Can't grant permissions to protection domains

Hi, I'm trying to grant some permissions to a couple of protection domains using Visual Administrator (Security Provider item).
I follow these steps:
1) I select protection domain, for instance, a jar file
2) I select the permission I want to grant
3) I click the Grant button
4) An error happens. "Unable to refresh protection domains panel!" states an error dialog, and
SAPEngine_Application_Thread[impl:3]_36##0#0#Path#1#com.sap.engine.services.rmi_p4#
Plain###> com.sap.engine.services.rmi_p4.DispatchImpl->throwException
MSG:P4 Call execution: Exception in execute operation :
<grantPermission(java.lang.String,java.lang.String,java.lang.String,java.lang.String)
in the server.log file.
What can be happening?
Thanks,
Juan Manuel

Are you planning for this to be available over the Internet? If it's just for your personal use, I would recommend writing an application instead of an applet. No security hassles to deal with.
Also, I notice from your error messages that you are trying to use the sun.jdbc.odbc.JdbcOdbcDriver class. You can't use that from an applet, because it requires installing a DLL on the applet's local machine. But you did say you were using MySQL, so you should probably get a JDBC driver that can access it (I'm not even sure if there's an ODBC driver form MySQL).

Similar Messages

  • Can't grant permissions

    Hope somebody can help. I am building my first java applet which connects to a database but I can't get around the permissions problem. I have included the following policy file in the same directry as my applet but still no joy. (To be honest I am guessing a bit as tutorials tend to give you the policy file instead of explaining it.)
    Can anyone suggest a good tutorial online or spot any obvious problems below??
    900-0772 is my machine name - I'm running win 2k with IIS and trying to connect to MySQL (on same machine).
    Thanks
    Andy
    /* AUTOMATICALLY GENERATED ON Thu Nov 01 15:09:44 GMT+00:00 2001*/
    /* DO NOT EDIT */
    grant codeBase "http://900-0772/" {
    permission java.lang.RuntimePermission "accessClassInPackage.sun.jdbc.odbc";
    permission java.net.SocketPermission "900-0772", "resolve";
    permission java.net.SocketPermission "10.64.1.44:3306", "connect,resolve";
    };

    Are you planning for this to be available over the Internet? If it's just for your personal use, I would recommend writing an application instead of an applet. No security hassles to deal with.
    Also, I notice from your error messages that you are trying to use the sun.jdbc.odbc.JdbcOdbcDriver class. You can't use that from an applet, because it requires installing a DLL on the applet's local machine. But you did say you were using MySQL, so you should probably get a JDBC driver that can access it (I'm not even sure if there's an ODBC driver form MySQL).

  • Granting permissions for JAVA STORED PROCS

    If I imported a java class file as user test and created a stored proc, how can I grant permissions to all the users in the DB? Do I have to grant permissions on JAVA CLASS itself when I load it or Do I have to grant permissions on the Stored proc or Both?
    Any help will be greatly appreciated.
    null

    Note: I can manually add the file with the command -
    loadjava -v -user user/password@sid sqljdbc.jar (pg 261 in Oracle Database Programming using Java and Web Services by Kuassi Mensah)
    Which is what I have done to get this to work. But the question still stands - How do I get the sqljdbc.jar file to be loaded when deployed using the deployment descriptor?
    Thanks, Ken

  • Removing and granting permissions - can item.systemupdate(false) be used

    Hi,
    When removing and granting permissions programmatically, can the item.systemupdate(false) be used?
    I have used the below code for removing permissions. Is this systemupdate(false) the right thing to use or item.update?
    oSPWeb.AllowUnsafeUpdates = true;
    CurrentlistItem.BreakRoleInheritance(false);
    oSPWeb.AllowUnsafeUpdates = true;
    using (DisabledItemEventsScope scope = new DisabledItemEventsScope())
    CurrentlistItem.SystemUpdate(false);
    //or is it better to use - CurrentlistItem.Update();
    Thanks

    you should not need the DisabledItemEventsScope.
    You do not need to use SsytemUpdate.
    You *probably* don't even need to use AllowUnsafeUpdates.
    just BreakRoleInheritance and then Update.
    Scott Brickey
    MCTS, MCPD, MCITP
    www.sbrickey.com
    Strategic Data Systems - for all your SharePoint needs

  • Java Security Model: Java Protection Domains

    1.     Policy Configuration
    Until now, security policy was hard-coded in the security manager used by Java applications. This gives us the effective but rigid Java sandbox for applets.A major enhancement to the Java sandbox is the separation of policy from mechanism. Policy is now expressed in a separate, persistent format. The policy is represented in simple ascii, and can be modified and displayed by any tools that support the policy syntax specification. This allows:
    o     Configurable policies -- no longer is the security policy hard-coded into the application.
    o     Flexible policies -- Since the policy is configurable, system administrators can enforce global polices for the enterprise. If permitted by the enterprise's global policy, end-users can refine the policy for their desktop.
    o     Fine-grain policies -- The policy configuration file uses a simple, extensible syntax that allows you to specify access on specific files or to particular network hosts. Access to resources can be granted only to code signed by trusted principals.
    o     Application policies -- The sandbox is generalized so that applications of any stripe can use the policy mechanism. Previously, to establish a security policy for an application, an developer needed to implement a subclass of the SecurityManager, and hard-code the application's policies in that subclass. Now, the application can make use of the policy file and the extensible Permission object to build an application whose policy is separate from the implementation of the application.
    o     Extensible policies -- Application developers can choose to define new resource types that require fine-grain access control. They need only define a new Permission object and a method that the system invokes to make access decisions. The policy configuration file and policy tools automatically support application-defined permissions. For example, an application could define a CheckBook object and a CheckBookPermission.
    2.     X.509v3 Certificate APIs
    Public-key cryptography is an effective tool for associating an identity with a piece of code. JavaSoft is introducing API support in the core APIs for X.509v3 certificates. This allows system administrators to use certificates from enterprise Certificate Authorities (CAs), as well as trusted third-party CAs, to cryptographically establish identities.
    3.     Protection Domains
    The central architectural feature of the Java security model is its concept of a Protection Domain. The Java sandbox is an example of a Protection Domain that places tight controls around the execution of downloaded code. This concept is generalized so that each Java class executes within one and only one Protection Domain, with associated permissions.
    When code is loaded, its Protection Domain comes into existence. The Protection Domain has two attributes - a signer and a location. The signer could be null if the code is not signed by anyone. The location is the URL where the Java classes reside. The system consults the global policy on behalf of the new Protection Domain. It derives the set of permissions for the Protection Domain based on its signer/location attributes. Those permissions are put into the Protection Domain's bag of permissions.
    4.     Access Decisions
    Access decisions are straightforward. When code tries to access a protected resource, it creates an access request. If the request matches a permission contained in the bag of permissions, then access is granted. Otherwise, access is denied. This simple way of making access decisions extends easily to application-defined resources and access control. For example, the banking application allows access to the CheckBook only when the executing code holds the appropriate CheckBookPermission.
    Sandbox model for Security
    Java is supported in applications and applets, small programs that spurred Java's early growth and are executable in a browser environment. The applet code is downloaded at runtime and executes in the context of a JVM hosted by the browser. An applet's code can be downloaded from anywhere in the network, so Java's early designers thought such code should not be given unlimited access to the target system. That led to the sandbox model -- the security model introduced with JDK 1.0.
    The sandbox model deems all code downloaded from the network untrustworthy, and confines the code to a limited area of the browser -- the sandbox. For instance, code downloaded from the network could not update the local file system. It's probably more accurate to call this a "fenced-in" model, since a sandbox does not connote strict confinement.
    While this may seem a very secure approach, there are inherent problems. First, it dictates a rigid policy that is closely tied to the implementation. Second, it's seldom a good idea to put all one's eggs in one basket -- that is, it's unwise to rely entirely on one approach to provide overall system security.
    Security needs to be layered for depth of defense and flexible enough to accommodate different policies -- the sandbox model is neither.
    java.security.ProtectionDomain
    This class represents a unit of protection within the Java application environment, and is typically associated with a concept of "principal," where a principal is an entity in the computer system to which permissions (and as a result, accountability) are granted.
    A domain conceptually encloses a set of classes whose instances are granted the same set of permissions. Currently, a domain is uniquely identified by a CodeSource, which encapsulates two characteristics of the code running inside the domain: the codebase (java.net.URL), and a set of certificates (of type java.security.cert.Certificate) for public keys that correspond to the private keys that signed all code in this domain. Thus, classes signed by the same keys and from the same URL are placed in the same domain.
    A domain also encompasses the permissions granted to code in the domain, as determined by the security policy currently in effect.
    Classes that have the same permissions but are from different code sources belong to different domains.
    A class belongs to one and only one ProtectionDomain.
    Note that currently in Java 2 SDK, v 1.2, protection domains are created "on demand" as a result of class loading. The getProtectionDomain method in java.lang.Class can be used to look up the protection domain that is associated with a given class. Note that one must have the appropriate permission (the RuntimePermission "getProtectionDomain") to successfully invoke this method.
    Today all code shipped as part of the Java 2 SDK is considered system code and run inside the unique system domain. Each applet or application runs in its appropriate domain, determined by its code source.
    It is possible to ensure that objects in any non-system domain cannot automatically discover objects in another non-system domain. This partition can be achieved by careful class resolution and loading, for example, using different classloaders for different domains. However, SecureClassLoader (or its subclasses) can, at its choice, load classes from different domains, thus allowing these classes to co-exist within the same name space (as partitioned by a classloader).
    jarsigner and keytool
    example : cd D:\EicherProject\EicherWEB\Web Content jarsigner -keystore eicher.store source.jar eichercert
    The javakey tool from JDK 1.1 has been replaced by two tools in Java 2.
    One tool manages keys and certificates in a database. The other is responsible for signing and verifying JAR files. Both tools require access to a keystore that contains certificate and key information to operate. The keystore replaces the identitydb.obj from JDK 1.1. New to Java 2 is the notion of policy, which controls what resources applets are granted access to outside of the sandbox (see Chapter 3).
    The javakey replacement tools are both command-line driven, and neither requires the use of the awkward directive files required in JDK 1.1.x. Management of keystores, and the generation of keys and certificates, is carried out by keytool. jarsigner uses certificates to sign JAR files and to verify the signatures found on signed JAR files.
    Here we list simple steps of doing the signing. We assume that JDK 1.3 is installed and the tools jarsigner and keytool that are part of JDK are in the execution PATH. Following are Unix commands, however with proper changes, these could be used in Windows as well.
    1. First generate a key pair for our Certificate:
    keytool -genkey -keyalg rsa -alias AppletCert
    2. Generate a certification-signing request.
    keytool -certreq -alias AppletCert > CertReq.pem
    3. Send this CertReq.pem to VeriSign/Thawte webform. Let the signed reply from them be SignedCert.pem.
    4. Import the chain into keystore:
    keytool -import -alias AppletCert -file SignedCert.pem
    5. Sign the CyberVote archive �TeleVote.jar�:
    jarsigner TeleVote.jar AppletCert
    This signed applet TeleVote.jar can now be made available to the web server. For testing purpose we can have our own test root CA. Following are the steps to generate a root CA by using openssl.
    1. Generate a key pair for root CA:
    openssl genrsa -des3 -out CyberVoteCA.key 1024
    2. Generate an x509 certificate using the above keypair:
    openssl req -new -x509 -days key CyberVoteCA.key -out CyberVoteCA.crt
    3. Import the Certificate to keystore.
    keytool -import -alias CyberVoteRoot -file CyberVoteCA.crt
    Now, in the step 3 of jar signing above, instead of sending the request certificate to VeriSign/Thawte webform for signing, we 365 - can sign using our newly created root CA using this command:
    openssl x509 -req -CA CyberVoteCA.crt -CAkey CyberVoteCA.key -days 365 -in CertReq.pem -out SignedCert.pem �Cacreateserial
    However, our test root CA has to be imported to the keystore of voter�s web browser in some way. [This was not investigated. We used some manual importing procedure which is not recommended way]
    The Important Classes
    The MessageDigest class, which is used in current CyberVote mockup system (see section 2), is an engine class designed to provide the functionality of cryptographically secure message digests such as SHA-1 or MD5. A cryptographically secure message digest takes arbitrary-sized input (a byte array), and generates a fixed-size output, called a digest or hash. A digest has the following properties:
    � It should be computationally infeasible to find two messages that hashed to the same value.
    � The digest does not reveal anything about the input that was used to generate it.
    Message digests are used to produce unique and reliable identifiers of data. They are sometimes called the "digital fingerprints" of data.
    The (Digital)Signature class is an engine class designed to provide the functionality of a cryptographic digital signature algorithm such as DSA or RSA with MD5. A cryptographically secure signature algorithm takes arbitrary-sized input and a private key and generates a relatively short (often fixed-size) string of bytes, called the signature, with the following properties:
    � Given the public key corresponding to the private key used to generate the signature, it should be possible to verify the authenticity and integrity of the input.
    � The signature and the public key do not reveal anything about the private key.
    A Signature object can be used to sign data. It can also be used to verify whether or not an alleged signature is in fact the authentic signature of the data associated with it.
    ----Cheers
    ---- Dinesh Vishwakarma

    Hi,
    these concepts are used and implemented in jGuard(www.jguard.net) which enable easy JAAS integration into j2ee webapps across application servers.
    cheers,
    Charles(jGuard team).

  • Can I grant permission to write in specific attributes using security groups

    Hi
    I Created GPO that write the computer name in the one of the user attribute "comment attribute " when  he logged on
    then i went to OU and grant self delegate permissions to allow the users of that OU to write on "comment attribute
    but this did not work for the users how have been disabled form inheritance
    so instead of grant delegate permissions to the OU
    Can I grant permission to write in specific attribute "comment attribute " using security groups "Domain User "??

    Hi,
    Open Active Directory Users and Computers.
    On the View menu, select Advanced Features.
    Right-click the object for which you want to assign, change, or remove permissions, and then click Properties.
    On the Security tab, click Advanced to view all of the permission entries that exist for the object.
    To assign new permissions on an object or attribute, click Add.
    Type the name of the group, computer, or user that you want to add, and then clickOK.
    In the Permission Entry for ObjectName dialog
    box, on the Object and Properties tabs,
    select or clear the Allow or Deny check
    boxes, as appropriate.
    http://technet.microsoft.com/en-us/library/cc757520(v=ws.10).aspx
    Regards,
    Rafic
    If you found this post helpful, please give it a "Helpful" vote.
    If it answered your question, remember to mark it as an "Answer".
    This posting is provided "AS IS" with no warranties and confers no rights! Always test ANY suggestion in a test environment before implementing!

  • Grant permissions dynamically in a applet

    I am try to write a java applet and wants it can the access the local disk...
    I know one way is modify the Security policy files in the JRE ( this method can support signed or unsigned applet ), but this need user manually modification before run the applet.
    Can any method support grant permissions dynamically in java applet.
    e.g
    prompt a dialog to ask the user do they allow the applet grant the permissions

    Just try to sign your applet , it's easy to do . if you want to know the process of how to sign your applet , i can give you some advise , my email address is :[email protected] . Best wishes !

  • Can Business Catalyst host a sub-domain?

    Can BC host a sub-domain? If so then we can make arrangements to update our domain DNS and point to that address.
    Please advise whether BC can host sub-domains? We have a parent domain that we currently use for our marketing website although require a domain DNS to point to BC to make it live. Would a sub-domain be sufficient?

    Thx for your quick reply ! It helps a lot !
    Phil Martin
    Le 12 juin 2014 à 12:03, Dave Black <[email protected]> a écrit :
    Can Business Catalyst host a html css website done without Dreamweaver ?
    created by Dave Black in Business Catalyst FAQ - View the full discussion
    It sure can. Just upload your files with these instructions: Business Catalyst Help | Connect to your site using SFTP
    Please note that the Adobe Forums do not accept email attachments. If you want to embed a screen image in your message please visit the thread in the forum to embed the image at https://forums.adobe.com/message/6452531#6452531
    Replies to this message go to everyone subscribed to this thread, not directly to the person who posted the message. To post a reply, either reply to this email or visit the message page:
    To unsubscribe from this thread, please visit the message page at . In the Actions box on the right, click the Stop Email Notifications link.
    Start a new discussion in Business Catalyst FAQ by email or at Adobe Community
    For more information about maintaining your forum email notifications please go to http://forums.adobe.com/thread/416458?tstart=0.

  • ERROR: policy does not allow granting permissions at this level outlook

    Hi All,
    Our users are attempting to send sharing requests to each other via Right Click Calendar | Share | Share Calendar
    Availabilty only works fine but Limited and Full Access fails with the error: policy does not allow granting permissions at this level.
    I can see that the default sharing policy is set for availabilty only so I assume I need to add our internal SMTP addresses to the sharing policy with increased right's.
    But... From our testing in our LAB we found that if the exchange org does not have a connection to the federation setup it works fine straigh out of the box.
    Does this sound right or is my LAB just messing with me?
    Cheers
    Josh

    Hi VK, looks like these threads should resolve your problem:
    Assembly does not allow partially trusted
    callers                        
    "That assembly
    does not allow partially trusted callers."                        
    That assembly does not allow
    partially trusted callers                        
    Assembly does not allow partially
    trusted callers.                        
    WPF Assembly does not allow
    partially trusted callers
    cameron rautmann

  • How to grant permissions to an OU?

    Hello Community
    In a network there are 2 forests (lets call them ForestA and ForestB).
    In both forests there are administrators in their domains.
    If  I wanted to put an administrator from ForestA into an OU in ForestB so that the administrator from ForestA could
     access resources in ForestB, but I don’t want that administrator to be an administrator in ForestB, how can I grant only “Read” permission to the “OU” so that the administrator from ForestA won’t have administrator privileges in ForestB?
    Thank you
        Shabeaut

    I'm not an expert in forest trusts, but I think you will need to examine the EnterpriseAdmins and DomainAdmins, in both domains/forests, before and after you establish the trust.
    I think you will find that EnterpriseAdmins is the only cross-forest group that may grant "excessive" permimissions for your scenario.
    You will likely get a lot more discussion on this DS topic, in the DS forum:
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/home?forum=winserverDS
    e.g. this discussion is a little similar, and several experienced DS professionals contributing to the discussion:
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/fa4070bd-b09f-4ad2-b628-2624030c0116/forest-trust-domain-admins-to-manage-both-domains?forum=winserverDS
    Don
    (Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable.
    This helps the community, keeps the forums tidy, and recognises useful contributions. Thanks!)

  • File sharing permissions for AD Domain Admins?

    I've binded Mavericks to a Windows network with Active Directory, turned on File Sharing under System Preferences > Sharing, and added the Domain Admins group; how can I configure permissions so that the Domain Admins can read and write to and from all files and folders on the MAC HD without affecting other user's permissions?
    If I "apply to enclosed items..." the Domain Admins' Read & Write permissions from the root volume then Everyone (gets unintentionally propagated) can access all files!
    Ideally, the Domain Admins need the same permissions as the root administrator even after a new user has logged onto the MAC and had their Home Folders created in the future; In other words I need them to be able to access files and folders for all accounts past, present and future, but all other user's access must stay the same. Does that make sense?
    Is this even possible with AD binding? Would having a MAC OSX Server/Open Directory facilitate this better?
    Any help would be much appreciated!

    I tried adding the Domain Admins to the wheel group, but that never helped either. Also the "apply to enclose items" only seems to work for the entire share (left side)--not individual users or groups (right sde).

  • No Grant Permissions Dialog Showing

    Hey guys, I am trying to write a simple applet that executes a file on the users local filesystem. I have signed the applet by first creating a keystore and then using jarsigner to self-sign the applet. However, when the applet is executed it throws an AccessControlException when trying to execute the file (a FilePermission error on the execute)
    The applet is compiled in 1.5.0_09 and run in the 1.5.0_09 JRE. I have tried running the applet from an HTML page both locally through the filesystem and remotely through my webserver on 2 separate machines.
    The problem is, it just throws an exception and doesn't even ask the user to grant it permissions which I imagine is what I need to do
    Here is the code:
    package Jim;
    import java.awt.*;
    import java.applet.*;
    import java.io.*;
    import java.util.*;
    import java.security.*;
    import netscape.javascript.*;
    public class WinampConnect2 extends Applet {
         private String msg;
         public void init()
                               GetWinampInfo();
         public void paint(Graphics g) {
              g.drawString("MSG: " + this.msg, 50, 60 );
         public void GetWinampInfo()
              String msg2 = (String) AccessController.doPrivileged(new PrivilegedAction()
                public Object run()
                       try
                            FilePermission MyPerm = new java.io.FilePermission( "c:\\WinampMagic.exe", "execute" );
                            Runtime runtime = Runtime.getRuntime();
                            Process process = null;
                            process = runtime.exec("c:\\WinampMagic.exe");
                              DataInputStream in = new DataInputStream(process.getInputStream());
                              // Read and print the output
                              String line = null;
                              return in.readLine();
                       catch (Exception e)
                            System.out.print(e);
                            System.out.flush();
                            return "error";
                this.msg = msg2;
    }If anyone could offer me any advice on what I am doing wrong or how to correct this I would be very appreciative. Thanks in advance guys.
    Jim.

    Thanks for the input but that seems a bit of a cop-out. I realise that Applets are by default limited in their abilities which is why there is the ability to sign them in the first place.
    I know permissions aren't a problem as other applets I have tried which request permissions pop up the grant permissions dialog which my applet does not.
    I need this applet to run from a webpage and communicate with the DOM/Javascript on the page from my website for an experiment I am working on. I have worked with applets before and not had this problem with security so am wondering if there is something wrong with my code or a known bug that I am encountering.
    Please don't get me wrong, Lion-O, I appreciate your response, I just would really like to learn from this problem by fixing it rather than giving in.
    Can anyone else help?

  • Cannot activate "Workflows can use app permissions"

    Dear all,
    I have a SharePoint 2013 on Windows Server 2008 R2.
    And I create a develop site to share my apps.
    First, I try to activate the app permission, but it fail.
    Is anybody knows how to fix it?
    Thank you!

    Workflows can use app permissions feature is only going to be activated if 
    1) You have configured your workflow manager properly. Make sure there are not issues with your workflow manager and you can create workflow using SP 2013 Workflow Manager.
    2) You have configured apps for SharePoint 2013. Again you will need to make sure that you have hit all the check when configuring SharePoint 2013 apps. 
    Follow these two articles to make sure that you have configured apps for SharePoint 2013.
    http://technet.microsoft.com/en-us/library/fp161236.aspx
    http://sharepointchick.com/archive/2012/07/29/setting-up-your-app-domain-for-sharepoint-2013.aspx
    If you have confirmed that both of the above features are configured properly then check your ULS logs and find the detailed issue using the Correlation ID.
    Amit

  • Unable to activate Workflows can use app permissions feature

    Hi all,
    Iam unable to activate Workflows can use app permissions feature in sharepoint 2013. it throws sorry something went wrong error. Kindly somebody help me in resolving this issue

    Workflows can use app permissions feature is only going to be activated if 
    1) You have configured your workflow manager properly. Make sure there are not issues with your workflow manager and you can create workflow using SP 2013 Workflow Manager.
    2) You have configured apps for SharePoint 2013. Again you will need to make sure that you have hit all the check when configuring SharePoint 2013 apps. 
    Follow these two articles to make sure that you have configured apps for SharePoint 2013.
    http://technet.microsoft.com/en-us/library/fp161236.aspx
    http://sharepointchick.com/archive/2012/07/29/setting-up-your-app-domain-for-sharepoint-2013.aspx
    If you have confirmed that both of the above features are configured properly then check your ULS logs and find the detailed issue using the Correlation ID.
    If this helped you resolve your issue, please mark it Answered

  • SP2013 Form to populate a list without granting permissions

    Hey All,
    I have someone who wants a way to populate specific fields in a list, without granting permissions to the site or list. I don't think it can be done, but I figured I would check with everyone anyways. Is it possible?
    Thanks for the help!
    J

    You are right. without permission it is not possible.
    Please 'propose as answer' if it helped you, also 'vote helpful' if you like this reply.

Maybe you are looking for

  • Installation and run

    I downloaded camera raw 6.2. Please tell me how to install and run?

  • Ack Requirement

    Hi All, I have two scenarios. 1. IDOC to File 2.File to IDOC. My requirement is to get the acknowledgement in both the cases. 1. Scenario (IDOC to File) – I have ALEAUD message type for Source and user defined message type for target. 2. Scenario (Fi

  • Syslog.log messages with regard to VpxaHalCnxHostagent

    hi, i need a sharing of your precious knowledge. After upgrading vmware server to 5.5 from 5.1, vmware keeps generating messages as follows. Syslog daemon repeats similar pattern like followings. what is the reason and in case of error what's the sol

  • Does the Aperture has planned to support traditional Chinese?

    Since the Aperture supported Simplified Chinese, it shouldn't be too much effort to support Traditional Chinese. I'm wondering if the Aperture has planned to support Traditional Chinese in the near future?

  • Why does my Blog not publish with the rest of my new pages and photos????

    Much more work was done on my iWebsite today and I even made a rudimentary beginning of a blog. QUESTION: Why does my blog not publish? Lorna in Southern California