Will Windows 10 be unfriendly to security software and friendly to malware as Windows 8?

Dear MS developers,
Forgive me but topic is equal to serious problems IMHO:
We are developing security products (antikeylogger HIPS) 
New PatchGuard for Windows 8, and 8.1 does not allow code hooks on win32k.sys
Previous PatchGuard version for Vista and Win7 allowed these hooks
HIPS-based software (firewall, antikeylogger) cannot work effectively
Malware can inject own dll via SetWindowsHookEx function without any alert from firewall
Malware can record keystrokes using GetKeyState, GetAsyncKeyState and other functions
I wrote more about this problem there long time ago:
https://social.msdn.microsoft.com/forums/windowsdesktop/en-us/27f483ca-8449-4abd-aedd-3d73e956649c/new-patch-guard-is-dangerous-for-w8-security

Please use the
Feedback app if you wish to forward your concerns.  Thank you!
Carey Frisch

Similar Messages

  • I am using a Mac Leopard and want to know if I upgrade to Snow Leopard (so I can use the new Lightroom 4) will any of my programs be affected.  I will not be able to restore some software and want to know if I'll lose those programs with the upgrade?

    I am using a Mac Leopard and want to know if I upgrade to Snow Leopard (so I can use the new Lightroom 4) will any of my programs be affected.  I will not be able to restore some software and want to know if I'll lose those programs with the upgrade?

    Hello,
    Snow Leopard/10.6.x Requirements...
    General requirements
       * Mac computer with an Intel processor
        * 1GB of memory (I say 4GB at least)
        * 5GB of available disk space (I say 30GB at least)
        * DVD drive for installation
        * Some features require a compatible Internet service provider; fees may apply.
        * Some features require Apple’s MobileMe service; fees and terms apply.
    Which apps work with Mac OS X 10.6?...
    http://snowleopard.wikidot.com/
    It looks like they do still have it:
    http://store.apple.com/us/product/MC573Z/A?fnode=MTY1NDAzOA
    And it's been reported that if you have a MobileMe account Apple will send one free.
    If it's a core Duo & not a Core2Duo, then it'll only run in 32 bit mode.

  • Will bootcamp allow me to use pepakura software and print pdo files?

    Will bootcamp allow me to use pepakura software to unfold and print 3d pdo pso files in windows?

    Bootcamp Assistant only partitions your hard drive and provides hardware drivers so that you can install Windows. Once Windows is installed you can run ny Windows program that you can run on any other Windows computer.
    http://www.apple.com/support/bootcamp/
    https://discussions.apple.com/community/windows_software/boot_camp

  • I'm trying to download security software and it won't download. When I click the icon " if your download doesn't start click here", nothing still happens.

    I'm trying to download security software for my Mac Pro and it won't download. Even when I click the icon that says "if your download doesn't start click here" and still nothing happens. I have tried different types of software and nothing will download.

    Are you not able to download anything at all?
    I don't know what "security software" you're trying to download, but the chances are overwhelmingly good that you don't need it, and it's likely to do more harm than good.

  • Why is apple selling security software and people say you don't need it

    i got a imac 27 inch late 2013 and people are telling me i dont need security so why are apple selling it then
    http://store.apple.com/uk/product/HC567ZM/A/intego-antivirus-and-security-mac-pr emium-bundle-2013?fnode=000104090a

    Apple Stores sell all sorts of things, including software, that you do not need, but some may want anyway.
    The simple fact is that there are only a very tiny number of threats in the wild for OS X and those are easily avoidable by simply not installing anything you did not purposely set out to (do not enter your admin password to an installer dialogue unless you know exactly what it is for).
    That said, people have been buying anitvirus software for Apple computers since before OS X was even released.  It has never really been needed, but such products have always existed and used by some.
    If you really want it, buy it, but just know that there is no real need for it or purpose to having it.
    Intego is a perfectly legitimate business, and like any software vendor they can arrange to have Apple sell their product.  Apple does not dictate that what they sell meet some intrinsic need or purpose.

  • I have a 13" mac book osx version 10.6.8 that will not connect to my router, all software and firmware are up to date.

    any one have similar problems?

    also, all other devices will conect to the router via wifi or ethernet. 

  • Error 1601 appears when I restored, I did uninstall all my security software and it still doesnt work

    please help me

    Hello cyliss69, try a ''Clean reinstall''. This means you remove Firefox program files and then reinstall Firefox. Please follow these steps:
    '''Note:''' You might want to print these steps or view them in another browser.
    #Download the latest Desktop version of Firefox from http://www.mozilla.org and save the setup file to your computer.
    #After the download finishes, close all Firefox windows (click Exit from the Firefox or File menu).
    #Delete the Firefox installation folder, which is located in one of these locations, by default:
    #*'''Windows:'''
    #**C:\Program Files\Mozilla Firefox
    #**C:\Program Files (x86)\Mozilla Firefox
    #*'''Mac:''' Delete Firefox from the Applications folder.
    #*'''Linux:''' If you installed Firefox with the distro-based package manager, you should use the same way to uninstall it - see [[Installing Firefox on Linux]]. If you downloaded and installed the binary package from the [http://www.mozilla.org/firefox#desktop Firefox download page], simply remove the folder ''firefox'' in your home directory.
    #Now, go ahead and reinstall Firefox:
    ##Double-click the downloaded installation file and go through the steps of the installation wizard.
    ##Once the wizard is finished, choose to directly open Firefox after clicking the Finish button.
    More information about reinstalling Firefox can be found [https://support.mozilla.org/en-US/kb/troubleshoot-and-diagnose-firefox-problems?esab=a&s=troubleshooting&r=3&as=s#w_5-reinstall-firefox here].
    <b>WARNING:</b> Do not run Firefox's uninstaller or use a third party remover as part of this process, because that could permanently delete your Firefox data, including but not limited to, extensions, cache, cookies, bookmarks, personal settings and saved passwords. <u>These cannot be recovered unless they have been backed up to an external device!</u>
    Please report back to see if this helped you!
    Thank you.

  • I get a notice that says "this file is corrupt" and I can't finish the download. I have ckd all of my security software and it came back clean, but still can't download!

    I have been trying to download firefox since last nite...I keep getting a notice that "this file is corrupt" and can't finish the download...Help!!

    Temporarily disable your Anti-Virus application only long enough to download Firefox.

  • Should i run any security software?

    Hi new Mac user(2 days) I'm running Mavericks 10.9.2 on Macbook Pro.
    Should i be running any anti viris or any other security software and if so what do you recommend?
    Thanks

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Research has shown that most successful attacks are "zero-day"—that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security makes you more vulnerable.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize by the file name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need any software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may be useful if an ill-informed network administrator says you must run some kind of "anti-virus" application.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining Bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Help my safari web browser has been hijacked by some type of malware. My browser is locked in on a web page that pretends to be from the FBI. Is there security software I can purchase to eliminate this malware?

    I am not sure if this is the correct forum but I had these bastards who have stolen my web browser. Natually they ask me to send them monies to unlock my browser. It is a dangerous place out there. I would appreciate any recommendations as to possible security software to remove this malware will be much appreciated
    thank you
    Hijacked Safari Browser

    Information.
    https://discussions.apple.com/message/17680743#17680743

  • Tried to download ios 7. Connected to i-tunes and wants to restore my phone - says its in recovery mode. No other options available. Goes near to success then always get error code 29. Have tried to re-set my security software etc.

    My iPhone is now dead. Downloaded ios 7 by wifi on the phone. It then asked me to connect to i-tunes. I-tunes says the phone must be restored. Goes a long way down the restore and then get error code 29. I have tried turning off security software and firewalls as suggested by the Apple site but no difference. Can anyone help?

    Spent hours trying everything suggested and finally this morning hit on a solution. iTunes must be run as an administrator. Even though you are logged into your PC as an administrator, using the iTunes shortcut does not make you an administrator in iTunes. I found this out by using the diagnostics in iTunes and reading through the results report.
    I am using Windows 7, so I clicked the start button and right clicked on iTunes and selected "Run as an adimistrator". The first restore attempt got the 4013 error. I then did the DFU thing, hold power and home buttons for 10 seconds, release power and continue holding home for 10 more seconds.
    iTunes gave me the restore message and I clicked it. I clicked the restore iPhone button and it started. The drivers loaded a couple of times. I got the apple logo with the progress bar and this time instead of disappearing, it started to fill in.
    End result, a successful restore to factory settings and a happy 14 year old.
    Hope this helps others.

  • HT5312 It will not let me change my security passwords? What do I do?

    My ipad will not let me change my security passwords and question and I don't know what to do

    What do you mean 'my iPad will not let me change my security passwords' ? You are following the instructions on the HT5312 page that you postedi.e. if you have a rescue email address (which is not the same thing as an alternate email address) on your account then steps 1 to 5 half-way down that page should give you a reset link.
    If you don't have a rescue email address (you won't be able to add one until you can answer your questions) then you will need to contact Support in your country to get the questions reset (these are user-to-user forums).
    Contacting Apple about account security : http://support.apple.com/kb/HT5699
    When they've been reset (and if you don't already have a rescue email address) you can then use the steps half-way down the HT5312 page that you posted from to add a rescue email address for potential future use

  • Problem: LMS 3.2 SP1 do not connect to CCO for software and device updates

    LMS 3.2.1
    When I try to check Software and Device packages updates for LMS components, it fails with "Error while downloading package information from Cisco.com for the selected products. See the d:/CSCOpx/log/psu.log file for details." diagnostics.
    CSCOpx\log\psu.log shows that it fails with 404 error. Looking to wireshark capture, I see that software make GET to http://www.cisco.com, then GET to http://cco.cisco.com/cgi-bin/login, then GET to www.cisco.com/cgi-bin/WLAN/cwselectfile.cgi with some params, which result in "404 Not Found" error nevermind which product (Common Services, Campus Manager, RME, DFM or others) I try to get updates on.
    Is there any patch or solution for it?

    have you installed the patch for bug ID CSCto46927, yet?
    the details form the Bug Tool Kit:
    ============================
    Psu support changes from CCO to SPRIT
    Symptom:
    After the 16th of June 2011 LMS will no longer be able to download Software and Device Package updates, or PSIRT and End of Sale/Life information from CCO
    Conditions:
    Hosted services in Cisco.com that are being leveraged by LMS, for downloading the latest Software and Device Package updates, as well as the PSIRT and End of Sale/Life information are being migrated to a new framework and the old services will be retired.
    This will affect all LMS 3.x and 4.x versions.
    Refer to https://supportforums.cisco.com/docs/DOC-16806 for more information
    Workaround:
    Users of LMS 3.2.1 , 4.0 should install the patch that can be downloaded from cisco.com
    Users of earlier version will need to upgrade to LMS 3.2 and then install the LMS 3.2 SP1 patch set before installing the patch   
    =================================
    the patch cwcs33x-win-CSCto46927-1.zip can be downloaded here

  • I have windows xp sp3, run Mcaffee security software- when I open I-tunes it does open however it will not connet to the I-tunes store. I-Tunes diagnostic indicates that it does connect to internet but the secure link to I-Tunes fails.

    I have windows xp sp3, run Mcaffee security software- when I open I-Tunes it does open however it will not connet to the I-Tunes store. I-Tunes diagnostic indicates that it does connect to the internet but the secure ling to I-Tunes fails. I-Tunes diagnostic attached. Hope some one can help.                                                     Microsoft Windows XP Professional Service Pack 3 (Build 2600) Dell Inc. MP061 iTunes 11.0.2.26 QuickTime 7.7.3 FairPlay 2.3.31 Apple Application Support 2.3.3 iPod Updater Library 10.0d2 CD Driver 2.2.3.0 CD Driver DLL 2.1.3.1 Apple Mobile Device 6.1.0.13 Apple Mobile Device Driver 1.64.0.0 Bonjour 3.0.0.10 (333.10) Gracenote SDK 1.9.6.502 Gracenote MusicID 1.9.6.115 Gracenote Submit 1.9.6.143 Gracenote DSP 1.9.6.45 iTunes Serial Number 0012B5500B576CC8 Current user is an administrator. The current local date and time is 2013-04-28 10:27:11. iTunes is not running in safe mode. WebKit accelerated compositing is enabled. HDCP is not supported. Core Media is supported. Video Display Information ATI Mobility Radeon X1400 **** External Plug-ins Information **** No external plug-ins installed. iPodService 11.0.2.26 is currently running. iTunesHelper 11.0.2.26 is currently running. Apple Mobile Device service 3.3.0.0 is currently running. **** Network Connectivity Tests **** Network Adapter Information Adapter Name: {7282B8D2-078A-4414-82D6-A506F9C935D0} Description: WiMAX Network Adapter - McAfee Core NDIS Intermediate Filter Miniport IP Address: 0.0.0.0 Subnet Mask: 0.0.0.0 Default Gateway: DHCP Enabled: Yes DHCP Server: 255.255.255.255 Lease Obtained: Wed Feb 13 12:30:29 2013 Lease Expires: Mon Jan 18 21:14:07 2038 DNS Servers: Adapter Name: {9CE46F79-8015-4C15-A074-B1ACA4388E56} Description: Sierra Wireless Network Adapter - McAfee Core NDIS Intermediate Filter Miniport IP Address: 0.0.0.0 Subnet Mask: 0.0.0.0 Default Gateway: DHCP Enabled: Yes DHCP Server: Lease Obtained: Mon Jan 18 21:14:07 2038 Lease Expires: Mon Jan 18 21:14:07 2038 DNS Servers: Adapter Name: {1A876FC9-50B6-4101-8E4F-838AF1D1CB32} Description: Dell Wireless 1390 WLAN Mini-Card - McAfee Core NDIS Intermediate Filter Miniport IP Address: 0.0.0.0 Subnet Mask: 0.0.0.0 Default Gateway: DHCP Enabled: Yes DHCP Server: Lease Obtained: Mon Jan 18 21:14:07 2038 Lease Expires: Mon Jan 18 21:14:07 2038 DNS Servers: Adapter Name: {E64A2DD8-7A18-4784-8DC0-08B143E504A7} Description: Broadcom 440x 10/100 Integrated Controller - McAfee Core NDIS Intermediate Filter Miniport IP Address: 0.0.0.0 Subnet Mask: 0.0.0.0 Default Gateway: DHCP Enabled: Yes DHCP Server: 10.0.40.20 Lease Obtained: Thu Aug 23 15:54:15 2012 Lease Expires: Thu Aug 23 17:54:15 2012 DNS Servers: Adapter Name: {2A9F97F5-D693-427F-BA40-9C3AA36937B1} Description: WAN (PPP/SLIP) Interface IP Address: 107.42.83.109 Subnet Mask: 255.255.255.255 Default Gateway: 107.42.83.109 DHCP Enabled: No DHCP Server: Lease Obtained: Wed Dec 31 18:00:00 1969 Lease Expires: Wed Dec 31 18:00:00 1969 DNS Servers: 66.1.77.7 68.29.73.7 Active Connection: Mobile Connected: Yes Online: Yes Using Modem: Yes Using LAN: No Using Proxy: No Firewall Information Windows Firewall is on. iTunes is enabled in Windows Firewall. Connection attempt to Apple web site was unsuccessful. The network connection timed out. Basic connection to the store failed. The network connection timed out. Connection attempt to Gracenote server was successful. The network connection timed out. Last successful iTunes Store access was 2013-04-16 10:14:47.

    Hello cor-el, thanks for your reply. I changed my settings for downloads to desktop and it has appeared on there. When I double click I am asked which program I want to open file. I click firefox and another box "opening install" says I have chosen to open the file which is an application and do I want to save it. This is the only real option so I press save file. I get a box saying this is an executable file which may contain viruses - do you want to run. I press ok and the final box showing C drive file name and desktop appears stating application not found.
    This happens the same whenever I try to install.
    To my untrained eye the application is not being recognised as an application and I cannot work out how to get it to do that.
    My plugin is still showing as out of date.
    Is there anything you could suggest. Thanks for your time.

  • HT201318 How do I back up everything that will be lost when I upgrade my software for my Ipod Touch 3rd Generation? Can I just take the information and go into windows explorer and drag it out in2 a separate folder/drag it back?I'm running Windows Vista b

    I am trying to figure out how to back up ALL of my apps, games, movies, personal info, etc, that is destroyed when I  upgrade ITunes  ( I do not know why). If it's all on ITunes in the first place then what's the problem with installing new software after wiping it clean, then adding that software and the original apps, games, movies, tv shows, etc, that are stored on ITunes to begin with"? With that being said, I subscribed to ICloud somehow through the Itunes store, the instructions that they had for using Windows VIsta were incorrect so I signed up with the intention of using it as a tool to backup all of my data. Problem is I only got 25 gigs to start and I need 40 gigs. I also don't know how to properly set up the account or manage it, or the amount of data that it will hold. Please help me!!!! I just recently located my Touch after it being misplaced by my little sister for over a year and I'm trying to upgrade the operating system, after all, it IS over two years old.....Thanks, in advance for any help anyone can give me.
    Message was edited by: cdftrim

    Hi. The two user tips both describe a sequence of steps that should get your library from the point where it threatens to wipe data from your device to where it is syncing normally, while recovering as much information as possible. It may still be necessary to wipe and reload the device but this should only take place once all the data that can be recovered has been recovered.
    Doing step 1 of 8 and then complaining things aren't the way you want them to be yet strikes me as premature...
    Since you appear to have all your media content, and we are discussing an iPod classic, not an iOS device, the main worries are already taken care of. What's left is ratings, playcounts, playlist membership and checked status. Since your device holds only part of your library at best you could only recover the missing data for the content that is on the device using third party tools.
    Recreating the previous checked/unchecked status of every track in your library from where you are now may not be that easy. Syncing with selected playlists has many advantages, one of which would have been that you would have a named playlist that could have been retrieved by 3rd party software if you had used this method.
    You haven't explained what caused your problem in the first place, but if you have a Previous iTunes Libraries folder holding old copies of your iTunes database (generated with each iTunes update) then it would be possible to restore the most recent of these and then update the library with any changes in your media folder.
    BTW Apple doesn't offer free support for this kind of issue with iTunes.
    tt2

Maybe you are looking for

  • HT4623 How to update an iPhone with iOS 4

    I have already got an iPhone 4 that has been recently updated but I have now got my sisters old iPhone 4 as I smashed mine and she has never updated it how do you update it from iOS 4? Thanks

  • How can I broadcast a changed email address to my contacts list

    how can I broadcast a changed email address to my contacts list?

  • MathScript Commands

    HI all, i'm quite new to LabVIEW MathScript and have been struggling with using the 'load' command in MathScript window to load the data  wanting to sort data in every column (total of 4) within a data file. I can perform this operation in Matlab sim

  • Import mail without the correct IDs (OD messed up)

    I messed up the Open Directory info, recreate 5 users from scratch, but how I can import the old mail into the new server? Both systems were 10.6.3, and I still have access to the old (screwed up machine). Screwed up because the authentication system

  • How Do I Convert a .mod file int .avi then to Mp4?

    Hello I have a .mod file that my boss wants me to get on to our iPod Video. We have purchased Quick time pro and I cannot open the file I'm getting the following error: Error -2048: the file is not a movie file. Please help!!! Thank you. PS. I'm at w