Which perspectives I should consider about Av Rd(ms) is very high just for

db version: 11.1.7
os: RH linux 5.5
I was seeing i/o stats from AWR generated for one hour, and all the value of Av Rd(ms) for files i/o stats are under around 10, however except for one file, the Av Rd(ms) just for one data file is very high(38325.25), even Av Rd(ms) of the others data files which are on same mount point with that one file are also normal, so I think this should be caused by application, however I can not find out clue.
so could you please give me some perspectives to be considered and to be researched? thanks so much!

RLUO wrote:
db version: 11.1.7
os: RH linux 5.5
I was seeing i/o stats from AWR generated for one hour, and all the value of Av Rd(ms) for files i/o stats are under around 10, however except for one file, the Av Rd(ms) just for one data file is very high(38325.25), even Av Rd(ms) of the others data files which are on same mount point with that one file are also normal, so I think this should be caused by application, however I can not find out clue.
so could you please give me some perspectives to be considered and to be researched? thanks so much!Look at the v$event_histogram report for anything to to with file reads. It's possible that you will find that a single read request got an extremely high time - I've seen odd glitches occasionall, with a single block read taking (apparently) several weeks to complete - and that you can ignore the side effects .
Regards
Jonathan Lewis

Similar Messages

  • I recently read this article about crashing of HDD at very high altitudes like 3000 metres and above and I was concerned if the same would happen with my iPad.

    Hi,I was really concerned if my ipad disk would crash.
    Here is the link to the article
    http://devilonwheels.com/index.php/carrying-laptop-to-ladakh-or-high-altitudes/

    There is no SSD. Just a bank of EPROM memory. It can't crash.

  • Hello, i have a problem with my macbook air. When i try to open my iPhoto i should wait about 3mins to get opened it and also in it just appeared around 57000 photos! in which i have 2000. they are not mine, the photos are pics of other people or things

    hello, i have a problem with my macbook air. When i try to open my iPhoto i should wait about 3mins to get opened it and also in it just appeared around 57000 photos! in which i have 2000. they are not mine, the photos are pics of other people or things

    If you want help you’ll need to give us more information. There are 9 different versions of iPhoto and they run on 8 different versions of the Operating System. The tricks and tips for dealing with issues vary depending on the version of iPhoto and the version of the OS. So to get help you need to give as much information as you can. Include things like:
    - What version of iPhoto.
    - What version of the Operating System.
    - Details. As full a description of the problem as you can. For example, if you have a problem with exporting, then explain by describing how you are trying to export, and so on.
    - History: Is this going on long? Has anything been installed or deleted? - Are there error messages?
    - What steps have you tried already to solve the issue.
    - Anything unusual about your set up? Or how you use iPhoto?
    Anything else you can think of that might help someone understand the problem you have.

  • Which CC plan should I consider signing up for?

    Which CC plan should I consider signing up for if I only need one license?
    I work as a freelance graphic designer and I need (at least) Photoshop, Illustrator, InDesign, Muse and Dreamweaver so single apps are not the way to go. As I'm only one person it doesn't make much sence going for the team solution either.
    Is there a plan specifically for freelancers/oneman companies?

    Hi TQ777,
    You'll be prompted to enter that printer code when you've completed the account registration form. After that you'll also be prompted to customize the printer's email address if you wanted to changed it.
    Check this article - Setting up ePrint on your HP ePrint printer
    Hope this works for you!
    ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
    Cheers!
    * If this post has helped you, the White Kudos star on the left is a great way to say thanks!
    * Please mark Accept As Solution if it solves your problem so other users can benefit as well.

  • What every developer should know about character encoding

    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts.
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    Here's a key point about these text files – every program is still using an encoding. It may not be setting it in code, but by definition an encoding is being used.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    Wrapping it up
    I think there are two key items to keep in mind here. First, make sure you are taking the encoding in to account on text files. Second, this is actually all very easy and straightforward. People rarely screw up how to use an encoding, it's when they ignore the issue that they get in to trouble.
    Edited by: Darryl Burke -- link removed

    DavidThi808 wrote:
    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts. Pretty sure most Americans do not use character sets that only have a range of 0-127. I don't think I have every used a desktop OS that did. I might have used some big iron boxes before that but at that time I wasn't even aware that character sets existed.
    They might only use that range but that is a different issue, especially since that range is exactly the same as the UTF8 character set anyways.
    >
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    The above is only true for small volume sets. If I am targeting a processing rate of 2000 txns/sec with a requirement to hold data active for seven years then a column with a size of 8 bytes is significantly different than one with 16 bytes.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    The above is out of place. It would be best to address this as part of Point 1.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    The first part of that paragraph is odd. The first 128 characters of unicode, all unicode, is based on ASCII. The representational format of UTF8 is required to implement unicode, thus it must represent those characters. It uses the idiom supported by variable width encodings to do that.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Not sure what you are saying here. If a file is supposed to be in one encoding and you insert invalid characters into it then it invalid. End of story. It has nothing to do with html/xml.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    The browser still needs to support the encoding.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    I know java files have a default encoding - the specification defines it. And I am certain C# does as well.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    It is important to define it. Whether you set it is another matter.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Unicode character escapes are replaced prior to actual code compilation. Thus it is possible to create strings in java with escaped unicode characters which will fail to compile.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    No. A developer should understand the problem domain represented by the requirements and the business and create solutions that appropriate to that. Thus there is absolutely no point for someone that is creating an inventory system for a stand alone store to craft a solution that supports multiple languages.
    And another example is with high volume systems moving/storing bytes is relevant. As such one must carefully consider each text element as to whether it is customer consumable or internally consumable. Saving bytes in such cases will impact the total load of the system. In such systems incremental savings impact operating costs and marketing advantage with speed.

  • In addition to my iMac, I have a Power Mac G4 (10.4.11 Tiger) which of course is pre-Intel.  I can boot up and use for about 5 minutes before the mouse freezes.  I believe something is   overheating.  What would that be - so I can have repairs done?  The

    In addition to my iMac, I have a Power Mac G4 (10.4.11 Tiger) which of course is pre-Intel.  I can boot up and use for about 5 minutes before the mouse freezes.  I believe something is
    overheating.  What would that be - so I can have repairs done?  The machine is the Digital Audio version, M7627LL/A and Serial Number XB******KXQ.
    <Edited By Host>

    Hello USME,
    'Tis a common problem on old Macs.
    Do as Allan says: open the door and blow out all the dust bunnies. Canned air from Wal-Mart or Radio Shack can be handy (though sort of expensive) especially for blowing through the back of the power supply. A cool Mac is a happy Mac.
    Be sure your Mac can breathe. The air intake is on the bottom of the case, so be sure a deep pile rug or too many papers on your desk are not blocking the air supply.
    Feel the power supply and the processor with your hand. They should be warm but not hot; if you have to move your hand away, that's too hot!
    Check the fan on the power supply, and on the processor if it has one. Take a flashlight and peer in the back of the (Mac) case through  the grille; make sure the fan is turning. If it's not, the power supply won't work for long.
    Fans are not considered serviceable, though they will succumb to mechanics of determination. A CPU fan is easy and straightforward.
    A fan replacement will not cure an already damaged power supply; the PS may already be done for. Used power supplies for a DA are hard to come by, and not especially cheap when found (c.$50). An entire  working DA or Quicksilver may often be found for under $100 on eBay, and swapping in your HD is easy and simple... this might be cheaper and more expeditious than repairing an expired DA. Replacing a power supply is fairly easy, but it's a nuisance and requires a 2mm Allen head wrench in addition to the usual #2 Phillips head screwdriver.
    In my experience, power supplies and CPUs are about equally likely to fail. There are a few other possibilities, but they are not nearly so common.
    Good luck!... Jon

  • Not sure how i should go about creating this flash to accomplish what i need.

    First let me start by saying my flash file is currently 740kb
    in .swf form and I'm not done with it. I'm taking this which was
    developed from another developer and trying to customize it to work
    for what i need. The flash was bought from template monster. I'm
    using actionscript 2.0 in the flash.
    Is 740kb big for a flash file that is basically an entire
    website?
    I'm trying to make this flash load as fast as possible while
    implementing the best practices so i can use it for future
    projects. Also i would like advice on using various techniques to
    accomplish some functionality.
    The flash file i'm working on is basically like a brochure
    for a client. It consists of "8" main pages, along with several sub
    pages.
    I have the following questions though.
    1. Currently the navigation is on the left hand side, and has
    a mouse over animation as well as sound effects with rollover and
    being clicked. The mouseover effect just moves the text to the
    right a little and brings it back to the original position..
    However each button in is an individual movie symbol.
    - Should I consolidate the navigation so it's one movie
    symbol instead of 8 movie symbols on one page? Keeping in mind that
    even if i do make it just 1 symbol i might need to add the 8
    navigation movie symbols into that one to maintain the animation.
    - Should the buttons even be movie symbols or is there a
    better way this should be done?
    2. Because of the text for each page, I was using adobes
    built in scrolling component for the dynamic text boxes.
    Considering there is more then 8 dynamic text instances converted
    to graphic symbols.... Is there a more efficient way of doing this,
    or is the above method just fine?
    3. The flash file contains a photo gallery. Currently all the
    images from the gallery are in the same flash file. I was thinking
    it would be more efficient to load the images in the gallery from
    external .swf files. However i'm not sure if that would be the best
    method, and i'm also not sure how to correctly accomplish within
    standards.
    4. I would like to implement a contact form within the flash
    so users can contact me.
    5. I would also like to have a testimonials page where users
    can submit testimonials. However i'm not sure how to create the
    form, but i had an idea on displaying the text in the flash using
    xml so it can be easily updated . Just not sure on the proper and
    more efficient way of doing this.
    6. I would also like an event calendar that displays within
    the flash. Was thinking of having this loaded from an external .swf
    file as well. Would like the calendar to be xml based so I can
    update it myself. Don't need nothing advance, just something that
    says "Busy", "Not Busy", and "Book" which would just take them back
    to the contact form to book me.
    I know many of you don't know who i am, but I would really
    appreciate some assistance. Whether its sample flash files, links
    to tutorials, advice, anything.
    I really want to do all of the above, but also as i'm
    learning i would like to make sure i'm doing the above in the most
    efficient way possible and up to standards while also keeping the
    size low. Would like to do it right the first time, so as i
    continue making flash files in the future I'm not writing sloppy
    actionscript coding, having sloppy timelines, and or having sloppy
    structure in my .fla files.
    Also i know alot of you are very busy people, and i'm not
    asking for you to do the flash for me but any and all help will be
    very greatly appreciated.
    Thank you in advance for you comments, advice, and replies.
    :)

    Wow, you're really looking to get your money's worth here. :)
    I haven't read through your entire list of questions, but
    I'll do what I can to help - others here will probably have
    different ideas, so feel free to pick and choose which (if any - or
    all) you want to integrate.
    1. So far, my experience has been that the people that create
    the templates on TemplateMonster have a pretty good handle on what
    they are doing, and have done what they do for a pretty good
    reason. Unless you are quite good at ActionScript, I probably
    wouldn't make any major changes to the back end. After all, you
    bought the template for a reason. If you want to move the buttons
    around the stage, great - edit them to change the colors, great.
    But to try to create a button array may be more than you want to
    bite into here. That said, it can be done. I've done it. If you
    want a sample of the code, drop me an e-mail and I'll send it to
    you. FYI: I only do AS3.0 at this point. If your template is in AS2
    then one of the other Flash gods would be better suited for code
    samples.
    1a. The buttons are movie clips for a reason - flexibility.
    Leave them as movie clips unless you really like migraines.
    2. I hate having to convert text to symbols, but sometimes it
    is the most efficient (or only) way to do things. If you want to do
    any tweens with the text, it has to be a symbol.
    3. You can load the photos from external SWF's or you can
    load the JPG's directly using XML. If you are using AS3, I know
    that there is tight, simple integration with XML. I'd review a
    couple tutorials on XML from some place like www.tutorialized.com
    to get a feel for it. Also, look up "Working with XML" in the Flash
    Help file (F1). Once you have decided on an approach, come back
    here with specific questions and you will get good answers.
    4. Doable. Search these forums for "Email from Text Box".
    This was covered several times in the last couple of days.
    5. XML is one option. You can even have XML give a photo of
    the person doing the testimonial and load it all into a single
    page. What you can do with this is limited only by your
    imagination. This is a very broad question.
    6. Someone posted a message about a calendar on here today.
    Search for "Calendar" and I'm sure you will get some ideas from
    there. Also (and again) www.tutorialized.com is a great resource
    for general code and ideas.
    You're right, we don't know you. And guess what? That doesn't
    matter. We are equal opportunity abusers here. :) I mean that with
    the kindest grin.
    The things you have asked are very broad in nature and
    therefore are quite difficult to give specific answers. We are
    always happy to help you when you get stuck, and even to spend a
    great deal of time walking you through a specific topic. However,
    what you've asked here would take a six-week course to answer to
    the level you will need. Grab some free code. Try it out. Play with
    it. Break it. The Flash gods will rescue you. But remember, the
    more specific your question, the better answer you will get.
    I hope this helps (at least some).

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Which Latitude Computer Should I Buy?

    I am heading to college and I've decided to get a Latitude Dell computer to last me my undergraduate. However, I am undecided about which Latitude I should buy. I want the one that is going to run best with creative suite production premium cs6 but if the power difference in the computers makes no real difference on which computer I'm choosing I would buy the cheaper one and buy an external hard drive. I have difficulties understanding computer specs so its hard for me to understand how different the computers are from each other though it seems the biggest difference between the computers are the hard drives and the screen size (14'' vs 15.6''). I'll list the two specs bellow.
    Intel 2.9 GHz i7 Processor;
    64 Bit;
    500GB 7200rpm Hard Drive;
    8 GB RAM; 14.0 " HD Anti-Glare LED Display (1366x768);
    Intel HD Graphics 4000 Video Card
    Enabled; 6-Cell (65WH) Primary Lithium Ion Battery
    or
    i7-3720QM Processor (2.6GHz Quad-Core)
    Windows 7 Pro, 64-bit
    15.6" FHD (1920x1080) Wide View Anti-Glare WLED-backlit display
    NVIDIA NVS 5200M Discrete 1GB Graphics card
    8 GB RAM
    750GB 7200rpm Hard Drive
    9-cell battery, 90-watt A/C adapter
    I am also curious to hear your opinion on Latitude computers and if you think I will have any problems with production premium or the computer in general.

    If you are not doing video or 3D modeling/CGI work, you maybe able to get by with either base model, 27 inch iMacs.
    If you can afford it get the 27 inch iMac with the faster i5 CPU. The GPU is not that big an issue with 2D or flat images.
    So, I think you would, also, be fine with the base 27 inch screen model with only 1 GB of VRAM.
    WIth photography, it's all about CPU, RAM and storage size/space.
    Purchase this 27 inch screen iMac with the base RAM and purchase additonal, cheaper RAM through third party RAM vendors.
    Correct and reliable Mac RAM can be purchased from online Mac RAM sources Crucial memory or OWC (macsales.com).
    The 27 inch screen iMacs can take a total of 32 GBs of RAM.
    After purchase, I would advise installing, at least, another 8 GBs of RAM for, at least a total of 16 GBs of RAM. Install more RAM if you can afford it.
    As far as storage is concerned, forget the base 1 TB standard hard drive and consider installing, at purchase time,  the 3 TB Fusion drive, instead.
    OR (again,if you can afford it) consider the 512 GB Solid State Flash Drive and use external drives for image storage when the storage on the Flash drive becomes full.
    WIth the Mac Pro, you are forced to use external storage (extra costs) as well as forced to having to purchase a good, color accurate external monitor with image editing and color correction work (another additional and expensive purchase).
    The iMac is a completely all-in-one purchase solution versus a individual component system like a Mac Pro system.

  • Which IPad model should I get?

    Hi,
    I am considering buying an IPad for school and I don't know what to get. I need help choosing which one I should get.
    I have concerns for these things:
    ~ 3g or Wifi only? I have no Internet at home and no other sources for Internet. I currently go to a family members house to use Wifi.
    ~ IPad or IPad 2? I do not know which one is better. I am currently leaning towards the IPad 2, but I would like a second opinion.
    ~ 16gb, 32gb, or 64gb? I only put apps, a few TV shows, music, voice memos, and notes currently on my iPod touch (32gb).
    ~ Where should I get it? Should I buy it over the Internet or in-store? If I buy it from the Internet, I will most likely buy it from the Apple Store.
    ~ Can you engrave it in a store? Could an IPad be engraved when you buy it from a store and then be shipped to you?
                                     --thank you for trying to answer these questions!

    What are all the differences between the iPad 3rd Gen and the iPad 2? Is the iPad 2 worth the cost savings?
    http://everymac.com/systems/apple/ipad/ipad-faq/differences-between-ipad-3rd-gen -2012-ipad-2-2011.html
    What are all the differences between the iPad 3rd Gen models? Which should I buy?
    http://everymac.com/systems/apple/ipad/ipad-faq/differences-between-ipad-3rd-gen -early-2012-models.html
    Should I Buy a New iPad? Or an iPad 2?
    http://www.maclife.com/article/blogs/should_i_buy_new_ipad_or_ipad_2
    iPad 3 vs iPad 2 vs iPad 1- Feature comparisons with iOS 5
    http://ipadhelp.com/ipad-help/ipad-3-vs-ipad-2/
    iPad Q&A
    http://www.everymac.com/systems/apple/ipad/ipad-faq/differences-between-ipad-3rd -gen-early-2012-models.html
    A Few Questions (and Answers) About the New iPad
    http://pogue.blogs.nytimes.com/2012/03/15/a-few-questions-and-answers-about-the-   new-ipad/?ref=personaltechemail&nl=technology&emc=edit_ct_20120315
    New iPad: A Polishing of the Old
    http://www.nytimes.com/2012/03/15/technology/personaltech/the-new-ipad-is-much-t he-same-only-better.html?nl=technology&emc=edit_ct_20120315
    iPad 1, 2 and New Specifications
    http://www.everymac.com/systems/apple/ipad/index-ipad-specs.html
    16GB vs 32GB vs 64GB: Which new iPad storage capacity should you get?
    http://www.imore.com/2012/03/08/16gb-32gb-64gb-ipad-capacity/
    How much content will fit on my iPod or iPhone?
    http://support.apple.com/kb/HT1867
    If you think you may get an iPad 2:
    Refurbished iPad Prices
    http://store.apple.com/us/browse/home/specialdeals/ipad
    New 16GB iPad 2 Prices
    http://store.apple.com/us/browse/home/shop_ipad/family/ipad/select_ipad2
    When iOS 6 comes out in the fall, the iPad 3 will get Siri, but the iPad 2 won't.
     Cheers, Tom

  • In finder, it says that I am shared to a pc which I didn't know about nor do i know the pc, how do I stop sharing with it?

    In finder, it says that I am shared to a pc which I didn't know about nor do i know the pc, how do I stop sharing with it?

    I gather that you are seeing other "pee-seas" (and | other hosts) in MAC OSX Finder UI under SHARED ? T/F ??  The Finder is reflecting what others are sharing.
    In any case consider these items:
    1) Other hosts on your network (local) have ITEMS (folders and structures) that they themselves are sharing
    with anyone on there network and to others outside who will access them via a specic host nae or address. KInda like your mate who has some files he wants to share with you. You connect to his host (machine) either by a host name (yourmate.com), an IP address (33.33.33.11) or on your local area network usually over Bonjour (yourmates_macbookair.local).
    Simply THEY ARE sharing their stuff with you and this your MACs FINDER makes then apear under the SHARED parion of the side bar in the UI. This is likely what you are seeing
    microsoft platforms have their users share DIRECTORIES mainly through the SHARING properties for that opject. YEp.. and then you can at a minimum SEE it . HOwever this doesnt mean you can access the contents.... This is all familiar to most.. nothing to be concerned about.
    Probably no need for concern.....
    (IMO), its amazing the number of PC users that unknowingly expose their folder contents on a hotel WIFI or ETHERNET network... its astonishing....!
    2) YOUR CONCERN that you are sharing your stuff:
    I'll hazard a guess that form you minmal description that you may feel that others on your network can SEE YOUR STUFF?? Bt Default, any user can see ANYTHING you have put in your ~/Public folder (theis is your Public folder in your home directory. Usually they can ONLY read whats there unless you have gone out of your way to change the ACCESS CONTROL LIST (ACL) to an access for others other than READ ONLY.
    An extention so to speak of this sharing is the concept of a "DROP BOX" that is also maintained by default in your homes public folder (~/Public/Drop Box). This is very useful for people to GIVE you their files by DROPPING then into this ~/Public/Drop Box folder.
    So THIS folder is exposed for all to see on your local network.
    How to stop anyone seeing anything?.. easy..
    Step 1: go to SYSTEM PREFERENCES/Sharing/ and UNTICK the  "File Sharing" service. Its probably already unticked. This will stop exposing anything that you have shared to others. pee-sea users may need your to enable SMB/CIFS TO READ YOUR STUFF. YOU WONT HAVE THIS ENABLED UNLESS YOU DID IT YOURSELF. Additionally there are windows .apps to read mac file systems too... so stopping all fie sharing will do the trick
    Step 1.1: if you dont want others to see your ~/Public folder either then simply select the Public folder in your finder, open the Finder inspector (+i), open the disclosure triangle for "sharing and permissions" and then set the access by others to "NO ACCESS"
    Step 2: while you are in SYSTEM PREFERENCES/Sharing/ and UNTICK the  "Remote Login" and "Screen Sharing" services. Its very likely already unticked. This will stop exposing remote services such as ssh and vnc anything that you have shared to others.
    Step 3: for extra go to SYSTEM PREFERENCES/Security/Firewall and enable any setting for network here that you want to disable or filter... seek out these apple discussion forums.. tonnes of stuff here on his.
    Others reading this thread will also have good advice and opinions.
    Post your results for others to see.
    Warwick
    Hong Kong

  • Can anyone tell me if this is something i should worry about?

    I just repaired permissions and it says this about ARD.
    Is this something i should worry about?
    Repairing permissions for “MacBook Pro”
    Reading permissions database.
    Reading the permissions database can take several minutes.
    Warning: SUID file "System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAg ent" has been modified and will not be repaired.
    Group differs on "private/etc/cups", should be 0, group is 26.
    Permissions repair complete
    Repairing permissions for “MacBook Pro”
    Reading permissions database.
    Reading the permissions database can take several minutes.
    Warning: SUID file "System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAg ent" has been modified and will not be repaired.
    Group differs on "private/etc/cups", should be 0, group is 26.
    Permissions repair complete

    these messages are harmless and should be ignored. the ARD message one indicates that you might not be running the latest version of leopard. is that right? your profile does indicate 10.5.5 which is the latest.
    http://support.apple.com/kb/TS1448?viewlocale=en_US

  • Which NI devices should I buy and how to start with?

    Greetings!
    I am an undergraduate who is trying to design a control system which can measure chemical solution conductivity as well as PH value; besides, based on those values, we need to control 4 valves to open and close so that acid, base, water,and salt from 4 tanks can flow into the main pipe.
    Question: Which NI device should I buy and start with? The devices have to have at least 4 input/output, do you have any suggestion, Thank you very much!!
    I am also new to LabVIEW, so any extra suggestion would be greatly appreciated!

    Thank you , we are considering purchasing NI USB-6008
    http://www.ni.com/products/usb-6008/
    Doest it work with the following PH sensor, one specification says that it has output voltage of Output 0-5 vdc, does NI USB-6008 accept it?
    Model A1004 pH Transmitter
    Warning
    Do not short the power connections. Wrong wiring of the signal and power wires will result in
    permanent damage to the unit instantly.
    Specs:
    Range 0-14pH
    Power: 12vdc 500ma nominal
    Output 0-5 vdc
    Material ABS
    Calibration trim pots
    Distance up to 50ft
    Model A1004 is a pH transmitter designed to be used with PLCs and microprocessors that accept
    analog input of 0-5vdc.
    Connect any general purpose pH sensor to the transmitter. Double junction sensor is preferred.
    Calibrate unit with 4 and 7 pH buffer solutions. Use zero trim pot to adjust 4pH and span trim pot to
    adjust 7pH..Fine tune adjustment is done with span trim pot.
    If you do not have a sensor , short the bnc connector ,this will simulate 7pH and observe output voltage
    of 2.5vdc.
    Din connector provides power and signal from one cable.
    Note.: When connecting signal and ground to the PLC input ,use .01uf capacitor across signal
    and ground to filter any noise issues.

  • Which one I should download?

    Hi all,
    I need to learn some about Websphere, i want to try on windows XP ,
    I want to
    http://www14.software.ibm.com/webapp/download/product.jsp?cat=webservers&fam=&s=s&id=MCOS-5FUSYK&pf=&k=ALL&q=&dt=&v=&rs=&S_TACT=104CBW71&S_CMP=&sb=r&sr=11
    there are
    Webserver pluging for websphere application server
    WebSphere application server v6.0 base trial
    WebSphere application server technology for developers
    which one I should download??
    alos, some one on this form said websphere is not stable. is that ture?
    any advice is welcome!
    thank you

    Webserver pluging for websphere application server
    WebSphere application server v6.0 base trial
    WebSphere application server technology for
    r developers
    which one I should download??I suppose it should be the one I bolded.
    alos, some one on this form said websphere is not
    stable. is that ture?IMO, WebSphere sux!!!

  • Which software I should install to view video file AVI format on my Imac?

    Which software I should install to view video file AVI format on my Imac?

    It's hard to say. AVI doesn't exactly describe how the video was encoded. AVI is a package that contains the video content.
    However, VLC can play just about anything. That's the first thing I'd try.

Maybe you are looking for