What are the security options

How can I have my mac air require a log in when opening it.

Try System Preferences > Users & Groups > Login Options and turn off automatic Login. You then use your Admin Password to log in.
Cheers
Pete

Similar Messages

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • What are the security implications of having JAVA running on my Mac Book Pro?

    What are the security implications of having JAVA running on my Mac Book Pro?

    Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.

  • What are the security risks for opening port 80 on workstations?

    Hello all,
    in our environment, there is an application which open port 80 on workstations when installed, but it is not allowed on preimeter FW
    could you please advise what are the security risks for leaving port 80 opened on the workstations? or it is considered secure unless it is not allowed on the preimeter FW?
    thanks alot & regards

    Hi R.Naguib.
    The 80 port is open by default through the firewall on Windows system, it is used by a http protocol by a browser.
    As for the network or hardware Firewall settings, I suggest to turn to the network administrator for details.
    Regards
    Wade Liu
    TechNet Community Support

  • What Are the Security Implications of not Completely Signing Database?

    Hello everyone,
    What are the security implications of not completely signing the database?
    From http://www.archlinux.org/pacman/ ,
    The following quote implies that the database exists merely just in case hand tweaking is necessary:
    maintains a text-based package database (more of a hierarchy), just in case some hand tweaking is necessary.
    However, considering that there are cases that pacman's local database needs to be restored, there are implications that the database is essential for pacman to function properly.
    From https://wiki.archlinux.org/index.php/Ho … l_Database :
    Restore pacman's local database
    Signs that pacman needs a local database restoration:
    - pacman -Q gives absolutely no output, and pacman -Syu erroneously reports that the system is up to date.
    - When trying to install a package using pacman -S package, and it outputs a list of already satisfied dependencies.
    - When testdb (part of pacman) reports database inconsistency.
    Most likely, pacman's database of installed software, /var/lib/pacman/local, has been corrupted or deleted. While this is a serious problem, it can be restored by following the instructions below.
    I know that all official packages (from core, extra, community, etc.) are signed so that all files should be safe, but I'm just paranoid.
    What if the database was hacked?  Will this lead to installation of harmful software?
    Sincerely,
    Cylinder57
    Last edited by Cylinder57 (2012-10-15 03:42:31)

    Cylinder57 wrote:
    From this quote:
    Allan wrote:But, the OP (also?) talks about the local package database on his computer.  That is not signed at all as there is no point.  If someone can modify that, then they can regenerate the signature, or just modify any other piece of software on your computer.
    Is it going to be easy for anyone other than the authorized user to modify the local package database?
    Allan basically answered that with the quote above already as I understand it. Someone who has access to the installation, e.g. is able chrooting your PC via USB, is not held back by any ACLs. However, modifying the local database only makes limited sense because the packages are already installed. Pacman would only recheck, if you re-install a package. The only really relevant attack vector for the package database is
    (1) installing an older package with a vulnerability,
    (2) re-placing the up-to-date package sig in the local database with the older one and
    (3) modifying the system, e.g. via pacman.conf excludes, to not update that.
    then also re-installing would not create a sig-error and you get stuck with the bogus old package.
    With a signed database this would not be possible. However, as Allan wrote earlier also with a signed database that criminal can manually install (totally leaving pacman & package cache) whatever it needs in this scenario. So, if you are -really- paranoid about that, you probably want to spend (a lot of configuring) time with something like the "aide" package.
    Cylinder57 wrote:
    And, are the following statements correct:
    If the repository databases are modified, the hacker might be able to modify the packages on the server (Considering that if someone can modify the local package database, that person can modify any other piece of software on that particular computer.)
    However, pacman won't let users from installing the modified packages (due to package signing,) unless at one person with access is bribed (at least, for an individual package.)
    I don't know the intricacies of the server infrastructure - only saw they have great names :-), but I am pretty certain your statements assume that correctly. It is pretty unlikely that someone able to modify the central repository database fails at placing a bogus package for shipping with those access rights at this time. Yet it does no harm not to post any details of such a scenario here imo. In any case: A compromised mirror would be enough for that - and easier to achieve (hacked anywhere or e.g. in a non-democratic state). Plus you also answered it yourself. The keys are key for our safety there. Which keeps me hoping that no criminal lawnmover salesmen frequent the Brisbane area.
    As you put up a thread about this, one question you can ask yourself is:
    Have you always checked on updates new signatures keys which pacman asks about? If you ever pressed "accept/enter" without checking them out-of-band (e.g. the webserver), that compromised mirror database might have just created a "legitimate" key .. user error, but another attack vector the database signing would catch.
    edit: Re-thinking the last paragraph just after posting, I now believe it would not be that easy as implied - simply because the bogus key is not trusted by one of the master keys. The pacman pgp trust model should catch that without database signing. At least it would if only the official repositories are activated, but that's a pre-requisite to the whole thread.
    Last edited by Strike0 (2012-10-20 23:01:26)

  • What are the proposal options available?

    What are the proposal options available?

    Hi,
    please use meaningful subjects as well as  well explained questions. See also the rules of engagement.
    kind regards
    Siggi

  • What are the security post refresh procedures in general?

    Hi,
    Can anyone list me out What are the security post refresh procedures in general?
    Thanks and Regards,
    Damanaidu J

    >
    Damanaidu jawaharlal wrote:
    > Hi,
    >
    > Can you cite with respect to CUA.
    >
    > Thanks and Regards,
    > Damanaidu J
    CUA
    ====
    CUA behaves differently during a system/client copy and this is the approach we took and it was successful.  The goal is to take a backup of the source before CUA deletion then restore. Do not delete CUA and just attempt to rebuild it, all the roles will be gone.  Backup and restore will be the approach I recommend.
    a1.  Take a snap shot of your QA user and role assignments before copy.
    1.  (Basis) First make a backup of the source system.  This is important before step 2.
    2.  After successful backup delete the CUA from the source system. 
    3.  After successful copy to target system, restore backup to source system.
    4.  Depending how the copy was done, users and passwords should be in the target system but all the role assignments will be gone. 
    5.  Start assigning roles base on your requirements.  If you need to restore the old QA settings that is captured in a1.
    Perhaps others can add in other steps I might have missed.
    Good Luck!

  • What are the two options of entering PLAN DATA?

    Dear SAP Gurus
    What are the two options of entering PLAN DATA?
    AA

    Dear Friend AA
    Such two options are :- FORM BASED ENTRY & FREE ENTRY.
    FORM BASED ENTRY-Here you fill in th eplan data in the rows corresponding to the characteristic values displayed on the screen.But in free entry you have the freedom of inputting even the chrcteristic values.
    Regards
    Vivek

  • What are the best options for running windows on a Mac Pro

    what are the best options for running windows on a Mac Pro

    For gaming and other CPU intensive stuff: Boot Camp – https://www.apple.com/support/bootcamp/
    For the rest: any virtualization software (Parallels/Vmware Fusion/VirtualBox)

  • What are the reporting options

    hi
    what are the reporting options

    Hi,
    in addition to the report XXX we can add
    i)No standard page heading.
    ii)message class name
    iii) line size
    iv)line count
    for eg:
    REPORT  ZXXXXXX no standard page heading message-id zXXX line-size 124 line-count 100.
    regards,
    vineela

  • What are the kernel option required for udev in 2.6.28 kernel

    Hi All,
    I just want to know the exact options that we need to enable in the
    kernel configuration for the latest udev. Some options specified in
    http://webpages.charter.net/decibelshel … rimer.html is
    not available ( or changed position ) in the 2.6.28 kernel.
    I know that copying the existing config file from linux distro will do
    it. But want to know about the exact kenel modules/support needed for
    udev to get everything working. Please help.

    B wrote:
    OK I was definitely not qualified to answer that question .
    May I ask what you are trying to do exactly?
    If you are rebuilding your own kernel you might as well check the documentation in the kernel building utilities (gconfig, qconfig, xconfig, ...). Granted, it takes longer, but you get to know your way around. Also, I don't think those options are specific to 2.6.28 either - it would surprise me if they get altered so frequently you'd need to inquire about a specific kernel version.
    I am using the kernel 2.6.28. Thats why I specified the kernel version as 2.6.28. Yes, those options are generic to latest version of 2.6 kernel. But things were changed from 2.6.13 kernel and again as per the comment from kay sievers, it again going to change in next version.
    Yeah, SIGNALFD only in the next, the to be released version
    http://www.spinics.net/lists/hotplug/msg02162.html
    I am just searching to find out the kernel configuration options to get the udev working. The udev primer is for 2.6.13 and I know there are lots of changes in newer version of kernel/udev. I know how to build kernel and I like menuconfig than the GUI utilities.
    Thanks for all the answers/comments.

  • Selling a 'Collection' or 'Series' of Folios, not a subscription -- What are the Buying Options

    We have a collection of how-to books with illustrations and interactive features we want to publish using our Pro account. Each book is set up as a folio. The books are related to each other and are used as a resource set from the app. We want to offer a multi-folio app with the core of several folios loaded in advance, and then let each customer buy additional folios if they are needed or when they become available.
    -- Can we set up a multi-folio viewer app library to display only those folios that have been purchased? We would rather not have the library cluttered up with new folios with buy buttons that the customer might not want. We could put out a sample of each additional folio but we’d like the buy option to the full edition handled in a more discreet way.
    -- All marketing and sales will be from our website sending people to the Apple and Android app stores so we are not that concerned about sales initiated from the app. In most cases the day-to-day user/reader is not the purchaser or decision maker about the additional folios..
    -- Can we disable the archive button or have it bring up a dialog box with some options? I have read others have a problem with this also.
    Any suggestions?

    I would say you need a custom entitlement server that connects to your user database. We can set it up for you.
    When Adobe allows customizing the library you can probably remove the Archive button as well.
    Best,
    Tristan

  • What are the different options for implementing web security?

    Hi,
    Right now I am working on an internet website. We are using JSP for presentation and running Weblogic Application Server. I want to know different options for implementing website security. One of the options that I am aware of is to use LDAP. But we donot want to go and buy a LDAP Directory Server now. So I would really appreciate if somebody could let me know my choices here.
    Thanks in advance.

    Hi,
    If you are working on a Windows 2000 platform, the most obvious choice would be Active Directory Server as this is shipped free with Server 2000. It is LDAP compliant, although does have a few differences that set it apart from the other X500 standard based solutions which I will mention in a moment. Details on these differences can be found at http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnactdir/html/msdn_activedirvsnds.asp
    Other options are openldap, an open source implementation of an ldap server or iPlanet's Directory Server. If you are initially doing an evaluation, a trial version is available of the iPlanet software and can be downloaded from their site. I found this particularly easy to get to grips with and their is excellent documentation available. There is also an offering from Novell, but I have no experience of this.
    Hope this helps.
    Jon

  • Inbound Logistics:  What are the best options to capture freight costs?

    We attempted to implement a freight payables solution which was built on Inbound Deliveries> Inbound Shipments> Inbound Shipment Cost Documents.  The PO line items were flagged with a conf.control key which made the above inbound documents relevant.
    Very long story short, we had to remove this functionality because of two major issues:
    1.     The Inbound Deliveries were created with incorrect quantities some of the time.  When the Inbound Deliveries were created with incorrect quantity those errors caused major problems (e.g., over accrual of freight cost to the tune of several millions of dollars!!!).
    2.     Also, when the Inbound Deliveries were created with incorrect quantity MRP went berserk (e.g., when the IB delivery has the wrong quantity that shows up in MD04 and the planners are left scratching their heads wondering why the supplier is shipping so much or so little).
    I wonu2019t get into the details of how the Inbound Deliveries were being created but suffice to say they were manually entered by the supplier without the benefit of an EDI transaction- it was more of a manual entry- hence the data accuracy problem.
    The point of this post is to gain feedback from other customers who have implemented an inbound freight payables solution with success & understand what processes were used to make your project successful.
    For example, if I had a u201Cwish listu201D Iu2019d request the following:
    1.     The IB delivery document type Iu2019d like to use should be non-MRP relevant.  This will eliminate the confusion that occurred when planners run MD04 and see all of the shipment notifications.  Also, if the MIGO_GR transaction is used to receive the POu2019s, they will see the quantities on the PO, not on the IB delivery.  This would be good for us from a business continuity stand point.  However, if the IB delivery is not MRP relevant, than your GR does not accrue the freight cost defined on the SCD which short circuits the entire point of having these documents.
    u2022     Q:  Have you had any success implementing an IB freight solution with minimum impact to planning / inventory / operations?
    2.     As mentioned above, the data accuracy of the IB delivery was problematic.  Because of this issue we have changed our thinking so that we would require a EDI ASN to be sent from our supplier to our SAP system.  Using EDI we feel that greater accuracy would be obtained since the quantities defined would map to what is being picked or at least aligned with what we would expect to be invoiced for.  The problem is we donu2019t know how EDI capable our suppliers are.
    u2022     Q:  Has anyone had success implementing this with your suppliers on a large scale?
    3.     Are there other inbound freight payment solutions that Iu2019m not thinking about u2013 custom or other that you have implemented & can share some of the specifics about?  Iu2019d enjoy hearing about them.  Since we are re-thinking what we implemented Iu2019m open to any suggestions. 
    Thanks so much for your time!
    Rich Wortmann

    Chandra,
    Thank you for your reply.  I'm aware of the freight condition approach you suggest & the ability to define the carrier in the freight condition.
    We explored this functionality in the past.  The problem/limitations we've experienced were as follows:
    1. Essentially you have to know your freight cost & the carrier by PO line item at the time the PO is created.  Both of these variables we typically cannot predict in our environment.
    2. We have a lot of situations where the PO is considered a u201Cblanketu201D where it will remain open for a month up to a year.  Knowing the entire freight cost for these PO's once they are created is impossible to predict so to support the freight conditions we would have to change our business process which would be a big effort for our organization.
    3. Our suppliers ship product based on multiple PO's / PO lines, again it is impossible to predict what the per unit freight cost would be at the time a PO is generated.
    These factors are what led us to the IB delivery solution which handles each one of these scenarios quite well provided you have good data when the IB delivery is created.
    Regarding your second post:  Thanks!  This information is helpful.
    Sincerely,
    Rich Wortmann

  • What are the different options for creating a basic image slideshow in Dreamweaver 5?

    Hi, I have created slideshows in Bridge, and they all work fine. They aren't exactly what I had in mind, but this was the only solution I could find that I could understand. My knowledge of web design is minimal at the most. I have attached the slideshows to my html website using IFrames, but it doesn't load properly in Safari.
    I included the code at the bottom of this post.
    The code dealing with the slideshow and IFrame in question are towards the bottom of the document, I marked them in bold. All the styles with regards to the <div> locations and such are on a separate stylesheet, I'm not sure if you would need that to help out.
    I'm wondering if someone could clue me in as to what I can do with this code to make this slideshow work properly in safari. I checked in Chrome and it loads properly. Unsure about other browsers, I do not have access currently.
    I am also wondering if there is another way I can create a slideshow using CSS5. This slide show is fine, but I was also looking to include text--image names and descriptions--without having to edit each image in Photoshop to include the text.
    Thank you for your time, any help would be appreciated.
    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
    <html xmlns="http://www.w3.org/1999/xhtml">
    <head>
    <meta name="creator/artist" content="Ryan Olsen" /><meta name="keywords" content="Ryan Olsen, artist, paint, draw, dark fantasy, landscape, seascape, Paire, Connecicut, New York" /><meta name="description" content="The collection of art by Ryan Olsen" />
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <title>Ryan Olsen's Studio</title>
    <script type="text/javascript">
    function MM_swapImgRestore() { //v3.0
      var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
    function MM_preloadImages() { //v3.0
      var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
        var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
        if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
    function MM_findObj(n, d) { //v4.01
      var p,i,x;  if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
        d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
      if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
      for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
      if(!x && d.getElementById) x=d.getElementById(n); return x;
    function MM_swapImage() { //v3.0
      var i,j=0,x,a=MM_swapImage.arguments; document.MM_sr=new Array; for(i=0;i<(a.length-2);i+=3)
       if ((x=MM_findObj(a[i]))!=null){document.MM_sr[j++]=x; if(!x.oSrc) x.oSrc=x.src; x.src=a[i+2];}
    </script>
    <link href="ryanolsenstudios.css" rel="stylesheet" type="text/css" />
    <script src="SpryAssets/SpryMenuBar.js" type="text/javascript"></script>
    <link href="SpryAssets/SpryMenuBarVertical.css" rel="stylesheet" type="text/css" />
    </head>
    <body onload="MM_preloadImages('images/gallerytabroll.jpg','images/transformativeroll.jpg','ima ges/landscapesroll.jpg','../ryanolsenstudios/illustrationstab.jpg','images/illustrationrol l.jpg','images/bioroll.jpg','images/petportraitroll.jpg','images/sparklessroll.jpg')">
    <div id="pagetop">
    <div id="header">
    <img src="images/name.jpg" width="1057" height="87" alt="name" />
    </div>
    <div id="banner">
    <img src="images/banner.jpg" width="1158" height="155" alt="banner" /> </</div>
    </div>
    <div id="navigationalmenu">
    <div id="gallerytab">
    <ul id="MenuBar2" class="MenuBarVertical">
      <li><a class="MenuBarItemSubmenu" href="#" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('gallery tab','','images/gallerytabroll.jpg',1)"><img src="images/gallerytab.jpg" alt="gallery" name="gallery tab" width="252" height="72" border="0" class="MenuBarItemSubmenu" id="gallery tab" /></a>
        <ul>
          <li><a href="transformative.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('transformative','','images/transformativeroll.jpg',1)"><img src="images/transformative.jpg" alt="transformative" name="transformative" width="174" height="53" border="0" id="transformative" /></a>
          <li><a href="landscapes.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('landscapes','','images/landscapesroll.jpg',1)"><img src="images/landscapes.jpg" name="landscapes" width="174" height="53" border="0" id="landscapes" /></a></li>
          <li><a href="illustrations.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('illustrations','','images/illustrationroll.jpg',1)"><img src="images/illustrations.jpg" name="illustrations" width="174" height="53" border="0" id="illustrations" /></a>
    </li>
    <li>
      <a href="petportraits.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('pet portrait','','images/petportraitroll.jpg',1)"><img src="images/petportrait.jpg" alt="pet portraits" name="pet portrait" width="174" height="53" border="0" id="pet portrait" /></a></li>
    <li>
    <a href="sparkless.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('sparkless','','images/sparklessroll.jpg',1)"><img src="images/sparkless.jpg" alt="sparkless" name="sparkless" width="174" height="53" border="0" id="sparkless" /></a>
    </li>
        </ul>
      </li>
    </ul>
    </div>
    <div id="showstab">
    <a href="shows.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('showstab','','images/showsroll.jpg',0)"><img src="images/shows.jpg" alt="shows" name="showstab" width="252" height="72" border="0" id="showstab2" /></a>
    </div>
    <div id="hometab">
    <a href="home.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('hometab','','images/hometabroll.jpg',0)"><img src="images/hometab.jpg" alt="home" name="hometab" width="252" height="72" border="0" id="hometab2" /></a>
    </div>
    <div id="biotab">
    <a href="bio.html" onmouseout="MM_swapImgRestore()" onmouseover="MM_swapImage('bio','','images/bioroll.jpg',1)"><img src="images/bio.jpg" alt="bio" name="bio" width="252" height="72" border="0" id="bio" /></a>
    </div>
    </div>
    <div id="warpage">
    <!-- Facebook Badge START --><a href="https://www.facebook.com/WARSPIT" target="_TOP" style="font-family: &quot;lucida grande&quot;,tahoma,verdana,arial,sans-serif; font-size: 11px; font-variant: normal; font-style: normal; font-weight: normal; color: #3B5998; text-decoration: none;" title="Welcome to WAR">Welcome to WAR</a><br/><a href="https://www.facebook.com/WARSPIT" target="_TOP" title="Welcome to WAR"><img src="https://badge.facebook.com/badge/515768845136977.2357.1022321304.png" style="border: 0px;" /></a><br/><a href="https://www.facebook.com/advertising" target="_TOP" style="font-family: &quot;lucida grande&quot;,tahoma,verdana,arial,sans-serif; font-size: 11px; font-variant: normal; font-style: normal; font-weight: normal; color: #3B5998; text-decoration: none;" title="Make your own badge!">Promote Your Page Too</a><!-- Facebook Badge END -->
    </div>
    <div id="ryanpage">
    <!-- Facebook Badge START --><a href="https://www.facebook.com/ryanolsenstudios" title="Ryan Olsen Studios" style="font-family: &quot;lucida grande&quot;,tahoma,verdana,arial,sans-serif; font-size: 11px; font-variant: normal; font-style: normal; font-weight: normal; color: #3B5998; text-decoration: none;" target="_TOP">Ryan Olsen Studios</a><br /><a href="https://www.facebook.com/ryanolsenstudios" title="Ryan Olsen Studios" target="_TOP"><img class="img" src="https://badge.facebook.com/badge/572127626212351.1710.552992230.png" style="border: 0px;" alt="" /></a><br /><a href="https://www.facebook.com/advertising" title="Make your own badge!" style="font-family: &quot;lucida grande&quot;,tahoma,verdana,arial,sans-serif; font-size: 11px; font-variant: normal; font-style: normal; font-weight: normal; color: #3B5998; text-decoration: none;" target="_TOP">Promote Your Page Too</a><!-- Facebook Badge END -->
    </div>
    <div id="ryaninstagram">
    <a href="http://instagram.com/ryanolsenstudios" target="_new"><img src="images/instagram-glyph.jpg" width="112" height="144" alt="instagram" /></a>
    </div>
    <div id="gallery">
    <iframe src="Transformative/index.html" width="1003" height="834" frameborder="0" name="gallery">
    </iframe>
    </div>
    </div>
    <script type="text/javascript">
    var MenuBar2 = new Spry.Widget.MenuBar("MenuBar2", {imgRight:"SpryAssets/SpryMenuBarRightHover.gif"});
    </script>
    </body>
    </html>

    Have a look here Jquery slideshow tutorial for beginners | WEBTUTS

Maybe you are looking for