Printer Error #5

What is Printer Error #5?

You will receive this message when you attempt to open/print in AccountEdge without a printer attached. Make sure you have a printer driver installed on your computer, and you have a default printer selected.

To resolve this:
On Windows OS: Select a default printer in Windows by going to your Control Panel > Printers. Highlight your Printer and select Set as Default.
On Mac OS: On the Mac, select Printers & Scanners in System Preferences, and set the default printer.

If the correct printer is already set as the default, and you get Error #5, try setting another printer as the default printer

If the problem isn't cleared on a Windows system, User Access Control (UAC) is being used on Windows Vista, Windows 7, and Windows 8. In cases where UAC is being used, you can run AccountEdge Compatibility mode. This compatibility mode will permit AccountEdge to run in XP Compatibility mode, and run with Administrator privileges. Since this is a potential security risk, we recommend you consult with your IT staff for proper implementation. Alternatively, an experienced IT Administrator can set the appropriate UAC permissions on your machine.

"Accessory may not be supported" alert

If you see an ‘Accessory may not be supported’ alert

There are several reasons why you might see this alert or similar alerts on your iPhone, iPad, or iPod touch. If you see an alert, learn what to do.

Here's when these alerts might appear:

  • Your accessory is defective, damaged, or not Apple-certified.

  • The accessory isn't supported by your device.

  • Your iOS device has a dirty or damaged connector.

Try these steps to fix the issue:

Update to the latest version of iOS

Some accessories might require the latest version of iOS. Make sure that you update to the latest version of iOS.

Make sure the accessory is compatible

If this is the first time that you tried to use the accessory, make sure that it works with your device. Some accessories only work with certain models of iPhone, iPad, or iPod touch. If you aren’t sure, contact the manufacturer.

Check the connections

Disconnect and reconnect the accessory to see if the alert goes away. If it continues to appear, check the connectors on the accessory and your device for damage or debris. If necessary, gently remove the debris and clean the connectors on your device.

If you see this alert and don’t have any accessories connected, contact Apple Support.

Updating Applications from Apple's App Store

How to manually update apps on your Apple device

You can turn off automatic updates and update apps manually. Or you can turn on automatic updates so that you don't need to manually update each app.

Update your apps manually

On your iPhone and iPad, apps that you download from the App Store are automatically updated by default. But if there's an issue, you can update an app manually.

How to manually update apps on your iPhone or iPad

  1. Open the App Store.

  2. Tap your profile icon at the top of the screen.

  3. Scroll to see pending updates and release notes. Tap Update next to an app to update only that app, or tap Update All.

Learn what to do if you can't update an app on your iPhone or iPad.

How to manually update apps on your Mac

  1. Open the App Store.

  2. In the sidebar, click Updates.

  3. Click Update next to an app to update only that app, or click Update All.


If you didn’t get the app from the App Store on your Mac, contact the app developer to get help with updates.

Learn what to do if you can't update an app on your Mac.

How to manually update apps on your Apple Watch

  1. Open the App Store and scroll down to the bottom.

  2. Tap Account.

  3. Tap Updates.

  4. Tap Update next to an app to update only that app, or tap Update All.

Turn on or turn off automatic updates

If you prefer to manually update all your apps, turn off automatic updates. When you do this, you receive notifications from the App Store each time an update for one of your apps is released. 

How to turn on or turn off automatic updates on your iPhone or iPad

  1. Go to Settings.

  2. Tap App Store.

  3. Turn on or turn off App Updates.



How to turn on or turn off automatic updates on your Mac

  1. Open the App Store.

  2. From the menu bar at the top of the screen, choose App Store > Preferences.

  3. Select or deselect Automatic Updates.

How to turn on or turn off automatic updates on your Apple Watch

  1. Go to Settings > App Store.

  2. Turn on or turn off Automatic Updates.

You can also open the Watch app on your iPhone, scroll to App Store and tap it, then turn on or turn off Automatic Updates.

How to turn on or turn off automatic updates on your Apple TV HD or 4K

  1. Go to Settings > Apps.

  2. Select or deselect Automatically Update Apps.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: November 08, 2021

2022.0818 Apple Security Concern

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

Safari 15.6.1

Released August 18, 2022

WebKit

Available for: macOS Big Sur and macOS Catalina

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


About the security content of iOS 15.6.1 and iPadOS 15.6.1

This document describes the security content of iOS 15.6.1 and iPadOS 15.6.1.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.


iOS 15.6.1 and iPadOS 15.6.1

Released August 17, 2022

Kernel

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2022-32894: an anonymous researcher

WebKit

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


About the security content of macOS Monterey 12.5.1

This document describes the security content of macOS Monterey 12.5.1.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.


macOS Monterey 12.5.1

Released August 17, 2022

Kernel

Available for: macOS Monterey

Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2022-32894: an anonymous researcher

WebKit

Available for: macOS Monterey

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


New macOS 12.5.1 and iOS 15.6.1 updates patch “actively exploited” vulnerabilities

The two vulnerabilities are the same for all three operating systems, with the first tracked as CVE-2022-32894. This vulnerability is an out-of-bounds write vulnerability in the operating system's Kernel.

The kernel is a program that operates as the core component of an operating system and has the highest privileges in macOS, iPadOS, and iOS.

An application, such as malware, can use this vulnerability to execute code with Kernel privileges. As this is the highest privilege level, a process would be able to perform any command on the device, effectively taking complete control over it.

The second zero-day vulnerability is CVE-2022-32893 and is an out-of-bounds write vulnerability in WebKit, the web browser engine used by Safari and other apps that can access the web.

Apple says this flaw would allow an attacker to perform arbitrary code execution and, as it's in the web engine, could likely be exploited remotely by visiting a maliciously crafted website.

The bugs were reported by anonymous researchers and fixed by Apple in iOS 15.6.1,  iPadOS 15.6.1, and macOS Monterey 12.5.1 with improved bounds checking for both bugs.

The list of devices affected by both vulnerabilities are:

  • Macs running macOS Monterey

  • iPhone 6s and later

  • iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).


Update, Aug. 18, 3:45 p.m.: Apple has released the Safari 15.6.1 update for macOS Big Sur and Catalina to patch the WebKit vulnerability it fixed in macOS Monterey yesterday. Still no word on whether the kernel vulnerability is present in either of these older operating systems, but we'll update if Apple responds to our query.

Original story: Apple has released a trio of operating system updates to patch security vulnerabilities that it says "may have been actively exploited." The macOS 12.5.1, iOS 15.6.1, and iPadOS 15.6.1 updates are available for download now and should be installed as soon as possible.

The three updates all fix the same pair of bugs. One, labeled CVE-2022-32894, is a kernel vulnerability that can allow apps "to execute arbitrary code with kernel privileges. The other, CVE-2022-32893, is a WebKit bug that allows for arbitrary code execution via "maliciously crafted web content." Both discoveries are attributed to an anonymous security researcher. WebKit is used in the Safari browser as well as in apps like Mail that use Apple's WebViews to render and display content.

Apple didn't release equivalent security patches for macOS Catalina or Big Sur, two older versions of macOS that are still receiving regular security updates. We've contacted Apple to see whether it plans to release these patches for these older OSes, or if they aren't affected by the bugs and don't need to be patched.

Apple's software release notes for the updates don't reference any other fixes or features. Apple is actively developing iOS 16, iPadOS 16, and macOS Ventura, and those updates are due out later this fall.