Mac OS X

14K

Solutions

11K

Contributors

Mac OS X is the desktop operating system from Apple Inc., found on Macintosh computers. OS X consists of a Mach/BSD-based kernel, operating system interfaces primarily based on FreeBSD and additional frameworks (written in C, C++ and Objective-C providing user interface and application-level services.

Share tech news, updates, or what's on your mind.

Sign up to Post

Advice on upgrading to macOS Catalina.
0
LVL 23

Author Comment

by:Peter Hutchison
Some Good News, Sheepshaver is now Catalina Compatible, so you can now run your old classic MacOS emulators!

See http://www.columbia.edu/~em36/macos9osx.html
1
LVL 23

Author Comment

by:Peter Hutchison
Update on my Catalina installation. I have removed my dual booted Catalina installation and upgraded from Mojave to Catalina. It took a few hours but finished ok.
A few things to note: Microsoft Office 2016 (v16.16.16) is working, so I do not need to upgrade to Office 365 or 2019. I must have used an old version when installing on the fresh install of Catalina.
Microsoft Lync and McAfee Endpoint Protection 2.3 are also incompatible, so they will be removed. You have to use the correct uninstall procedure for Endpoint Protection via Terminal shell (run  sudo /usr/local/McAfee/uninstall EPM ) or manually remove it.
All other programs are working including Adobe Dreamweaver 2019 which was previously installed.
1
Exploring SharePoint 2016
LVL 19
Exploring SharePoint 2016

Explore SharePoint 2016, the web-based, collaborative platform that integrates with Microsoft Office to provide intranets, secure document management, and collaboration so you can develop your online and offline capabilities.

A great idea of a USB Flash Drive that caught my eye in an advertisement I read on Facebook -- but how good is it? I purchased a couple to find out so here's a review of what I think about it, from a variety of perspectives.
1
LVL 69

Expert Comment

by:☠ MASQ ☠
Thanks Andrew, it's an interesting product  but I do have concerns about how it would be used as intended.

Surely the first responder/paramedic who would really benefit from having this data if the patient isn't able to provide it won't be able to access it.  Most don't carry devices which will read USB and those that do will have them locked down to prevent  infection of their computer from an unknown source and secure their patient data system.

I don't often hear "let me through, I've got a device that can read USB sticks" at the scene of an accident (OK, I never hear that).

Either at the scene or on transfer to hospital care it's more likely that your 'phone or wallet will have been checked for ID, contact details and anything useful that might impact on your medical care.

I'm sure the developer has the best of intentions for their product but despite our "Age of Technology" have reservations about its implementation here.
2
This article is about an excellent bookmarks manager I've been using that I thought deserved some promotion to make more folks aware of its existence. Free to use and very useful indeed. Enjoy...
5
LVL 14

Expert Comment

by:Brandon Lyon
This is a helpful article. One thing to remember is that keeping one (or more) Start.Me tabs open is going to consume significantly more memory than browser bookmarks.

I used to love XMarks but years ago I ditched it when I was getting synchronization and corruption issues on a daily basis. These days I just use the default browser sync in Chrome (though I'll be migrating to Firefox soon).
1
LVL 29

Author Comment

by:Andrew Leniart
Hi Brandon,

Thank you for your very kind comment and also for endorsing the article with a Thumbs Up. Both very much appreciated!

Regards, Andrew
0
The purpose of this article is to show the bundle of features available to you at Experts Exchange, and where to find them. I will be updating it whenever changes to the site are made, so bookmark it and keep referring back if you suddenly can't find something. Enjoy exploring and using the site!
10
LVL 7

Expert Comment

by:Ugra Narayan Pandey
Very useful article and explain in detailed, each feature and their use.
Thanks for the Article, still learning new things in Expert-Exchange and this article help me lots!
2
LVL 29

Author Comment

by:Andrew Leniart
You're very welcome Ugra, I've very glad you've found it useful.  And thank you for endorsing the article by clicking the Thumbs Up icon - very much appreciated.

Regards, Andrew
1
The purpose of this tutorial is to show you how, with a minimum of effort, you can make your articles much more accessible for the blind and other readers with visual impairments at Experts Exchange.
14
LVL 29

Author Comment

by:Andrew Leniart
That's wonderful of you Joe and I'm certain your efforts will be appreciated by many indeed!

The world could use more developers like yourself. Thank you very much for your kind words and this feedback. Very much appreciated.

Regards, Andrew
1
LVL 68

Expert Comment

by:Joe Winograd
Hi Andrew,
I want to let you know that the comments in my last post were not empty promises. I now have a beta version of TrayLaunch that contains the four features mentioned in that post, i.e., all functionality available via keyboard (including right-click on tray icons via hotkeys); alternative text for all graphics and screenshots in the manual; command line calls for all features; and 24 colors (A-Z, except for C and O, explained below).

Also, I added the ability to increase the font size in the program's GUIs. There are now the typical letter "A" boxes representing five font sizes, which I'm calling: tiny, small, medium, large, huge. The small size is the point size that is in all prior TrayLaunch versions. I decided to put in one smaller choice, but three larger ones.

The select-color-stars-to-run dialog box with the 24 colors and five font size choices looks like this now:

TrayLaunch 5.0.15 (beta) select color stars to run
The font size selection is sticky, automatically saved, and used in all GUI dialogs. That screenshot is from W7 with "Underline keyboard shortcuts and access keys" ticked via Control Panel>Ease of Access Center (it works the same in W10). As you can see, each color has Alt+<first-letter> as its access key. This is why O and C are not for colors, since Alt+O is the access key for the OK button and Alt+C is the access key for the Cancel button.

Once again, wanting you to know the impact of your article! Btw, as a beta user, you'll be getting the new version soon. :) Regards, Joe
1
Want to remove a security password from PDF files? Know simple tips and tricks to remove security and restrictions from PDF files on a Mac OS X. Follow each step carefully to unprotect an Adobe PDF document.
0
Experience of upgrade from macOS High Sierra to macos Majave on a late 2012 iMac.
0
Are you looking to move from Mac Outlook to Windows Outlook? Not getting any solution to export Mac Outlook 2016 to PST? Then this is must read article for you which explains the manual solution to convert OLM to PST. It also suggest Outlook Mac Exporter for converting OLM files to PST in one go.
0

General rules for the care of MAC


It's a shame if the failure occurred due to ignoring simple rules for care or because of improper use of the device. For the MacBook, there are hygiene rules, as well as for users - if you do not follow these simple rules, neglect, or do not know them, then the device does not last long. You will definitely need to seek the assistance of a professional master or give the device for a number of works to clean the device in the service center.



Unlike the laptops of many companies, Apple's laptops are cleaned a bit harder, and the user without special skills is better not to take it for themselves. Just wipe the dust you will get without a doubt, but at the same time make a replacement for the dried thermal paste will not work. Such complications are due to the location of the radiator under the motherboard, and in order to make a replacement for thermal grease, a fee should be charged. The good news is that if you have MacBook Air and MacBook previous releases, where access to the MacBook is under the cover, and in the MacBook under the keyboard, then you can do the work yourself.

So, what is required of us as responsible for the device? Just a couple of minutes a week and only!

1. Turn off the device, turn it off from power.
2. We take out the battery (in case it is removable).
3. Clean with a soft cloth (microfiber for office equipment) ports and air vents to remove dust.
4. We eliminate vacuum from the hard-to-reach areas, for example, slots.

But, it is not advisable to use a vacuum cleaner to clean the internal parts of the MacBook, as it has not yet brought any positive results to anyone. If there are pieces of dirt and dust left in the holes, you can use a toothbrush to moisten it with alcohol or an alcohol-based agent. The device is ready to work in half an hour, everything is simple and easy!


Read more: https://www.apple.com/support/macbookpro/care/index.html


Сare of MacBook battery


The check of the condition in which the battery is located should be made in a month 2 or more times, if this is not done, do not hesitate to apply for a repair of the MacBook. For verification, it is necessary to take the following actions:


1. Charge battery fully.


2. Enter the pmset -g rawlog command in the Terminal to check the current status of the battery.



The input of this command for its correct and correct execution should be done from the keyboard, and not through copying, after which the launch is performed by pressing the "Enter" key. The utility will display an image showing the current status of the battery. The codes and commands for the battery will have the following meanings:


  • The presence of a connected power adapter - yes for external connected;
  • Battery charge status is activated - yes for battery present;
  • No battery charging at the moment - no for battery charging;
  • Display of the factory or current capacity of the battery - cap = 5435/5380;
  • The permissible quantity and at this time for the charge-discharge cycles, as well as at the present time - cycle count = 1000/72.


3. Special attention should be paid to the cap 5435/5380 indicator. If the value of the second number is greater than the first when the battery is fully charged, it is worthwhile to subject the battery to recalibration. To this end, the laptop itself is connected to the external power supply network, and its battery is fully charged, i.e. on 100%. The next 2 hours of work on the laptop should be done directly when powered from the network. At the end of this time, the battery should be discharged to the full 0% and leave the laptop itself for half a day. Before switching on after such operation of the laptop it is necessary to conduct a full charging of its battery.


4. You must restart the Terminal and re-enter the pmset -g rawlog command. In the output, there must be a new value for the cap parameter. In the case where this procedure for the laptop is the first, then the restoration of a value equal to or approximate to the factory one, for the battery may not occur. A similar repeat procedure will help to correct the condition. The optimum frequency for it is from 2 times per month of time.

P.S: Access to the "Terminal" utility is made through the Utilities folder located in the Program directory.

 

Read more: https://computers.tutsplus.com/tutorials/practical-tips-for-taking-care-of-your-macs-battery--mac-45367


How to properly clean the MacBook keyboard


Food + drinks + keyboard - an explosive mixture that entails clogging of contacts, sticking keys and other unpleasant consequences for the user. In general, the picture is not pleasant. Despite the fact that the Apple Keyboard distance between the keys and the body is minimal to avoid getting under the body of dust, fibers and microparticles will not succeed. Consequently, sooner or later, there is a need to carry out cleaning work inside the keyboard. I will try to tell you how to do it correctly and without extra financial costs. 


1. The preparatory stage includes the collection of necessary materials and the disconnection of the keyboard from the computer. So, we will need cotton buds, toothpicks, credit / discount card, water, cloth-microfiber, alcohol / specialized liquid for gadget care. Turn off the keyboard or use the special program KeyboardCleanTool, which automatically blocks the keyboard. And better do both


2. External cleaning of the keyboard consists of the mechanical cleaning of the keyboard body from dust and dirt, using a microfiber and a small amount of special equipment or water.


3. Internal cleaning of the keyboard is the most responsible and time-consuming process. Have enough patience and free time, friends. 

  • Pry the upper left corner of the small button with your fingernail / toothpick / credit card and lift it evenly enough to understand how the internal fasteners are located. This is very important because brute force can lead to the breakdown of the built-in mechanisms. After evaluating the location of the fasteners, press the key in the desired direction until it clicks.
  • We shoot big keys. In addition to standard fasteners, they also have metal fasteners and clamps.
  • This is how our keyboard looks without the keys. Please note that we remove the movable aluminum fasteners as well.



  • Armed with wet napkins to disinfect monitors or paper towels with a small impregnation of alcohol. But it is better to give preference to specials. means. And we wash each key, throwing out napkins as they become soiled. If the keys are "gray" and the napkins do not take them, then users of the global network recommend using an eraser.
  • The inner elements are wiped with a lint-free (!) Cloth moistened with a small (!) Amount of water. Crumbs are blown into the hand - at the same time and light, we will train.


4. It's time to set the keys in place. The small keys will come back up after a slight click on the body - until it clicks. Large (those with metal fittings) should coincide with the built-in grooves, but the principle is the same.


P.S.: For the more effective protection of your keyboard, you can use a MacBook keyboard cover, but this is only if it's convenient for you

Read more:https://support.apple.com/en-us/ht205662



Conclusion
I would like to say that in the first place everything depends on you and on your attitude towards your gadgets. After all, if you do not remember in time what and when to do good, nothing will turn out. Treat your technique as well as your pets and then you do not have to change your "pets" every 2-3 years!
Thank you all for attention! :)

 

0
A simplified solution to fix "Apple mail does not open attachments of emails” error. Furthermore, an automated solution namely Mac MBOX Converter is also discussed to fix Mac Mail attachments problem. Before that, let us consider a real-life scenario that might be faced by users.
0
OWASP: Avoiding Hacker Tricks
LVL 19
OWASP: Avoiding Hacker Tricks

Learn to build secure applications from the mindset of the hacker and avoid being exploited.

Go through this article to know the method to import Entourage into Outlook 2016 Mac effortlessly. The proper solution to Export Entourage to Outlook Mac is illustrated in detail manner. Before exploring the method, let us consider a real-life scenario usually faced by the users
0
In this era of multiple operating systems, migration from Mac Mail to Windows Outlook 2016 is a usual incident. Since the manual method of exporting Mac Mail to Windows Outlook 2016 is a lengthy process, readers can use SysTools Mac MBOX Converter for easy migration.
0
Perform mass mailouts without the need to subscribe to an online service. This review explains the author's experiences of several years with the software being reviewed and discusses some of the benefits of using it as opposed to online services.
7
LVL 30

Expert Comment

by:skullnobrains
chances that a personal sender email gets blacklisted on public blacklists are slim.

chances that email massively send using the above steps reach their targets, i'd say about 20 % tops, and most of the recipients would not use such poorly protected mailboxes.
0
LVL 29

Author Comment

by:Andrew Leniart
What are the chances that a user using a public Gmail email address as the "reply address" within Send Blaster would have his public Gmail email address blacklisted within (public internet email blacklists) after using the Send Blaster software to send out a newsletter containing a Word attachment (even after following steps 10 and 11 using the "Text from HTML" button which returned a "Spam score" of 0)?

Very small indeed. I've done this myself many times (though not with Gmail) with the only other difference is that I never tend to send docx files as attachments in my mailouts, always opting to attach protected PDFs instead, though I don't see how that should make any sort of difference.

The full details have been posted in this other question:

No worries, will take a look to see if I can help.

Best, Andrew
1
This is the conclusion of the review and tests for using two or more Password Managers so you don't need to rely on just one. This article describes the results of a lot of testing in different scenario's to reveal which ones best co-exist together. Enjoy...
2

Expert Comment

by:Otto Didact
Thank you, Andrew Leniart;

Parts 1 & 2 of both of these articles were excellent.  

I actually like the idea of being able to carry around or safely stash a flashdrive as a alternate vault for passwords.  Being able to plug a USB stick into Laptop`s USB port & gain access through whatever gateways, even without WiFi, Bluetooth, Ethernet cables, &/or cell service & unlimited data minutes for an Internet connection seems like a beneficial advantage to me.  I as yet have never used a password manager, though have been following reviews their use for several years now, but then have usually felt they fell short of being applicable to how I & my wife would use them.  I especially like your innovation in deciding to redundantly use two password managers together.  

I think your article was the first time that any reviewer mentioned being able to print or save all of one`s passwords as a PDF, though for the purpose of keeping it with my passport doesn`t seem like a good idea, but in a safe deposit box, or in an other such safe place does.  And so does saving it to a USB thumbdrive, to then be placed in a safe place or carried on one`s person as necessary.  Saving a copy to the cloud, where an operational version of one`s password manager exists at one`s beck & call, & for syncing different devices & browsers, seems unnecessary.  

I am still a bit consternated by them not working with Microsoft Edge (is this the fault of the password manager industry or that of Microsoft), & with them not being able to figure out how to autofill or sign in on some login situations.  The latter especially sounds like someone needs to assign some set of universal criteria for login methodology, for both the password managers & the password  requiring gateways to adhere to in order to operate efficiently together, for the sake & necessity of the users of password managers, & of the sites & applications that rightly require security precautions.
2
LVL 29

Author Comment

by:Andrew Leniart
Hi Otto,

Parts 1 & 2 of both of these articles were excellent.

Firstly, welcome to Experts Exchange and thank you for reading my articles and especially for your kind comment! I'd be grateful if you could take a moment to endorse the articles by clicking the thumbs-up icon right underneath the end of them :)

I actually like the idea of being able to carry around or safely stash a flashdrive as a alternate vault for passwords.  Being able to plug a USB stick into Laptop`s USB port & gain access through whatever gateways, even without WiFi, Bluetooth, Ethernet cables, &/or cell service & unlimited data minutes for an Internet connection seems like a beneficial advantage to me.

You're not the only one. Others have expressed the same desire, yet the password developers seem to continue heading in the direction of making your vault fully available to you in a browser on their website instead. RoboForm is a typical example that moved away and dropped support for exactly what you prefer doing. I see that as a huge responsibility on the developers part, so it's important to consider who you are going to trust with the storage of such sensitive information.

That said, the only way I can see of influencing password manager developers is to continue showing them there is still a need for this type of technology and function. Keep giving them feedback - if they get enough of it, they may just start to listen.

I as yet have never used a password manager, though have been following reviews their use for several years now, but then have usually felt they fell short of being applicable to how I & my wife would use them.

You make an interesting comment. Obviously, I'm one of those that always recommends the use of Password managers. In my field of work, far too often I see people using the same password on multiple websites (and confess I've been guilty of that myself at times) and still frequently see real-life examples of sensitive password information being stuck to monitors via sticky notes, in totally unsecured spreadsheets or on a piece of paper laying on a desk or in a drawer. I'm not just talking about your average home user here either. I support many Accounting and Legal Firms who I've still noticed doing things like that. Basic human nature tendencies kick in, regardless of educational and professional achievement levels.

Everyone has unique requirements, so I'd be genuinely interested to hear "how" the variety of password managers fell short for your particular circumstances?

I especially like your innovation in deciding to redundantly use two password managers together.

Thank you so much. I've actually been doing that for years because I could never find a single solution that wouldn't break for me under one circumstance or another when a website changed its login steps. The use of two solved that, but the trick was finding two that could work together in harmony and not constantly fight one another for control of logging me into the websites I was visiting, or password protected applications on my computer. Currently, Roboform and Avast play very well together, but if I had to make a choice between the two, then I would probably keep the Avast solution. Despite the lack of features that Roboform offers, it seems to handle changed login pages far more effortlessly.

I think your article was the first time that any reviewer mentioned being able to print or save all of one`s passwords as a PDF, though for the purpose of keeping it with my passport doesn`t seem like a good idea, but in a safe deposit box, or in an other such safe place does.

Indeed, and you make an excellent observation that I perhaps should have clarified on a bit more. I would certainly never encourage people to save to PDF or even print out their passwords, but there have been times when that's helped folks out of a  jam. The capability is actually there in just about every password application I've tried, but I don't tend to encourage its use except under specific scenarios that a client may explain to me that they have.

And so does saving it to a USB thumbdrive, to then be placed in a safe place or carried on one`s person as necessary.

I do hope you have that USB thumb drive encrypted with a nice strong password in the event you ever lost it though? :)

Saving a copy to the cloud, where an operational version of one`s password manager exists at one`s beck & call, & for syncing different devices & browsers, seems unnecessary.

This again falls back to personal requirements and circumstances I think. For me, the option is invaluable, because I have a couple of laptops that I use when I travel, sometimes need to access my bank using my phone, or a website on an Ipad when showing a demo of a proposed solution to a client. Everything is available to me, all the time. But in order to have that luxury, I must trust that both Roboform and Avast will keep all my information secure - per my earlier statement.

In circumstances where such functionality isn't needed, such as perhaps yours, there is no need to use it just because it's available. There are functions in my Password managers that I simply ignore because I have no use for them. In fact, if "you" don't need cloud access to synchronize different devices and browsers, then you are in a somewhat enviable position of taking advantage of the freely available versions of those tools, where Cloud Synchronization is often offered as a "paid" feature.

I am still a bit consternated by them not working with Microsoft Edge (is this the fault of the password manager industry or that of Microsoft), & with them not being able to figure out how to autofill or sign in on some login situations.

A combination of both is my understanding. To have an application available as a plug into Microsoft Edge, it has to be vetted and approved by Microsoft first. How much work and/or expense this involves on the part of the developers I couldn't guess. But I am confident in one thing - from the feedback I received from all the password manager developers that were included in this review, all will at some point be updated to support Microsoft Edge. They will be forced to as the popularity of Microsoft's latest browser grows, if they want to retain their current userbase, subscribers and gain new ones over other competitive offerings.

The latter especially sounds like someone needs to assign some set of universal criteria for login methodology, for both the password managers & the password  requiring gateways to adhere to in order to operate efficiently together, for the sake & necessity of the users of password managers, & of the sites & applications that rightly require security precautions.

I don't believe it's so much as how to fill in the required information or security precautions, which would be a given. It's more about getting their application approved as a plug-in for Microsoft Edge, and subsequently even approved to be available on the Microsoft Store, strongly promoted in Windows 10. Again, this falls into how much effort is required to get past that vetting process. As I'm not a developer, that's something I'm not very familiar with.

My thanks for all of your feedback and comments Otto!

Regards, Andrew
0
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it's often useful to use more than one.
12
LVL 29

Author Comment

by:Andrew Leniart
Hi Bernhard,

Thanks for your comments. 2FA is an important consideration for many, an unnecessary nuisance for others, and then you have the camp that believes it should be forced (or at least made as an available option) everywhere as standard practice :)

For my own part, if 2FA is an option, I'll always enable and use it, but that's not always so. My bank as an example doesn't have the option available to me to just log into my account - opting instead to only force 2FA on money transfers to accounts that have not been transferred to before. I could give dozens of other examples that don't make much sense to "me" personally.

At the end of the day, everyone must reach their own conclusions and decide on what's best for them.

Regards, Andrew
1
LVL 33

Expert Comment

by:Thomas Zucker-Scharff
Bernhard has an excellent point.  I love Sticky Password, but how does it know it is you if it doesn't store the credential you are logging in with?  I am actually in the midst of a tech support triage with SP and intend to ask the very question.

And by the way SP does have 2FA.
0
Most folks would know the basics of how Dropbox works, so that’s not the purpose of this article. Security is what it’s all about, so here I’ll share how I choose to secure my Dropbox Account and the Data it contains.
4
LVL 33

Expert Comment

by:Thomas Zucker-Scharff
I figured that was the reason - especially since password management was really a side note.  BTW, I now use StickyPassword.  I have found that the worse part of Roboform was that it didn't completely transfer all passwords/passcards/whatever when I exported them.  I do like some of the features of Dashlane, and probably would use that instead if SP didn't offer such a great deal (it was because I was using some other software - don't remember which - and they gave all their users a lifetime membership to SP).
1
LVL 29

Author Comment

by:Andrew Leniart
Hi Thomas, thanks for mentioning the other password managers that you use.  I currently have licenses for Roboform, Avast Password and now 1Password.  I'll generally install a trial to a software product and use it for a short time.

If I don't like it I get rid of it, if I do like it, I'll generally buy a license/subscription to it to unlock all features as 1 reason, but also to encourage the developers to keep working on the products.  Purchasing licenses by registering them to my company gives me a tax benefit as well so it's all good. Just don't tell my missus that's one of my habits! lol  :-)

Cheers..
2
This is a tech scam I recently helped my parents through.
1
This article outlines the struggles that Macs encounter in Windows-dominated workplace environments – and what Mac users can do to improve their network connectivity and remain productive.
0
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
0
LVL 10

Expert Comment

by:David Anders
Turning on firmware passwords and encryption requires perfect password records and backup habits.
A dying encrypted drive is beyond my recovery skills.
I have dealt with the problems caused by both many times and have yet to deal with malware.
Adware, scareware, phishing, identity theft yes, I have been called to fix these.
But, I deal with individuals and small businesses.
0
How to Generate Services Revenue the Easiest Way
How to Generate Services Revenue the Easiest Way

This Tuesday! Learn key insights about modern cyber protection services & gain practical strategies to skyrocket business:

- What it takes to build a cloud service portfolio
- How to determine which services will help your unique business grow
- Various use-cases and examples

This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
8
LVL 57

Expert Comment

by:Jackie Man
Modern OS from Windows 7 onwards will disable disk cache and you will not have performance gain on using a RAMDisk.

Besides, the wearing from disk read and write will not have a significant impact to your SSD.

https://www.howtogeek.com/256859/dont-waste-time-optimizing-your-ssd-windows-knows-what-its-doing/

I have changed the HDD to SSD for a number of desktop PC for more than 18 months and they are still running to top speed like Day 1.

Before I changed to SSD, I did use RAMDisk to make Windows 7 ran faster by moving all cached and temporary files to the RAMDisk and my experience shows that the article in the link above is correct.

Besides, unless you are staying with 32 bit MS Windows, you will not have spare RAM for RAMDisk and it is better to let the OS to handle memory management.
0
LVL 33

Expert Comment

by:Thomas Zucker-Scharff
I found that on my Windows 10 64 bit machine with a 256gb boot SSD (1tb data drive HDD 7200rpm), RAMDisk made a huge difference.  I found the same on my brand new laptop (Lenovo Yoga) with SSD.  I even bought the software.
2
An introduction to the wonderful sport of Scam Baiting. Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
22

Expert Comment

by:Tom Crawford
Thank you Andrew, hope to put  to good use and enjoyment.
Tom.
0
LVL 29

Author Comment

by:Andrew Leniart
Thanks for the comments and endorsements Andrew and Tom, very much appreciated and help me out.  I'm glad you both got some value of the article.

Regards,
Andrew
0
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me is flawed and borders on irresponsible behavior!
11
LVL 6

Expert Comment

by:DP230
Sometimes we will get "The update is not applicable to your computer" when updating the patches as well; so Wait a bit :)
0
LVL 29

Author Comment

by:Andrew Leniart
Hi SpiderlinK, thank you for your comment.  I've found that failure to often be a result of being behind in issued Service Packs. A patch will often fail on a Service Pack 1 or 2 installation if a SP3 has been released.

Best..
0
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.
3
In this article we discuss how to recover the missing Outlook 2011 for Mac data like Emails and Contacts manually.
0
This is a short article about OS X KeRanger, and what people can do to get rid of it.
0
LVL 15

Author Comment

by:Justin Pierce, CEH, CNDA, Stanford ACS
Hi Ericpete,

Sorry for the reference to Intego and my site. I've removed the lines that you've asked to be taken out. Again, I'm sorry for the mishap.

Thank you for your time and take care.

vr,

Justin
0

Mac OS X

14K

Solutions

11K

Contributors

Mac OS X is the desktop operating system from Apple Inc., found on Macintosh computers. OS X consists of a Mach/BSD-based kernel, operating system interfaces primarily based on FreeBSD and additional frameworks (written in C, C++ and Objective-C providing user interface and application-level services.