Need help! Found a RSA-4096 in a shared dropbox folder,

It's a ransom malware virus

I disconnected and removed the file.

can anyone advise on the next steps?

I've not seen it in any of my other files so far! probably one of my colleagues that he had in his computer

What can I do to protect my computer, should I worry? I have a macbook pro, y at - it software that allows to clean my

can anyone advise on the next steps?

Get rid of your software "anti-virus" without value.

I have a macbook pro, y at - it software that allows to clean my

Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

The comment is long because the issue is complex. The essential points are in articles 5 and 11.

OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

The following restrictions apply to XProtect:

☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

☞ It can easily be turned off or overridden by the user.

☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

Install the system data files and security updates

If it is not already done.

As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

Software from a reliable source

☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

Software that is clearly illegal or doing something illegal

Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

Conditional or unsolicited offer from strangers

☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

☞ You win a prize in a competition that you are never entered.

☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

☞ Online everything that you expect to pay is 'free '.

Unexpected events

☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

Stop the plug-ins to save energy

in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

Why you should not use products AV?

☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

     London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

Tags: Mac OS & System Software

Similar Questions

  • Need help with LogonUI.exe - entry point not found error

    Apparently my IT cannot resolve this error. Reason of the Department was that, sometimes, the password cannot be captured.

    The following error came up:

    LogonUI.exe - not found entry point

    the procedure entry point IsAdditionalKeyFileAvailableFromKernel could not be located in the dynamic link library sdd.dll

    Is there a way to fix this?

    Hello

    In addition to the steps provided by Deepak K prajapati, you can also see this link: Entry Point not found for more option.

    Let us know if you need help.

    Kind regards

    Tiero Chi

  • Need help to reinstall itunes

    Recently had to withdraw Windows 10 votes against 7, on doing so, iTunes didn't work.  I tried to remove iTunes, but get an error not found the path iTunes6464.msi. So I can't uninstall.  I tried to download the latest version, but when it comes to uninstall the old version it fails because it cannot find this file.  Need help to remove and reinstall so it can connect again my devices.

    See this user of ASC. See the section on deleting and reinstalling iTunes.  Troubleshooting problems with iTunes for Windows updates

  • I'm suddenly needing help with my browser Firefox (6.0.2)

    Hello
    I'm suddenly needing help with my browser Firefox (6.0.2)

    (OS: I use Windows XP).

    When I open the browser, I don't see is a totally white screen of white, with all the toolbars at the top.

    I know that my physical connections are very good: I have tested the modem, turned the pc market etc and I can also receive/send emails.

    This problem started today, September 8, 2011 and has never happened before.

    Is it a coincidence that Firefox itself to day before I disconnected yesterday evening? Could this be something to do with this particular new update?

    I also noticed that just before I "opened" Firefox, I now get a small box indicating:

    [JAVASCRIPT APPLICATION]
    Handl exc in Ev: TypeError: this oRoot.enable is not a function

    This never appeared before - I hope that it offers a clue has what is wrong.

    The browser not be stuck in Mode safe, said by the way.

    Of course, I can't find solutions to the problem on the internet, I don't physically see all Web sites!
    (A friend sends this request in my name from their pc)

    Any light you can throw on this problem of confusion would be much appreciated. I'd rather not have to uninstall and reinstall Firefox if possible.

    If the only option is to uninstall Firefox and reinstall from your site, I'm also in trouble (I can not see the internet or download).
    In this case, would you be able to send the .exe file as an attachment to my e-mail address? In the affirmative, please let me know and I'll give you more details.

    Thanks in advance.

    One possible cause is security software (firewall) that blocks or limits Firefox or plugin-container process without informing you, possibly after the detection of changes (update) for the Firefox program.

    Delete all rules for Firefox in the list of permissions in the firewall and leave your firewall again ask permission to get full unlimited access to the internet for Firefox and the plugin-container and the update process.

    See:

    Start Firefox in Firefox to solve the issues in Safe Mode to check if one of the extensions of the origin of the problem (switch to the DEFAULT theme: Firefox (Tools) > Add-ons > appearance/themes).

  • Need help updating Bios dc7800 Compact Mini Tower: ROM CAB missing or damaged

    I need help, updated the BIOS on my HP dc7800 CMT. I get this error message:

    System BIOS updte file (. C:\Users\f\Downloads\ROM CAB) is missing or damaged. THE system BIOS does not update.

    I tried to update using the sp53611.exe (8.0 MB) 1.32 Rev A(6 Dec 2011) HP Compaq Business Desktop system BIOS (BIOS 786F1)

    Which can be found here.

    http://h20564.www2.HP.com/hpsc/SWD/public/detail?sp4ts.Oid=3459243 & swItemId = vc_97114_1 & swEnvOid = 4059

    The current version of my BIOS is: 786F1 v01.04 2007-07-18

    I am running Windows 7 64-bit Ultiate. I noticed on the page (linked above) software, it mentions most of the flavors of Windows 7 64-bit, but it does not mention Win 7 ULTIMATE 64-ditch.

    Here's what I did:

    (1) computer restarted in safe mode

    (2) connected as administrator

    (3) Task Manager began to ensure that all applications and most of the services have been arrested

    3 (a) as an additional precaustion, I even stopped Windows Defeneder

    (4) double clicked on sp53611.exe and let it install the software.

    (5) This opens a web page. I clicked on the link which was under the Bio update to a windows environment.

    (6) the process has started, but then I got the above error.

    Any ideas on what to do next?

    Is it possible that the BIOS cannot be updated because the software does not support windows 7 64 bit ULTIMATE?

    Thank you in advance. I have a new graphics card today (Radeon HD 6570 - who has been recommended by Mr. Paul Tikkanen, thank you), and I guess I should have my current BIOS a bit, no?

    Hello:

    There should be no need to update the BIOS, if everything is working properly.

    If you want to update the BIOS, you must use the built in Flash ROM of system menu in the BIOS.

    It is the safest and easiest way to Flash the BIOS.

    All you need is a USB stick formatted with the FAT 32 file system.

    Download the latest BIOS update, then run it.

    You should get a page of instructions.  On this page, you want the option F10 system flash rom and you should see a summary of BACK flash folder view.

    Copy all the files in this folder on your USB.

    Plug the drive into the usb port, restart the PC and at the beginning of the HP welcome screen, press the F10 key to access the BIOS.

    There will be a menu to System Flash ROM

    What to choose and it should see the BIOS update files on the usb flash drive.  Then follow the instructions on the screen to proceed to the update of the BIOS.

  • Need help with settings - wifi extension

    So I need help from networking. I have xfinity for my internet with a router/modem from arris tg1682g. However, it is located in a horrible place. So I run Ethernet to a central point and connected to an AirPort Extreme (latest version). Extreme, I ran Ethernet in the basement and connected a first gen express. I also have a second express gen located in the rooms upstairs.

    the extreme and express it is defined to extend the network, however the signal keeps a fall or be slowed down significantly even when you are inches apart. When I got the arris in bridge mode and the extreme to create the network and expresses it to extend everything worked fine. However, we have the security to the House installed xfinity, and they took the arris off mode bridge because they do not allow me to use the extreme for the security system. Since then, I got nothing else problems with my internet connection. It is either significantly reduced performance (up to 18mbps 150mbps).

    I also get error messages that the network is not found on the airport connected Ethernet devices.

    It has been very frustrating because the people Comcast it is horrible. So, any help would be greatly appreciated. Thanks in advance.

    https://discussions.Apple.com/message/29878786#29878786

    https://discussions.apple.com/thread/7195783 - is it possible to use the apple Time Capsule as a range extender?

  • Need help with the decision of the laptop

    I'm sorry for the length of this post, but I really need help. I am buying a laptop and what should be a very exciting perspective (my first laptop purchase) turns into a nightmare that had me pretty much in tears over the weekend.

    My budget is not big - absolute maximum of 600 pounds, but I'd rather spend a little less than that.

    I mainly work of office (Word, Excel, database and PowerPoint) and also some Photoshop work. I also play a strategy game called Caesar 3. I want to charge my copy of XP on the computer or replace Vista or as a partition.

    Looking through the available templates in my price range and rising benchmarks, I found the following:

    Most have processors such as the Intel T5250 or T5450 or AMD TL 58, which are all rated as ok, but not very well. Some have the AMD TL 60, which is a little better and one or two have the T7200 Intel which is even better.

    On most of the machines graphics cards are the ATI Radeon Xpress X 1200 or the Intel GMA X 3100. These two are calibrated as not terrible and the review says that they cannot manage strategy games. Some of the models have the ATI Mobility Radeon HD 2400 and HD 2400XT and one or two have the HD 2600.

    The problem is that the models that have the best processor have the lower rated graphics card and those who do not have XP drivers, I see.

    Don't mind a 15.4 screen "(although the 17.1" would be very nice to have) and want a pretty big hard drive (160 +). I get 2 GB of RAM.

    I'm at my wits end. I don't want to buy a computer that will eventually take a minute or more to refresh a screen when you have more than two things open, or you will have to keep rebooting to make it work. I want to be able to play my one and only (Caesar III) game which is a strategy game and I want to be able to work in Photoshop and maybe one or two other things open at the same time, as a website perhaps.

    Help me please, anyone. I asking the impossible? I can't get my hands on an email address for Toshiba try to get clarity on their part on the issue of drivers and they will be available in the future.

    Then there is of course the issue detailing as each stock only a limited number of models, and we must choose between those detailing.

    I hope someone can help me!

    Hello

    The problem is you want to buy a laptop all over the place but don t want to spend a lot of money.

    In addition, you want to change the XP operating system and have XP drivers.

    Well it's boyfriend very difficult decision ;)

    A laptop for gaming with the graphics power full card cost slightly more than £ 600
    If you need to make a decision; You want to buy a gaming laptop and to spend more than £ 600 or you will have a notebook that is ideal for everyday use, like watching DVDs, in collaboration with the office software, etc.

    The Caesar game is unknown to me, but I assume that it doesn t need a graphics card high performance and it should work on a normal phone too.

    I think that a Satellite a200 is not bad choice for you, because some A200 laptop computers were shipped with the Intel Pentium Dual-Core processor and an NVIDIA GeForce graphics card.

    And very important is that all the XP drivers were already released ;)

  • List of Satellite A200 drivers... Need help...

    Ok.
    I need help with this...
    There are some things in the list that I don't know where to find them...:

    8 step by Step Interactive Training (Pro) for the ENG version
    Module 9 SLP OEMSLP2.0 (523759)
    10 Microsoft .NET Framework V1.1.4322 (SR1)
    11 Sun Java 2 Runtime Environment V1.6.0

    And this one, I guess I have to replace with the ATI driver:

    13 Intel VGA driver 6.14.10.4833 965GM

    And this one I don't know:

    22 iMSM.reg 20070512

    Of these two, I can only find the first condition in the drivers download page:

    Monitor 27 Bluetooth V3.01 (Build20070215)
    Bluetooth Stack for Windows by Toshiba V5.10.06T 28

    What about this:

    V1.0.0.1906C Fn-esse TOSHIBA 36

    In any case, there are a lot of things in the list that do not exist in the drivers download page...
    I don't know what's wrong, but it is not very useful.

    And after putting the drivers I find _can_, I always get 2 points mark in the Device Manager...

    ? -Audio device on High Definition Audio Bus
    ? -PCI memory controller

    So, any help would be useful.

    Thank you...

    I put t really know what your problem is.
    All the XP drivers are available on the Toshiba page!

    > iMSM.reg 20070512
    It's the Intel Storage Manager! Can be found on the page of Tosh too!

    > 27 Bluetooth Monitor V3.01 (Build20070215)
    > Bluetooth Stack for Windows by Toshiba V5.10.06T 28

    BT monitor can be found on the Toshiba driver page.
    The stack of BT here:
    http://APS2.toshiba-tro.de/Bluetooth/

    > 36 TOSHIBA Fn-esse V1.0.0.1906C
    You need the Hotkey Utility allows you to use the FN keys! But note; v.5.2 BIOS for XP must be updated!

    >? -Audio device on High Definition Audio Bus
    It is his driver. It can be found on the page of Tosh too!
    You can also use the audio driver from the Realtek site.
    Notes; MS (patches) KB888111 and KB835221 patches must be installed!

    >? -PCI memory controller
    Follow the Flash Media Driver and Chip Set Utility have been installed

  • com Closing force Motorola.contact... Need help

    Well, I looked around the internet and found that this issue has a lot of people lately. Some say it's a problem with Facebook. I uninstalled it and Messenger FB, nope didn't fix it. I heard that it is a LEAK version Google + app. I don't load Google + app and also could not find it on my phone in manage applications. I still don't know what to do. I got lost. I need HELP please. I don't want to lose my contacts. Take GD for a long time to put them in even with fuzzy or Google.

    Taz

    Maybe I have something here. I recently installed the soft of MS Outlook. That's when my contacts has stopped working. I uninstalled my Hotmail and Outlook apparently and restarted the phone. Contacts still do not work. For some reason, I decided to reinstall the Outlook application. After that I did it, I again was able to access my contacts!

  • Display settings S920 missing page, need help

    Hello

    I have a strange problem with my phone S920 and need help.

    First I describe that I made:

    I bought two phone weeks and first install update "by air" (from the settings menu, "System Update"). The current version number is S920_ROW_S117_130815. After that, I set the settings on the phone, insert the SIM and SD card and started to install applications. When I found that photos from my SD card are not visible in the gallery. He won't get the images in the external SD card. I can see all the files on this map in the file browser and open, but the Gallery shows only a few files from SD internal tried to force to re-scan of the media files. Finally, Gallery shows all the photos, but I found some files on my SD card had size = 0 bytes. SD card was probably not properly disassembled during a new analysis. I've wiped the SD card in settings of the phone and coppied all data to the SD card in my PC. And re-scan again. Now all the files was correct and all images is vissible in the gallery. But a few days later, I found that I can't run page display settings. I tried to access to this-> all the settings, fron-> display settings but received a message "Unfortunately stopped Control Panel:

    OK, I noticed that my problem disappeared after I disabled my live wallpaper. Let me tinker some more...

  • Need help for optical safety circuit.

    I buy these parts and prototype with real components, but since I multisim, I thought it would be nice to create the circuit and maybe work through issues I can practically.

    I need a circuit that takes 120 VCA, generates 5 VDC and 1.5Vdc power of optical transmitter and receiver.  I actually use a data port because he has great range and is pretty cheap.  Rather than send the binary code well I just send a light stead that is broken or not broken through doors and windows in my house.  Then the receiver sees this as an entry and order a relay.

    I tried several voltage regulators that come with multisim, but I get an error of execution of my circuit.  Really I can't the 120 VAC to power levels necessary for the functioning of the optics.

    Otherwise I might want to run on a system 120Vdc with battery backup, so throw a 120Vdc up to 20 v DC switching power supply - but I have not found a SMP in the library which takes 120 as input and as output 20.

    Basic plan: 120VAC source-> transform to 24Vac-> Full bridge rectifier to ~ 20 v DC-> voltage capacitor filter on the input of two voltage regulators (1 to 5 VDC, 1 to 1.5Vdc) - then circuit since the two power supply of the transmitter and the receiver.

    I just need help for 5V and 1.5V, from there, I know that the real world circuit will work component tests already carried out.  Thanks for reading.

    I didn't Multism so I can't advise you on the compatible models. I ran the model on semiconductors with slight modifications of format on my SPICE simulator based on Berkeley Spice 3f5. I had to change the format of model resistance semiconductors appeal but has not changed any values.

    The output of your power supply circuit 3 (with 5 V, not the 1.5 V regulator regulator) was 4.99995 V.

    There are a few messages about changing templates published for compatibility Multisim woth. You can search those to see if there are any suggestions on what you'll need to fix in the model.

    Lynn

  • HP C4580 not scan to PC. I need help to configure my Netgear router please :)

    Hello

    I've read here, the threads that talk about this printer prints only not to or from a PC - my problem is that the C4580 go scan from my PC, but will not scan to PC.

    I found an answer from someone who has had the same problem earlier this year, but I do not understand what to do.

    Here's the answer:

    "I have ordered mine entering the settings from my router (Netgear) page and setting the built-in firewall rules. "The internal firewall was blocking the printer, I could print, scan using the computer, just could not scan from the printer to the computer.

    Also, I have a Netgear router, but could do with help on how to do the same thing as the person above.

    Thanks in advance for any help!

    Sorry, I don't need help after all

    It was not the router requires a configuration, it is the firewall that was a block that should be changed to "allow".

    My "all-in-one" now does everything it is supposed to do

  • Need help to create a new Xbox account

    I deleted my Xbox Live account, a long time ago and I want to create a new. My old Xbox Live account is associated to my the Microsoft Account. But when I want to create an Xbox Live account, it says I have one using my that already have Microsoft Account. I'm sure I deleted my Xbox Live account and when I go on my Xbox Live account in the Internet, it says this, "Uh oh... that shouldn't happen." It seems that you have found a bug in the system. Please try again later. "I need help, I really want to create a new Xbox Live account using my course Microsoft Account. Thank you.

    Hello

    Your Question is beyond the scope of this community.

    I suggest that repost you in the correct forum.

    'Home'

    http://forums.Xbox.com/

    "Xbox forums.

    http://forums.Xbox.com/xbox_forums/general_discussion/f/3817.aspx

    "Xbox Forums directory.

    http://www.Xbox.com/en-us/forums

    See you soon.

  • Curve adjustment not linear need help

    I need help, try to fit a set of data that require the use of a non-linear curve.  I have attached a txt file that contains the data that must be mounted.  The first line contains the values of the x axis, while the second line contains the values of the y-axis.  The model of this set of data can be described by a single parameter, has, for the first five data points.  The rest of the data points can be described by the model of A + A1 * exp ((0.4-x)/A2), where A, A1 and A2 are all the parameter.  As you can see both models share the A setting.

    I determined the initial values for each of the parameters: A = 176,32, 2133.4133 = A1 and A2 = 1.4936.

    The last, I spent two days trying to understand how to use the non-linear curve of Lev - Mar good vi but have had little success.  I did programming LabVIEW for many years and I've never felt as lost, as I now try to understand how the curve nonlinear Lev - Mar is vi works.  Any help you can provide my editing data would be greatly appreciated.

    Thank you.

    -Alonzo

    I think the problem is that the first 5 points are not part of the data sent to Lev - Mar.  For this reason the process adjustment very well suited to the remaining data, but the term constant is able to move freely.  I modified the model function to output A to the first 5 terms and full for the rest.  The found offset is now more reasonable.

    In addition, your quote your model to A + A1 * exp ((0.4-x)/A2), but which is implemented in the VI model seems to be A + A1 * exp ((x-0.4)/A2).

    -Jim

  • I get error code 800b0100... I need help... as soon as possible...

    I need help!... I'm not that computer savvy, but I get the error code... 800 b 0100... I can't figure out the devil to do!... just as I think I found it... it just got an error... help please!

    Error message when you try to use Microsoft Update or Windows Update Web sites to install updates: "0x800B0100.
    http://support.Microsoft.com/kb/956702
    TaurArian [MVP] 2005-2010 - Update Services

Maybe you are looking for

  • Adding signature information

    I can activate the signature feature and specify where it goes, but where to enter I want the signature?

  • Impossible to change my Skype password somehow!

    Hello! I tried to change some of my preferences on Skype Online including password, email address and telephone number. I remember my Skype name or it's password that I created a long time ago. So, I signed up using the Microsoft account. And then I

  • Sort to run VI s real time?

    Good evening First of all, I am fairly new to LabVIEW and NXT programming, so I hope this isn't a stupid question. Right now, I have this little VI, to help me to pass along an absolute scale robotic arm. When I hit the run button, the value of the b

  • Is it possible to filter design on FPGA reconfigurable on the fly?

    Hello world I wonder if it is possible to design multi-channel filters on the FPGA reconfigurable on the fly? For example, it is possible to have X bandpass filters in an iteration, and Bandpass Filters Y with different specifications in the iteratio

  • par2j.exe running

    Hi guys. I'm trying to run an exe (par2j.exe). The problem is to get the syntax right cmd and in the right order. I followed the syntax of command supplied with the exe file, but I can't understand it. I created an image recovery files for test purpo