How can I tell if direct-path insert is really being used?

I have a number of INSERT statements with /*+ APPEND */ hints, that I suspect are not using direct-path insert processing. How can I tell (via the plan, via Enterprise Manager, whatever) if direct-path is being used?
If it is not being used, then I can research why that might be, and try to resolve the obstacles there. But if it is being used, then I want to know that so I can focus elsewhere.
Thanks,
Mike

mtefft wrote:
The question of whether direct-path is possible with multi-table inserts has been on my mind...
Moreover, in another forum post, we have eyewitnesses that it has happened at least once:
APPEND Hint in Multi-table insert
So I think that post (giving examples of Explain plans with multi-table inserts successfully using direct-path) answers my question.
Mike,
Thanks for that link. When I checked my example again I realised that it had a foreign key constraint between the two tables I was inserting into. (It was a demonstration of how to normalise an incoming denormalised address table, so converted a flat table into address/address lines). When I removed the constraint I got the multi-table insert.
However, I followed this up with a check on the execution plans and for the 10.2.0.3 I was running noted the following:
Plan reported after running the insert and select from dbms_xplan.display_cursor()
| Id  | Operation           | Name | Rows  | Bytes | Cost  |
|   0 | INSERT STATEMENT    |      |       |       |    30 |
|   1 |  MULTI-TABLE INSERT |      |       |       |       |
|   2 |   TABLE ACCESS FULL | T3   | 10000 |  1240K|    30 |
------------------------------------------------------------Plan reported after explain plan / select from dbms_xplan.display()
| Id  | Operation           | Name | Rows  | Bytes | Cost  |
|   0 | INSERT STATEMENT    |      | 10000 |  1240K|    30 |
|   1 |  MULTI-TABLE INSERT |      |       |       |       |
|   2 |   DIRECT LOAD INTO  | T1   |       |       |       |
|   3 |   DIRECT LOAD INTO  | T2   |       |       |       |
|   4 |    TABLE ACCESS FULL| T3   | 10000 |  1240K|    30 |
------------------------------------------------------------If you try to check for direct path inserts by looking at the in-memory plans, you might not see the direct load that is really happening. (Perhaps the a check that both / all the target tables are locked with TM mode 6 may give you a clue.)
Regards
Jonathan Lewis

Similar Messages

  • How can i tell if my lost/stolen iPod is being used

    My daughter has either lost or had stolen her ipod.  how can we see if someone else may be using it?

    Look for charges/purchase
    Look for photos in your PhotoStream
    Lookf for posts make for accounts used on the iPod like FaceBook
    There is not good way really
    - If you previously turned on FIndMyiPod on the iPod in Settings>iCloud and wifi is on and connected go to iCloud: Find My iPhone, sign in and go to FIndMyiPhone. If the iPod has been restored it will never show up.
    - You can also wipe/erase the iPod and have the iPod play a sound via iCloud.
    - If not shown, then you will have to use the old fashioned way, like if you lost a wallet or purse.
    - Change the passwords for all accounts used on the iPod and report to police
    - There is no way to prevent someone from restoring the iPod (it erases it) using it unless you had iOS 7 on the device. With iOS 7, one has to enter the Apple ID and password to restore the device.
    - Apple will do nothing without a court order                                                        
    Reporting a lost or stolen Apple product                                               
    - iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number

  • How can I tell if my computer  orweb surfing is being monitored?

    How can I tell if my computer orweb surfing is being monitored? just got Apple Remote Desktop 3 at the office and want to know if Big Brother is watching me....how can I know?

    If you set up your mac yourself and it was never touched by an admin, then you have nothing to worry about. If your IT dept set up the mac and gave it to you, then they could have a hidden admin account and turn on ARD without your knowing. well, you'd have to go into the Sharing preference pane to see if it's turned on. the icon is turned off and on from the ARD preferences within the Sharing pane.
    it sounds like your account is an admin account so you have the ability to change the ARD client preferences. if your IT dept wants this on, you should leave it on so they don't take away your admin privs.

  • How can you tell if a process step is already being processed?

    Further to my last note regarding assigned a process step to multiple users, how can you determine if the step is currently being processed by another user?  When opening a task which has already been opened by another user, the message "The following action has been opened by another 1 user(s)...."
    I would like to prevent the second user from making any changes to the object if it's already been opened by another user, hence this request.
    Thx!

    Top Right hand corner of the Safari window you will see a padlock. This shows it's secure.
    Otherwise, you are pretty much working on trust. If you want to purchase something online and the site takes you through a paypal based checkout, it's fairly standard practice.

  • How can I unverify an email once it is not being used?

    I changed my iTunes account email once. Now, I need to get back to that email, but Apple says it is being used in another account. I am pretty sure that the first email is not being used for any other account.
    Through Apple's site, I chose "iForgot" to resend the password , so I should be able to login to that email account (if it was linked to another account, like they claim). Apple can't send an email for verification. Actually, they say that the email was sent, but it was not.
    How can I unverify this email once Apple says it is linked to another account, but it is not (if it was, the iForgot email would come)?

    for either method to work the state dividing lines must go past the state borders, for example, the line that divides these two states needs to go north a little bit more, I exaggerated the space so you can see, for your map this gap must be really small. Zoom in where you have trouble making separate shapes and fix it before using either tool.

  • Superdrive - How can I tell if its broken or I'm just using it wrong?

    I've had my Quad PPC G5 for a while now, and the Superdrive has always been flakey...
    When I try to burn my vids using DVD Studio Pro mostly (but other software is used), it says it burns, but when move it to other machines or my TV, the vids freeze midway... When i copy the files to my PC and burn from there using Roxio, it burns fine & plays fine... I'm afraid to use the Superdrive now as I've given my stuff to people and they can't play it..
    I also have problems ejecting discs once theyre in the drive...If i have nothing in there, eject works fine, but if i put discs (any discs) in there, I have to reboot and hold down the eject button to get them out...
    I have AppleCare, but before i call, I'm hoping it is just a matter that I;m doing something wrong or using cheap DVDs (Generic DVD-R's 16X speed)... Buit that wouldn't explain away the eject issue...
    Any ideas? Thanks!

    Hi James-
    Here's the info on your drive (performance review):
    http://www.cdfreaks.com/reviews/First-look-LG-GSA-4165B-DVD-Burner/1st-look-conc lusion.html
    The maker is LG- typically receives good reviews.
    I notice that you are running OS 10.4.6. How long has it been since you did a system reinstall? With regard to the eject function, it could very well be that you have some corrupt files within the OS. Could be that a repair with Disk Utility could help. Beyond this, an Archive and Install may be useful, followed by (preferred) a clean system reinstall. A simple re-update might be all that is needed.....
    But, since the drive has displayed the problem from the beginning, it does tilt the balance towards a hardware problem. Having said this, depending on the original OS version (10.4.2?), and the update history, the problem could lie within the firmware, or, system software.
    Does the problem occur in a different user account? Setting up a second user account, with Admin privileges, is a good trouble shooting technique. If no problem, then it is in your account only. If the same, the saga continues.......
    So- first, I would run Disk Utility (booted from install disk) and repair the hard drive. I would also repair permissions. Following this (after testing the drive) I would try a re-application of the 10.4.6 Combo Update:
    http://www.apple.com/support/downloads/macosx1046comboforppc.html
    Should this fail, I think I would be inclined to use my Applecare.
    As for the disk reading and writing- take note of the makers that are listed on the bottom of the review (1st look conclusion) page that I linked. Can't go wrong with them. Also, look at user responses on the following (select format):
    http://www.cdfreaks.com/media/
    G4AGP(450)Sawtooth, 2ghz PowerLogix, 2gbRAM, 300gbSATA+160gbATA, ATI Radeon 9800   Mac OS X (10.4.8)   Pioneer DVR-109, ExtHD 160gb x2, 23"Cinema Display, Ratoc USB2.0, Nikon Coolscan

  • How can i tell if my new Apple TV is streaming using wireless N or G

    Ok i sold my 40G apple TV a few weeks back before the itunes update.. all worked great. Yesterday i purchased a new 16G apple TV and a new belkin N1 wirlessN router.
    So far i have had a few problems with syncing. After much searching here it looks like it is an issue with the new itunes build. Apple TV drops in and out of itunes etc.
    However when it is connected i found the streaming of movies and TV shows not much better than my old wireless G router. I was expecting much more. So as a shot in the dark is there a way to see the connection speed or transfer speed on the apple TV
    TIA
    henry

    Does your Mac have Wireless 802.11N? Both the router and the Mac must have N enabled to get the speed. ATV to Router will be at N speeds, but this does not matter if the bottleneck is between the Mac and the Router.
    Newer iMacs and MacBooks have N, If you bought before 2007, maybe not. Maybe check your system profiler to see which you have.
    For your initial sync, you may want to use an ethernet cable. See the Apple Knowledgebase article on how to do this. Once the initial sync is done, the incremental syncs should go pretty well with either g or n.
    I have n. My wife's Mac has g. She is able to stream video to the ATV with no problem. We are using the Airport Extreme, though, not the Belkin.

  • HT2471 How can I tell if my g5 power mac quad(2006) uses PCIe or PCIx cards?

    Hello,
    I am purchasing a Pro Tools HD8 system, and I need to know if my g5 uses PCIe or PCIx cards? How do I find this out?
    Regards, Dean.

    Choose About this Mac from the Apple menu, click on More Info, and check the model identifier. If it's PowerMac11,2, the computer has PCI Express slots. If not, they're PCI-X.
    (76258)

  • How can I tell if a page is secure

    How can I tell if a page is secure? There used to be an option to view a security certificate although this has been removed from the toolbar?
    Also, how can I refresh a page now that the button has been deleted from the toolbar?
    Thanks

    It has been changed. Please read this article:
    https://support.mozilla.com/en-US/kb/Site%20Identity%20Button
    You can use this add-on to get the classic icon back:
    https://addons.mozilla.org/en-US/firefox/addon/padlock-icon/
    Refresh Button:
    It has been incorporated into the far right end of the Address Bar. When you load a page, it is a "Stop" button, when it finished loading, it turns into a "Reload" button.
    If you want it to be somewhere else in the Toolbar, you can drag it out to wherever you want. If that doesn't work, try this:
    View > Toolbars > Customize and drag the Refresh/Stop icon into the window, then drag it back out to wherever you prefer.

  • Direct path read caused by direct path insert?

    Oracle 9.2
    ========
    Consider this INSERT statement
    INSERT /*+ APPEND USE_HASH*/ INTO schema.tablename (...)
    SELECT * FROM view_tablename;
    This statement takes about 30 minutes to complete.
    If I look at the v$session_wait, I can see that the session waits denoting db file scattered read (which is understandable). However, at the very end of the 30-minute wait, the v$session_wait view shows that it is waiting denoting direct path read. I want to understand how can a direct path INSERT (or for that matter a simple INSERT statement) can cause a direct path read wait. Can you show me some doc which expalain this in more detail than Oracle doc? Thanks in advance.

    Hmm....ok, well,first, there's a problem w/ the hint specification.
    The USE_HASH hint makes no sense as a hint to the insert statement. It only makes sense in the context of a select statement. Also, it should specify a table alias. So, you could have something like:
    insert /*+ APPEND */.into some_tab
    select /*+ use_hash(tab_alias) */ col1,col2,col3 from .....
    Now, as to the question of direct path read:
    The direct path read event indicates a disk sort. So, it's likely the source of the direct path read wait was due to sorting in the processing of the select statement. I can't imagine how the insert would cause direct path read.
    Hope that helps,
    -Mark

  • Nologging direct-path insert into an indexed table

    Hello,
    Does anyone have an idea how I can suppress generation of undo logs for direct-path insert into an indexed table on 11.2.0.1.0:
    CREATE TABLE TBL(ID NUMBER) NOLOGGING;
    CREATE INDEX IDX ON TBL(ID) NOLOGGING;
    INSERT /*+ APPEND */ INTO TBL SELECT /*+ APPEND */ ROWNUM FROM ...; -- Source table has 400,000,000+ rows
    Regards,
    Angel Tsankov

    Pl do not post duplicates - Why does Oracle not use direct-path insert when instructed to do so - pl continue the discussion in your original thread

  • PLEASE HELP! How can I tell if my Imac has been hacked?

    PLEASE HELP! How can I tell if my Imac has been hacked? I see a few people have asked this question but the responses tended to be advice on what to do once you've been hacked, not what can done to find out if you have been hacked. I have a late 2012 model imac. My sharing was off and remote logging was off. I use an external router that send wireless to about 4 consoles in the flat. I don't think I have any firewalls up (now looking like a mistake). I think I'm possibly being hacked  due to abnormal behaviour and most recently my camera was turned off all day (no LED) then I went to record something on Photo Booth, the application popped up displaying an image of me getting dressed (nightmare!) which happened hours earlier when the camera was off. This image quickly then disappeared and the camera began working normally. Very strange and alarming. Please help me. Any advice would be very much appreciated. Thanks.

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. All it does is to collect information about the state of the computer. That information goes nowhere unless you choose to share it. However, you should be cautious about running any kind of program (not just a shell script) at the behest of a stranger. If you have doubts, search this site for other discussions in which this procedure has been followed without any report of ill effects. If you can't satisfy yourself that the instructions are safe, don't follow them. Ask for other options.
    Here's a summary of what you need to do, if you choose to proceed:
    Copy a line of text in this window to the Clipboard.
    Paste into the window of another application.
    Wait for the test to run. It usually takes a few minutes.
    Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    4. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    5. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    6. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts 51 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports 'com.autodesk.AutoCad com.evenflow.dropbox com.google.GoogleDrive' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */  /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/root/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1000) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/d;/(etc|Preferences)\//s/^\.\/[^/]+//p;' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| ","||kMDItem'${p[35]}'=");sub("^.."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[9]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n  "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n  [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n  ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' ' /^ +B/{ s/.+= |(-[0-9]+)?\.s.+//g;p;} ' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' 's/0/Off/p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil PlistBuddy whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '-c Print /L*/P*/loginw*' '-c Print L*/P*/*loginit*' '-c Print L*/Saf*/*/E*.plist' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' '-c Print\ :'${p[35]}' 2>&1' '-c Print\ :Label 2>&1' '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..8};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A1 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D23 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D22 4 4 50 0;D13 14 3 49 5;D12 26 48 59 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    7. Launch the built-in Terminal application in any of the following ways:
    Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    8. If you see an error message in the Terminal window such as "syntax error," enter
    exec bash
    and press return. Then paste the script again.
    9. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    10. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    11. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    12. When you post the results, you might see the message, "You have included content in your post that is not permitted." It means that the forum software has misidentified something in the post as a violation of the rules. If that happens, please post the test results on Pastebin, then post a link here to the page you created.
    Note: This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • I'm told there is a virus associated with Adobe Reader. How can I tell if my machine is effected and if so what is the cure. I'm running OS X10.6.8 on an iMac with safari 5.1.5

    I'm told there is a virus associated with Adobe Reader. How can I tell if my machine is effected and if so what is the cure. I'm running OS X10.6.8 on an iMac with safari 5.1.5

    There are no viruses currently affecting the Mac but there is something called Flashback which is malware that has been doing the rounds and affected many Mac users. Apple have released some updates to Java that should remove it and improve protection. Run Software Update to see if there is anything for downloading.
    A few precautions that can help prevent your Mac becoming infected:
    If you use Flash only download it directly from Adobe.
    In all web browsers disable Java (but do leave Javascript on as that's something else).
    In all web browsers make sure downloaded files aren't set to automatically open after downloading.
    Consider disabling Java completely (launch Java Preferences in the Utilities folder and disable it - you'll likely rarely, if ever need it. If you do just turn it on and off again when your done).
    You can also check out this link:
    http://lifehacker.com/5900434/how-to-find-out-if-your-mac-was-infected-by-the-fl ashback-trojan-in-one-click

  • HT1515 Just installed Airport Express on Mac 10.6.8  Can't see base station.  Hard Reset the Airport.  Rebooted machine.  How can I tell if this is a Mac problem or Airport Express Problem?

    I have a Mac 10.6.8.  Just installed Airport Express.  I can't see any base stations.  I did a hard reset on the Airport Express, turned off all devices,  turned them back on.   I see plenty of Airport networks in the neighborhood.  How can I tell if I have a Mac problem or an Airport Express problem?  Airport Express blinks Amber. 

    Obviously,  I'm still using ethernet to be able to reply to this.
    Alright, use the same ethernet cable to plug directly into the airport express. This will FORCE the airport utility to now see it regardless of weak signals & interference. You can set it up that way.
    BTW, what is the original intent on the express?

  • How can I tell if my EMET GPO is in place instead of the local xml file on a computer?

    Hi,
    I did the following commands on my test machine with EMET 5.1 installed:
    emet_conf --delete_all
    emet_conf --refresh
    emet_conf --list
    There were applications that came up but how can I tell if it is really coming from GPO and not the local configuration file that came with EMET 5.1? Am I suppose to see a "greater than symbol" prior to the name of the application or no?
    When I ran rsop.msc on the machine, I can see that my group policy in place.  But I thought I'm suppose to see a greater than symbol (like below) - which means the list of apps are coming from the GPO:
    Executable             Path                                  
    Mitigations
    >7z.exe                *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >7zFM.exe              *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >7zG.exe               *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 8.0\Acrobat            DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 9.0\Acrobat            DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 10.0\Acrobat           DEP SEHOP NullPage HeapSpray
    Am I wrong? Is that an EMET 3.1 "thing" only?  Please let me know.
    Thanks!

    Never mind.  I got it.  If you do an "Emet_conf --List" it will turn out something like this that indicates you are getting your policies from GPO

Maybe you are looking for

  • Photoshop Elements 8 - unable to view RAW files

    Hi. I have been using Adobe Elements 8 since it came on to the market. I use Canon Cameras and my latest one being a 1Dmkiv. When I got the Canon 1D I down loaded the appropriate RAW file I think it was 5.6 and followed the instructions and changed t

  • Firefox always opens with "Well, this is embarassing...." not with my newest window & tab settings. How do I fix this?

    I have entered different settings for my home page, opening window etc but each time Firefox opens it's stuck on the same problem and asks if it should Restore or Start New Session, never starting up with my new options. thx for any info

  • Transfer SGTXT from Billing to Accounting

    Hi All, Here we have a requirement like we need a text field(length more than 40 char) in VF01 transaction to enter Narration and that should be copied to SGTXT(Itemtext) field of corresponding accounting document. Presently we are using one long tex

  • Is it normal for iPad to get hot after 30 min usage?

    Hi, well after thirty minutes or so my iPad 1 starts getting hot and temperatures continue to increase .. This also happens while charging. I just wanted to know if this is normal ..

  • Classic Scenario in SRM 7.0

    Hi, I have a doubt. Please correct me if I am wrong: -  As per my knowledge, confirmation and invoice can be created either in SRM or ECC in SRM 5.0. However in the SRM 7.0    confirmation and invoice can not be created in SRM 7.0. It has to be creat