What are my chances (messed up Macbook pro)?

While I was in the middle of the first question on a statistics test my Macbook pro froze.    I ended up having to hold the power button until it restarted and when it did turn back on it only would go to the disk utility screen and is taking forever to do anything.  It says the hard drive needs to be repaired, but I left the repair on overnight and it still is on the same item. 
So, I bought a new computer and am wondering what you guys think the chances are that the genius bar people can obtain my data.  I am a fool and haven't backed up the computer since February (I know, I know ) so at least I can get some of it back.  Any ideas?

well, if you're technically capable - take the hard drive off your Macbook Pro - install it in a usb enclosure (about $10) - once installed - connect it to your new computer and see if you can retrieve your data that way.  hopefully it's another Macbook Pro since windows will not be able to read it.
if it doesn't work that way - then put the hard drive back into your macbook pro and see if Apple can retrieve it for you.
good luck - hope you get it sorted out.

Similar Messages

  • What are good ssd drive for macbook pro 2012

    What good ssd drive good with a macbook pro 2012  with 10gb of ram and i hear intel sad are good  any ideas?

    I'm fond of OWC, OCZ, and Samsung SSDs.

  • What are the average temperatures a macbook pro should reach?

    Just wondering are the temperatures below normal for a four year old macbook pro? I am just a bit worried about it overheating!

    You needn't worry much because if you ever hit that temp the machine will shut down automatically. Certain activities such as watching movies, using Flash, playing some games can easily drive CPU and/or GPU temps into the 90s C. That would be considered high.

  • What are the dimensions of the macbook pro 13 inch shipping box

    What are the dimensions of the brown shipping box that the 13-INCH MBP is shipped in including the weight. Please give the dimensions in the order Length, Height, and Width .

    I have one in front of me, albeit 2009. 14 x10.5 x 3". This was the shipping box it came in; there wasn't an enclosing box.

  • What are some good apps for Macbook Pro?

    Hey guys! I am new to the Mac family. Just purchased a mid 2012 macbook pro 13 inch, base model the other day.
    You guys have any favorite apps that you like to use on your mac?

    appletv does not support any apps at all

  • What are odds of iMac and MacBook pro purchased at same time crashing within days of each other?

    HHas anyone else purchased late 2011 model iMacs AND MacBook Pro on the same day crash within days of each other?

    Sounds like something you did. Power surge or outage damaged the machines.

  • My MacBook Pro can't turn on again and apple said that the hard drive was broken. What are the chances of apple recovering my files on target disk?

    Okay basically my MacBook Pro won't turn on. It has a spinning loading sign and a bar that won't complete at the bottom. Rang apple said take it into the apple shop and they will try target disk. What is that exactly and what are the chances my photos and files can be recovered. I would go to the shop but I'm on vacation. Help would be appreciated thanks.

    This defines Target Disk Mode:
    http://support.apple.com/kb/PH10725
    Though not guaranteed, the chances are good that the data can be recovered.
    Ciao.

  • What are the chances on installing Windows 8 pro on mac?

    Hi guys, i just wanna know if what are the chances on installing a windows 8 pro on mac?
    I just bought a CD of windows 8 pro. Im planning to use it on my mac because i am currently studying a software which is applicable on windows such as Visual Studio 2008, 2010 or 2012.
    I am planning to use bootcamp for windows 8 pro, i dont like to use parallels or vm.
    and i heard about bootcamp doesnt support windows 8, is that true?
    If it is true, so does it means it is not possible to use windows 8 using bootcamp?
    Am i right that bootcamp offers the drivers or something?
    Or can i just update the drivers for windows manually, u know the thing which u can found it on control panel on windows.

    Grazzii wrote:
    Running Windows 8 on my iMac right now buddy. You don't actually need Bootcamp to do all the heavy work for you - it's just a parition tool. However, you will need Bootcamp tools once Windows is installed to get the most out of windows. Without the Bootcamp tools installed, Windows will run - your mouse and keyboard should also work, but the resolution, graphics, speed.etc will all be a little over the place. I used Bootcamp tools 3.0 as it came with my iMac, not sure if the latest 4.0 works...
    Boot Camp 5.1 is the latest version, but no version includes drivers for Windows 8.

  • How do I know what files to remove from my Macbook Pro laptop?

    Apparently my hard drive is full and I need to remove files so I have space to download more music and movies.  I don't want to delete important files.  How do I go about doing this? 

    How do I know what files to remove from my Macbook Pro laptop?
    Remove only files you yourself stored on the laptop; files in your Home folder. Don't delete any files from the system libraries, and if you want to remove applications, use the provided uninstallers.
    For files in the media libraries - iTunes, iPhoto, iMovie use the application to delete music, photos, movies.
    If you are planning on storing more movies and music on your mac, deleting old files will probably not suffice alone to free enough space. Consider to get yourself an external drive to store your media.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have messed my MacBook Pro attempting to customize it. I am far from savvy with technology and I would like to erase and reset it to out of the box brand new and start over

    I have messed my MacBook Pro attempting to customize it. I am far from savvy with technology and I would like to erase and reset it to out of the box brand new and start over

    Polly,
    usually there are multiple models of MacBook Pro per model number, but in the case of your model number (A1502), there’s currently only one model for that model number: 13-inch Late 2013.
    To reset your MacBook Pro, you’ll need to boot into Recovery mode by holding down a Command key and the R key as you start it up. When the Mac OS X Utilities menu appears, select Disk Utility. On the left-hand side of the Disk Utility window, select your internal disk (most likely the top item of the list). On the right-hand side, select the Erase tab. For the Format dropdown, select “Mac OS Extended (Journaled)”. For the Name input box, “Macintosh HD” has traditionally been the default name — I don’t know if that’s still the case for the Late 2013 models. After that, press the Erase… button, and erase its entire internal disk. When it’s finished with the erasure, exit Disk Utility, and select Shut Down from the Apple menu. When you start it up again, OS X Internet Recovery will redownload Mavericks from Apple’s servers and reïnstall it on your internal disk. Once it has reïnstalled, run Software Update to get it up to date, and adjust the System Preferences to your taste.

  • What can I do? my macbook pro rejcets to eject any cds or dvds I put on !!!

    what can I do? my macbook pro rejcets to eject any cds or dvds I put on !!!

    The drive accepts discs but they do not mount or are automatically ejected
    Check the disc's surface for scratches and dirt, since these things can prevent the disc from appearing on the desktop.
    Reset the Power Manager (PMU) or System Management Controller (SMC).
    Ensure your drive can read the specific type of disc being used. For example a "combo drive" can read a DVD-R and burn a CD-R however it cannot burn a DVD-R. The utility System Profiler may provide additional information regarding what media your computer supports.
    If the discs continue to not be recognized, please contact Apple, contact an Apple Authorized Service Provider, or make an appointment with an Apple Retail Store for additional troubleshooting, evaluation, or service.
    source: http://support.apple.com/kb/ht2801

  • What's the power Adapter for Macbook pro 13inch Mid 2012

    What's the power Adapter for Macbook pro 13inch Mid 2012 with core i-7, 2.9ghz, 8Gb ram?
    AFAIK it should be a 60wat Megasafe power adapter.
    But mine shipped with a 45Watt Megasafe. I got it as a Gift from my friend.
    Thanks in Advance.

    mmaumio wrote:
    60W MagSafe power adapter with "L" style connector
    This should be my Adapter right?
    Yes.
    There is a drawback in addition to taking a longer time to charge up your MBP.  In unusual instances when using your MBP with power adapter attached, and running a very heavy load on the CPU/GPU, the MBP will require additional electrical resources in addition to what the power adapter can provide.  It will then draw upon the battery.  What this means is that using a 45 watt adapter, these conditions are more likely to occur.
    Using a 45 watt adapter should not harm your MBP as such.
    Ciao.

  • What i gonna do to my macbook pro its easy low battery.

    what i gonna do to my macbook pro its easy low battery.

    not sure what you mean by easily low - as Courcoul has stated - replace it if you're having problems with it.
    or, keep it plugged in.
    what applications are you running that makes your battery drain fast?  if you're playing games or watching videos - you're lucky to get 3 hours of battery life.

  • My iPhone was stolen and I have contacted the police who are using the meid number to locate.  How does this work and what are my chances of getting the phone back?

    My iPhone was stolen.  I used Find My iPhone app to lock it and display a message.  The phone has not connected to the internet to locate it.  I contacted the police and they have taken my meid number.  How does this work and what are my chances of getting the phone back?  Are there other ways the theif can use it.  I was told once they put in a new sim card and use it, whatever software the police have, it will show up.

    Honestly? In the US (I can't speak to other countries, though I doubt it works much differently in a lot of the world) The police took your report and filed it either in their computers or, on paper. They will now not think of this again. The only time it will cross anyones mind is if, in the course of entering information into evidence about items recovered or seized at a crime scene, the serial number of an iPhone that was found/seized happens to match yours, in which case you will be contacted.
    The police in the US can and will do nothing to 'blok' the phone and it's not worth their time to try and locate it unless you know for a fact that it was stolen by a big time drug lord, master criminal, or some other such prime target and they can get a court order to track the location of the phone in order to locate this individual for your own purposes.  If they do that, they'll probably keep him under surveilance for a year or so before they act.
    Basically, the police don't care about your phone. If they find it, they will give it back to you. They are not, however, going to go looking for it. They have better things to do.
    I'm sorry, but that's the way it is.

Maybe you are looking for