How to tell if someone answered me in the Apple community?

Hi, I'm new to the community of Apple, and I just asked a few questions here. However, I have not received an email or notifications on all the answers to my messages. I checked my messages manually, then I discovered someone answered me. So, should I manually check my posts to see if anyone responded? What happens if someone answered me on my response to their questions? This seems very awkward for me.

In addition, I checked my preference, there is no option on the e-mail responses to me.

You should be automatically 'after' any thread you posted in; If this is not the case, for some reason, make sure to click on the 'monitoring' in the upper right:

Once you follow the thread, check in your preferences that you have turned on email notifications. Click your name (upper-left), and then click Preferences. Make sure that everything you want to be alerted on is set on "on".

Make sure yours is on (mine is off):

Tags: Using Support Communities

Similar Questions

  • How to tell if someone uses remote adjustment to control the use of my computer?

    How to tell if someone uses remote adjustment to control the use of my computer?

    * original title - monitoring computer use *.

    Hello

    Why do you think that someone is watching your computer use? One would have to have
    loaded tracking software (trojan) on your computer or have access to the source of the network
    you use, such as cable, on your leg of it and have very sophisticated equipment.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • How to tell if someone uses my count at home when I'm not home?

    Original title: who was on my computer.

    Probably a stupid question, but I've never had to ask before.  How to tell if someone uses my count at home when I'm not home?

    You can examine (eventwvr.exe) Event Viewer system log. He recorded each logon.

  • How I will be notified if someone answers my question in MS Community?

    Original title: RESPONSE

    How I will be notified if someone answers my question?

    Go to your profile page and click on edit. Check the box to receive notifications by e-mail.

    Or, for a single thread, see subscribe to updates.

  • How to tell if someone is remotely access our home computer (s) and storing hidden files and/or access our emails and accounts?

    I think my computer (s) have been used to store hidden files / emails and unauthorized activity distance without our knowledge... We have problems of browser and see all kinds of strange activity and files which are not ours in folders on the list of recent documents that contain garbled code... How to join us at the heart of what happens or not to be a problem with security problems... (IT SEEMS to COME through OUR OUTLOOK EXPRESS WE HAVE EVER PUT UPWARDS or USE of e-mail > response will be GREATLY appreciated as we are unable to pay for assistance online live...) Thank you! Roberta!

    A short list includes...

    IP alias addresses

    Identities with the user's alias opens a session

    Activity on and off our drive c: with text records distorts

    the use of our accounts of outlook express and hotmail etc etc...

    First of all, download and install Malwarebytes from the link below. Once installed a dialog window with two boxes with checkmarks in them is displayed. Make sure both boxes are checked. We need to launch Malwarebytes, and the other is to be updated. Once updated Malwarebytes opens. On the "Scanner"tab check the box for a fast analysis." Start the scan. At the end of the analysis, follow the prompts to remove whatever it is detected. Display the results of the analysis in your answer to receive the next step.

    Malwarebytes.org

    How to use Malwarebytes

  • How to tell if someone in my house, it's stealing my internet

    I believe that someone in my house, it's stealing my internet. How will I know? I don't know too much about spyware. I see if spyware is on my computer? Or is spy software on the other computer in our House? Or on two computers... I have a lap top the other computer at home is a pc

    Thank you very much.

    slasm

    Hello

    Carefully check for malware: it's search for Trojan horses, recorders of striking and other methods.
    For more information about security, see the following message after you below.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.  (Vista is similar - to use XP RUN instead of start - search)

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

  • How to tell if someone is using your identity after phone call scam

    I got one of these calls, but unfortunately worries me now that I may have something that I regret? Please indicate how to get out of this?  He seems to know what he was talking about too? Thank you

    * original title - how do you know if people are using your identity? *

    Your post is rather vague, but it seems you've been had by a scam, there are much of what we can do here to help you.  If you gave them your credit card information, you can call your company and credit card fraud report and have the card cancelled.

    John

  • I think that someone other than me has synchronized my computer. How to tell if someone has access to my activity?

    I think my computer is "hidden." There are Web sites that I have not visited at all, including the Mozilla developers, who appear as previously visited. In addition, whenever I load a page, it seems to load twice, as if another copy is running in the background. Help, please.

    The Firefox sync system don't live synchronization of all of the Web site that you visit on another device. That means, the problem with your sites Web appearing to load twice is more than likely not caused by the synchronization system.

    For added security, please change the password for your Firefox sync account to make sure that nobody can access it.

    It seems to me that you have an infection on your computer. You can try these free programs to search for malicious software that work with your existing anti-virus software:

    Microsoft Security Essentials is a good permanent antivirus for Windows 7/Vista/XP, if you do not already have one. Windows 8 already has integrated antivirus.

    Please let me know if the scans detect something.

  • How to tell if someone is using my network or internet connection w / my password

    Ok.. So I let my old neighbour use my network providing him with my router username and password of my network. Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix? Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I have confidence in him.

    Thank you kindly

    Sunday, September 14, 2014 02:11:07 + 0000, Slamina wrote:

    * OK... So I let my old neighbour use my network providing him with my router username and password of my network.

    Always a bad thing to do, in my opinion.

    Now his family of very strange... possibly use their computers to connect and play games on Facebook and emails. They have no internet so it must be on my network. fix?

    They could also use some other wi - fi router, but you are probably
    correct that it is yours.

    Can I use mngr. to view the process and from that task? Help, please... I know I was taking a chance here, but I trusted to him.*

    If I were you, I would simply change the password of the router. Do not
    worrying about if they used it, stop using it more.

  • I want to install the PowerPoint Viewer and do not know how... can someone please send me the correct link for it?

    Hi, when I get an email to PowerPoint I click on enregistrer to save on trombone, then save it to my documents... then I must open documents to get the powerpoint e-mail... is there a way I can just click on the paperclip and powerpoint automatically opens the email instead of going to all the steps, I pass by?

    ....... so I open documents to get the email of powerpoint...

    Does this mean that you were able to open the pesented after that that it has been saved in the documents folder?

    If so, this means that you already have the PowerPoint Viewer.

    Your problem is... impossible to open powerpoint DIRECTLY from email.

    Assuming you are using Windows Mail, try this tutorial...

    http://www.Winhelponline.com/blog/unable-to-open-PPS-ppt-from-Windows-mail-or-WLM/

  • How can I contact someone? Error on the app store

    Hello

    My application was finally approved, and I went on my account and displayed for sale... who was on Apr. 2.  The app is the web version of the store, but when you click it, it says

    Unknown anerror occurred (EC)
    To return to the homepage please click here

    It seems that the only way to contact them is to pay for it? That's nice.

    Any help would be greatly appreciated.

    Thank you

    Hi four2theizz0,

    If it is a PlayBook application, check your devices supported (see steps below).  If there is no device supported, the shop online will return probably this error message.

    Change devices in charge from the supplier portal:

    -Click on manage products
    -Click on the eye (view) in the versions of the application to change column
    -Click on the pen (edit) by the publication containing the bundle to edit
    -Click the "Add Release Version.
    -Click on the pen (edit) in the column of device Support for the package that you want to change

  • How can I call someone from support on the Activation?

    I have Adobe Web Premium CS3 which I paid something like $2,500 years ago. I have it on my windows machine 8 but upgraded to 10 windows without disabling my permit first. Now it says I have 5 days to activate it. The phone number in the activation support page says you no longer manage activations by phone. Please let know us to whom I should call/email for I'm sure that I wouldn't post my serial number etc. on a public forum

    In fact I found the cat and my problem was solved... Thank you

  • How to make Flash Player Package to use the Apple Remote Desktop.

    I want to deploy Flsh Player Package using Apple Remote Desktop.

    Could you please please teach me how to make Flash Player 'Package' to deploy Apple Remote Desktop on Mac OS X 10.9.

    Hello

    We provide an installation of Flash Player PKG for managed deployment package.  The package is available for download for visitors (with distribution license) current of the Adobe Flash Player Distribution | Adobe page.  The post you are looking for is the option 'download DMG Installer (for system administrators).

    --

    Maria

  • How to configure applications 'Find my iPhone' on the Apple Watch of fallback to iCloud, when the bluetooth connection is interrupted?

    It would be ideal if applications of "Find my iPhone" Apple Watch can be redirected via iCloud when the watch is connected to wifi, but the bluetooth with the phone connection is lost.

    Ongoing enforcement watch OS 2.1, coupled with the iPhone 6 more (iOS 9.2). Thank you!

    Hello

    The feature you described is not currently available on Apple Watch.

    It is a community of support based on the user, but if you want to suggest that Apple considers adding that as a new feature, you can do so here:

    https://www.Apple.com/feedback/watch.html

    All submissions are read (even if you do not expect to receive a response).

  • How do you communicate with the Apple Watch

    How do you communicate with the Apple Watch

    Hello!

    Welcome to the Apple community. I'm not quite sure what you mean when you say "communicate" with the Apple Watch, so I'll give you a few options that can respond to your request.

    (1) the Apple Watch supports Siri, just like the iPhone and the Mac. To apply, simply say "Hey Siri" while the wrist is triggered, and your watch will respond. Alternatively, you can hold the digital Crown and Siri will be activated. As soon as Siri is activated, you can ask him questions such as "what is the weather today" or "reminder", or "Let's start a workout."

    (2) you can manually send SMS via your Apple Watch by use of Siri, or opening the messaging app. That Siri send your messages, just say 'Hey Siri, send a text < name >' and Siri will open the Messages app and wait to talk to you about your message. If you want to move the Messages app manually, press the digital Crown and will take you to the home screen. In the home screen, select the Messages app (a green icon with a word inside bubble). Any existing message log must appear, and you can type on a given message log and choose to respond.

    (3) If you want to place a phone call using your Apple Watch, you can say "Hey Siri, call < contact name >". If you have several numbers for a particular contact, Siri will ask you what number you want to call. You can also you can present a more specific request like 'Hey Siri, call < contact name >, < number >' with the number favorite is 'work' or 'House' or 'mobile' etc. So the demand go something like "Hey Siri, call Barbra, House".

    If you are still at a loss, with regard to the types of orders that Siri will accept, you can always ask. Say 'Hey Siri, what can you do?' and she will give you a list of commands that she will answer to the.

    If all goes well, I addressed your question. If not, please provide a little more information and I'll do what I can to help you.

    Good luck!

Maybe you are looking for