What is the safe mode key for 875p neo board

can you please tell me what the safe mode key is for this board as F8 key in xp pro wont do?
regards,
bunter

Quote
Originally posted by CROBBO
@ Assaf correct  
I tried your suggestion and you were correct again thanks m8  
I have Built many Pc's first time using an MSI mobo, I have been fault finding and have many problems.
So Assaf going to need some more of your knowlage please.  
I have the utils infoview & wminfo and I have big problems.
Number of Proccessors: 2?  
External Clock: 200MHz  
Current Speed: 3200MHz  
Device manager confirms this in Win XP Pro SP1, Tried uninstalling one of the cpu's reboot and it's still their 2 cpu's
Some help would be very nice TA!
TIA  
Regards CROBBO  
theres nothing wrong with those readings m8.
 you have 2 processors because of hyperthreading. windows sees it at 2 separate cpus.  you external clock is your fsb, which should be 200. this is quadpumped so essentially it is 800mhz, then your current speed is your cpus clock speed and since you have a 3.2p4 E it tells you its running at 3200mhz = 3.2Ghz  

Similar Messages

  • What is the best 3G key for new macbook pro, what is the best 3G key for new macbook pro

    I ve just buy a new macbook pro 13" and the Alcatel Key (3g) to connect web but it doesn't working.
    My supplier told me is because of thunderbolt system.
    the web is essential for my business
    What can i do ? Which key i need ?
    Yours sincerely
    Florent

    First the reason sounds like "tech guy doesn't know"
    If your in Europe then I use Vodafone, and have been happy.  I also tether my Android phone, depending whc has better reception (though the Android is free with easytether)

  • What are the Batch mode parameters for Receiver JDBC Adapter

    Hi All,
             Could some pls tell me how to set bacth mode in receiver JDBC adapter and what are its parameters and how to configure them. i beleive there is something like max count parameters etc..
    Regards,
    Xier

    Hi,
    Check this for more info
    http://help.sap.com/saphelp_nw04s/helpdata/en/64/ce4e886334ec4ea7c2712e11cc567c/frameset.htm
    Regards
    Seshagiri

  • What is the safe voltage range for charging my iphone

    I tested a USB Car charger that I had, and it was putting out 5.68V.  Is that safe to charge my iPhone 5 with?  I thought it was supposed to be 5V.  I don't want to screw anything up.
    Thanks!

    Joe Z in VA wrote:
    All chargers are certified and regulated to hold a maximum output of 5V. Specific chargers modeled for higher power devices including iPads hold a maximum output of 10V but can take 5V instead.
    A difference of 0.68 more won't hurt the device much, despite that you used a tester.
    You are confusing your V with W
    Iphone uses 5V 1A ( 5w)
    iPad uses    5V  2A (10w)
    Not all chargers are certified Branded ones may be most far east copies definately not
    hence my reference to premium Brands

  • Firefox closes when opening mulitiple tabs even in the safe mode

    Opening mulitle tabs from NY Times or Washington Post website.
    Firefox will close.
    Upon reopening, I activate "Restore Session" and all of the tabs load.
    I have disabled JavaScript.
    It has done this in the "safe" mode.

    Thanks for the note about profile locations.
    I deleted mimeType.rdf in my existing profile, still have the same issue - can't view Tools -> Options for the Applications tab, or download a file. Same goes for a new profile - the same issues arise.
    Firefox never does crash, I can leave it in this hung state for hours (I left it in a 'not responding' state last night and it was still hung this morning).
    I was going to add a screen shot to this post but Firefox hung when I clicked on the 'Browse' button. Perhaps this is an issue when FF tries to interact with my directory structure? Does that get us any leads on what's wrong?
    FYI, I currently have my antivirus disabled & not running in the task bar just in case that was interfering somehow.

  • Has anyone tried installing BC2.1 for Vista 64-bit in the Safe mode?

    Before I go ahead, has anyone attempted to install the BC2.1 64-bit update for Vista using the Safe mode?
    The thought occurred to me earlier, and before I bothered, I was wondering if it had been tried yet by anyone?
    As with most others with Vista 64 bit, the exe runs, asks for permission and then dies. Not even a whimper

    I attempted to install the BC2.1 in the safe mode, but it still did nothing.
    In the normal mode, viewing the Task Manager, when I click the update, after a long while the Task Manager shows a message, something to the effect, "BC2.1.exe is waiting for administrator approval."
    After I check the box in the approval window that it's OK to run, the warning in the Task Manager disappears and nothing reappears, meaning the process died.
    The system logs don't show very much, but I did not bother too much with them.
    This is an issue that Apple has to address. I am confident that they will.
    Meanwhile I will post a note on the developers board about it.
    http://developer.apple.com/contact/
    I presume when it's fixed, the update will show up in the Apple Software Update window, just as the XP update appeared on my other MBP.
    Until then, it's just a bit annoying.

  • We have several licences of Adobe Photoshop Elements V9 can we use the same licence key for latest version or what version can we install is this key???

    We have several licences of Adobe Photoshop Elements V9 can we use the same licence key for latest version or what version can we install is this key???
    We are Gouvernment and we use Windows 7 64 bits edition with office 2010.
    Thanks.

    Hi Denis, if you have license of Photosho Elements V9 then you can only install V9, please check the download link: Download Photoshop Elements products | 9, 8, 7. Please also check System requirements | Adobe Photoshop Elements
    Atul_Saini

  • After installing 3.6 FF won't open even in the safe mode, I click on the icon and nothing happens at all

    I installed 3.6 and now FF won't open even in the safe mode. I restored my computer setting back to where I was running 3.5.13 but it still doesn't work...some files must have been deleted when I upgraded that weren't put back even when going back to the older version but I have no idea what to look for or what to do even if I find them. Can you please help me?

    Using system restore can create problems as well as solving them. I have seen system restore destroy a Firefox setup. The installation may be OK but to be sure perform a clean install
    # [http://kb.mozillazine.org/Uninstalling_Firefox Uninstall Firefox]
    # Delete the Firefox [http://kb.mozillazine.org/Installation_directory Installation directory], default location C:\Program Files\Mozilla Firefox\
    # Download the latest version from http://www.mozilla.com/ and install it
    If Firefox still does not start, try creating a new profile folder. Firefox stores user data in a profile folder, creating a new profile will show if the problem is with the old profile. For how to do that see [http://kb.mozillazine.org/Creating_a_new_Firefox_profile_on_Windows creating a new Firefox profile on Windows].
    If the new profile works, you can copy selected data such as bookmarks and passwords to the new profile. For details see [http://kb.mozillazine.org/Transferring_data_to_a_new_profile_-_Firefox transferring data to a new profile]. Do not copy the preferences file, and it is best to re-install any add-ons.

  • Using the Safe Mode function on your PlayStation 3?

    i followed the steps it works fine then when i sign in within a afew seconds it cuts off and gets a red flashing light again i dont know what to do :/

     
    RabidWalker wrote:
    Using the Safe Mode function on your PlayStation 3?
    Safe Mode:
    The option to use Safe Mode on the PlayStation 3 was introduced if a problem occurs where it will no longer start up normally.
    To use this feature the console will need to have the System Software update 2.60 (or later).
    When to Use Safe Mode?
    When starting up the PlayStation 3, and the XMB menu no longer appears (you may see a wavy line on the background instead).
    When the PlayStation 3 is started up, nothing appears on screen.
    When the PlayStation 3 is started up and you encounter the following message ‘The Hard disk’s file system is corrupted and will be restored’. When selecting ‘OK’ the system restores and restarts, however the same message appears.
    When the PlayStation 3 is started up and you encounter the following message ‘The Hard disk’s database will be rebuilt’. When selecting ‘OK’ the system begins the operation and then fails (stopping the restoration of the HDD).
    There is an issue after the PlayStation 3 update process is started, or a rebuilding of the database occurs.
    Safe Mode procedure:
    1)    Ensure the PlayStation 3 is in standby mode (where the red light is apparent), and then turn the console off at the mains switch.
    2)    Turn the mains power on, then while in standby touch and hold the power button.
    3)    Keep your finger pressed on the power button (after 5 seconds you will hear a beep).
    4)    After 10 seconds of holding your finger on the power button, you will hear a second beep and the console will shut down (you can remove your finger).
    5)    Touch and hold the power button again.
    6)    Again hold your finger down on the button until you hear another beep after 5 seconds.
    7)    A number of seconds after this you will hear a double beep- you can remove your finger.
    8)    You will be prompted to plug your controller in and press the PS button on your controller. After doing so you will access the Safe Mode menu with a number of options.
    Safe Mode Option Screen:
    Restart System
    Selecting this option will start up the system normally- It will also allow you to exit the Safe Mode Menu.
    Restore Default Settings
    Selecting this option will restore Default settings on your console (when starting the unit you will be prompted to set time, time zone etc). This option will also delete your PlayStation Network account information from the system.
    Your User information will be deleted and restored- the indicator will be an asterix by your username e.g. *RabidWalker.
    When logging into your user you will encounter no issues with disc based games. However when attempting to play PSN downloaded games you may encounter the message:
    ‘To access the system, you must activate the system.
    Go to [PlayStation Network] > [Account Management] to activate this system. (80029514). ’
    Follow the instruction to activate your PlayStation 3 to play downloaded games (if the system is activated, deactivate and reactivate the system)
    Restore File System
    This option will begin a process to repair data on your Hard Disk Drive. Therefore it will check for any corrupted data and try and recover this. It the data cannot be recovered it may be erased to ensure that it does not interfere with the operation of the PlayStation 3.
    Rebuild Database
    If issues continue to persist and you select this option please note that data will be removed during this process.
    The following information will removed:
    -          Messages
    -          Playlists
    -          User changes to Information Screens
    -          User changes to Picture under Photos
    -          Video Thumbnails
    -          Video Playback History
    -          Video Resume Information
    This process may take same time to complete
    Restore PS3 System
    The option to restore PS3 system is the same as the ‘quick format’ option on the XMB menu. It will reformat the HDD, removing all data and restoring the Hard drive to its original state.
    System Update
    Selecting this option will install the PlayStation 3 Update but only if the update is on an external media storage device plugged into the console.
    This option can be used if any issues are encountered with the installation of the System software update.
    If you have any queries regarding this or any other issues please PM me or catch me on Twitter
    @RabidWalker
    Rabid
     

  • When I open Firefox outside of the safe mode I get a continous sound of a the "Pac Man" game over my speakers

    when I open Firefox outside of the safe mode I get a constant sound of the "Pac Man" game playing over my speakers
    == This happened ==
    Every time Firefox opened
    == today

    help! when i open firefox I get the pac-man game sound and I can't get it to stop and I can't find it. I ran trend micro and avg9.
    Is it malicious? can it dump or damage my data?
    How do I finally remove it?
    what is it anyway??
    Thanks for your help.

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the "remote DNS" checkbox for?

    Want to know what is that configuration option for; that's all!

    Firefox doesn't come with such a check box.
    Can you attach a screenshot?
    *http://en.wikipedia.org/wiki/Screenshot
    *https://support.mozilla.org/kb/how-do-i-create-screenshot-my-problem
    *Use a compressed image type like PNG or JPG to save the screenshot
    *Make sure that you do not exceed the maximum size of 1 MB
    Start Firefox in <u>[[Safe Mode|Safe Mode]]</u> to check if one of the extensions (Firefox/Tools > Add-ons > Extensions) or if hardware acceleration is causing the problem.
    *Switch to the DEFAULT theme: Firefox/Tools > Add-ons > Appearance
    *Do NOT click the Reset button on the Safe Mode start window
    *https://support.mozilla.org/kb/Safe+Mode
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes

  • I am running Windows XP PRO. Firefox 3.6 islisted in in my computer and I cannot delete it in the control panel using the Add of Delete Function. I have even gon into the safe mode and I still cannot delete it.

    I want to intall Mozilla Firefox 4. Will this delete the contents of Firefox 3.6? I was to the point that I was ready to Reboot the Whole system. I called Microsoft and they resolved the Silverstream issue. When in the control panel I click on the delete function all that is does is stay at Blue. It will not delete and it does not give me any message.

    The normal method is simply
    * Help -> Check for Updates
    on Firefox (Window XP)
    * see also [[Updating Firefox]]
    You should be able to delete Firefox and remove it, from your Windows XP control panel although that may not be what you intend.
    If you have doubts about compatibility stay with Firefox3.6 for now.
    Some software extensions will currently have problems with firefox 4 (and that iircc may include some versions of silverlight )
    Do NOT use any delete settings (or whatever it is worded) that will loose all your passwords and bookmarks.
    BTW the safe mode in relation to Firefox is a totally different concept from Windows safe mode, but you probably have no need to use either of them.
    * see also [[Safe Mode]]
    On an ordinary upgrade Firefox will preserve your profile details which include bookmarks any passwords.
    You should have no problems in installing Firefox 4. You should be able to install firefox 4, and retain any bookmarks etc that were used in firefox 3.6, but sometimes extensions may be incompatible.

  • What is the best Compressor setting for best quality video playback on an iBook g4?

    I know the iBook and G4's in general are very outdated today, but I need to ask anyways. I have some video projects in 720p and 1080p in which I have down converted to 480p and also exported to MPEG-2 for DVD (personal wedding videos and videos made for my clients using Final Cut Studio). Anything encoded at most resolutions using h264 won't play on my iBook. Even 480p.
    I have about 20 hours of mixed video content that I need it in a format that is suitable for an iPhone 4 and an iBook 12" with a 1.2GHz G4, 1.25GB RAM and I added a 250 WD 5400 IDE hard disk (running 10.5.8 and 10.4.11 for Classic Mode). I know the iBook doesn't seem like the best tool for modern video playback, but I need to figure out which setting will play best with iPhone 4 and iBook so I don't need to make 2 local copies of each video for each device.
    The iBook plays best with the original DVD output MPEG-2 file and playing back in QT Pro or VLC... but I already have 180 GB's of MPEG-2 files now and my little HD is almost full. I don't have enough room to convert all the iPhone 4 counterparts. If I use Compressor 3.5.3, what is the optimal setting for iBook and iPhone .m4v or .mp4 files that can play on both devices? So far 720x400-480 widescreen videos @ 29fps works great on my iPhone, Apple TV 2, and other computers but seems to murder my poor iBook if encoded with high profile (and still choppy on simple profiles). 640x480 (adding black matte bars to my videos) plays fine in MPEG-2 but drops frames or goes to black screen if I convert it to mp4 (and looks bad on the iPhone 4 because of the matte). But if I convert on any of the simple profiles, it looks terrible on my iPhone 4 and a blocky on the iBook.
    This is the problem leading me to having 2 copies of each video and eating my hard disk space. What is the best video setting for both playback on the iBook and iPhone 4? Can the iBook playback H264 at all in decent resolutionsat all? I don't really want to have a 480p .m4v collection for the iPhone 4 and a MPEG-2 RAW collection just to play the same videos on the iBook.
    Any suggestions are greatly appreciated! Thanks!

    Update: The iBook can play any 480p video and higher if I encode them with DivX and in AVI format. But of course this is not compatible with my iPhone 4. At least I can shrink my library now and get away from the full MPEG-2s. I don't get why I can't use Apple's h264 though. There has to be a setting I am missing. The sample Apple h264 videos from the days of Tiger worked flawlessly on my iBook when it was new so the CPU must be capable of decoding it. I really can't understand this.
    Also, since I made my videos in English for my family, I had to create soft subtitles for my wife's Chinese family, and I can't get players like QT with perian or MPlayerX to sync them properly to an AVI encoded with DivX, they only sync well with the iPhone 4 m4v/mp4 formatted files I made. This is a real pickle.
    So now I may need three or four copies of each video, LOL. I need to hardcode the subtitles if I want to use AVI to playback on older machines, and keep the mp4 file for the iDevices too, while keeping higher quality h264 videos for my American relatives...
    If h264 is compatible with my iBook, what is the proper encoding settings? Must I dramatically lower the settings or frame rate? I can settle on 2 copies of each video that way. One iBook/G4/eMac compatible video that syncs correctly with my srt soft subs, and another version that works well with my iPhone 4 and iPad.
    All in all, I will end up with more than 3 or 4 version of each video. On my late G5 dual core I have the full 720-1080p uncompressed master files. On my i5 iMac I have the h264 compressed versions for distribution, and lower versions for my iDevices. Now I need to keep either full MPEG-2 files for the iBook to play, or convert to older formats like DivX AVI for our family's legacy machines. I am running out of hard disk space quick now, LOL.
    Is there an easier way?

  • What are the permitted compression techniques for PDF/A-1?

    The PDF/A-1 standard does not specify how compression is performed. What are the permitted compression techniques for PDF/A-1?
    The information I have gathered (not sure if all are true)
    LZW should not be used
    JPEG2000 may not be used
    Few say, JPEG can be used but its a lossy compression. (PDF standard clearly states lossy compression can't be used)
    Also, how to figure out whether a particular file is PDF/A-1a or PDF/A-1b and what kind of compressions are used in that file?
    Thanks in advance.

    For better or worse, ISO specifications are written in a language from a parallel universe.    After dealing with ISO standards for a while, you learn what specific words really mean. I should know - I am chair of the ISO PDF/X task force and co-chair of the PDF/VT task force.
    The word should does not specify a requirement. PDF/A does not prohibit lossy compression.
    JPEG is always a lossy compression. There is a mode of JPEG2000 compression that is indeed lossless. Note that JPEG and JPEG2000 are totally different compression schemes. (I believe that PDF/A-1 as well as PDF/X-1a and PDF/X-3, based on older versions of the PDF specification do not permit JPEG2000. PDF/A-2 based on ISO32000-1 and PDF/X-4 based on PDF 1.6 do allow for JPEG2000.)
    ZIP compression is lossless.
              - Dov

Maybe you are looking for

  • Turned off cellular data, when I turned it back on, I couldn't connect to AT&T

    I had turned off the Cellular data while in a WiFi zone...when I turned it back on while on the road, all attempts to connect.(in spite of EXCELLENT AT&T signal strength), were met with "you do not have an internet connection" messages. I've since go

  • Email sent...but attachment appears in body

    Hi, I am trying to send emails with attachments in pl/sql. I heard it can be done. I tried it, the code runs wiithout erros. But i cannot see the actual attachment. The content of the attachment appears in the body of the email. In the email i see th

  • Podcasts don't delete

    Hi, I've searched through and can'tfind anyone with a similar problem. I have long-deleted podcasts that still show up in smart playlists (songs only played once, for example) but don't appear in the main 'Music' folder, or, crucially, in the subscri

  • ASP url, post method

    Hi all, I' m working on a web crawler to crawl information about company. I need to get information from a web company register http://www.ur.sk. Url with all needed information looks like this one: http://www.ur.sk/index.asp?lang=&stranka=3&ID=0&ico

  • Priceing procedure - condition type - number of units

    Hi, I have a condition type in my pricing procedure. When I display item conditions for an item in a sales document I can see that my condition applies to 1000 units of measure. How do I change my condition so that the calculated amount applies to on