What is the safari homepage for yosemite

what is the safari homepage for yosemite

It can be anything you want it to be. In Safari, go to the "Safari" menu and choose Preferences, and in the General section you should see a Homepage setting that will hold the address to your current home page. You can click the "Set to Current Page" button if you want the current Web page to be your home page, or you can delete the address to set this to nothing. The behavior of new windows and tabs is then set using the two menus above this setting, where you can have a new window or tab open with your Favorites (the default), your home page setting, an empty page, or the same page as the current window (ie, duplicate the current view in another window or tab).

Similar Messages

  • What is the safari homepage address? I want to get rid of google as my homepage

    I have a macbook pro. I just switched the homepage from safari over to google and now I want to switch back. What is the default homepage that came with my macbook pro and what is the address?

    Go to http://www.apple.com/startpage/
    then go into Safari > Preferences and click General > Set to current page.
    Pete

  • What are the "EXACT" requirements for Yosemite install on iMac 5.1 (fails on wk 27 2007 build with OS X.6.8)??

    My iMac seems to meet all of the stated requirements
    Ie: Mid 2007 or newer, 2GB RAM, 50+GB HD space, OS X.6.8. Yet it gives an error of "Cannot install Yosemite on this computer" after attempting an update/install. No other useful information is given and just re-presents the same system requirements over and over with no help.

    Yosemite requires an iMac 7,1 or higher, while yours is:
    Introduced
    September 2006
    Discontinued
    August 2007
    Model Identifier
    iMac5,1

  • HT201222 Is it just me or is the last safari update for Yosemite slowing everyone down? Any ideas how to fix it?

    Is it just me or is the last safari update for Yosemite slowing everyone down? Any ideas how to fix it?

    When you see a beachball cursor or the slowness is especially bad, note the exact time: hour, minute, second.  
    These instructions must be carried out as an administrator. If you have only one user account, you are the administrator.
    Launch the Console application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad and start typing the name.
    The title of the Console window should be All Messages. If it isn't, select
              SYSTEM LOG QUERIES ▹ All Messages
    from the log list on the left. If you don't see that list, select
              View ▹ Show Log List
    from the menu bar at the top of the screen.
    Each message in the log begins with the date and time when it was entered. Scroll back to the time you noted above.
    Select the messages entered from then until the end of the episode, or until they start to repeat, whichever comes first.
    Copy the messages to the Clipboard by pressing the key combination command-C. Paste into a reply to this message by pressing command-V.
    The log contains a vast amount of information, almost all of it useless for solving any particular problem. When posting a log extract, be selective. A few dozen lines are almost always more than enough.
    Please don't indiscriminately dump thousands of lines from the log into this discussion.
    Please don't post screenshots of log messages—post the text.
    Some private information, such as your name, may appear in the log. Anonymize before posting.

  • What is the best solution for migrating from Maverick to Yosemite?

    What is the best solution for migrating from Maverick to Yosemite? Anyone have suggestions?

    Back up all data. Update all third-party software to the latest version and remove any you don't need. Download the Yosemite installer from the App Store. Run it.

  • I currently am using ML 10.8.5, what's the best way for me to upgrade to Yosemite 10?

    Hi Folks,
    I am currently using ML 10.8.5. What is the best procedure for me to follow to upgrade to Yosemite 10.0?
    Is Yosemite stable enough to upgrade to?
    I currently am running MAC OSX on an Apple iMac 27 late 2012 with 24GB of system ram, and 1TB Fusion HDD
    I have as a back up drive an external 1TB FW800 using Super Duper as cloning of my current 10.8.5
    I also use another external FW800 3TB HDD running TM
    Many thanks for any helpful suggestions

    you can no longer send to a group and now have to look for a + in the right corner and click on each addressee
    I welcome that.  Mass e-mails have a downside:
    You get implicated in them when you least want to.
    You get blocked by internet providers preventing you from sending to your contacts who are on those internet providers even when you haven't sent any, because someone else has you on their address list who does send mass e-mails, and you get "blacklisted."
    You get summarily ignored by others if you are believed to be a sender of them, as they will probably use the fact you mass e-mailed as a means of blocking you.
    Use BCC when mass e-mailing.
    You can always make your list of e-mails in a comma delimited fashion, and copy/paste it to the field you want.   

  • I just downloaded the software update for Yosemite after it restarted and installed the software I have a white screen. What should I do ?o

    I Just downloaded the latest software for Yosemite 10.10 after it restarted and installed the software it stopped, now I have a white screen. What should I do now?

    Hi ..
    Hold down  the power button until the screen goes black.
    Wait about ten seconds then restart your Mac while holding down the Command + R keys.
    From there you should be able to access the built in utilities to verify and repair the startup disk if necessary and reinstall OS X. (10.10.1)

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Simple question: What's the Mac shortcut for size???

    What's the Mac shortcut for increasing the size of the online image?
    Thank you

    Safari offers only two choices, zoom page and zoom text only.
    To zoom images, you have to look for a safari extension.
    I have not tested any, so I have no information about any of it.
    Best.

  • What is the -k option for of the Ping utility in OS X?

      Hi,
    May I know what is the -k option for of the Ping utility in OS X? It doesn't seem to be a ICMP protocol standards-relates.
    Below is the description of this option copied from Yosemite.
    -k trafficlass
                 Specifies the traffic class to use for sending ICMP packets.  The
                 supported traffic classes are BK_SYS, BK, BE, RD, OAM, AV, RV,
                 VI, VO and CTL.  By default ping uses the control traffic class
                 (CTL).
    Thank you!

    These are low-level bits defined in the kernel's IPv6 support code.
    Here is the first reference I could find that actually says what some of them are: https://github.com/darwin-on-arm/xnu/blob/master/bsd/sys/kpi_mbuf.h
    Search for "MBUF_TC_BE"

  • What is the advantage of using Yosemite on my iMac over 10.9.5

    What is the advantage of using Yosemite over Lion on my iMac?  Is it any faster, slower or what?

    Before upgrading to a new operating system, here are a couple considerations:
    1.  If you are having problems with your current system, full version upgrades
         will make them worse.  Fix all issues before making the upgrade.
    2.  Make sure that any third party hardware is compatible with the new operating
         system, i.e. drivers available to support the OS.
    3.  The hidden cost item of needing to upgrade apps to work on the new OS.
         If your any of your favorite or mission critical applications are not compatible,
         expect the possibility of needing to purchase upgrades of those apps so that
         they will work on the new OS.
    4.  If you rely on your computer for your livelihood,  be absolutely sure that you
         have a backup strategy and plan to quickly recover should there be any issues.
         There has been many a complaint on this forum that new OS upgrades have
         have ruined their business and had no recovery strategy in place.  Besides,
         anyone relying on a computer for their livelihood is REQUIRED to have such
         a strategy in place regardless of OS upgrades as anything can happen at
         any time.
    5.  If everything is working fine and dandy for you currently, you need to ask if
         any of the new features of an OS of any use to you.  If not, then perhaps
         a "don't fix it if it ain't broke" philosophy is what you should follow.

  • My daughter is a college student. she needs to write and compile c programs on her mac for a class this semester. what is the best place for her to start to get the correct compiler etc. to use ? thanks

    my daughter is a college student. she needs to write and compile c programs on her mac for a class this semester. what is the best place for her to start to get the correct compiler etc. to use ? thanks

    If you know that you will not be asked to design GUI interfaces, and the C programming course will adhere to command line compilation environments, then get the Xcode command-line developer tools, and skip the extra complication of Xcode until you absolutely need it. Apple has kicked GNU C to the curb and is rightly so, using Clang/LLVM compiler technology.
    Sign up for a free Apple Developer account using your Apple ID, and then visit the Mac Dev Center, and towards the bottom of the page, you will see additional downloads. Click on the associated, all down loads link. Know your OS X version beforehand, as the command-line tool releases are tied to general operating system versions, and the most recent Xcode version.  That said, there are currently two March 9, 2015 command-line tools for Xcode 6.2 — one for OS X 10.9 Mavericks, and the other for OS X Yosemite.

  • What is the best app for storing all passwords in a secure area? osx snow leopard

    What is the best app for storing all passwords in a secure area? osx snow leopard

    Keychain is nice, but I prefer to use 1Password. It's got a nice user interface, and does what I need. It stores passwords, notes, identitiy info, credit card info, application registration numbers, saves hardware information such as your router settings, and more. It also has a secure password generator. There's an extension that keeps a button in the browser toolbar for Safari, etc., so you can submit your info (password, credit card) with the click of a button, and without having to type the information in through the website you are visiting. It also pays attention when you are signing in to a website, and asks you if you want to save the login to 1Password. Once you get them all entered, it's a big timesaver.
    http://itunes.apple.com/us/app/1password/id443987910?mt=12
    The link above says it is for OS X 10.7 and up, but if you go to the developer's website (link below), it says it works with OS X 10.6 as well. You can also download a 30-day demo from the link below.
    http://agilebits.com/onepassword/mac

  • What is the newest OS for 2nd generation ipod touch?

    I am looking at buying an iPod touch 2nd Gen just for music purposes. I am mainly going to use it with SiriusXM app. First I wanted to know what is the newest iOS for the ipod touch? Second, I wanted to know if anyone has a 2nd gen ipod touch and is using the SiriusXM app?
    Thank you,
    Matt

    Just note that if yo are getting a 3G iPod make sure that your get a 3G. A 2G and 3G look the same on the outside except for the model number on the back
    iPod touch (3rd generation)
    iPod touch (3rd generation) features a 3.5-inch (diagonal) widescreen multi-touch display and 32 GB or 64 GB flash drive. You can browse the web with Safari and watch YouTube videos with Wi-Fi. You can also search, preview, and buy songs from the iTunes Wi-Fi Music Store on iPod touch.
    The iPod touch (3rd generation) can be distinguished from iPod touch (2nd generation) by looking at the back of the device. In the text below the engraving, look for the model number. iPod touch (2nd generation) is model A1288, and iPod touch (3rd generation) is model A1318.

  • What is the best app for Maintenance/Cleanup for my mac? Do I need Virus Protection?

    What is the best app for Maintenance/Cleanup for my Mac? Do I need Virus protection?

    How to maintain a Mac
    Make two or more backups of all your files
    One backup is not enough to be safe. A copy of a backup doesn't count as another backup; all backups must be made directly from the original data.
    Keep at least one backup off site at all times in case of disaster. Backing up to a cloud-data service is one way to accomplish this, but don't rely exclusively on such backups.
    In fact, don’t rely exclusively on any single backup method, such as Time Machine.
    If you get an indication that a backup has failed, don't ignore it.
    Keep your software up to date
    In the App Store or Software Update preference pane (depending on the OS version), you can configure automatic notifications of updates to OS X and other Mac App Store products. Some third-party applications from other sources have a similar feature, if you don’t mind letting them phone home. Otherwise you have to check yourself on a regular basis.
    Keeping up to date is especially important for complex software that modifies the operating system, such as device drivers. Don't install such modifications unless they're absolutely necessary. Remove them when they are no longer needed. Before installing any Apple update, you must check that all system modifications that you use are compatible. Incompatibility with third-party software is by far the most common cause of difficulties with system updates.
    Don't install crapware
    ...such as “themes,” "haxies," “add-ons,” “toolbars,” “enhancers," “optimizers,” “accelerators,” "boosters," “extenders,” “cleaners,” "doctors," "tune-ups," “defragmenters,” “firewalls,” "barriers," “guardians,” “defenders,” “protectors,” most “plugins,” commercial "virus scanners,” "disk tools," or "utilities." With very few exceptions, such stuff is useless or worse than useless. Above all, avoid any software that purports to change the look and feel of the user interface.
    It's not much of an exaggeration to say that the whole "utility" software industry for the Mac is a fraud on consumers. The most extreme examples are the "CleanMyMac," "TuneUpMyMac," and “MacKeeper” scams, but there are many others.
    As a rule, you should avoid software that changes the way other software works. Plugins for Photoshop and similar programs are an obvious exception to this rule. Safari extensions, and perhaps the equivalent for other web browsers, are a partial exception. Most are safe, and they're easy to get rid of if they don't work. Some may cause the browser to crash or otherwise malfunction. Some are malicious. Use with caution, and install only well-known extensions from relatively trustworthy sources, such as the Safari Extensions Gallery.
    Only install software that is useful to you, not (as you imagine) to the computer. For example, a word processor is useful for writing. A video editor is useful for making movies. A game is useful for fun. But a "cache cleaner" isn't useful for anything. You didn't buy a computer so you could clean caches.
    Never install any third-party software unless you know how to uninstall it. Otherwise you may create problems that are very hard to solve. Do not rely on "utilities" such as "AppCleaner" and the like that purport to remove software.
    Don't install bad, conflicting, or unnecessary fonts
    Whenever you install new fonts, use the validation feature of the built-in Font Book application to make sure the fonts aren't defective and don't conflict with each other or with others that you already have. See the built-in help and this support article for instructions.
    Deactivate or remove fonts that you don't really need to speed up application launching.
    Avoid malware
    "Malware" is malicious software that circulates on the Internet. This kind of attack on OS X was once so rare that it was hardly a concern, but it's now increasingly common and dangerous.
    There is some built-in protection against malware, but you can’t rely on it—the attackers are always at least one day ahead of the defense. You can’t rely on third-party "anti-virus" products for protection either. What you can rely on is common-sense awareness—not paranoia, which only makes you more vulnerable.
    Never install software from an untrustworthy or unknown source. If in doubt, do some research. Any website that prompts you to install a “codec” or “plugin” that comes from the same site, or an unknown site, is untrustworthy. Software with a corporate brand, such as Adobe Flash Player, must come directly from the developer's website. No intermediary is acceptable, and don’t trust links unless you know how to parse them. Any file that is automatically downloaded from the web, without your having requested it, should go straight into the Trash. A web page that tells you that your computer has a “virus,” or that anything else is wrong with it, is a scam.
    In OS X 10.7.5 or later, downloaded applications and Installer packages that have not been digitally signed by a developer registered with Apple are blocked from loading by default. The block can be overridden, but think carefully before you do so.
    Because of recurring security issues in Java, it’s best to disable it in your web browsers, if it’s installed. Few websites have Java content nowadays, so you won’t be missing much. This action is mandatory if you’re running any version of OS X older than 10.6.8 with the latest Java update. Note: Java has nothing to do with JavaScript, despite the similar names. Don't install Java unless you're sure you need it. Most people don't.
    Don't fill up your disk or SSD
    A common mistake is adding more and more large files to your home folder until you start to get warnings that you're out of space, which may be followed in short order by a startup failure. This is more prone to happen on the newer Macs that come with an internal SSD instead of the traditional hard drive. The drive can be very nearly full before you become aware of the problem.
    While it's not true that you should or must keep any particular percentage of space free, you should monitor your storage use and make sure you're not in immediate danger of using it up. According to Apple documentation, you need at least 9 GB of free space on the startup volume for normal operation.
    If storage space is running low, use a tool such as OmniDiskSweeper to explore the volume and find out what's taking up the most space. Move seldom-used large files to secondary storage.
    Relax, don’t do it
    Besides the above, no routine maintenance is necessary or beneficial for the vast majority of users; specifically not “cleaning caches,” “zapping the PRAM,” "resetting the SMC," “rebuilding the directory,” "defragmenting the drive," “running periodic scripts,” “dumping logs,” "deleting temp files," “scanning for viruses,” "purging memory," "checking for bad blocks," "testing the hardware," or “repairing permissions.” Such measures are either completely pointless or are useful only for solving problems, not for prevention.
    To use a Mac effectively, you have to free yourself from the Windows mindset that every computer needs regular downtime for maintenance such as "defragging" and "registry cleaning." Those concepts do not apply to the Mac platform.
    A well-designed computing device is not something you should have to think about much. It should be an almost transparent medium through which you communicate, work, and play. If you want a machine that needs a lot of attention just to keep going, use a PC, or collect antique cars.
    The very height of futility is running an expensive third-party application called “Disk Warrior” when nothing is wrong, or even when something is wrong and you have backups, which you must have. Disk Warrior is a data-salvage tool, not a maintenance tool, and you will never need it if your backups are adequate. Don’t waste money on it or anything like it.

Maybe you are looking for

  • Can't login to obiee 11g analytics

    Hi Guys, Client has installed obiee 11g in a server sitting at different place. We have deployed our own repository and catalog. Now we can't login to obiee analytics. It does not accept any username or password created in weblogic console. But if we

  • WoW on 24 inch iMac

    Does anybody run wow on their 24inch, or have any experience doing so and how well does it run.

  • Connecting to mysql - TNS: protocol adapter error

    hi to all, when I run Oracle client (Run sql command line), I get the sql prompt only. I need to connect to the db. So I use command conn and then enter the username (I tried SYSTEM, SYSDBA and SYS) then the password. The error I receive is: ORA-1256

  • HRMD_A Delimiting Date Update Mode

    Hello all, For creating a Employ master i have used HRMD_A IDOC.It is successfully creating it. But when i try to Update the Employ Master :          For creating the existing infotype with the new evaluation period.It is overwriting the existing rec

  • Zen Cart - how to edit php

    How do I go about editing zen cart php in Dreamweaver in the design wysiwyg view? Can it be done? If not, edit with what?