Is it safe to leave your Mac to sleep while not using it?
Is it safe to leave your Mac to sleep while not using it?
Of course, it is safe. Sleep is the best way to let your Mac if you use in a short period of time (process of awakening is much faster but to turn on your Mac, whenever you want to use it), and your Mac also consumes very little power in this mode. However, it is better to turn off your Mac if you are not going to use it for a long time.
To secure your Mac by others, I suggest you to set up your Mac to request your password after waking up from his sleep. You can do System Preferences-> Security & privacy-> general-> 'ask the password... ».
Hi there, this is not necessarily a problem, but I was wondering if you could awnswer this. I recently adding some new contacts to my contact list, who are both using android phones is said by the way and noticed that options for these contacts, such as: Send Message, share contact, add to Favorites, block this caller, as well as the options of call and text, are all displayed in blue text. I could have sworn at a certain point my contact options were displayed in green text for users of android and blue text only if this contact was using an iPhone. So I looked through my contacts, I needed to update some of my contacts anyway information and discovered that even the options of contact for non-iPhone users were posted in a blue text. I know that iMessage is always displayed in blue, and that regular messages always appear green, it is always the case when I text someone. I know that's really not a big deal, but still when I really could have sworn that the colors are different depending on whether my contacts using iPhones or not. Don't know if a blue font for the selection of these options would have is part of an update or not, or if it was always supposed to be the appearance of these options. If you could tell me what colors your iPhones display when you select a contact from your contact list, and if this would be something that would be possible to change if these colors are supposed to differ, it would be highly appreciated. Thank you for taking the time to read this, once again, I know this is really not very problematic, but I am always curious about it. Thanks to a bouquet.
This text is blue, no matter that the person has an iPhone, Android phone, landline phone or not phone. Contacts don't 'knows' what kind of phone is connected to the number.
After an important virus corrupt my system, I got everything running except internet Wifi access.
The configfree detects the unit, Wireless 2200BG, which is enabled and the latest driver downloaded from Intel, but he said nothing to the MAC address.
IPCONFIG displays the wifi MAC address and loading upward it says wireless networks detected but it can not always connect.
Configfree using I get error message c-15, c-16, c-16.
I can hard wire to the internet using the LAN.
IM using XP Home
Ive took the wireless card, reinstalled, deleted, and updated.
Any help would be appreciated
Have you checked the TCP/IP protocol settings?
The settings are located in:
Network connections-> network connection WLan-> properties-> Protocol TCP/IP-> properties
There you have to make sure that settings such as; obtain an IP address automatically, get the DNS should automatically be marked!
PS: The router must has disabled the mac address filtering!
Continue the process of defragmentation even if the computer is set to mode 'sleep'?
Nothing happens when the PC goes to "sleep".-steve
Sorry if this is posted in the wrong place.
Harden your Mac from malicious software attacks
Seems to be outdated. ( Changed the: July 12, 2013 19:28 46816 views )
It is the Firefox Mozilla Knowledge Base article
- Fix Firefox problems caused by malicious software
- Link firefox:mac https://support.mozilla.org/en-US/kb/troubleshoot-firefox-issues-caused-malware#
- This is the official site of support of Firefox that is bound to the User Interface of Firefox browsers.
- This Mozilla document can not be an article on it, but still had 10s of thousands of views.
Is someone able to update this document or suggest other resources or document to include in the document of Mozilla?
Personally, I don't use a Mac. One point which can be exceeded in the Apple support document some of the references to the clams.
Is ClamXav graphic version is no longer free? (https://www.clamxav.com/changetocommercialsoftware)
There is also now a product available from how Malwrebyes 2015 is considered within the Apple community.
(Yes I realize that as Linux and Android, you will have less malware and adware issues than the MS OS)
- Anti-Malware for Mac https://www.malwarebytes.org/antimalware/mac/
It's free and (probably) equivalent Windows software is well regarded in the Mozilla community.
Thanks in advance,
Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.
1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.
It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.
The comment is long because the issue is complex. The essential points are in articles 5 and 11.
OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.
2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."
The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.
The following restrictions apply to XProtect:
☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.
☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.
As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.
3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).
Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:
☞ It can easily be turned off or overridden by the user.
☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.
Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.
For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.
4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked
Install the system data files and security updates
If it is not already done.
As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.
5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.
The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.
Software from a reliable source
☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.
☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.
☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".
☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.
Software that is clearly illegal or doing something illegal
Commercial software ☞ high-end such as Photoshop is "cracked" or "free."
☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.
Conditional or unsolicited offer from strangers
☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)
☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.
☞ You win a prize in a competition that you are never entered.
☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.
☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.
☞ Online everything that you expect to pay is 'free '.
☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.
☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.
☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.
☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.
I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.
The emergence of data "ransomware" for Mac was part of the defense against the attacks of backup all data. Since an infected machine could destroy its own backups, at least a backup unit must always be in offline mode. For example, you could turn your backup drives, keeping one with you or another site. This strategy also protects against a physical threat such as a fire or theft.
Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.
Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.
7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked
Stop the plug-ins to save energy
in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.
8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.
Although it may seem counterintuitive, you should never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.
Why you should not use products AV?
☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.
☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.
☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.
☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.
Using the software AV defines you for double exploitation: by hackers, malicious software, that the software does not protect you and the actual AV industry. The latter will often try to hang with a product free of appeal , so it can charge you for "improvements" later.
9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware. Also ignore any attempt to upsell you to a paid version of the product.
An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.
Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary.
A free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that requires to have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.
If you are just curious to know if a file is recognized as malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.
10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.
11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.
What software is better and safer to protect my Mac - OSX El Capitan 10.11.3? I was bombarded by MacKeeper advertising claiming recently that my Mac has "serious" problems and offering discounts of wholesale so that until recently the MacKeeper said my system was well protected and works well!
MacKeeper is considered malware: never install or use it. No Web site can analyze your Mac for "problems." If your Mac does not appear no matter what strange behaviour, it is not necessary to make "clean-up" operations
Hi, I have the strangest thing going:
all of a sudden all my apps wanted to use Keychain 'login '. I've had this problem several times on other Machines and fixed it by deleting the keychain of connection in Macintosh HD / Users/[userX]/Library/Keychains/login.keychain. I did it once again. (Moving the file to a folder on the desktop)
Then I rebooted my mac. Both my user accounts appear as expected. When I tried to log in to my user account, he gave me a Notification "OSX wants to access the Keychain 'local products' (or something similar) this time, it was the bunch of local products, which I hadn't touched." I clicked Cancel.
Now the system asked me to provide my password in iCloud. I thought that this is normal, because I just deleted my bunch of connection and will need to re-enter my password to iCloud.
But after that I have provided the password, the computer displays the screen "Setting up your Mac. (The same as you see when you install your mac directly on the box. the first two check marks appeared very quickly at first, but then the computer was stuck and just display the wheel.) And it is yet...)
***? I really hope that my system drive is not removed right now, because my BU time machine is not 100% of the latter. And although I did the whole process relatively fast, I am positive that I have has not confirmed something like "be careful, that if you continue, your system will be restored."
What is happening to me? Has anyone already experienced something like this?
I read in an article in apple support I should wait for the installation to the end, when it seems to be stuck, but it was about 45 minutes now. I will keep you updated on what is happening in the meantime, I'd really appreciate any thoughts on the subject... Thank you
(I apologize for my grammar, I'm not a native speaker)
Update: Okay, at the end of my day I seem to have beaten the problem, I write my Solution, maybe it helps someone in the future...
(1) I waited several hours and all, had no hope that my mac would get out of the rut of the screen 'set up your mac. But eventually he did...
(2) when the machine finally come off, I got the login screen. My second user account was not visible, only my admin... I tried to log in, but I come to the spinning wheel of apple for another hour or two until finally, I lost my patience and restarted strength.
(3) after pushing the power button I started in safe MODE. I was able to connect. Then I rebooted again normally.
(4) my machine worked but the problem with the keychain. He told me a hundred times, the login keychain is not found, and I hit "reset default" several times. Then I deleted the Keychain file again. There were two files: 'login.keychain' and ' login.keychain.sb - 6e45f1ef-el41hA. I rebooted.
(5) when you try to connect this time I received the same message as last time I deleted the keychain file: "OSX wants access to the 'local products' Keychain '. Cancel this time that I was NOT hit, but provided my normal login password. And Voila. I had to enter several passwords, but the Keychain Access does not annoy me more...
Hope this helps someone...
Hi, I have a macbook pro 15 "retina.
I got the cover of the keyboard (not cheap but decent), and I use it everytime I open my macbook.
However, I heard that it would be dangerous to leave the keypad cover when you close the macbook. Because it could hurt the sensitive retina screen.
Is this true?
Is it safe to leave the cover on my keyboard when I close the macbook? It's a little annoying move coverage of my keyboard everytime I have my macbook to opening / closing.
If it's dangerous, is there a cover keyboard without danger to the retina on the market?
Thanks for the help!
I have used Moshi Clearguard kb current covers on two MacBook Pro, including retina mid-2014, I usually use closed with my Apple display 27 ". I put KB covers on as soon as I bought computers and have never deleted without fingers never touched my keys. I did it because I saw how dirty the kbs in the Apple Store, and the seller told me that once the black keys are oily, it is impossible to clean completely. I started with a silicone rubber cap. Three weeks later, I threw it in disgust and I bought a Moshi to replace.
Moshi rugs are much thinner and lighter than the silicone rubber ones more adapted, hold their shape better, stay clear longer and are much easier to clean and type through. In addition to the one on my computer Ko, I keep one on the external Apple wireless keyboard which is always exposed on my desk. These caches really keep particulate crud, and they do not interfere with my typing at all. When they are dirty, I rub it in the sink with a detergent and a brush to vegetables, and when possible discoloration becomes noticeable after three or four years, I replace it with new ones.
My previous MBP, a Core 2 Duo late 2008 unibody model, allows to get much hotter than my current on occasion, and I fear sometimes that heat buildup between the lowercase and the display closed would cook the KB cover or even the screen itself. But that never happened, but I guess it might have helped if any yellowing of the coverage.
If use you Moshi hiding for seven years, I would never consider a time using a silicone back cover. I did not, and you shouldn't worry about all to close your view on a Moshi.
How to unlock your Mac with your Apple Watch?
my mac: MacBook Pro (13 inch, late 2011) MacOS Sierra 10.12
I can not found "Allow your Apple Watch unlock your Mac" in security and privacy
I don't know if someone else found this situation but I am not able to activate the function "allow your Apple Watch unlock your Mac" is enabled.
All devices are on the same Wi - Fi, all connected with the same Apple ID, password enabled on the watch, but still nothing.
I have the FileVault enabled on my Macbook Air. Does this influence
Verify that you followed all the steps here:
I installed macOD Sierra Version 10.12, iOS 10.0.1 and watch OS 3.0.
On my Mac, I have goto system-> Security & privacy-> general preferences
I don't see the option 'Allow your Apple Watch to unlock your Mac'.
The feature is available for the Mac from mid-2013 models or later:
I notice that netbios d wants to access the computer through firewall he.
What is a required protocol?
NetBios is the protocol used by the Windows file share to discover other computers using the same protocol. Do not allow this through your firewall.
Even if you don't want to allow access to a remote computer, it must be done via a VPN connection. You should not let any network of ports opened to the Internet unless you really have to. examples where you run a website or, of course, a VPN server.
If that rather than being a network-level firewall that is a device of protection for your entire network, is instead a software firewall on your Mac and protecting so just as Mac, then you will allows NetBios through so that other computers on your network can make Windows sharing files with you.
Someone has got this and how do I make Apple aware of this problem? I received a pop up on Google Maps with the following message. I suspect its malware but don't know what to do. The word is not the number. Does anyone know how I can send it to Apple or how to remove possible malware. My anti-virus did not show anything.
That's what said the pop up and he showed this in the address of the tab box: virus - zyd.co
* ATTENTION Comcast Cable Communications Inc. user: your Apple Macintosh has been blocked *.
Apple Macintosh system alert!
System was infected due to an unexpected error! Please contact technicians certified Mac 1-855-217-0780 immediately! unlock your computer.
Detected suspicious activity. Your browser might have been hijacked or hacked.
ANONYMOUS ACTIVITY: 220.127.116.11
Private and financial data is at RISK:
Your credit cared details and banking information
Your passwords of e-mail and other passwords
Your Facebook, Skype, AIM, ICQ and other chat logs
Your private and family photos and other sensitive files
Your webcam can be accessed remotely by stalkers
CALL IMMEDIATELY THE MAC APPLE CERTIFIED TECHNICIANS AT 1-855-217-0780
MORE INFO ABOUT THIS INFECTION:
See these pop up means you might have a virus installed on your Mac that puts the security of your data personal at serious risk. It is strongly recommended that you call the above number and get your Apple computer inspected before you continue to use your connection internet, especially for shopping or banking.
Contact Apple certified Macintosh technicians on 1-855-217-0780
Please read Phony 'technical support' / 'ransomware' popups and web pages for a description of the solution, this very common scam. These fraudulent popups are easily implemented, distributed inexpensively and can affect any computer running any browser. Apple has no interest in these things, shouldn't you. Just ignore it.
My anti-virus did not show anything.
There is no advantage to perform a "virus scan" on a Mac and a considerable number of potentially harmful effects. This waste should not be used on a Mac. Please read of effective defenses against software malware and other threats.
My Mac said I 7 138 photos and 271 videos and she mentions your Mac storage is full 472 points to download. What does that mean? How to free storage? Also how can I check my storage?
How can I check how much storage I have. My Mac said I 7 138 images and videos and said 271 then your Mac storage is fully 472 points to download. How to make
I have free storage?
In safari, connect to iCloud.com can click on the gear icon - it will show the storage utilization and availability - I expect that you will buy n = more storage iCLoud
Here's the whole thing:
An unknown service (port 266877) starts on your Mac.
If you do not change the settings of the firewall, the firewall blocks the connection to other computers
to this service on your Mac.
Then, there are these choices
Allow all connections to this service.
Allow local network connections.
Deny all connections to this service.
Do not change firewall connections.
SBN application > launched
Port 26877 (unknown service)
Is there an Ant Norton/Symantec software installed on your Mac?
If so, my suggestion is that you uninstall the Norton software according to the seller instructions to uninstall.
Maybe you are looking for
This morning at 5:00 I tried to check the weather on my phone, but after you have unlocked my phone with my mark, I was asked to reset my password iPhone. I've never seen a guest like this before. To reset, I had to enter my current password. I locke
I have the attached labview, the settings on a variable diagram and shared block. In my project I have a cRio who is using the analytical engine and signals some time RTD. in my computer, I have a shared variable that I have an alias to the scan on
Tonight, I tried several times installation/connection to the wireless Lexmark Professional 6600 series printer but every time the printer message said installation failed. Why? What should I do to connect to this printer? Title: original printer I
I have a hp Pavilion g6 that guard showing disabled code 75799982 when I try to put the password in 3 times someone can help please
I tried to install I-tunes on my system and I'm unable to do - I have the following error: the system administrator has set policies to prevent this installation. I tried to follow different directions to fix this - who usually start by uninstalling