't help but only hurt. I also thought the "disable" setting was available in the Airport Utility previously, but it's vanished from there too.

Maybe you are looking for

  • Open folders in same window (in toolbar control button mode)

    Hi, when I set a finder window to hide the toolbar from view, using the toolbar control button in the top right, the folders open a new window when clicked. Is it possible to set them to open in the same window? Thanks

  • How to get the Hyper-V version/hostname from a linux guest?

    Hi, I am running a custom Linux VM on Windows Server 2008 R2 Hyper-V. I need to get the version/hostname of Hyper-V from the running custom Linux guest. How can I do that? I am having Integration Service 3.4 installed. Is there any option I can confi

  • Cut/Paste not working in Microsoft Remote Desktop for Mac

    Sirs, I am using Microsoft Remote Desktop V8.05 build 24428 on a Mac under the latest Mavericks OS, and I find that Cut and Paste are not working. When I paste on Remote Desktop Windows always pastes the last thing cut/copied under the Windows remote

  • My iphone wont play through my left earphone

    having problems palying music through my earphones, right side play fine but left side is very quite. also when i plug into my trucks radio it doesnt play through any of my left side of speakers. Anyone have any ideas?

  • Problem in data reconcilation

    Hi Experts, In the extractor 0EC_PCA_1 there are three key figure credit, debit and accumulated balance. we reconcile value of credit and debit in tcode 2kee or ke5z in R/3. Can anyone please tell how to reconcile figures of accumulated balance. Than