What virus protection do you recommend?

What virus protection do you recommend for MacBook Pro?

I simply recommend practicing safe browsing habits, such as not opening files or attachments from unverified sources and never provide your user name and password unless you're certain of what you're doing.
Point in case: There is a malicious application currently floating around which goes by various different names, such as Mac Defender and Mac Security. When this piece of malware is downloaded and run on your computer, it will ask you to install it and you will be asked to provide your user name and password for it to gain access to your computer. By not providing this information, the malware is unable to cause any harm your computer.

Similar Messages

  • HT4061 as of lately my iCloud mail box as been full of junk mail ....... in iCloud preferences you can only send 99 different address directly to trash?  what Virus & Malware do you recommend for my iMac, iPad and iPhone ............ thank you !!!!

    as of lately my iCloud mail box as been full of junk mail ....... in iCloud preferences you can only send 99 different address directly to trash?  what Virus & Malware do you recommend for my iMac, iPad and iPhone ............ thank you !!!!

    as of lately my iCloud mail box as been full of junk mail ....... in iCloud preferences you can only send 99 different address directly to trash?  what Virus & Malware do you recommend for my iMac, iPad and iPhone ............ thank you !!!!

  • What virus protection should i download for my macbook pro

    i just got my macbook pro and want to know what virus protection program should i download for free

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article.
    Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If Java is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.

  • I have a macbook pro what virus protection should i install?

    I have a macbook pro, what virus protection should I install?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I Mini with an i7 processor. I would like to use Boot Camp to install windows based CAD software on my MAC. Would it be better to use a plugin external hard drive to load my software on and if so what hard drive would you recommend?

    I Mini with an i7 processor. I would like to use Boot Camp to install windows based CAD software on my MAC. Would it be better to use a plugin external hard drive to load my software on and if so what hard drive would you recommend?

    Thank you for your quick response. I can then use a ZIP drive for data storage. I want to keep as much of my hard drive free of data as possible.

  • What family fonts do you recommend for an AS3 iphone app

    What family fonts do you recommend for an AS3 iphone app?
    The fonts must be clear and sharp.

    Here's a lengthy list.

  • What internet security do you recommend for apple products

    What Internet security do you recommend for apple products

    None.  The best security is to backup your data frequently, and using WPA2 encryption on wireless routers.    Otherwise basic good practices include:
    1. Do not download sites that suggest installing cleanup software.
    2. Do not do things that might slow your Mac down:
    https://discussions.apple.com/docs/DOC-6921
    3. Do not install updates except directly from reputable vendors websites, and the Apple Mac Store.
    4. Do not follow instructions of popup windows or banner ads.
    5. Do not use peer2peer or torrent software.
    6. Do not open .scpt, .sct, .app attachments.
    7. If you use Windows on your Mac, the same security rules for Windows on a non-Apple machine apply as an Apple machine.

  • I can't get a signal through whole house because of a brick wall   What range extender do you recommend to be used with my wireless router ( apple brand)

    I can't get a signal through whole house because of a brick wall   What range extender do you recommend to be used with my wireless router ( apple brand)

    Very few 3rd party wireless extenders will work with an Apple router, so your best bet is always to use an extender that is the same brand as the main router. An AirPort Express is a popular choice for this type of application with another Apple router.
    If you had a Cisco router, then a Cisco extender would be your best bet.  Same for Netgear, etc.
    But......a wireless extender can only "extend" the quality of wireless signal that it receives, and not much of a wireless signal is going to make it through a brick wall, so whether any extender might do what you want is open to question.
    You won't know whether an extender using wireless to connect will work to your satisfaction in your home until you actually try it out in your home.
    The performance will always be much better if you can connect the extending device back to the main router using a wired Ethernet cable connection.
    If it is not possible to run the Ethernet cable, a pair of Ethernet power line adapters might be able to send the signal over the existing AC power lines in your home. The theory with these devices is that you already have the wiring in place, you just need the adapters.
    In practice though, things do not always work as well as the theory might suggest, so if you decide to try a pair of adapters, it might be a good idea to understand the store's return policies before you buy.

  • Web page video - what file type would you recommend?

    I've stood up a web page for selling things (house, musical instrument, chipper-shredder, rent an apartment, etc.) and would like to have a few videos included. The plan is to save the video on the server and not use hyperlinks to places like vimeo and youtube. For one thing, vimeo doesn't allow a basic member to use their site for selling things.
    A. Screen view size: I would like something, say, 2.5 to 3 inches high X whatever width the proportion would be (4:5 or 16:9), minimum.
    B. Resolution: Most of what I've recorded is in 1440CBR but reducing the quality to keep the file size small is VERY important. I'm not looking for Full Hi-Def, just something that gets the message across.
    C. It is very desirable for the visitor to be able to start viewing the video as soon after clicking on the hyperlink as possible. If they have to wait for a few MegaBytes to be downloaded they probably won't stick around. Also, there will be no advertising on my web page which should be nice.
    D. The file format should be viewable by both Macs and PCs. Questions:
    1. Is *.mp4 H.264 the most universal format?
    2. Should I "Share" to a QuickTime format and assume the PC users will have QuickTime on their machine?
    3. FCPx uses the "Share" menu in order to Export. What would you recommend for a Share setting (file type) so it will do what I would like to do?
    Is there anything I left out that would be good to know???
    Editorial comment: This has been a total struggle.
    My resources:
    FCPX 10.0.3 (have not updated yet. Waiting until the dust settles)
    MacBook Pro Core 2 Duo 5,1 2.53 8GB memory Lion
    MacPro 1,1 Lion
    Passport drive: 1TB for video storage
    MacBook White 1,1 (for email and Internet surfing) 10.6.8

    Hi again,
    I'm happy with the Audioengine 5 which I have on the computer desk about 2' ~ 3'
    away so I'd call them 'near field'. You should have a shelf on your desk so the speakers are roughly at your head height.  I'm also using a 12" Velodyne powered sub in this set-up which sits on the floor to my right.
    here are some 'home' studio designs:
    http://www.youtube.com/watch?v=OQ9oAhm8GsE&feature=related
    http://www.youtube.com/watch?v=PdCQBs5wsyc&feature=related
    http://www.youtube.com/watch?v=PKk1N6moZPc&feature=related
    http://www.youtube.com/watch?v=X4Smei451dw&feature=related

  • What flash drive do you recommend for iPhoto?

    I need a nice and strong flash drive to save thousands of pictures from iphoto, which I can view them everywhere and even print them out. What brand do you recommend and how many GB?

    Any flash drive will do. They're all the same. They don't come in "strong". How many GB depends on how many photos and what size they are.

  • What case/cover would you recommend?

    Hi,
    I've been looking into iphone case covers like the ones advertised in iskin.com and case-mate.com . Those two are advertised in the Macworld magazine. These are the slip covers that the iphone "wears" around its sides for added protection etc.
    Does anyone have any hands-on experience with any of these already? Or would you recommend another, completely different brand?
    I have an 8gb Iphone if that makes any difference.
    Many Thanks for any suggestions,...Frank B.

    I ordered the iskin revo case last week when it first went on sale. It just arrived today and I am very impressed. This is the 4th case I tried and I think the revo is nearly perfect. The silicon is of very high quality and adds some much needed grip to the iphone as well as some more shock and impact protection. I don't know about the plastic screen shield it comes with, it is supposed to stay on and then you take it off and it clings to the back while you are using the iphone, I probably won't use it. Another thing I really like is that it covers all the ports, some people mentioned it looked like it covers the headphone port totally. Well this is true, but the piece over it peals right back giving you instant access and it is still covered when not in use in your pocket, I was starting to notice a lot of dust build up in there but now it is covered so that is nice. It also comes with a dock cover that isn't attached but I will probably use also.
    If you want a nice case I say this is the best, I got another silicone case that was cheap feeling and didn't fit very tightly. The revo fits tight and feels great, and it won't be covered in dust, it also still allows the light and proxy sensors to work while in the case. Only draw back is that if you want to use the dock you have to remove the case, but I don't see that as much of a negative. It is worth the price.
    Message was edited by: Randy Fast

  • What bluetooth headset would you recommend ?

    Hi,
    I currently own a Jabra BT8040 but want to change it with one of the following Nokia headset:
    BH-902
    BH-602
    BH-703
    BH-803
    However I don't really know which one to choose. For the last hours I've been reading a number of reviews on the web as well as some discussion on this Nokia forum.
    It is my understanding that the BH-703 is the newest one in the above list.
    Although I spend a lot of time on the phone, 8 hours of talk time is more than acceptable for me.
    However I need a good sound because sometimes I'm calling from my car, and most of the time I have business calls in the office, where I have other colleagues also on the phone (open office), hence I do not want to be to much limited with a volume limitation on the headset.
    I like the BH-902 because we don't need to take the phone to look at who is calling us, this is really great, however I don't know how confortable it is for confcalls running 1 hour.
    The BH-602 has the highest autonomy however it seems to be the oldest one. I I don't need 11 hours of talk time.
    From your experience, which one would you recommend for business usage ?
    Thanks a lot in advance
    Solved!
    Go to Solution.

    Hi,
    I think my pick would the Nokia BH-902 headset. It has a nice set of features including - close-fitting control with the in-the-ear plug and optional ear hook - as stated on the product page.
    But still the decision to be made is yours.
    Hope this helps
    Kind regards

  • What Virus Scan software is recommended

    What Virus scan software do Mac Users like best?  My experience using Windows previously is that they really slowed the CPU.

    While I don't have an answer for the specific question at hand, i have to disagree with the other posters on this thread. In my book, good security practices go beyond my personal machine. They extend to the people I work and collaborate with.
    What I mean by that is while viruses, malware and trojans may not affect me or my Mac itself, I think it's in everyone's best interest that I be cognizant that they do indeed exist and that they can make me a vector for infection--a digital Typhoid Mary, so to speak-- for my co-workers, classmates, or family who are using other platforms.  I also need to realize that ignoring them out of hand, could lead to downstream exposure of my data and content if one of my collaborators machines get compromised by a bit of malicious code or app that I passed along to them.
    Again, though, that's just my two cents, but I do think that's something worth chewing on.  Everyone needs to take ownership when it comes to security.

  • What Virus protection program do you recommend???

    I have a macbook c2d currently using ClamXav......i have heard some people using norton av 10, some using intego virusbarrier etc.....which is the best? or should i stick with clam?
    thanks
    brent

    You're welcome.
    Just so I don't receive and forward any attachments that contain a Windows virus to my always concerned about viruses, adware and spyware Windows using friends, I have the Sentry watch my entire Mail folder since I use the Mail application.
    I do notice a very slight and short bogging down of the Mail application at times when receiving a message or messages but if you didn't use the Sentry and only performed a complete hard drive scan weekly or so, you would be plenty covered especially since all it may find is a Windows virus.

  • What system utilities do you recommend?

    Hi,
    I am a new switcher to Mac.
    Can you please recommend what system utilities I should purchase and which brand I should purchase.
    The ones I want are :
    1) I need an anti-virus program (I know there are no real problems on the Mac with virus's, but it is better to be safe than sorry!)
    2) A firewall. (Is the one that comes with Mac OS X good enough or should I use a commerical one?
    3) A Backup program
    4) A Disk utility program
    5) A general system utility program for system maintenance
    I would be really grateful if you experienced Mac users could give me advice on this matter.
    Thank you for your help. I look forward to your responses.

    Hi, Lucky Luxy.
    Here are my recommendations, in order corresponding to your list:
    1. re: Anti-virus: See my "Detecting and avoiding malware and spyware" FAQ for my recommendations as well as a list of some recent Mac OS X security threats that have emerged, including Trojans, rootkits, and spyware. The FAQ also addresses some of the usual arguments against installing an anti-virus solution on a Mac that often arise in discussions of this topic.
    While some believe that anti-virus solutions are not required on a Mac, I feel that's ignoring the fact that threats are emerging and that security exposures continue to be found, albeit eventually closed, in Mac OS X, as in any other operating system. Even Apple now recommends that one should "check for viruses."
    2. The firewall included with Mac OS X is "industrial strength." No need for a third-party firewall product.
    3. A comprehensive Backup and Recovery solution is essential. Computing without a comprehensive Backup and Recovery solution is like driving without auto insurance. If you don't have a Backup and Recovery solution that you're using regularly, you're essentially accepting the risk that at some point all of your data may be lost. For advice on the backup and recovery solution I employ, see my "Backup and Recovery" FAQ.
    4. re: Disk Utility. I recommend having both Alsoft DiskWarrior 4.x+ (DW4) and Micromat TechTool Pro version 4.x+ (TTP4).
    While both can build a new, optimized directory for a disk, I have found there are some disks that only DW4 can repair. DW4 is a "specialist" in disk directories.
    Likewise, TTP4 brings a host of useful hardware testing routines that are neither in DW4 nor the Apple Hardware Test. TTP4 also includes an excellent disk defragmenter. Defragmenting is generally not required under Mac OS X 10.3 or later unless you perform an extensive amount of video editing or your disk is nearing full, in which case it may be useful. See Mac OS X: About Disk Optimization. TTP4's Surface Scan is also useful in determining if a disk has developed bad sectors.
    If one owns neither utility today, the initial investment may seem like a good deal of money, but compared to your data and your time, the cost of these utilities is insignificant in the the long run. I've found their upgrades to be reasonably priced for what they do.
    Neither utility is a substitute for a comprehensive Backup and Recovery solution. But I've seen DW4 save more than one person's bacon and the suite of hardware tests and additional functions TTP4 bring to the table make both a worthwhile investment.
    If one could only purchase one now, I'd recommend they purchase DW4, then later add TTP4 when funds permit.
    Better to have the tools and not need them, than to need them and not have them.
    A good mechanic has more than one kind of wrench in their toolbox.
    5. re: General Maintenance: See my "Maintaining Mac OS X" FAQ. It covers my advice on "regular maintenance" and dispels some common "maintenance myths."
    Finally, since you are new to Mac OS X, you may benefit from some of the educational resources I recommend in my "Learning About Mac OS X" FAQ.
    Good luck!
    Dr. Smoke
    Author: Troubleshooting Mac® OS X
    Note: The information provided in the link(s) above is freely available. However, because I own The X Lab™, a commercial Web site to which some of these links point, the Apple Discussions Terms of Use require I include the following disclosure statement with this post:
    I may receive some form of compensation, financial or otherwise, from my recommendation or link.

Maybe you are looking for

  • Where is the "stroke options panel" in Photoshop CS6?

    Where is the "stroke options panel" in Photoshop CS6? It used to be right above the layers palette in older versions of Photoshop but now it's gone. I'v been trying to find it for an hour and a half and it doesn't seem to be in any of the menus.

  • About Aironet 1300 Outdoor Bridge.

    Hi, I have a question about Aironet 1300 series Outdoor Bridge. in case of 1300 series, it is supporting with 802.11g protocol. BTW, I wanna use it with 802.11a protocol on Aironet 1310 series. Is it possible ? If so, how to do I have to it ? I wait

  • Thread safe display of JTable

    Hi all, I have a JTree, which has JTable as its node. Each JTable has some children that will be displayed on expanding a node. When user expands a node, next sibling node of that ( a JTable again) will get header.I am programmatically adding header

  • Symbols Saved are not Appearing

    Symbols I save from my document library to my common library are not appearing in my common library. I also try to save a graphic element as a symbol and choose "Common Library, and that's not appearing in my Common Library. Any idea why? I am using

  • When trying to send mail, I get a message about rejected by server because it doesn't allow relaying.

    When trying to send mail I get a message the message was rejected by the server because it doesn't allow relaying!  I can send mail to myself but not anywhere else.