What is known/felt about Trusteer Rapport security software?

What is the collective experience with the security software, Trusteer Rapport.  It is designed to protect against nefarious internet agents, but I don't want to do anything that 1. I don't need to do, and 2. may slow down my system.  Any help will be appreciated.

Hi Ayala,  I realize that you have a product to sell and a reputation to uphold.  My experience was with Rapport some time ago and at that time the Mac version at least, had a bad press for causing crashes.  As I said, it may well have been improved since then.
But as with BT's desire for me to use their recommended anti-virus software, which is blatantly designed for PC users, I prefer to keep my computer with Mac applications or ones with a proven track record, such as ClamXav. I would not even use Adobe Flash and Java, if I could help it.  Any application which imposes constant extra processing load to Safari, like your's, is not acceptable to me anyway, and for you to have even put it on the market without testing it thoroughly on a Mac, is enough to convince me to avoid it now.

Similar Messages

  • Update always removes 3rd party add ons - ie Trusteer Rapport Security

    I always use Trusteer Rapport as additional security as recommended by the financial institutions.
    Works fine with Firefox 4.0 but as always updates do not improve personal settings just removes them.
    Why cannot Firefox work with software companies to include them?

    I always use Trusteer Rapport as additional security as recommended by the financial institutions.
    Works fine with Firefox 4.0 but as always updates do not improve personal settings just removes them.
    Why cannot Firefox work with software companies to include them?

  • Lost Trusteer Rapport Security after down loading 4.0. why

    After downloading FFox 4.0 upgraded from 3.6.6 have lost Trusteer Rapport protection from some of my bookmarked accounts. How do I restore and register new sights for this protection as the TR icon has disappeared from top bar.

    There is an update for Trusteer Rapport to make it work with Firefox 4, for details see http://www.trusteer.com/faq/i-dont-see-rapport-icon-firefox-4

  • What do you think about running 2 security solutions at the same time? [malware event]

    Hi all
    Is there anyone here running 2 Security Solutions at the same time?
    From what I know, few of my lecturers are running AVG and Avira, or Avira and MSE. (All free)
    According to their theory, school-licensed Symantec Endpoint Protection slows down the system too much till a point that it is slow or unable to detect the threats. 1 antivirus is not good enough, 2 antivirus would be able to detect 100% of malware.
    For my school labs computer, they are running both Symantec Endpoint Protection and Microsoft Security Essential at the same time.
    Does 2 security solutions or more helps your computer to be risk-free?
    Cheers 
    Peter
    (Current: W520 4284-A99) (Refunded: W510 4876-A11)
    =============================================
    Does someone’s post help you? Give them kudos as a reward, as they will do better to improve 
    Mark it as solved if the solution works for you, so it could be reference for others in the future 
    Dolby Home Theater v4 (ThinkMix V2)!
    http://forums.lenovo.com/t5/W-Series-ThinkPad-Lapt​ops/W520-Sound-Enhancement-Thread/m-p/451401#M155... 
    Solved!
    Go to Solution.

    Hello,
    Generally speaking, you should not run two security programs together at the same time which run in "real-time," e.g., they are actively monitoring the system.  The reason for this is that the various real-time components (on-access file system scanner, network traffic filter, and so forth) may interfere with each others operations as they both attempt to access the same bits at the same time.  This can lead to all sorts of strange system behavior, such as slowdowns, program crashes, failed downloads and lock-ups.
    If you are going to do this, make sure you disable the realtime scanning components of one program, or use one program to actively monitor the system and the other to periodically perform an scheduled or manual scans on demand.
    Regards,
    Aryeh Goretsky
    I am a volunteer and neither a Lenovo nor a Microsoft employee. • Dexter is a good dog • Dexter je dobrý pes
    S230u (3347-4HU) • X220 (4286-CTO) • W510 (4318-CTO) • W530 (2441-4R3) • X100e (3508-CTO) • X120e (0596-CTO) • T61p (6459-CTO) • T43p (2678-H7U) • T42 (2378-R4U) • T23 (2648-LU7)
      Deutsche Community   Comunidad en Español Русскоязычное Сообщество

  • Please tell me why it takes so long to log into a site protected by 'Rapport' security software since the upgrade to 17.0.1. Also locks firefox temporarily

    When logging into:
    https://service.oneaccount.com/onlineV2/OSV2?event=login&pt=1
    Rapport seems to hang the whole browser. This has only been a problem since you upgraded me to 17.0.1. Have just tried the same operation with Rapport running on IE8 and no problem, from hitting go to being in - 12 seconds and use of the browser. When can we expect a fix?

    Hi,
    Please see http://www.trusteer.com/support/ for updating the current installation, and reporting issues.
    ''fixed the broken hyperlink - Ed''

  • Trusteer Rapport - does it work now?

    My bank has suddenly bought into the Trusteer Rapport security software and is urging me to install it. At the top of this forum is a warning, now over a year old, that some versions of Trusteer Rapport conflict with InDesign.
    Can anyone confirm that they are running a current version of Trusteer Rapport without conflict?
    I need to run InDesign CS4 and InDesign CS5 without problems.
    I tried searching, but of course, the search function is broken.

    I haven't seen a report of a problem with Trusteer Rapport in quite some time.

  • Trusteer Report security for Browsers....I don't know which version of Fire fox I have. Previous one could have Trusteer on it but this one can't and all of my passwords have been compromised as a result. hw can I have trusteer on this one please?

    My Bank has made Trusteer raport available to protect all my passwords...and the new version of firefox which installed itself!!!!!! cant support this safty measure whic has now been compromised by MyWebSearch which has also installed itself on my browser...How can I get this feature to run on my browser please!
    Regards
    Coco

    From what I have seen other Trusteer Rapport users post here recently, it isn't compatible with the Firefox 4.0 betas. Most security applications or add-ons typically don't support beta pre-release software. You should still have your older version of Firefox installed yet (if you had one installed), the Firefox 4.0 betas install to their own unique Program Files folder and don't overwrite another version of Firefox.

  • Is trusteer rapport safe?

    Dose anyone know about Trusteer rapport? Today I notoced the icon and I do not remember loading this software but did update my Mac some days ago. Is this auotmatically loaded by apple?

    Dear Forum users,
    The problems you are describing have been resolved in Rapport latest verion- 1204.75.
    You can update Rapport here - http://www.trusteer.com/support/rapport-installation-links
    If the problem persists with Rapport's latest version, please contact us [email protected] or by browsing to http://www.trusteer.com/support/en/report-problem and we'll be glad to assist you in resolving the problem.
    Once again, we apologize for any inconvenience that may have been caused by this.
    Sincerely,
    Trusteer Technical Support

  • What is a good security software for Mac

    My bank seems to think that my Mac has a virus, as my accounts have had several attempted hacks over the last month. My computer seems to run fine and I haven't noticed any problems, but probably should buy some sort of security software before I change all my account numbers etc. I'm leary of just internet shopping for security software as I am not knowledgable enough to know if something is for real or not. What would you reccommend for as good security software?

    My bank seems to think that my Mac has a virus...
    More than likely your bank considers using a Mac or Safari is a "virus".  A lot (not all) of investment sites, banks, etc. think Macs are just not significant to them and get "confused" or just plain reject Macs attempting to connect to them because they are entrenched with Microsoft crap and Internet Explorer's particular variant of HTML.
    The way around this of course it just change your user agent to make them think you are using Internet Explorer.  This will usually shut them up but of course if they are using a Microsoft variant of HTML some stuff may draw incorrectly.
    The way you can change your user agent in Safari is to enable the Safari Develop menu (Safari preferences --> Advanced --> Show Develop menu checkbox).  Then in the Develop menu change your user agent to one of the flavors of IE.  See what happens then.
    If you are using Firefox there are user agent add-ons.  One is User Agent Switcher.
    I'm sure other browser also have a way to change user agents as well; builtin like Safari or add-ons/extensions as with Firefox.

  • Oracle Security : what do you think about the following policy violation ?

    If you install OEM10, you will be able to see if you violate some security guidelines :
    Interresting is revoking UTL_FILE from public, which is critical. Also revoke UTL_TCP and UTL_SMTP. This is going to upset an expert I know...
    Take care about the failed login attempts. If you set it to 10 to the default profile, and if your DBSNMP password is NOT the default password, then Oracle will lock your account after node discovery!
    In Solaris, you can disable execution of the user stack with the system parameters set noexec_user_stack=1
    set noexec_user_stack_log=1. I did not find how to do it on AIX. However, those settings may have side effects.
    About the ports, it complains about open ports, even if this is the port oracle listener is using! Simply ignore most of the violations there.
    About JAccelerator (NCOMP), it is located on the "companion" CD.
    Ok, Waiting for your feedback
    Regards
    Laurent
    [High]      Critical Patch Advisories for Oracle Homes     Configuration     Host     Checks Oracle Homes for missing critical patches          
    [High]      Insufficient Number of Control Files     Configuration     Database     Checks for use of a single control file          
    [High]      Open ports     Security     Host     Check for open ports          
    [High]      Remote OS role     Security     Database     Check for insecure authentication of remote users (remote OS role)          
    [High]      EXECUTE UTL_FILE privileges to PUBLIC     Security     Database     Test for PUBLIC having EXECUTE privilege on the UTIL_FILE package          
    [High]      Listener direct administration     Security     Listener     Ensure that listeners cannot be administered directly          
    [High]      Remote OS authentication     Security     Database     Check for insecure authentication of remote users (remote OS authentication)          
    [High]      Listener password     Security     Listener     Test for password-protected listeners          
    [High]      HTTP Server Access Logging     Security     HTTP Server     Check that HTTP Server access logging is enabled          
    [High]      Web Cache Access Logging     Security     Web Cache     Check that Web Cache access logging is enabled          
    [High]      Web Cache Dummy wallet     Security     Web Cache     Check that dummy wallet is not used for production SSL load.          
    [High]      HTTP Server Dummy wallet     Security     HTTP Server     Check that dummy wallet is not used for production SSL load.          
    [High]      Web Cache owner and setuid bit'     Security     Web Cache     Check that webcached binary is not owned by root and setuid is not set          
    [High]      HTTP Server Owner and setuid bit     Security     HTTP Server     Check the httpd binary is not owned by root and setuid bit is not set.          
    [High]      HTTP Server Directory Indexing     Security     HTTP Server     Check that Directory Indexing is disabled on this HTTP Server          
    [High]      Insufficient Redo Log Size     Storage     Database     Checks for redo log files less than 1 Mb          
    [Medium]      Insufficient Number of Redo Logs     Configuration     Database     Checks for use of less than three redo logs          
    [Medium]      Invalid Objects     Objects     Database     Checks for invalid objects          
    [Medium]      Insecure services     Security     Host     Check for insecure services          
    [Medium]      DBSNMP privileges     Security     Database     Check that DBSNMP account has sufficient privileges to conduct all security tests          
    [Medium]      Remote password file     Security     Database     Check for insecure authentication of remote users (remote password file)          
    [Medium]      Default passwords     Security     Database     Test for known accounts having default passwords          
    [Medium]      Unlimited login attempts     Security     Database     Check for limits on the number of failed logging attempts          
    [Medium]      Web Cache Writable files     Security     Web Cache     Check that there are no group or world writable files in the Document Root directory.          
    [Medium]      HTTP Server Writable files     Security     HTTP Server     Check that there are no group or world writable files in the Document Root directory          
    [Medium]      Excessive PUBLIC EXECUTE privileges     Security     Database     Check for PUBLIC having EXECUTE privileges on powerful packages          
    [Medium]      SYSTEM privileges to PUBLIC     Security     Database     Check for SYSTEM privileges granted to PUBLIC          
    [Medium]      Well-known accounts     Security     Database     Test for accessibility of well-known accounts          
    [Medium]      Execute Stack     Security     Host     Check for OS config parameter which enables execution of code on the user stack          
    [Medium]      Use of Unlimited Autoextension     Storage     Database     Checks for tablespaces with at least one datafile whose size is unlimited          
    [Informational]      Force Logging Disabled     Configuration     Database     When Data Guard Broker is being used, checks primary database for disabled force logging          
    [Informational]      Not Using Spfile     Configuration     Database     Checks for spfile not being used          
    [Informational]      Use of Non-Standard Initialization Parameters     Configuration     Database     Checks for use of non-standard initialization parameters          
    [Informational]      Flash Recovery Area Location Not Set     Configuration     Database     Checks for flash recovery area not set          
    [Informational]      Installation of JAccelerator (NCOMP)     Installation     Database     Checks for installation of JAccelerator (NCOMP) that improves Java Virtual Machine performance by running natively compiled (NCOMP) classes          
    [Informational]      Listener logging status     Security     Listener     Test for logging status of listener instances          
    [Informational]      Non-uniform Default Extent Size     Storage     Database     Checks for tablespaces with non-uniform default extent size          
    [Informational]      Not Using Undo Space Management     Storage     Database     Checks for undo space management not being used          
    [Informational]      Users with Permanent Tablespace as Temporary Tablespace     Storage     Database     Checks for users using a permanent tablespace as the temporary tablespace          
    [Informational]      Rollback in SYSTEM Tablespace     Storage     Database     Checks for rollback segments in SYSTEM tablespace          
    [Informational]      Non-System Data Segments in System Tablespaces     Storage     Database     Checks for data segments owned by non-system users located in tablespaces SYSTEM and SYSAUX          
    [Informational]      Users with System Tablespace as Default Tablespace     Storage     Database     Checks for non-system users using SYSTEM or SYSAUX as the default tablespace          
    [Informational]      Dictionary Managed Tablespaces     Storage     Database     Checks for dictionary managed tablespaces (other than SYSTEM and SYSAUX)          
    [Informational]      Tablespaces Containing Rollback and Data Segments     Storage     Database     Checks for tablespaces containing both rollback (other than SYSTEM) and data segments          
    [Informational]      Segments with Extent Growth Policy Violation     Storage     Database     Checks for segments in dictionary managed tablespaces (other than SYSTEM and SYSAUX) having irregular extent sizes and/or non-zero Percent Increase settings

    Interresting is revoking UTL_FILE from public, which is critical. Also revoke UTL_TCP and UTL_SMTP. This is going to upset an expert I know...Okay, as this is (I think) aimed at me, I'll fall for it ;)
    What is the point of revoking UTL_FILE from PUBLIC? Yes I know what you think the point is, but without rights on an Oracle DIRECTORY being able to execute UTL_FILE is useless. Unless of course you're still using the init.ora parameter
    UTL_FILE_DIR=*which I sincerely hope you're not.
    As for UTL_SMTP and UTL_TCP, I think whether a program is allowed to send e-mail to a given SMTP server is really in the remit of the e-mail adminstrator rather than the DBA.
    Look, DBAs are kings of their realm and can set their own rules. The rest of us have to live with them. A couple of years ago I worked a project where I was not allowed access to the USER_DUMP_DEST directory. So every time I generated a TRC file I had to phone up the DBA and a couple of hours later I got an e-mail with an attachment. Secure yes, but not very productive when I was trying to debug a Row Level Security implementation.
    I have worked on both sides of the DBA/Developer fence and I understand both sides of the argument. I think it is important for developers to document all the privileges necessary to make their app run. Maybe you don't have a better way of doing that than revoking privileges from PUBLIC. Or maybe you just want to generate additional communication with developers. That's fine. I know sometimes even DBAs get lonely.
    Cheers, APC

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is known about UCMA support in 'Skype for Business', the next generation of Lync Server?

    Microsoft has announced that the next version of Lync will be "Skype for Business".  In the first half of 2015, the next version of Lync will become Skype for Business with a new client experience, new server release, and updates to the service
    in Office 365.
    http://blogs.skype.com/2014/11/11/introducing-skype-for-business/
    What is known about support for UCMA and other Lync SDKs in the new version that is expected to be released in less than six months?
    UCFin

    There is now publicly available information that all the Lync SDKs will be supported in Skype for Business. Specifically, there will be support for:
    Unified Communications Managed API (UCMA)
    Lync Server SDK
    Lync Client Managed API (including UI Suppression)
    Unified Communication Web API (UCWA)
    You can read more on my blog post: here: http://blog.thoughtstuff.co.uk/2015/03/lync-development-apis-whats-supported-in-skype-for-business/
    -tom
    Tom Morgan Developing Lync

  • HT201210 what do yu mean by security software....is it all about disabling my antivirus....i need help on this

    what do yu mean by security software....is it all about disabling my antivirus....i need help on this...cze my 3g is showing error 1015

    See this discussion: https://discussions.apple.com/thread/5110212?tstart=0

  • Safari is asking us to call 1-866 782-**** because of a security issue. Safari is not currently working. What is this all about?

    Safari is asking us to call 1-866 782-**** because of a security issue. Safari is not currently working. What is this all about?
    <Post Edited By Host>

    Sorry for the second same words reply but I want people to see this is a scam thank you
    this conversation has help me, today I had the same pop up scam announcement, I was searching in you tube yahoo and google about this no one apparently had this issue before, first I was going to call the original apple phone number because to me this pop seem awkward but the announcement had the apple name I gave it a try but using the call app phone booth just to see if it was the official apple phone number and if it was not who ever was asking me to call wont get my actual phone number, to my surprise it wasn't apple official phone number because I have called the apple official # and is nothing a like, I hung up all worried and sad with only one option in my mind called the apple support number, then I stop and thought for a minute and one clever thought came to my head that is brain lol, the clever thought was this "let me put this phone number in the web to see if it takes me to the official apple website" so I did it and the first pop up search was this article this conversation of you guys read it and follow the instructions they were very successful fix my issue, thank you so much guys, keep up the great work.
    Edit

  • TS3297 I forgot my security questions what do I do about this?? Plz help

    I forgot my security questions what do I do about this?? Plz help

    1. See my User Tip for some help: Some Solutions for Resetting Forgotten Security Questions: Apple Support Communities.
    2. Here are two different but direct methods:
        a. Send Apple an email request at: Apple - Support - iTunes Store - Contact Us.
        b. Call Apple Support in your country: Customer Service: Contacting Apple for support
            and service.
    3. For other queries about Apple ID see Frequently asked questions about Apple ID.
    4. Rescue email address and how to reset Apple ID security questions
    5. For online assistance use Apple - Support - Express Lane

Maybe you are looking for

  • Am I the only person who has (or cares) about this problem with IMAP

    I have multiple mailboxes in my IMAP account and i have to go into each mailbox to see if there is new mail. Is there a way to just update all mailboxes on the iphone? is it an IMAP setting? Is this Apple's way of trying to get me to buy mobile me?

  • Forms Adjustment

    1. How to edit a secured pdf form in Acrobat Pro. 2. How to adjust the cursor height to balance in a text field in forms Central.

  • Problem with "Who-is-who"-iView

    Hi, I wanted to integrate the "Who-is-who"-iView as it is described in SAPHelp (<a href="http://help.sap.com/saphelp_nw04/helpdata/en/21/ac21410bc3ef23e10000000a155106/frameset.htm">Configuration of the Who’s Who iView</a>). But it doesnu00B4t work.

  • I can't get a dvd to play on my new iMac?

    I inserted a dvd into my imac and it asked me to change the country code as the dvd code and the imac didn't match.  I changed it to you US or North America, whatever the code was and I still can't play the DVD.  Any idea why?  Can't I use this as a

  • How to let sql server 2008 know the table created at front end in c#

    How to let sql server 2008 know the table created at front end in c#