Warning "anti-viral" trojan virus circulating using apple icon

I accidently loaded a trojan virus when I thought I was downloading an anti-viral program sent from Apple - they use the Apple logo.  It then results in continuous pop-ups of *********** sites.  Apple tech support could not help but I found a website providing instructions to remove the malware.  Website is called "bleeping.com"  Yes, the irony of the name given what I had to get rid of - be careful.

This was "news" three weeks ago. And every day here, but mostly over on forum for Snow Leopard
There are dozens of articles, threads, links on how to help, as well as on what it is.
Apple Community threads "macdefender"
What is odd is a policy of turning customers away.
Microsoft links fake Mac AV to Windows scareware gang
http://www.reedcorner.net/news.php/?p=82
MacInTouch - security discussion
The most common and popular AV mentioned -
ClamXav
Intego Software 
Mac BitDefender
Norton for Mac
Sophos Anti-Virus for Mac Home Edition
MACDEFENDER Malware
ZDNet Security
Snow Leopard malware attacks
New MAC OS X scareware delivered through blackhat SEO
MacDefender Trojan
http://www.reedcorner.com/guides/macvirus/

Similar Messages

  • Can I use Apple TV if I have time Warner cable service? I have the Twc bundle of cable wifi and phone.  Thanks for your help!

    Can I use Apple TV with time Warner cable? I have the Twc bundle of cable, phone and wifi.  Thanks for your help!

    Cullentra wrote:
    ...Wishing you a happy 2014!
    ...and you.

  • Reoccurring warning, literally every 20 seconds: "This cable or accessory is not certified and may not work reliably with this iPhone." I am only using Apple devices. How can I eliminate the warning?

    Please help me eliminate this repeating warning message on my iPhone 5. It occurs several times a minute. I am only using Apple devices, so the warning is in error.  "This cable or accessory is not certified and may not work reliably with this iPhone."

    The cable may be damaged. Try another cable.
    Make sure it properly connected at both ends.

  • Warning. Stop using Apple's native email App.

    Stop using Apple's native email App, or else you will end up just like me, with no room for anything else.
    The thing is a memory gobbler.
    It eats memory like a hog and there is no way in the world to reclaim lost Gigabytes.
    You though you can get back your memory by deleting emails? You are wrong!
    You thought erasing email accounts will help? No. Another strikeout.
    There is no way to get your memory back. Neither the thing can be uninstalled.
    You will be better of not using Apple's email app ever!

    Been using Apple's mail app in iOS for years with a total of 9 different email accounts without a problem. As always, your personal experience and problems are not an indication of a fundamental flaw or even issue for the many MILLIONS of users world wide.
    Perhaps, if you just gave some actual details of your situation, someone here could actually help you.

  • Does Trojan Virus Works on Mac?

    Hey guys, i've downloaded a file from safari, and i've tried to open it up but all of a sudden my shophos anti-virus just pops and say there's a trojan virus with a 1/5 danger.
    If i'm right, i remember macs are "virus-free", and trojans are PC virus which shouldn't work on Mac.
    Please help!!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "archive extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Internet (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page. Its developers have had a lot of trouble getting it to do this without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" in OS X. Merely loading a page with malicious Java content could be harmful.
    Java is not included in OS X 10.7 and later. A separate Java installer is distributed by Apple, and another one by Oracle (the developer of Java.) Don't use either one unless you need it. At the moment, the Oracle version is blocked by Apple because of known security flaws that make it unsafe to use on the Internet. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog. Few websites have Java content nowadays, so you probably won’t be missing much.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Eliminate Java from your online workflow whenever possible. If a web page prompts you to use Java to do something that can be done without it, such as streaming video or downloading files, don't.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Is there an anti-viral software and spyware that is recommended??

    Is there anti-viral software and spyware that is preferred for the I-MAC and MAC book Pro??  I don't want to slow my system like one's I've used for PC's in the past.

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Trojan / Virus accessing email contacts

    Looking for some help please.
    For the past two days emails are being sent from my hotmail account, though I haven't sent them.  The emails are really random and are being sent to all my contacts in my address book and am thinking is it possible a Trojan/Virus may have attached itself to my contacts.  I have changed my hotmail password without success.  Is there any anti-software which can be used to check if I have a Trojan/Virus? Should I take it to an apple store?
    Thank you

    There is no malware capable of infecting any iOS device (iPad, iPhone, etc), so this is definitely not malware. What has undoubtedly happened is that your e-mail account has been hacked. See the information here:
    Someone is sending messages from my e-mail address!
    (Note that this page was written for Mac users, so information that page contains regarding malware is not applicable to your iOS device.)

  • What anti-phishing anti-spyware is best to use on Mac?

    What anti-phishing anti-spyware is best to use on Mac? Any need for any other protection, anti-virus, firewall or malware?

    If your profile is correct, you're running 10.4.8, in which case you need to update to 10.4.11 immediately. Not only will this fix a good number of bugs and security vulnerabilities, it will also let you run the most recent version of Safari.
    There is no anti-phishing software for the Mac. If you want a piece of software that combats that in addition to it's primary function, then you want <a href="http://agilewebsolutions.com/products/1Password"1Password</a>.
    There are no viruses for Mac OS X in the wild, nor spyware so there is no need for anti-virus or anti-spyware software. You can't protect against something that doesn't exist. The Mac already has a built-in firewall,; anything else is redundant and a waste. The only other malware is a Trojan Horse, but like any other software on Mac OS X, it requires user authorization before it can be installed, so as long as you aren't careless about what you download or install, you shouldn't have any problems.
    Mulder

  • Trojan Virus Detected

    While using Safari a notice stating Trojan Virus detected keeps appearing! Safe Booted once but very apprehensive !?

    HI and welcome to Apple Discussions...
    Malware perhaps but not a virus. Get MacScan
    You can use the demo for 30 days free and runs on Snow Leopard.
    Carolyn

  • Anti viral software recommendation

    anti viral software recommendation

    If you REALLY want anti virus, which you REALLY do not need. I would recommend AVG. It's free from CNET www.download.net . Like rk said you do not need it but Macs are beginning to become targets of Mal-Ware. Apple has released an update that keeps your Mac protected against Mal-Ware. Keep your Mac up to date and you should not have any issues. But, if you really feel like you need it go for the AVG. Stay away from Norton!!

  • I got the Trojan virus on my G56 Notebook PC, tried AVG to remove it hasn't worked!!!

    Can I get some assistance in removing this #^%$#%@$ Trojan Virus from my laptop... HELP!!!
    This question was solved.
    View Solution.

    Welcome Natty.
    Please take a look at this site.
    http://www.bleepingcomputer.com/combofix/how-to-use-combofix#uninstall
    The link to download then run COMBOFIX is there.
    You can get one or more of the online rep's to help you on there forum if needed..
    They are the best for a virus removal.
    Hope this helps.
    HP Expert Tester "Now testing HP Pavilion 15t i3-4030U Win8.1, 6GB RAM and 750GB HDD"
    Loaner Program”HP Split 13 x2 13r010dx i3-4012Y Win8.1, 4GB RAM and 500GB Hybrid HDD”
    Microsoft Registered Refurbisher
    Registered Microsoft Partner
    Apple Certified Macintosh Technician Certification in progress.

  • Use Apple TV to back-up iTunes?

    I am being forced to reformat my computer due to a virus. Do I need to back-up all my movies and songs on to a hard drive, or will I be able to use Apple TV to send all my media back to my computer once it is reformatted? Currently, my entire library is saved on to my Apple TV.
    One other question: The virus does not allow me to open iTunes, so how can I deauthorize that computer?

    Do I need to back-up all my movies and songs on to a hard drive
    Yes. An Apple TV, iPod, or iPhone is not intended to be a backup device and shouldn't be treated as one.
    The virus does not allow me to open iTunes, so how can I deauthorize that computer?
    You can't. If you run out of authorizations, you can use the Deauthorize All command. Otherwise, you should probably just leave it as is.
    (48848)

  • Can't close Firefox after eradicating Fake.Trojan virus

    Got infected with Fake.Trojan virus today while surfing email via Firefox. Successfully used Malwarebytes to clean up the mess but some carnage remains. On a WIn7 platform.
    During infection and since eradication I keep getting this message, "Firefox is already running, but is not responding. To open a new window, you must first close the existing Firefox process, or restart your system."
    Tried the following to no avail --
    1. Task Manager - The Firefox process doesn't show up.
    2. Restarting the PC - Same problem;
    3. Uninstalling & Reinstalling - Same problem; says it need to close first.
    4. Finding/fixing the Profile - %APPDATA%\Mozilla\Firefox\Profiles\ not found.
    5. Call to tech support at AVG - They've never seen this. They recommend a full reinstall of Windows (Ugh - don't even know where the disks are!).
    Any help welcome. Thanks. -j philly

    Thank you for the tip. I had already tried your suggestion but based on it decided to take a closer look. I also did a YouTube lookup using IE.
    But my first stop was to run that lengthy ChkDsk program to make sure all was structurally sound after the virus. I also bought the Pro version of Malwarebytes to take security even higher.
    I went to YouTube because I was having a hard time finding that profile folder the solution you gave me referenced. Answer that worked for me: Don't use the Start button to find your Profile, use your desktop explorer starting with your Users directory and drill down from there. Learned that here: http://www.youtube.com/watch?v=zRUgxlo4U4w&feature=related (Note: The speaker and video quality isn't great but his intent is good and his message had enough helpful content to get me started. Ohers may feel the same way.)
    Within the comments section replying to the above-referenced YouTube video, I then found one person who wrote this --
    "If your Firefox locks up with this error as the result of a "virus" which also happened to hide all your files and desktop icons, then none of these crap Windows XP 'fixes'on YOUTUBE will work.
    In 2012, you will need to install Google Chrome, make it your default browser/import bookmarks etc. Then run Firefox while Chrome is open, and Firefox will suddenly be unlocked! 8-) Amazing!!! Then just disarm Google Chrome and uninstall it, and you will have your Firefox back."
    His message wasn't so kind, but I did try his solution and it worked! All appears better.
    Thank you again to the community for assistance today and to jscher2000 in particular for taking the time. - j philly

  • Is there a fix for the new virus that hit apple computers called "FLASHBACK"?

    Is there a fix for the new virus that hit apple computers called "FLASHBACK"?

    Current recommendations is turn Java off.  Generally you don't need it.  Do not confuse it with Javascript which you do need for your browsers.   
    You can disable in the browser you are using and/or more globally using the Java Preferences too (in Utilities), General tab (uncheck the checkboxes).
    More new tricks from Flashback
    How to check for and disable Java in OS X
    Protect Yourself from the Mac OS X Java Vulnerability
    If it turns out you need it for some specific application or web site that you trust then turn it on only when running that application or visiting that site. If your work requires Java be enabled then at least disable it in your browsers.
    If you do need to run Java, be sure that you pick up the Java Software Update 7 posted recently that takes 10.6 and 10.7 up to Java SE 6 revision 31.
    Flashback is a moving target with lots of strains (various versions, permutations) and changing all the time.  So who knows what's next?

  • My new Ipod Touch 4 gives a overheating warning the second i want to use it .

    My new Ipod Touch 4 gives a overheating warning the second i want to use it or when i connect it to the loader. The ipod isn't even warm when it happens.

    Make an appointment at the Genius Bar of an Apple store. You have a defective iPod.
    Apple Retail Store - Genius Bar

Maybe you are looking for

  • How to install optional plug-ins

    I just read in the March issue of Photoshop User magazine about optional plug-ins you can download from http://www.adobe.com/support/downloads/detail.jsp?ftpID=4048. It includes the Contact Sheet II plug-in among others. The article described how to

  • Notifications not reflected in EP 7.0 in MSS. ECC 6.0 is Backend

    Hi Gurus We are implementing ESS/MSS in EP 7.0. In UWL We are able to see work items generating in Tasks tab. But in Notification tab the notifications which were shown in backend were not reflecting in the EP 7.0. There is no error message displayed

  • Searching/Restoring Mail on Time Machine

    Hello.  I am considering a Time Capsule and Time Machine on top of my existing Crashplan subscription.  I am particularly interested in a good backup plan for backing up Mac Mail and my iCloud account, since iCloud deletes e-mails put into trash afte

  • How to stop the counter after getting maximum amplitude from a waveform graph?

    I am using accelerometer, optical encoder and daq card (PCI MIO 16XE10) for my tyre balancing project. Basically i am trying to stop my edges count from the optical encoder to get the position for putting the mass for correcting the balancing. Could

  • Installing Leopard on new iMac, installation just goes on and on...

    Hi there! Just bought a new iMac 24" with OS X 10.4 installed. I ordered the Leopard upgrade and installed it today, and experienced the already documented problem where login password is seemingly accepted but after a few seconds the login window ap