What connector do I need for Macbook Pro to In Focus Projector? I understand it does not have HDMI input.

What connector do I need to use for MacBook Pro to an In Focus Projector to show a PowerPoint presentation?
I understand the projector has a "regular video input", S Video Input, but no HDMI input.
Thanks

Check out my post on how to output surround sound through your Mac.
https://discussions.apple.com/thread/3639822
that should be able to help you

Similar Messages

  • Login problem in FaceTime in my MacBook Pro.... "The registering device does not have appropriate credentials."

    I am not able to loing FaceTime and have tried to get support from apple communities also, but none of those worked out.... Please help me to resolve "The registering device does not have appropriate credentials."

    Hello GAURAV,
    Thank you for providing the details of the issue you are experiencing with logging into FaceTime.  I recommend the following article:
    FaceTime, Game Center, Messages: Troubleshooting sign in issues
    http://support.apple.com/kb/TS3970
    Thank you for using Apple Support Communities.
    Best,
    Sheila M.

  • What adaptor do I need for MacBook Pro A1226?

    Hi, I have a MacBook Pro model number A1226 - from late 2007 I think. It's a 15". I need a power adaptor for it as I got it second-hand and it didn't come with an adaptor. Can anyone help me out with what adaptor I need, and ideally including the adaptor model number?
    Thanks heaps
    Anna

    Hi!
    It's this one:
    http://store.apple.com/us/product/MA348LL/A?fnode=MTY1NDEwMQ&mco=MTA4NDE2NDk
    in the U.S. online Apple store. If you go to the online store for your country, you should be able to back into the proper model using the description of this one. What they call it should be the same. Just make sure the "15-inch" box is selected.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What's the power Adapter for Macbook pro 13inch Mid 2012

    What's the power Adapter for Macbook pro 13inch Mid 2012 with core i-7, 2.9ghz, 8Gb ram?
    AFAIK it should be a 60wat Megasafe power adapter.
    But mine shipped with a 45Watt Megasafe. I got it as a Gift from my friend.
    Thanks in Advance.

    mmaumio wrote:
    60W MagSafe power adapter with "L" style connector
    This should be my Adapter right?
    Yes.
    There is a drawback in addition to taking a longer time to charge up your MBP.  In unusual instances when using your MBP with power adapter attached, and running a very heavy load on the CPU/GPU, the MBP will require additional electrical resources in addition to what the power adapter can provide.  It will then draw upon the battery.  What this means is that using a 45 watt adapter, these conditions are more likely to occur.
    Using a 45 watt adapter should not harm your MBP as such.
    Ciao.

  • What is the return policy for macbook pro in china?

    I live in SuZhou, Jiangsu in China. What is the return policy for macbook pro in china? It's been 1 month and I got a main board exchange(repair).

    You would need to return it to the Apple Online Store where you purchased it and it would have to be within 14 days. They may limit you to exchange only or charge a restocking fee.
    Contact the Apple Online Store to make arrangements.

  • Favor, what is Battery model no. for Macbook Pro 17" 2.16Ghz Intel Core Duo

    Favor, what is Battery model no. for Macbook Pro 17" 2.16Ghz Intel Core Duo?

    This will fit:
    http://store.apple.com/us/product/MA458LL/A/rechargeable-battery-17-inch-macbook -pro?fnode=5a
    Ciao.

  • What is the best stylus for macbook pro?

    What is the best stylus for macbook pro?

    I dont understand? Why would a mac use a stylus when they aren't touchscreen?

  • My macbook pro with OS 10.6.7 'mail' program does not send my mail through the IPS wireless, I am connected to. The message is my 'e-mail is rejected by the server'. It has been working until 5 days ago. The connection doctor says I am connected and no lo

    My macbook pro with OS 10.6.7 'mail' program does not send my mail through the IPS wireless, I am connected to. The message is my 'e-mail is rejected by the server'. It has been working until 5 days ago. The connection doctor says I am connected and no log in required.
    After trying lots I found now in 'Airport Utility is 'unable to detect any airport wireless devises.....'
    There is no provider to be seen in airport utility and only 'rescan' is an option with no results...
    even so I am connected and can browse the net receive mail etc. and the outgoing 'mail server' is set to the internet provider I am connected to.
    Can you enlighten me what can I do I need to use my e-mail program urgently !!!
    Thanks for your help

    I'm not sure what "IPS wireless" is, but unless you have an Apple Wi-Fi base station (such as a Time Capsule, AirPort Extreme, or AirPort Express), AirPort Utility won't see anything.
    You might try defining a new SMTP server to see if that will work any better.
    By the way, the subject field for these messages isn't intended to hold a lot of text.  Put a short description of your problem in the subject field and save the rest of your message for the body field.

  • I have a mid 2009 Macbook Pro and i know the Mini-display port does not support audio out but does it support HDMI out? or do i have to buy a Mini-display to DVI and then a DVI to HDMI adapters?

    I have a mid 2009 Macbook Pro and i know the Mini-display port does not support audio out but does it support HDMI out? or do i have to buy a Mini-display to DVI and then a DVI to HDMI adapters?

    Run MDP to HDMI for picture. Use a cable like this to run sound from your audio out on your Mac to your TV's audio in.  That's about all  you can do.

  • My Macbook pro is very slow in oening folders, it does not open immediatly as you would expect and takes about 30s or more. Please help!   Here is the spec: OS X 10.8.3 2,3 Gz Intel Core i7 8GB 1600 MHz DDR3

    My Macbook pro is very slow in oening folders, it does not open immediatly as you would expect and takes about 30s or more. Please help!
    Here is the spec:
    OS X 10.8.3
    2,3 Gz Intel Core i7
    8GB 1600 MHz DDR3

    Did u try to rebuild spotlight index? repair permissions? verify disk and repair if needed?
    if now, try it out.

  • How can I connect my iMac to a TV for playback of videos? My TV does not have HDMI.

    How can I connect my iMac to a TV for playback of videos? My TV does not have HDMI.

    You need to find out what video out you have on your iMac, and what kind of video inputs there are on your TV.
    It will help to know exactly what model iMac and exactly what make/model TV you have.
    Depending on the exact model iMac you have, it may have miniVGA, miniDVI, miniDisplayPort or Thunderbolt output.  Your TV may have composite, S-video, component, DVI, VGA or HDMI inputs.  Once you confirm what kind of ports your iMac and TV have, then we can probably suggest the correct cable or adapter so you can connect them to each other.

  • WSDL for WSDL based Proxy that does not have any input

    Hi all,
    I am trying to create a service which is based on a db adapter. The db adapter is created using a procecure that does not accept any input and gives out a cursor. I have created a
    proxy based on a wsdl which was created by me. I have not given any soap:body in the input as I dont have any input for this service. When I test the service it is not going into the
    request pipeline instead what ever the input (Here input in the sense even the proxy does not have any input as per the wsdl we need to give some xml tag to test it right?)
    to the proxy service is getting echoed back. It is neither going inside the request pipline nor Invoking the business service. When I create a proxy service as a plain xml then It is
    working fine. I am very confused and donno what to do.. Kindly help me on this.
    thanks
    Edited by: 887737 on Apr 5, 2012 4:20 AM
    Edited by: 887737 on Apr 5, 2012 4:21 AM

    it depends on the selection algorithm you have on the proxyservce
    on the fourth tab you can dispatch based on soapaction/body/header/etc
    you could dispatch on the soapaction and skip the body

  • Can I Hook an Apple TV to an older TV that does not have HDMI Ports using a connector cable

    I have an older Sony HD TV and would like to hook my Apple TV to that TV but it does not have HDMI Ports.  Can I hook my Apple TV to this TV through a cable adapter that converts HDMI to Component Video and Audio (Red Green Blue Video Cables, Yellow White Audio) or HDMI to S-Video.  I have both these connections on my TV.  Thanks

    Thanks, I actually meant a converter box I just wanted to make sure that using that would work.  With Amazon FireTV Sticks for example I  jhave been told that only a direct HDMI connection to the TV would allow the device to work at all.

  • I can not create an Installer, After install the Vision Builder Demo and then uninstall it. I can not create a Labview installer anymore, it asks me for a Vision Builder Installer, even if My Labview program does not have nothing to do with it...

    I can not create an Installer on LabView, After install the Vision Builder Demo and then uninstall it. I can not create a Labview installer anymore, it asks me for a Vision Builder Installer, even if My Labview program does not have nothing to do with it...
    Solved!
    Go to Solution.

     Hi Shada this can happen if you are including additional installers to your installer for example DAQmx. When you are doing this the installer has to include other files like MAX (Measuremente and Automation Explorer). Probably when you installed Vision Builder it updated MAX, so when your installer is trying to Include MAX, its asking for the source where it was installed in your computer in this case Vision Builder.
     Here you can cache the information so its not asked again, or you can download a newer version fo DAQmx, so it will update MAX and change de dependecy.
     You can find more details about this issue in this KB:
    KnowledgeBase 3S88PJMY: Why Do I Get A "Missing Distribution" Error When Trying to Build an Installe...
    And for keeping a copy here is more info:
     How Do I Stop the Missing Distribution Notification Each Time I Build An Installer?
    Best Regards
    Benjamin C
    Senior Systems Engineer // CLA // CLED // CTD

Maybe you are looking for

  • Unable to make microphone to work on NVIDIA MCP55 onboard sound card

    Hello. Some time ago, I bought a nice HP xw9400 Workstation (with Dual Core AMD Opteron  2216) from Germany. Despite it's starting to become old by today's standards for some stuff like gaming, it's still quite okay to use and the SAS HDD makes it bo

  • Addition of new column in MC.1 Report

    Dear experts, MC.1 report displays stock in transit value but does not displays stock in transit quantity, is it possible that we can display additional column for stock in. transit. A detailed reply on how additional tables can be joined in MC serie

  • Loosing signal between my macbook pro and Neatgear 1000

    I am loosing connection between my macbook pro and my netgear 1000 on a daily basis. It seems to work fine with other wifi devices such as the printer. Howevere, I do have the same problems with my iphone that also looses wifi contact on a daily basi

  • Pernr"s concpet in abap hr

    hi gurus, what is pernr"s concpet in abap hr. pls guide me . warm regards

  • Exception messages....how do YOU eat yours??

    Exception Messages - For user or developer? Summary When catching Exceptions, is/should it be necessary to look at the message String for deciding what action should be taken or is the message just for humans? What is the generally accepted use of Ex