Client Security Fails af System Crash

Hey
Today when I started my T60 i had a crash in Windows Startup and had to restart manually.
Ever since my Client Security have been acting wierd. First it told me than my Windows password had been changed, and i should type it to check. I typed my normal password but failed, so clicked cancel.
Then I tried to access my Password Manager (both through fingerprinter and password) but get the message "Fejl under godkendelse" which means Failed while approving. It recognice my fingerprint but still get the same message.
How can I get my Client Security to work proberly again, and have my data been lost (a lot passwords) or will I be able to rescue them.
Sincerly
Vinther

Thanks for the reply.
I was using an older version of RnR, however, after the attempt to re-install, I upgraded to the latest version.  It still errors out.
As to your second guess, I was hopefull this was the fix, I had forgotten to go through the registry.  I deleted an empty CSS folder in the Common Files folder.  And found several registry entries which have now been deleted.  I don't believe I missed any.  But unfortunately no luck.  I cleared the chip again as well.
If it adds any clues, the system update was not working either.  But the language fix posted on the forums resolved it.  If I remember correctly the first time I tried to reinstall CSS it did ask a question/comment about language not matching.  I could be wrong, however, there have been alot of attempts.
I spoke with tech support on the phone with the only suggestion being a clean restore of the laptop which I would like to avoid.
Thanks again.

Similar Messages

  • Client Security Solution And System Key Recovery

    Hey,
    I have an IBM ThinkPad T40 2373-82M Laptop. Everytime Windows starts up Client Security Solution displays a box which is prompting me to enter a password of some sort for authentication. It indicates at the top of the window that the reason for authentication is 'System Key Recovery'. If I click the 'OK' button it brings up another window indicating that authentication has failed and that the security key could not be recovered. I do not recall ever entering a password in the Client Security Soultion programme or anywhere else on my laptop. I am not the first owner of this laptop and I am wondering if the previous owner may still have his/her password in the system? Is there any methid for which I could reset/restore these key's?
    Any help is appreciated.
    Cheers
    Ash

    Thanks for the reply.
    I must say I have read various issues on the web regarding this particular software buddled with Lenovo T series and although I will be uninstalling it I do not believe there is any support on this whatsoever. Too bad cause I did want to use it ...

  • Security Update causing system crashing??

    Hey everyone.  I installed the latest Security Update last night, and my computer hasn't been acting right since.  After being on for about 20 minutes or so, the screeens go to black, but the computer itself seems to still be on.  There doesn't seem to be any power going to the keyboard though because the caps lock button doesn't light up when I push it.  It's been going on all day, and I'm hoping maybe somone out there can shed some light on it for me.  It'd be much appreciated!  Here's the details of the crash....
    I'm running 10.8.4 on an early 2008 8 core Mac Pro
    Interval Since Last Panic Report:  1743393 sec
    Panics Since Last Report:          2
    Anonymous UUID:                    7F25451C-BF94-B6B3-A617-1459B5DA0D24
    Sat Jul 20 13:27:13 2013
    Machine-check capabilities 0x0000000000000806:
    family: 6 model: 23 stepping: 6 microcode: 1547
    Intel(R) Xeon(R) CPU           E5462  @ 2.80GHz
    6 error-reporting banks
    threshold-based error status present
    Processor 0: machine-check status 0x0000000000000005:
    restart IP valid
    machine-check in progress
    MCA error-reporting registers:
    IA32_MC0_STATUS(0x401): 0x1000000020000000 invalid
    IA32_MC1_STATUS(0x405): 0x0000000000000000 invalid
    IA32_MC2_STATUS(0x409): 0x0000000000000000 invalid
    IA32_MC3_STATUS(0x40d): 0x0020000000000000 invalid
    IA32_MC4_STATUS(0x411): 0x0000000000000011 invalid
    IA32_MC5_STATUS(0x415): 0xb200001084200e0f valid
      MCA error code:            0x0e0f
      Model specific error code: 0x8420
      Other information:         0x00000010
      Threshold-based status:    Undefined
      Status bits:
       Processor context corrupt
       Error enabled
       Uncorrected error
    Processor 1: machine-check status 0x0000000000000005:
    restart IP valid
    machine-check in progress
    MCA error-reporting registers:
    IA32_MC0_STATUS(0x401): 0x1000000020000000 invalid
    IA32_MC1_STATUS(0x405): 0x0000000000000000 invalid
    IA32_MC2_STATUS(0x409): 0x0000000000000000 invalid
    IA32_MC3_STATUS(0x40d): 0x0020000000000000 invalid
    IA32_MC4_STATUS(0x411): 0x0000000000000011 invalid
    IA32_MC5_STATUS(0x415): 0xb200001080200e0f valid
      MCA error code:            0x0e0f
      Model specific error code: 0x8020
      Other information:         0x00000010
      Threshold-based status:    Undefined
      Status bits:
       Processor context corrupt
       Error enabled
       Uncorrected error
    Processor 2: machine-check status 0x0000000000000005:
    restart IP valid
    machine-check in progress
    MCA error-reporting registers:
    IA32_MC0_STATUS(0x401): 0x1000000020000000 invalid
    IA32_MC1_STATUS(0x
    Model: MacPro3,1, BootROM MP31.006C.B05, 8 processors, Quad-Core Intel Xeon, 2.8 GHz, 12 GB, SMC 1.25f4
    Graphics: ATI Radeon HD 2600 XT, ATI Radeon HD 2600, PCIe, 256 MB
    Memory Module: DIMM Riser B/DIMM 1, 1 GB, DDR2 FB-DIMM, 800 MHz, 0x80AD, 0x48594D5035313241373243503844332D5335
    Memory Module: DIMM Riser B/DIMM 2, 1 GB, DDR2 FB-DIMM, 800 MHz, 0x80AD, 0x48594D5035313241373243503844332D5335
    Memory Module: DIMM Riser A/DIMM 1, 4 GB, DDR2 FB-DIMM, 800 MHz, 0x02BA, 0x202020202020202020202020202020202020
    Memory Module: DIMM Riser A/DIMM 2, 4 GB, DDR2 FB-DIMM, 800 MHz, 0x02BA, 0x202020202020202020202020202020202020
    Memory Module: DIMM Riser A/DIMM 3, 1 GB, DDR2 FB-DIMM, 800 MHz, 0x80AD, 0x48594D5035313241373243503844332D5335
    Memory Module: DIMM Riser A/DIMM 4, 1 GB, DDR2 FB-DIMM, 800 MHz, 0x80AD, 0x48594D5035313241373243503844332D5335
    Bluetooth: Version 4.1.4f2 12041, 2 service, 18 devices, 1 incoming serial ports
    Network Service: Ethernet 1, Ethernet, en0
    PCI Card: Intensity Pro, sppci_video, Slot-2
    PCI Card: ATI Radeon HD 2600, sppci_displaycontroller, Slot-1
    Serial ATA Device: WDC WD3200AAJS-41VWA0, 320.07 GB
    Serial ATA Device: ST2000DM001-1CH164, 2 TB
    Parallel ATA Device: OPTIARC DVD RW AD-7170A
    USB Device: Keyboard Hub, apple_vendor_id, 0x1006, 0xfd400000 / 2
    USB Device: USB Optical Mouse, 0x046d  (Logitech Inc.), 0xc06c, 0xfd430000 / 4
    USB Device: Apple Keyboard, apple_vendor_id, 0x0220, 0xfd420000 / 3
    USB Device: Bluetooth USB Host Controller, apple_vendor_id, 0x8206, 0x5d200000 / 3
    USB Device: iLok, 0x088e, 0x5036, 0x5d100000 / 2
    USB Device: FaderPort, 0x194f, 0x0201, 0x3d100000 / 2
    FireWire Device: built-in_hub, 800mbit_speed
    FireWire Device: 003Rack, Digidesign, 400mbit_speed

    That machine check with uncorrected error is almost always a RAM memory problem. Your report does not call out the specific module(s) involved.
    Sometimes this information can be found if you look in the About This Mac > (More Info) > Memory system report. like this one:
    If modules "drop out" they can generate an error message in the diagnostic pane. Do you have modules in Riser B DIMM 3 & 4 ?? If so, they have dropped out.
    If you remove the side door after the failure, sometimes the failed modules will have the Red LED lit up next to them.

  • Client Security Solution - System Key Recovery - After Lenovo Service

    I have a T61p running Windows 7, which I recently had to send to Lenovo for service after the video failed. According to my repair summary, the motherboard on the computer was replaced.
    I received the laptop back today, and now when I log on, the system comes up with a window from Client Security Solution asking me to "verify my identity" with "reason: system key recovery."
    Unfortunately, the program will not recognize my password, and I get an error message that authentication has failed.
    I tried calling Lenovo's support number, since the problem seems to be directly related to their replacement of the motherboard, but I received the response that "that's a software issue, we can't help you."
    Any help on this is much appreciated!

    hey shannonw,
    could you try uninstalling the Client Security Solution software and then reinstall.
    once done report back on what happen after.
    WW Social Media
    Important Note: If you need help, post your question in the forum, and include your system type, model number and OS. Do not post your serial number.
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"!
    Follow @LenovoForums on Twitter!
    Have you checked out the Community Knowledgebase yet?!
    How to send a private message? --> Check out this article.

  • T61p Client Security Solutions + Password Manager + Two Operating Systems

    Greetings.
        I am running both XP and VISTA on my T61p.  I use the client security solutions password manager feature for websites and network shares.  Since my model has the biometric scanner instead of entering the user ID and password I just swipe my finger.  The issue is that when I first setup client security solutions it creates some system key that I assume is tied to the security chip hardware.  Once I have it setup and working under one operating system it fails to authenticate me under the other operating system.  It brings up a windows that says, "Verify Identity" / "reason for authentication:  system key recovery"  Why am I not able to use this feature under both operating systems?
    Thanks for your time.
     XSYLUS

    Thanks for the reply.
    I was using an older version of RnR, however, after the attempt to re-install, I upgraded to the latest version.  It still errors out.
    As to your second guess, I was hopefull this was the fix, I had forgotten to go through the registry.  I deleted an empty CSS folder in the Common Files folder.  And found several registry entries which have now been deleted.  I don't believe I missed any.  But unfortunately no luck.  I cleared the chip again as well.
    If it adds any clues, the system update was not working either.  But the language fix posted on the forums resolved it.  If I remember correctly the first time I tried to reinstall CSS it did ask a question/comment about language not matching.  I could be wrong, however, there have been alot of attempts.
    I spoke with tech support on the phone with the only suggestion being a clean restore of the laptop which I would like to avoid.
    Thanks again.

  • Regarding mountain lion server: clients experience intermittent service connections. the server system log has the following error- Client handshake failed (6):113: Server not accepting client connections (any ideas???)

    regarding mountain lion server: clients experience intermittent service connections. the server system log has the following error- Client handshake failed (6):113: Server not accepting client connections. any suggestions would be greatly appreciated - thank you

    Hi Jason
    I was getting the same behavior after Apple support had me delete some plist files to get Airplay going. I was also getting the following error:
    the error occurred while processing a command of type 'writesettings' in the plug-in 'server vpn'
    I went into ~/Library/Preferences/ and /Library/Preferences/ and deleted every plist contating the word server. I had to re-set up my server (meaning walk through some intial steps) but all of my settings were still there after that and everything started working again.
    Just a thought, obviously try at your own risk but it worked for me.
    Kellen

  • WSUS Sync is not working Sync failed: UssCommunicationError: WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. --- System.Security.Authentication.AuthenticationException: The remote

    I know there are loads of posts with same issue and most of them were related to proxy and connectivity .
    This was case for me as well (few months back). Now the same error is back. But I've confirmed that FW ports and proxy are fine this time around.
    server is configured on http port 80 
    ERROR
    Sync failed: UssCommunicationError: WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. ---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid
    according to the validation procedure.~~at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request). Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WSyncAction.WSyncAction.SyncWSUS
    I've checked proxy server connectivity. I'm able browse following site from WSUS server
    http://catalog.update.microsoft.com/v7/site/Home.aspx?sku=wsus&version=3.2.7600.226&protocol=1.8
    I did telnet proxy server on the particular port (8080) and that is also fine.
    I've doubt on certificates, any idea which are the certificates which we need to look? And if certificate is expired then (my guess) we won't be able open the above mentioned windows update catalog site?
    Any tips appreciated !
    Anoop C Nair (My Blog www.AnoopCNair.com)
    - Twitter @anoopmannur -
    FaceBook Forum For SCCM

    Hi Lawrence ! - Many thanks for looking into this thread and replying. Appreciate your help.
    Your reply  ("SSL is enabled/configured, and the certificate being used is invalid
    (or the cert does not exist or cannot be obtained), or the SSL connection could not be established.") is very helpful.
    I've already tested CONTENT DOWNLOAD and it's working fine. WSUS Sync was also working fine for years with proxy server configured on port (8080) and WSUS server on port 80.
    My Guess (this is my best guess ;)) is this something to do with Firewall or Proxy side configuration rather than WSUS. However, I'm not finding a way to prove this to proxy/firewall team. From their perspective all the required port communication open and
    proxy server is also reachable. More over we're able to access internet (Microsoft Update Catalog site) over same port (8080).
    Any other hints where I can prove them it's a sure shot problem from their side.
    Thanks again !!
    Anoop C Nair (My Blog www.AnoopCNair.com)
    - Twitter @anoopmannur -
    FaceBook Forum For SCCM

  • Security setup operations failed: creating system keys

    I have just downgraded my T60 laptop from Vista to windows xp using the lenovo CD's.
    Everything seems to be working well, except that each time I boot up the computer, the lenovo security setup software runs.  If I follow the menus all the way through, I get to the following error on the last screen:
    "your security settings have been configured however, one or more setup operations failed: creating system keys"
    There was also a message that previously briefly flashed during the bootup (on the "bios" screen?) which stated that the system was designed to use fingerprints to protect something or other, but this was not enabled.  However:  I then ran all updates for windows xp and for lenovo drivers etc.  This message has now gone away (and unfortunately I didn't write it down).
    I'm guessing the failure to "create system keys" results in the software running each time I boot up.
    Another possibility:  I have not yet enabled the symantec security, as I intend to uninstall it and use other virus protection software.  Could this be causing the"failure to create system keys"?
    (The fingerprint reader works fine, and reads my fingerprint at the windows logon screen.)
    **UPDATE**:  uninstalled symantec security software, and this had no effect.
    Message Edited by orson_m on 12-29-2008 02:47 PM

    I have just downgraded my T60 laptop from Vista to windows xp using the lenovo CD's.
    Everything seems to be working well, except that each time I boot up the computer, the lenovo security setup software runs.  If I follow the menus all the way through, I get to the following error on the last screen:
    "your security settings have been configured however, one or more setup operations failed: creating system keys"
    There was also a message that previously briefly flashed during the bootup (on the "bios" screen?) which stated that the system was designed to use fingerprints to protect something or other, but this was not enabled.  However:  I then ran all updates for windows xp and for lenovo drivers etc.  This message has now gone away (and unfortunately I didn't write it down).
    I'm guessing the failure to "create system keys" results in the software running each time I boot up.
    Another possibility:  I have not yet enabled the symantec security, as I intend to uninstall it and use other virus protection software.  Could this be causing the"failure to create system keys"?
    (The fingerprint reader works fine, and reads my fingerprint at the windows logon screen.)
    **UPDATE**:  uninstalled symantec security software, and this had no effect.
    Message Edited by orson_m on 12-29-2008 02:47 PM

  • Client security system not accepting valid password

    I'm turning my old laptop in to my employer, as I have a new one.  I need to clear out all my security settings.  I know all the passwords.
    However, when I go into the Client Security Solution program and attempt to clear the embedded security chip, it's not accepting my passphrase.  This is true even if I use an administrator account on the machine to reset the passphrase.  I've even removed and re-added the user.  I only use two specific passphrases for all BIOS and security chip settings, and this has worked in the past.
    What should I try to get this cleared?  If I cannot get these items cleared I'm going to have a problem with my employer.
    Also:  when I enter BIOS from boot BIOS notes a Supervisor password is set, which is true, but gives me no chance to enter it.  How can I force BIOS to ask me for the Supervisor password?
    Thank you,
    H.

    Hi,
    in case you really want to clear everything, then my advice would be following:
    - uninstall CSS
    *  reboot
    - make sure, that there is nothing left in Registry , %programfiles% and %programfiles%\Common files , which may indicate to CSS.
    - once everything is clear shut down the system <NOT reboot>
    - start into BIOS and clear the Security chip
    NOTE: basically after the CSS was uninstalled, the items in the Security chip will be corrupted and not usable. So if you install CSS again it will firstly ignore the entries and then clear the chip
    Let me know, if you need any more info, or you have some results from this test.
    Cheers

  • Please help: fail to recover after system crash

    Hi all,
    I tried to start our directory server after system crash due to hardware failure. Error log shows:
    [17/Apr/2010:01:35:15 +0800] - WARNING<20488> - Backend Database - conn=-1 op=-1 msgId=-1 - Detected Disorderly Shutdown last time Directory Server was running, recovering database.
    However, the recover process seems never ends (I waited overnight...). While CPU usage of ns-slapd grows continuously, the server has no response (e.g. ldapsearch waits forever). I make copies of db before starting ns-slapd and thus I tried several attempts:
    1. start as it is.
    2. remove db/log* and start
    3. remove db/log* and db/__db* and start
    4. remove db/* except db/NetscapeRoot and start
    All attempts have the same result - recovery goes on continuously.
    Then I tried to remove db/* and run restoreconfig with an old configuration backup. Then ns-slapd can be started. However, when I do ldapsearch testing:
    ldapsearch -h localhost -v -D"cn=directory manager" -b "" -s base objectclass= namingContexts
    ldap_init( localhost, 389 )
    Bind Password:
    ldap_simple_bind_s: Invalid credentials
    I'm sure the password is correct, and also tried modifying nsslapd-rootpw in config/dse.ldif and corresponding userPassword in configuration file created by saveconfig before restoreconfig.
    Again, all attempts have the same result - invalid credentials. I can see BIND cn=directory manager attempts in logs/access, but also see following line in logs/errors:
    [17/Apr/2010:21:59:08 +0800] - INFORMATION - conn=-1 op=-1 msgId=-1 - get_entry: entry cn=directory manager not found (error 32)
    I'd like to know:
    * if there any other method to make recovery process complete successfully?
    * if there is anything missed/wrong in the restoreconfig process?
    I tried several days but can't make it. Would anyone please help?
    Sorry that we're still using old versions 5.2 patch 5 on Solaris 5.9 on v440 machines...
    Thank you very much.
    /ST Wong ([email protected])

    I hope you have a export of LDAP data backup in LDIF format, if so, please stop the instance and remove all the files from your db directory which includes .db3 and log.* and __db* and then do a ldif2db.
    Once import is complete, start the slapd process.

  • System crash OS 10.10.2

    My system frequently crashes after installing OS10.10.1. I was quite fine with OS10.10 except wifi drop. Now I am really suffering since my system crashes everyday. Can anyone help?

    The short answer is, never install any anti-virus software. The long answer is below.
    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • T500, how do I disable "client security password manager" popups?

    hello.
    I have recently noticed an extremely invasive and irritating popup occur frequently upon opening random folders.
    http://img249.imageshack.us/img249/4913/47354829.jpg
    I honestly do not know what I have done to trigger this, but I absolutely need to disable it.  When UAC appeared warning me about this application, I disallowed it because I did not know what this thing is or what it does.  I found out it was from Lenovo but I cannot figure out how to disable it or uninstall it.  I do not want this feature, it does not even function correctly.  The installation fails becaue it is missing a critical file, but I do not care.  I do not want to install anything, I want it GONE.  I don't know how much of the thinkvantage suite I would have to remove to get rid of this, I just want it gone, I don't want unexpected popups every time I open a folder, I do not need this feature or whatever it provides.  I want to remove it, I cannot find instructions on how to remove this.  I saw a tutorial to remove this software but it involves bring up the Thinkvantage menu and selecting"Thinkvantage Technologies" but there is no "Thinkvantage Technologies" option presented on my T500.
    If anyone can provide any insight on how to get rid of this extremely irritating piece of software I would greatly appreciate it.  It doesn't even function correctly and is extemely frustrating to deal with.  It is malware, I would like it gone.  Thankyou for your time.
    edit: I have not activated my "Security Device" so it appears I cannot access the Client Security Solution which seems to be required to disable this popup.  I do NOT want to actiavte anything because I do not want to want the risk of rendering my computer inoperable due to buggy first party software.

    I had run into a similar problem. I had windows 7 on a t500 which started giving all such popups every time you access control panel or explorer. I tried system restore it gave an error. I tried uninstalling client security from control panel, same popup. Finally I downloaded an uninstaller from download.com called "revo uninstaller". It removes the files and registry entries. Things seems to work on my end now. Will report is any problem comes up

  • Stuttering video/audio and system crashes?

    For the better part of this year, I've had a terrible time with video and audio stuttering on my MacBook (Sept. 2007; 2.16GHz, 4MB RAM). This was especially noticeable when watching streaming Netflix videos, and it didn't seem to matter if I was using Safari or Firefox. Clearing the browser cache has little to no impact.
    The problem appears to have worsened since I upgraded to Snow Leopard about two months ago. (I'd previously been using OS 10.4.11; I now have 10.6.7). This same problem now impacting YouTube and QuickTime, even when I'm viewing files on my hard drive (approx. 27 GB free on a 120 GB drive), so I doubt that my internet connection is to blame. This happens whether I'm on WiFi or on an Ethernet connection -- also, my Ethernet randomly decides to stop working, but that's (probably) a separate issue.
    (Also since my OS upgrade, I'm suddenly having battery issues as well.)
    The problem is sometimes so bad that the entire system crashes, and I'm forced to do a cold/hard reboot of my MacBook. This has happened twice within the past 24 hours. Mostly, I can watch a few seconds or sometimes several minutes of video before the video and audio start sticking and stuttering again -- so pretty much any video capability is nearly worthless to me at this point.
    Here's the Panic Report from my latest system crash this morning... I don't know how to read Panic Reports, so I'm hoping someone might spot something that I can fix to address this issue?
    Interval Since Last Panic Report:  69709 sec
    Panics Since Last Report:          1
    Anonymous UUID:                    0FEDE34F-A36E-41ED-B143-B31AFF61812B
    Wed Jun  8 09:59:42 2011
    panic(cpu 0 caller 0x28f17d): "pmap_flush_tlbs() timeout: " "cpu(s) failing to respond to interrupts, pmap=0x5fd71d0 cpus_to_respond=0x2"@/SourceCache/xnu/xnu-1504.9.37/osfmk/i386/pmap.c:3561
    Backtrace (CPU 0), Frame : Return Address (4 potential args on stack)
    0x420fbb28 : 0x21b510 (0x5d9514 0x420fbb5c 0x223978 0x0)
    0x420fbb78 : 0x28f17d (0x597130 0x5fd71d0 0x2 0x73bd000)
    0x420fbbe8 : 0x2939ff (0x5fd71d0 0x1760a000 0x0 0x41f42221)
    0x420fbd78 : 0x254f7c (0x5fd71d0 0x1760a000 0x0 0xbddb8)
    0x420fbde8 : 0x257f97 (0x416911c 0x5fd71d0 0x1760a000 0x0)
    0x420fbf38 : 0x2aa430 (0x78dc148 0x1760a000 0x0 0x3)
    0x420fbfc8 : 0x2a081a (0x762d0a0 0x0 0x10 0x5341064)
    BSD process name corresponding to current thread: plugin-container
    Mac OS version:
    10J869
    Kernel version:
    Darwin Kernel Version 10.7.0: Sat Jan 29 15:17:16 PST 2011; root:xnu-1504.9.37~1/RELEASE_I386
    System model name: MacBook2,1 (Mac-F4208CAA)
    System uptime in nanoseconds: 35391390659717
    unloaded kexts:
    com.apple.driver.CSRHIDTransitionDriver          2.4.0f1 (addr 0x42077000, size 0x12288) - last unloaded 24672258926767
    loaded kexts:
    com.google.driver.Gild          1.0.0 - last loaded 24609888691244
    com.apple.driver.AudioAUUC          1.54
    com.apple.driver.AppleUpstreamUserClient          3.5.4
    com.apple.Dont_Steal_Mac_OS_X          7.0.0
    com.apple.driver.AppleIntelGMA950          6.2.6
    com.apple.driver.AppleMCCSControl          1.0.17
    com.apple.driver.AudioIPCDriver          1.1.6
    com.apple.driver.AppleHDA          1.9.9f12
    com.apple.driver.AppleIntelIntegratedFramebuffer          6.2.6
    com.apple.driver.SMCMotionSensor          3.0.0d4
    com.apple.iokit.AppleYukon2          3.2.1b1
    com.apple.driver.AppleIntelMeromProfile          19
    com.apple.driver.AirPort.Atheros21          424.14.5
    com.apple.driver.ACPI_SMC_PlatformPlugin          4.5.0d5
    com.apple.driver.AppleLPC          1.4.12
    com.apple.driver.AppleBacklight          170.0.34
    com.apple.filesystems.autofs          2.1.0
    com.apple.driver.AppleIRController          303.8
    com.apple.driver.AppleUSBTrackpad          200.3.2
    com.apple.driver.AppleUSBTCKeyEventDriver          200.3.2
    com.apple.driver.AppleUSBTCKeyboard          200.3.2
    com.apple.iokit.SCSITaskUserClient          2.6.5
    com.apple.driver.AppleIntelPIIXATA          2.5.1
    com.apple.driver.AppleFWOHCI          4.7.1
    com.apple.BootCache          31
    com.apple.AppleFSCompression.AppleFSCompressionTypeZlib          1.0.0d1
    com.apple.driver.AppleEFINVRAM          1.4.0
    com.apple.iokit.IOAHCIBlockStorage          1.6.3
    com.apple.driver.AppleUSBHub          4.1.7
    com.apple.driver.AppleAHCIPort          2.1.5
    com.apple.driver.AppleUSBEHCI          4.1.8
    com.apple.driver.AppleUSBUHCI          4.1.5
    com.apple.driver.AppleRTC          1.3.1
    com.apple.driver.AppleHPET          1.5
    com.apple.driver.AppleSmartBatteryManager          160.0.0
    com.apple.driver.AppleACPIButtons          1.3.5
    com.apple.driver.AppleSMBIOS          1.6
    com.apple.driver.AppleACPIEC          1.3.5
    com.apple.driver.AppleAPIC          1.4
    com.apple.driver.AppleIntelCPUPowerManagementClient          105.13.0
    com.apple.security.sandbox          1
    com.apple.security.quarantine          0
    com.apple.nke.applicationfirewall          2.1.11
    com.apple.driver.AppleIntelCPUPowerManagement          105.13.0
    com.apple.driver.AppleProfileReadCounterAction          17
    com.apple.driver.AppleProfileTimestampAction          10
    com.apple.driver.AppleProfileThreadInfoAction          14
    com.apple.driver.AppleProfileRegisterStateAction          10
    com.apple.driver.AppleProfileKEventAction          10
    com.apple.driver.AppleProfileCallstackAction          20
    com.apple.iokit.IOSurface          74.2
    com.apple.iokit.IOBluetoothSerialManager          2.4.0f1
    com.apple.iokit.IOSerialFamily          10.0.3
    com.apple.driver.DspFuncLib          1.9.9f12
    com.apple.iokit.IOAudioFamily          1.8.0fc1
    com.apple.kext.OSvKernDSPLib          1.3
    com.apple.iokit.IOFireWireIP          2.0.3
    com.apple.iokit.AppleProfileFamily          41
    com.apple.driver.AppleHDAController          1.9.9f12
    com.apple.iokit.IOHDAFamily          1.9.9f12
    com.apple.iokit.IO80211Family          314.1.1
    com.apple.iokit.IONetworkingFamily          1.10
    com.apple.driver.AppleSMC          3.1.0d3
    com.apple.driver.IOPlatformPluginFamily          4.5.0d5
    com.apple.iokit.IONDRVSupport          2.2
    com.apple.iokit.IOGraphicsFamily          2.2
    com.apple.driver.CSRUSBBluetoothHCIController          2.4.0f1
    com.apple.driver.AppleUSBBluetoothHCIController          2.4.0f1
    com.apple.iokit.IOBluetoothFamily          2.4.0f1
    com.apple.iokit.IOUSBHIDDriver          4.1.5
    com.apple.iokit.IOSCSIMultimediaCommandsDevice          2.6.5
    com.apple.iokit.IOBDStorageFamily          1.6
    com.apple.iokit.IODVDStorageFamily          1.6
    com.apple.iokit.IOCDStorageFamily          1.6
    com.apple.driver.AppleUSBMergeNub          4.1.8
    com.apple.driver.AppleUSBComposite          3.9.0
    com.apple.iokit.IOATAPIProtocolTransport          2.5.1
    com.apple.iokit.IOSCSIArchitectureModelFamily          2.6.5
    com.apple.iokit.IOATAFamily          2.5.1
    com.apple.iokit.IOFireWireFamily          4.2.6
    com.apple.driver.XsanFilter          402.1
    com.apple.driver.AppleEFIRuntime          1.4.0
    com.apple.iokit.IOUSBUserClient          4.1.5
    com.apple.iokit.IOAHCIFamily          2.0.4
    com.apple.iokit.IOUSBFamily          4.1.8
    com.apple.iokit.IOHIDFamily          1.6.5
    com.apple.iokit.IOSMBusFamily          1.1
    com.apple.security.TMSafetyNet          6
    com.apple.kext.AppleMatch          1.0.0d1
    com.apple.driver.DiskImages          289
    com.apple.iokit.IOStorageFamily          1.6.2
    com.apple.driver.AppleACPIPlatform          1.3.5
    com.apple.iokit.IOPCIFamily          2.6
    com.apple.iokit.IOACPIFamily          1.3.0
    Model: MacBook2,1, BootROM MB21.00A5.B07, 2 processors, Intel Core 2 Duo, 2.16 GHz, 4 GB, SMC 1.17f0
    Graphics: Intel GMA 950, GMA 950, Built-In, spdisplays_integrated_vram
    Memory Module: global_name
    AirPort: spairport_wireless_card_type_airport_extreme (0x168C, 0x87), Atheros 5416: 2.1.14.5
    Bluetooth: Version 2.4.0f1, 2 service, 19 devices, 1 incoming serial ports
    Network Service: AirPort, AirPort, en1
    Serial ATA Device: FUJITSU MHW2120BH, 111.79 GB
    Parallel ATA Device: MATSHITADVD-R   UJ-857E
    USB Device: Built-in iSight, 0x05ac  (Apple Inc.), 0x8501, 0xfd400000
    USB Device: Apple Internal Keyboard / Trackpad, 0x05ac  (Apple Inc.), 0x021a, 0x1d200000
    USB Device: IR Receiver, 0x05ac  (Apple Inc.), 0x8240, 0x5d200000
    USB Device: Bluetooth USB Host Controller, 0x05ac  (Apple Inc.), 0x8205, 0x7d100000

    Definitely not. I've got a 2007 MacBook, and even with the extended warranty that coverage expired a year ago.
    If you're concnered about cost, you could always call and ask. In my experience, the people at the Genius Bar (and Apple Store in general) are happy to provide assistance free of charge. If you have to replace a part, system, etc. you'll certainly need to cover that, but they should talk to you about costs and get your consent before doing any work on your machine.

  • T61p 6460 74M - Client Security Solution Problem

    I am having problems with the Client Security Solution running under Vista
    I am able to log in OK using the fingerprint reader or password however after the system boots the CSS widow appears asking for password, I enter the password but it does not recognise this and requeste retry or cancel. If I retry the password entry it advises that "Authentication Failed". I then cancel and the CSS window offers to configure the CSS - hit "Yes", requests verification of identity with password - I enter password - response is "Authentication Failed" and back to square 1.
    Can the CSS be reinstalled and then reinitialised. This problem may have arisen after I upgraded my Norton Internet Security 2007 or 2008 to NIS 2009, or when I reset Internet Explorer 7. I note at this time the Password Manager dissappeared from IE7.
    Does anybody have some advice please since this useful function - Password Manager - has now been either disabled or removed.
    Regards Chris R.

    I had problem with CSS also after installing (maybe) Norton Update. No answer from CSS at all any where, and I could not start it it either.
    I reinstalled it with the application:
    C:\Program Files\Lenovo\Client Security Solution\css_admin_vista_launcher.exe
    An then it works again - installation will delete all store passwords!

  • BW System crashed due to DB6_ADM_RUNSTATS, error -911, -1032, --1224

    Hi Friends,
    we are using AIX 5.2 with DB2 8.1 on BW 3.5/640 system.
    The below warning is also coming very frequently which is causing system crash sometimes:
    1.Function DB6_ADM_RUNSTATS failed for List of Tables . Reason: ADBC
    2. Error and Database error -911 at EXE
    3. BTC 029 061 SEMABL BYL Database error -1032
    4. DIA 003 061 SEJABE BYM SQL error -1224 occurred;
    work process in reconnect status
    18:58:59 DP Q04 Connection to user
    14871 (ITGARO ), terminal 125 (nbw20810 ) lost
    19:04:06 BTC 029 061 SEMABL BYL Database error -1032
    requires intervention from database administrator
    19:04:06 BTC 029 061 SEMABL BY4 Database error -1032 at PRE
    access to table SWT_LOGCAT
    19:04:06 BTC 029 061 SEMABL BY0 > SQL1032N No start database
    manager command was issued.
    19:04:06 DIA 012 061 USEDBA BY2 Database error -1032 at CON
    19:04:06 DIA 017 061 DEKASO BY2 Database error -1032 at CON
    19:04:06 DIA 014 R19 Initialization DB-
    Connect Failed, Return Code 000256
    19:04:06 DIA 019 061 CHPAPR BYL Database error -1032
    requires intervention from database administrator
    19:04:46 DIA 003 061 SEJABE BYM SQL error -1224 occurred;
    work process in reconnect status
    19:04:46 DIA 012 061 USEDBA BYM SQL error -1224 occurred;
    work process in reconnect status
    19:04:46 DIA 005 061 DKKILA BYM SQL error -1224 occurred;
    work process in reconnect status
    19:04:46 DIA 015 061 NLBAGR BYM SQL error -1224 occurred;
    work process in reconnect status
    19:04:46 BTC 030 000 SESYSTADMJOB BY2 Database error -1224 at OPC
    19:04:46 BTC 030 000 SESYSTADMJOB BY0 > SQL1224N The database
    manager is not able to accept new
    19:04:46 BTC 030 000 SESYSTADMJOB BY0 > requests, has terminated
    all requests in progress, or has
    19:04:46 BTC 030 000 SESYSTADMJOB BY0 > terminated your particular
    request due to a problem with you
    19:04:46 BTC 030 000 SESYSTADMJOB BY0 > request. SQLSTATE=55032
    19:04:46 DIA 017 061 DEKASO BYM SQL error -1224 occurred;
    work process in reconnect status
    19:04:46 DIA 017 061 DEKASO R38 Error at DB commit, return
    code 001024
    any idea what can be done to resolve this issue.
    Thanks and regards
    Regards - Munish

    tail -310 db2diag.log
              /db2/BWP/log_dir/NODE0000/.
    2010-01-14-10.32.03.583933+060 I15733311A444      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sheapthres_shr" From: "73056" <automatic>  To: "81793" <automatic>
    2010-01-14-10.32.03.593671+060 I15733756A436      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sortheap" From: "3653" <automatic>  To: "4089" <automatic>
    2010-01-14-10.42.55.641172+060 I15734193A271      LEVEL: Warning
    PID     : 3633166              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.42.55.753060+060 I15734465A271      LEVEL: Warning
    PID     : 3633168              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.42.56.076470+060 I15734737A271      LEVEL: Warning
    PID     : 3633170              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.42.57.940361+060 I15735009A271      LEVEL: Warning
    PID     : 3633172              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.42.57.984990+060 I15735281A271      LEVEL: Warning
    PID     : 3633172              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.42.58.227268+060 I15735553A271      LEVEL: Warning
    PID     : 3633174              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.51.33.683730+060 I15735825A462      LEVEL: Info
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, buffer pool services, sqlbAlterBufferPoolAct, probe:90
    MESSAGE : Altering bufferpool "BP_STD_16K" From: "1348672" <automatic> To:
              "1356492" <automatic>
    2010-01-14-10.53.03.721301+060 I15736288A567      LEVEL: Warning
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, Self tuning memory manager, stmmUpdateDBConfig, probe:285
    MESSAGE : ZRC=0x82AE00A6=-2102525786=STMM_DYNAMIC_UPDATE_FAILED
              "STMM dynamic update failed"
    DATA #1 : String, 76 bytes
    Dynamic update failed for parameter Locklist. Attempted update value is 5472
    2010-01-14-10.53.03.722593+060 I15736856A444      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sheapthres_shr" From: "81793" <automatic>  To: "78415" <automatic>
    2010-01-14-10.53.04.168179+060 I15737301A458      LEVEL: Info
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, buffer pool services, sqlbAlterBufferPoolAct, probe:90
    MESSAGE : Altering bufferpool "IBMDEFAULTBP" From: "6524" <automatic> To:
              "5244" <automatic>
    2010-01-14-10.53.04.182145+060 I15737760A436      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sortheap" From: "4089" <automatic>  To: "3920" <automatic>
    2010-01-14-10.57.13.883762+060 I15738197A271      LEVEL: Warning
    PID     : 3522744              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.14.048828+060 I15738469A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.14.216675+060 I15738741A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.14.285737+060 I15739013A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.14.917712+060 I15739285A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.14.980479+060 I15739557A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.15.254151+060 I15739829A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.15.308542+060 I15740101A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.15.586406+060 I15740373A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.15.650049+060 I15740645A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.15.934485+060 I15740917A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.16.023114+060 I15741189A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.16.289905+060 I15741461A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.16.345930+060 I15741733A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.16.627395+060 I15742005A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.16.701147+060 I15742277A271      LEVEL: Warning
    PID     : 3522746              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    2010-01-14-10.57.31.076427+060 I15742549A379      LEVEL: Severe
    PID     : 786644               TID  : 1           PROC : db2sysc 0
    INSTANCE: db2bwp               NODE : 000
    FUNCTION: DB2 UDB, routine_infrastructure, sqlerReturnFmpToPool, probe:910
    MESSAGE : marking fmp as unstable:
    DATA #1 : Hexdump, 4 bytes
    0x078000000041EF40 : 0036 3064                                  .60d
    2010-01-14-10.57.31.076634+060 I15742929A2815     LEVEL: Severe
    PID     : 786644               TID  : 1           PROC : db2sysc 0
    INSTANCE: db2bwp               NODE : 000
    FUNCTION: DB2 UDB, routine_infrastructure, sqlerReturnFmpToPool, probe:911
    MESSAGE : marking fmp as unstable:
    DATA #1 : Hexdump, 488 bytes
    0x078000000041EF40 : 0036 3064 0000 0000 018A 0000 0000 0000    .60d............
    0x078000000041EF50 : 018B 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EF60 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EF70 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EF80 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EF90 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFA0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFB0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFC0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFD0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFE0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041EFF0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F000 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F010 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F020 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F030 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F040 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F050 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F060 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F070 : 0000 0000 0000 0000 0000 0001 111F 7720    ..............w
    0x078000000041F080 : 0780 0000 1007 0094 0780 0000 1008 0094    ................
    0x078000000041F090 : 0001 0000 0000 0000 0000 0000 0000 029A    ................
    0x078000000041F0A0 : 0000 00A3 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F0B0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F0C0 : 0780 0000 0023 AB20 0780 0000 0041 EF40    .....#. .....A.@
    0x078000000041F0D0 : 0780 0000 002C FF00 0000 0001 0000 0001    .....,..........
    0x078000000041F0E0 : 0000 0000 0000 0000 0000 0001 0000 0000    ................
    0x078000000041F0F0 : 0000 0000 0000 0000 0000 0000 0000 0000    ................
    0x078000000041F100 : 0780 0000 001A FB60 0000 0000 0000 0000    .......`........
    0x078000000041F110 : 0000 0150 0000 0000 0000 0000 0000 0001    ...P............
    0x078000000041F120 : 0100 0000 0000 0000                        ........
    2010-01-14-10.57.31.076872+060 I15745745A426      LEVEL: Warning
    PID     : 548998               TID  : 1           PROC : db2agent (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-28                 APPID: *LOCAL.db2bwp.100111182348
    AUTHID  : SAPBWP 
    MESSAGE : Removing FMP from pool
    DATA #1 : Hexdump, 16 bytes
    0x0FFFFFFFFFFF0748 : 0780 0000 0041 EF58 0036 3064 0000 0000    .....A.X.60d....
    2010-01-14-10.57.34.238172+060 I15746172A444      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sheapthres_shr" From: "78415" <automatic>  To: "73992" <automatic>
    2010-01-14-10.57.34.241586+060 I15746617A436      LEVEL: Event
    PID     : 798956               TID  : 1           PROC : db2stmm (BWP) 0
    INSTANCE: db2bwp               NODE : 000         DB   : BWP
    APPHDL  : 0-52                 APPID: *LOCAL.db2bwp.100111182342
    AUTHID  : SAPBWP 
    FUNCTION: DB2 UDB, config/install, sqlfLogUpdateCfgParam, probe:20
    CHANGE  : STMM CFG DB BWP: "Sortheap" From: "3920" <automatic>  To: "3699" <automatic>
    2010-01-14-10.57.40.592365+060 I15747054A271      LEVEL: Warning
    PID     : 3522628              TID : 1
    FUNCTION: DB2 Common, Security, Users and Groups, secLogMessage, probe:20
    DATA #1 : String, 65 bytes
    Password validation for user bwpadm failed with rc = -2146500507
    ];bwpadm@nbcsaprtv016:/db2/BWP/db2dump

Maybe you are looking for

  • How to find which user has killed a particular job in CPS?

    Hi All, I am new in CPS. I want to find the user who has killed a particular job in CPS? Thanks in Advance. Avdhesh

  • Backup my Data in DFU Mode

    Hello, My iPhone 4s iOS 5.1.1 keep rebooting (continuous reboot loop). I don't have a most recent backup. I need to backup my files first before I recover or restore my device OR get out of the reboot loop. Please help me.... Thanks

  • APE 10: How to select a frame be the thumbnail for the exported video file?

    I have Adobe Premiere Elements 10 and using Windows 7. I create a title and place it as the first clip in the Sceneline. When I export the video and look at the file using Windows Explorer folder view, the thumbnail shown is a frame from another clip

  • Safari 4.0.3 Will not open a window...

    I just upgraded to 4.0.3 and when I open Safari the software is open but no window appears. I click on file-new window and no window appears. I then file-Quit Safari and it says there is a window open but it isn't. I then click to close the app and i

  • Query on Extended Idoc Types

    Hi all, I am new to ALE/IDOC'S but has bit idea on that. I was asked to extend an Extension Idoc type. Kindly give me the steps on that. Also if an Idoc type is released, then how can i modify that idoc for segment insertion? Kindly reply me, i m in