Will my 4GB MBP work with Mavericks and Windows 7 smoothly?

I own a 13", Mid-2010 MacBook Pro with 4GB of RAM and a 2.4 GHz Intel Core 2 Duo processor. Will this system, given enough hard drive space, be able to run both Windows 7 and the newest OS X Mavericks via Boot Camp without any significant "lag", or effect on performance? I realise it will hurt the performance, but will it effect my ability to use the Mac?
Also, any advice on using Windows 7 with MOUNTAIN LION instead would be great!
If my specs do not meet the necessary requirements, any advice on upgrades i should need is also much appreciated
Thanks!

That Mac will work without any problem in Mavericks and Windows 7, as it meets the requirements of both of them. OS X Mavericks improves Mac OS X performance in most Macs, but make a backup of your files before upgrading Mac OS X. The same if you use Mountain Lion, but it's a bit older OS X version.
If you haven't installed Windows 7 yet, follow these steps > http://manuals.info.apple.com/MANUALS/1000/MA1636/en_US/boot_camp_install-setup_ 10.8.pdf

Similar Messages

  • Does Production Premium CS6 work with Maverick and the new iMacs

    Does Production Premium CS6 work with Maverick and the new i Macs

    Thankx for your reply. I saw the Apple tech note but that's what Apple says. I just want to know from users who experienced the thing if it really works.
    It doesn't seem so simple if you believe what this site tells (sorry it's in French):
    http://www.macquebec.com/spip.php?article4146
    So: BootCamp worse than the Beta?

  • Will SMS 3.0 work with 6505 and 3750 IOS?

    Will SMS 3.0 work with
    6506 s72033advanservicesk9-wan-mz.122-18.sxf9.bin
    and/or
    3750 c3750-advansevicesk9-mz.122-25.SEE3.bin?
    Thanks!
    Matt

    It is not supported.
    SMS FAQ:
    http://www.cisco.com/en/US/products/sw/cscowork/ps2428/products_qanda_item09186a0080091ba6.shtml
    http://www.cisco.com/en/US/docs/ios/12_1t/12_1t1/feature/guide/1dt_saa.html

  • Does iTunes 10.7 (Cover-Flow work with Mavericks and if not what do I have to do?

    What do I have to do to keep my 10.7 iTunes (Cover-Flow) with Mavericks?
    Thanks guys all appreciated responses will be accepted in this matter.

    I just had the similar issue. I redeemed my iTunes gift card then went to download something and was asked for my billing info. I completed the information and I think accepted terms and then had a pop-up telling me that my my account would be debited with the purchase. My VISA (billing info) did not appear to be charged as my gift card amount showing in the top right decreased with the purchase. So I just completing the information and hopefully it will happen the same for you! Good luck!

  • Will ipod nano work with itunes and windows 8?

    I am having trouble putting audiobooks from itunes on my ipod nano.  I have the 7th generation ipod and windows 8.  I have managed to put music and a couple movies on it but no luck with the audio books.  Please help!  Thank you, Lori

    Yes.  All model iPods should work with the newest version of iTunes.
    B-rock

  • Will Photoshop Elements 9 work with Mavericks?

    I use photoshop elements 9 for my photo application.  Will it be compatible with Mavericks, if I upgrade my operating system?

    Check out this site for compatibility issues.
    http://roaringapps.com/

  • How can I make an icon that links to a webpage that works with Mac and Windows??

    Hi!
    I burn CDs with my photos and send them to clients.   Besides the photos folder, I would like to include a file (similar to the .webloc files on the Mac Desktop) that can be clicked and it will be linked to my website - it will open up a browser window and go to my website .      Is it posssible to make one of these icons that works with both Macs and Windows machines?  Thanks!

    Now it works!  Thanks, Denico!
    The reason I saved to text:   The first time I followed your instructions, it did not work.   I tried to figure out what I did wrong and saw that you wrote to "save as plain text."   I did not know what this means and there was no option available to save a plain text.  So I looked around and saw "save as stationery" and I guessed that maybe that was what you meant.   And after that, it worked!  But the next thing you know, the icons started duplicating themselves.
    I guess I had made a different mistake in the beginning and I fixed it without knowing what it is.
    Thanks for clearing that up.
    But just one question.  WHY does saving as "stationery" make an icon duplicate itself?

  • Can I Use a network drive to work with Mac and Windows?

    Is it possible to introduce a network drive which can be accessed by both Mac and PC? I manipulate images in Photoshop on my Mac but the software I use to create slide shows is only available in PC format. This software is used more or less universally in the area of photography I am invo;ved with so changing is not an option. Can anyone advise me please.
    TC

    Yes sure. Any NAS type drive formatted in any way will work. Both Mac OS X and Windows communicate by Ethernet Packets to a Networked drive and it is up to the NAS device OS to translate those Ethernet Packets to the format used on the drive.
    Even if you are using a standard external drive connected to a Router or another computer, which is what a NAS is (A self contained computer with Operating System and hard drives), that router or NAS box does all the translating.

  • Which fingerprint password managers work with firefox and windows 7?

    I am running Windows 7 Home Basic on a Dell XPS laptop. I have recently switched to Firefox because Internet Explorer is making me crazy on a regular basis. It is not allowing some downloads and installs and I am tired of going backwards to find another IE that will work. Firefox seems to be doing the trick so far. I want to purchase a biometric fingerprint reader to manage my passwords, but most don't seem to work with Windows 7, and many of the ones that do will not work with Firefox. Has anyone run across the device I am looking for?

    Hello!
    Thank you for inquiring about your issue on Mozilla Support! We appreciate your patience while we find an answer to your issue. At this moment I am escalating this to our advanced troubleshooting team who will assist you further in 24-48 hours.
    Thank You!
    Best Regards,
    feer56

  • What antivirus is better for those who work with mac and windows?

    In my home I use an iMac, but in college I use Windows, and more than once I found an infected file. I know not affect iMac, but I prefer that viruses are removed. Right now I use ClamXv, but I don't know if it is effective.
    Am I to continue using ClamXv? or, do I use another?
    If there are others better AV for mac, what is most recommended?
    **I have also used Sophos, but it makes the iMac go very slow.
    Thanks for your attention.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Big ask! Is there any way to get MS Silverlight and NowTV to work with Mavericks and Safari 7?

    Now amount of frigging will allow me to run NowTV in any web-browser on Mavericks. I've tried all browsers (latest versions in every instance) without the slightest luck. Even delving into the new Plugins security feature of Safari 7 will not get Silverlight to work properly.
    Has anyone found a way to get these things to work?

    Have you seen this?
    http://community.nowtv.com/t5/PC-Mac-Silverlight/PC-Mac-and-Silverlight-Troubles hooting/m-p/65154#M4839
    This made me smile from that page.
    We know that sometimes Silverlight can be a little finicky

  • When EOS Utilities will be able to work with Mavericks

    I´ll try to open EOS utilities for CANON but itsays " Cannot be used with this version" , can you guys help me?

    Milapoly wrote:
    Where I can get any answers when it will work? 
    Unfortunately it's not possible to get such answers.  You just have to wait until Apple announces an update.

  • Working with autocad and windows on mac

    greetings guys,
    i have a new imac on which i plan to run autocad on the windows 7 platform through boot camp. preferably windows 7 home premium model (which costs less). because the program is processor intensive, i have 8 gb of ram. i want to run windows 7 in the 64 bit mode - i think... my question is: what is the speed of my imac? is it correct to use the 64 bit version of windows 7 or the 32 bit version? i'm kind of nervous getting started with autocad on my intel dual mac.
    any assistance will be appreciated!
    thanks,
    dp

    I hope this will be in time to save you from the hassle I've just been through. Two months ago, after running Autocad 2010 on Window XP on the most current Leopard OS X 5.8 and Bootcamp 2.x version with no problems, I decided it was time to upgrade to Windows 7. This turned out to be a huge mistake. To do it you have to upgrade to Snow Leopard OS 6.0 and Bootcamp 3.0. After two days of a clean install process including Snow Leopard, Bootcamp, and all my Windows applications, the machine started crashing (screen would go black with no warning, the machine would freeze, and a forced reboot was the only way to recover) at random when I was using Autocad. I will spare you most of the details, but two months later I had finally narrowed the cause down to a software conflict between Autocad and the Snow Leopard drivers (I believe it is the ATI video driver). It was a painful and time consuming process of elimination to come to this conclusion, including an overnight stress test of the hardware, a role back to Windows XP without also rolling back to the Leopard drivers, and finally a role back to Windows XP and to Leopard drivers, but it was an unavoidable conclusion once I found stability again once I had roled back to my original operating point. In the end senior level tech support personnel agreed that the evidence available appeared to point to a Snow Leopard driver that was conflicting with Autocad itself. In retrospect it was fool hardy of me to upgrade to Windows 7 before Apple engineers had time to work out the inevitable bugs in the Snow Leopard Bootcamp drivers. Don't make the same mistake.

  • Flash Player Does Not Work with IE8 and Windows XP

    I am using Windows XP VR 5.1 with SP3. Flash Player does not function? So videos will not play that use Flash Player. The Adobe Support Site has been 000 Help because it is a free product. Microsoft says it is an Adobe problem. Finger pointing to the nth degree. I have loaded the latest version of Javascript and Flash Palyer.. Any ideas?

    Resetting IE is a shotgun approach, but may be much easier (and faster) for a user than trying to troubleshoot and find exactly which add-on, control, setting is causing issues. For a fast approach, you can reset IE, then start re-installing the add-ons you wish to use. Here is a kb that describes the process and even provides a Fix it: http://support.microsoft.com/kb/923737
    If you’d like to troubleshoot, here are some steps that will fix most issues with Internet Explorer and Add-ons. This can be more of a scalpel approach, and could help you save your cookies, stored passwords, etc.
    1)      Update your Windows software
    a.       Follow the steps below to view updates that are available for your computer.
                                                       i.      Click to go online to the Windows Update website
    1.       Note: If Microsoft Update is not installed, you will be taken to the Windows Update website. See the note below if Microsoft Update is not installed.
                                                     ii.      Click Custom to check for available updates. In the left pane, under Select by Type, click each of the following links to view all available updates:
    1.       High Priority
    2.       Software, Optional
    3.       Hardware, Optional
                                                    iii.      Select the updates you want, click Review and install updates, and then click Install Updates.
    b.      What do I do if Microsoft Update is not installed?
                                                       i.      Follow the steps below to install Microsoft Update and check for updates.
    1.       Click to go online to the Windows Update website
    2.       Click the Go button next to the Get Microsoft Update Today and then click Start Now.
    3.       Review the license agreement, and then click Continue.
    4.       After setup is complete, click Check for Updates.
    5.       Click Custom to check for available updates. In the left pane, under Select by Type, click each of the following links to view all available updates:
    a.       High Priority
    b.      Software, Optional
    c.       Hardware, Optional
    6.       Select the updates you want, click Review and install updates, and then click Install Updates.
    2)      Turn off Internet Explorer add-ons you don't recognize
    a.       When you visit a website, an add-on might be downloaded without your knowledge, or you might be prompted to download an add-on. These add-ons might cause Internet Explorer to run slowly or become unresponsive. You should remove all Internet Explorer add-ons you don't recognize or trust.
    b.      How do I spot malicious add-ons?
                                                       i.      You can usually spot malicious add-ons under the Name column in the Manage Add-ons dialog box. Malicious add-ons might have:
    1.       Blank names.
    2.       Names that include random characters or have a sequence of numbers and letters (for example, fhriduvh.dll or f6rid8vh.exeas as opposed to Windows Messenger).
    3.       A publisher name you might not recognize.
    c.       How do I disable an add-on?
                                                       i.      Open Internet Explorer.
                                                     ii.      Depending on your version of Internet Explorer, do one of the following:
    1.       In Internet Explorer 6, click the Tools menu, and then click Manage Add-ons.
    2.       In Internet Explorer 7, click the Tools menu, point to Manage Add-ons, and then click Enable or Disable Add-ons.
    3.       In Internet Explorer 8, click the Tools menu, click Manage Add-ons, and then click Toolbars and Extension (if necessary). Also note the drop down list labeled “Show:” You are interested in Add-ons and Downloaded
    4.       Follow these steps to determine the version of Internet Explorer you're using:
    a.       Open Internet Explorer.
    b.      Press ALT+H, and then click About Internet Explorer.
    c.       How can I find which version of Internet Explorer I'm using if it won't launch?
                                                                                                                                i.      If you're unable to launch Internet Explorer you can use the following steps to determine the version you're using:
    1.       Click Start, click Run, type %ProgramFiles%\Internet Explorer, and then click OK.
    2.       Right-click iexplore, click Properties, and then click Version.
    3.       Under Item name, click File Version. The version number appears under Value to the right of File Version.
    a.       Note:If the file version number begins with 6, you have Internet Explorer 6. If the file version number begins with 7, you have Internet Explorer 7. If the file version number begins with 8, you have Internet Explorer 8.
    d.      If you aren't using the latest version of Internet Explorer, consider updating.
                                                                                                                                i.      How do I update to the latest version of Internet Explorer?
    1.       Click to download and install the latest version of Internet Explorer        
                                                                                                                              ii.      How can I update Internet Explorer without launching my web browser?
    1.       Click to go online to the Windows Update website.
    2.       Click Custom to check for available updates.
    3.       In the left pane, under Select by Type, click Software, Optional.
    4.       Select the Internet Explorer update, and then click Review and install updates.
                                                    iii.      Click the name of the add-on.
    1.       Click Disable. You might have to restart Internet Explorer for the changes to take effect.
    2.       Why do some add-ons include (Not verified) in the Publisher column?
    a.       If (Not verified) is displayed in the Publisher column in the Manage Add-ons dialog box, the add-on itself is not digitally signed even though the program that installed it might be. A digital signature verifies that a file comes from the person or publisher it claims to be from, and that no one has tampered with it since it was digitally signed.
    3.       How do I disable an add-on if I can't access Internet Explorer?
    a.       Click Start, and then click Control Panel.
    b.      Double-click Internet Options.
    c.       Click the Programs tab, and then click Manage Add-ons.
    d.      Click the name of the add-on you want to disable, and then select Disable.
    e.      When the Add-on Status dialog box appears, click OK to close it.
    3)      Perform a free Full Service Scan using Windows Live OneCare safety scanner (not necessary if you don’t suspect viruses and are confident in the protection you have on your machine).
    a.       Go to the following website, and then click Full Service Scan: Windows Live OneCare safety scanner
                                                       i.      http://go.microsoft.com/fwlink/?linkid=56726
    If you are still experiencing issues, perform these steps. If the issue subsides, you may discontinue the remainder of the steps
    1)      Disable all add-ons (one at a time) until you can no longer reproduce the problem
    a.       Close all Internet Explorer windows.
    b.      Click Start, and then click Control Panel.
    c.       Click Network and Internet Connections, and then click Internet Options.
    d.      Click the Programs tab, and then click Manage Add-ons.
    e.      Click the name of the add-on you want to turn off, and then, under Settings, click Disable.
    f.        Click OK.
    g.       Restart Internet Explorer. Continue using Internet Explorer the same way you did when you received a crash report. If Internet Explorer continues to crash after disabling this add-on, continue with the next step.
    h.      Repeat steps b through g for each add-on listed. When you can no longer reproduce the problem, the most recently disabled add-on is the cause of the problem. Once you discover the add-on that is causing the issues, you can uninstall it (use Manufacturer’s uninstaller if one is provided) then if you wish to continue to use the add-on, install the latest version from the manufacturer’s site.

  • Thunderbolt display not working with bootcamp and windows 7

    I am running a late 2013 MBP Retina display with a Thuderbolt monitor. I am running windows 7 on a dual boot partition. I can not get my thunderbolt display to work while working in windows. The screen is currently black. I have attempted to follow the instructions in prior posts regarding this issue with no success. Is there a clear fix to get the monitor to work? Thank you

    it has to be plugged into the machine before you power on the machine, it is not hot swapable like on OSX
    does the screen work in OSX

Maybe you are looking for

  • Bex MAP issue in WAD

    Dear All, I have an issue what I do not understand. In Web Appl. Designer I executed my web template and its behaviour was strange. When I selected Color Shading as displaying the different sales amount for countries, the map appeared and the shading

  • [solved] Google chat: no sound

    I haven't webcam, and try to setup gmail chat sound.Have installed google-talkplugin [1], but both mic and playing back doesn't work. The same devices do work with (sorry) Skype. Have tried with Firefox and Chromium with the same result. As additiona

  • ITunes Converter Not Working

    I am trying to convert a downloaded MPEG-4 file in ITunes for use on my Ipod. The converter runs through it and when complete, I get a file with no video, just sound. Any ideas?

  • BDC  For Bank Reconsilation.

    Dear friends,         I want to create BDC for bank reconcillation using Tcodes FF67 and FEBA. So I want to know whether we can create BDC for such a transactional data or there may be any other solution for the same. Beacuse it is very complicated p

  • Getting a 0 to display instead of a blank space in query

    Hi Experts My colleague has been writing a query in SAP to show when a delivery was late or early etc, the problem we have is when the 2 dates match signalling that it was neither early or late, it displays a blank space, is there a way he can get it