Why this Article says only those Macs or newer you can do. I know that isn't true.

For example my late 2007 MacBook can do if we talk about EFI or my iBook firmware if you include open firmware. With regard to the methods in the former article Macs it do the same thing, but it shows that they can do.

What in the world are you talking about? Writing an effective communities of Apple Support question.

Tags: Mac OS & System Software

Similar Questions

  • "This copy of Windows must be enabled before you can login."

    We have a laptop with Windows XP we have used for a while without problems.  All of a sudden, we get a box to activate product windows that we never had before, demanding that "this copy of Windows must be activated before you can connect."  No new software has been installed recently, so this seems very strange.  Is this a virus or is it true?

    These steps will work as long as the PC has only one user profile, and to Internet Explorer 8 is installed.

    In my case, I:
    (1) the steps already listed here, with an adaptation: safe mode: command prompt
    "Start in"Safe Mode".  To do this, turn on the laptop, and then press F8, as it is booting up.  Passes in 'Safe' Mode by selecting the option 'Safe Mode'. * Safe Mode command prompt *.
    Once you're on the office in 'Safe Mode', click 'Start' then click on 'run '.
    At the command prompt run type the following EXACTLY

    Rundll32.exe syssetup, SetupOobeBnk

    (2) restart the PC and start back in Safe Mode command prompt.
    (3) on a separate computer, download IE8 for WinXP and put it on a USB key. I renamed the file IE8install to make it easier later.
    (4) plug the USB on the problematic PC
    (5) in the command prompt installing IE8. Your USB drive letter may be different. If e: does not work, try f: etc until you find the right one.
    type e: * enter *.
    ie8install.exe * enter *.
    (6) complete the installation, restart the PC, and you should be good to go.
    I thank everyone in this thread for their help. He points a headache hours.
  • Microsoft says my Windows 7 key is not authentic, but I know that it is.

    Microsoft says my Windows 7 key is not authentic, but I know that it is. I bought Windows 7 upgrade of a person for $200 and the package seems authentic. I ran diagnostics & it says timeout.

    Hello

    I suggest refer you to the link below and check if it helps.

    Genuine Windows: Frequently asked questions: http://windows.microsoft.com/en-US/windows/help/genuine/faq

    Hope this information is useful.

  • I am interested in tutorials online on parallax scrolling websites but I have a version completely updated Adobe cloud. I'm on Windows 8.1 but my Muse is not the menu 'fill/scroll. Why? Is it only a Mac option?

    I want to create and offer a scroll for a customer of restaurant Web site, but I'm confused by online tutorials that show a drop-down list with filling or scrolling.  I checked the edits, but I'm perfectly up-to-date.  Anyone know why I can't access this drop-down menu please?

    Hello

    This menu is available for MAC and windows.

    Are you not able to see menu ' Fill/scroll' or scrolling of this section are gray?

    Please elaborate more on what you're trying to do. You can also share a few screenshots for better understanding.

    Concerning

    Vivek

  • On my work pc, I can't click on the links at the top of the screen while using firefox. This "dead zone" only affects the top 20% of the page, while below that I can click on all the links.

    This does not happen on my laptop or any other my work computer program works.

    This problem can be caused by that extended the Yahoo! toolbar or extension of Babylon also well down and covers the top of the browser window and therefore links and buttons in this part of the screen not clickable.

    Start Firefox in Firefox to solve the issues in Safe Mode to check if one of the extensions or if hardware acceleration is the cause of the problem (switch to the DEFAULT theme: Firefox/tools > Modules > appearance/themes).

  • Why used the Adobe Illustrator free trial download? How can I fix anything that's Going Wrong?

    I click on "Download trial" for Illustrator on the Adobe while website that logged into my account. He asks to open creative cloud and I click 'OK' but nothing then load it in the 'Applications' tab in the creative clouds. Nien downloads is. Creative cloud was already installed on my computer because I've used the free trial version for InDesign.

    Why is this happening? Are there not enough space on my laptop to download this app? This was very frustrating and I would appreciate any kind of help, thank you!

    I needed to update the software on my Mac

  • I use Foxfire that my server with my Mac 'Mini' but you can not download the Foxfire current upgrade.

    Several months ago, I bought the Mac Mini desktop computer and use Foxfire as my server. I wonder constantly update my Foxfire, but am not allowed to connect to the Foxfire server even if I'm already connected. What is my solution?

    If he has problems with the update or the permissions then simpler is to download the full version and trash the version currently installed to do a clean install of the new version.

    Download a new copy of the Firefox program and save the file on the desktop disk image (dmg)

    • Trash the present application Firefox to do a clean (re-) install
    • Install the new version you downloaded

    Your profile data is stored in the Firefox profile folder, so you will not lose your bookmarks and other personal data if you uninstall and (re) install Firefox.

  • Firefox on this PC doesn't remember stored passwords. You can check the "remember box" several times, but each time is like the first. Any ideas?

    Firefoox 8.0
    Windows Vista

    Websites to remember you and automatically log you on are stored in a cookie.

    • Create a cookie exception allow (Tools > Options > privacy > Cookies: Exceptions) to keep such cookies, especially for sites Web secure and if the cookies expire when Firefox is closed.

    Make sure that you run not Firefox in private browsing mode.

    Do not use clear recent history to erase "Cookies" and "Site preferences".

    Compensation of the "Site Preferences" clears all exceptions for cookies, images, windows pop up, installation of software and passwords.

  • You used to be able to scroll through the story of a tab with an arrow on the left of the screen to see all the pages that you have visited on this tab and now it is absent. You cannot select a page that has been perhaps 12 clicks back now.

    If I am on a site and click on several links on the page, I want to be able to look at the history of my clicks and return click earlier - as the second or third one instead of hitting the button arrow 12 times. You used to be able to get a history of drop-down list of all clicks on a tab - it has gone now and it is really annoying.

    There is an arrow to the left ("back" button). Click and hold down and after a second, you will have a list of the tab history. You can then select the page you want from there.

  • There is an email circulating saying sound of microsoft on the transfer of some messages to your friends and microsoft will pay you I want to know if it's true

    Subject: Fw: Fwd: FW: PLLLLEEEAAASSSEEE REEAADDD! IT IS ON GOODMORNING
    America

    It's a hoax.

    Bill Gates sharing his Fortune! -Urban Legends:
    http://urbanlegends.about.com/library/blmsaol.htm

    Snopes.com: Microsoft/AOL Giveaway:
    http://www.snopes.com/InBoxer/nothing/Microsoft-AOL.asp

    Microsoft email beta Test Hoax continues:
    http://www.Hoax-Slayer.com/Microsoft-Beta-test-hoax.shtml

    Don

  • Article update: Harden your Mac from malicious software attacks

    Sorry if this is posted in the wrong place.

    Article

    Harden your Mac from malicious software attacks

    Harden your Mac from malicious software attacks

    Seems to be outdated. ( Changed the: July 12, 2013 19:28 46816 views )

    It is the Firefox Mozilla Knowledge Base article

    Note

    • This is the official site of support of Firefox that is bound to the User Interface of Firefox browsers.
    • This Mozilla document can not be an article on it, but still had 10s of thousands of views.

    Is someone able to update this document or suggest other resources or document to include in the document of Mozilla?

    Personally, I don't use a Mac.  One point which can be exceeded in the Apple support document some of the references to the clams.

    Is ClamXav graphic version is no longer free?  (https://www.clamxav.com/changetocommercialsoftware)

    There is also now a product available from how Malwrebyes 2015 is considered within the Apple community.
    (Yes I realize that as Linux and Android, you will have less malware and adware issues than the MS OS)

    It's free and (probably) equivalent Windows software is well regarded in the Mozilla community.

    Thanks in advance,

    John

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    The emergence of data "ransomware" for Mac was part of the defense against the attacks of backup all data. Since an infected machine could destroy its own backups, at least a backup unit must always be in offline mode. For example, you could turn your backup drives, keeping one with you or another site. This strategy also protects against a physical threat such as a fire or theft.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Although it may seem counterintuitive, you should never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    Using the software AV defines you for double exploitation: by hackers, malicious software, that the software does not protect you and the actual AV industry. The latter will often try to hang with a product free of appeal , so it can charge you for "improvements" later.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware. Also ignore any attempt to upsell you to a paid version of the product.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary.

    A free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that requires to have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is recognized as malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • My Airport Express will randomly start flashing orange and I have to unplug it to make it back to the green.  Wifi continues to operate even when the light is orange flashing.  Anyone know why this is happening?

    My Airport Express will randomly start flashing orange and I have to unplug it to make it back to the green. Wifi continues to operate even when the light is orange flashing. Anyone know why this is happening?

    The next time you see the flashing light amber...

    Open Finder > Applications > utilities > AirPort Utility

    Click on the image of the AirPort Express

    If you see a button update, click on update the firmware on the airport

    Otherwise, find status and click on the little orange dot it. A message will appear to say why the airport complained and suggest a remedy for the issue.

  • I can't see the images received by using my Yahoo email in my MacBook Air, but I can see them in my iPhone 6, no idea why this is happening?

    I can't see the images received by using my Yahoo email in my MacBook Air, but I can see them in my iPhone 6, no idea why this is happening?

    Hello

    If you access your Yahoo mail via Mac Mail application, in the Mail menu bar, click Mail > Preferences , and then select the display tab to assure you that:

    Display remote messages HTML images is selected.

  • Why can't I get help from this program? ___The help for this program was created in Windows Help format, which depends on a feature that is not included in this version of Windows.

    Cannot run files .hlp in Windows 7

    No, it is not included. Click Start, then type Winhlp32.exe, and then press ENTER. You will get a help dialog box that says:

    Why can't I get help from this program?

    The help for this program was created in Windows Help format, which depends on a feature that is not included in this version of Windows. However, you can download a program that will allow you to view help created in the Windows Help format.

    For more information, go to the Microsoft Help and Support site.

    Messages rating helps other users

    Mark L. Ferguson MS - MVP

  • PROBLEMA: PHOTOMERGE NOT RUN! AND GET THIS ERROR MESSAGE: ERROR 22 WINDOWS NOT HAS DI A COSTRUTTORE LINEA 388 VAR W = NEW WINDOW (RES) PLEASE, IF POSSIBLE, HELP ME. THIS PROBLEM IS ONLY WITH WINDOWS 10!

    Adobe Photoshop version: 13.0.1 (13.0.1.3 20131024.r.34, 2013/10 / 24:21:00:00) x 64

    Operating system: Windows NT version: 6.2 Architettura di sistema: Famiglia CPU AMD:15, Modello:10, Stepping: 0 con MMX, SSE Intero, SSE FP, SSE2, SSE3

    Fisico processore Conteggio: 6 Velocità processore: 3214 MHz

    PROBLEMA: PHOTOMERGE NOT RUN! AND GET THIS ERROR MESSAGE: ERROR 22 WINDOWS NOT HAS DI A COSTRUTTORE LINEA 388 VAR W = WINDOW (RES) NEW

    PLEASE, IF POSSIBLE, HELP ME. THIS PROBLEM IS ONLY WITH WINDOWS 10!

    Hi biagiob,

    Seems that the operating system is obsolete.

    Photoshop CS6 has not been tested on Windows NT in accordance with this article: Photoshop system requirements

    Suggest you to see this link to the similar problem: Photoshop: Err: "window 22 has no constructor" (Win 7/64 bit)

    Kind regards

    Claes

Maybe you are looking for

  • What are the .isdata files? Is - this malware?

    I recently found a sudoers file on my 2015 Macbook Air 13 "(1.6 GHz Intel Core 5/Mem 4 GB 1600 MHz DDR3) El Capitan 10.11.6 who took control of my HD and my cable modem. I was able to fix these problems (with the help of this forum, thank YOU!) but I

  • Vine.co does not load in Firefox

    I use Windows 7 64-bit, the latest version of Firefox. www.Vine.co does not charge, it shows just the loading circle that you can see in the file attached, forever.The site load very well in other browsers. I tried to load the website with different

  • fill a NIC four-port with built-in port

    Hello everyone, Recently, we bought a NIC four ports to be able to work without a switch. Previously, this is how we have worked: * 4 camera (Allied Manta G201C) * camera is triggered (rising edge) separately, but almost simultaneously. * PC: quadcor

  • HP Photosmart C6380 all-in-one intermittently print job does not print

    My HP Photosmart C6380 all-in-One has a problem with the print jobs that fail intermittently to print the first time that I send it to the printer.  I can see the print job listed in the queue, but it fails to print.  I might have to send the job onc

  • Computer not reading USB key not

    I have my jumpdrive connected to my computer. my computer recognizes it is there, but when I press it to enter it says I need to "insert into removable disk f" how to open my files in my jumpdrive?