A few packages for chinese

I have compiled a few packages for better chinese support, though you can do it yourself easily, but if you like, there are mine.
freetype-2.1.7(with aiko's CJK patch)
scim-0.9.0
scim-tables-0.3.1
reciteword-0.8.2
stardict-2.4.1
I don't know how to put them in the incoming, and I am on the office right now, I will post my PKGBUILD when I go back home.
Sorry for this.

Sorry fot posting in the wrong section. By default Arch has some mess-up when displaying chinese charactors due to freetype and fontconfig, so I have to patch them firstly to get my chinese showing beautifully(surely it doesn't affect Non-chinese, but it's not a bug, it's defection of freetype mostly). I have some troubles in fontconfig makepkg but freetype comes out without problems.
scim is a input method platform for chinese(both Simplifed and Traditional), japanese and korean written by C++. it is GPL application, too.
scim-table is coding tables fot inputing chinese and so on.
A input method is a must-have for CJK user, so please include SCIM or FCITX in the next  Arch release.

Similar Messages

  • RoboHelp Packager for Adobe AIR (BETA)

    It is so exciting. It been just a few months since we
    released Adobe RoboHelp 7 and a brand new Technical Communication
    Suite, and today we are ready to share with you guys what we
    perceive as the future of Online Help. All I can say is that Time
    flies like an arrow. With this, I welcome you all to this new world
    of Web 2.0 and the future of Online Help - check out the Public
    Beta of
    RoboHelp
    Packager for Adobe AIR
    The tool is available for Free of Cost and can be used by
    customers who have either Adobe RoboHelp 6 or Adobe RoboHelp 7 or
    the Technical Communication Suite.
    The RoboHelp Packager for Adobe® AIR™ allows you
    to convert your existing WebHelp files generated using Adobe
    RoboHelp® to an Adobe AIR application. Help and knowledge
    bases delivered as Adobe AIR application will have a consistent
    look and feel across all platforms.
    RoboHelp Packager for Adobe AIR can:
    Generate a single distributable file
    similar to a .chm file.
    Provide a variety of skins from which a user can choose from.
    In addition, for any skin a user can choose different themes, which
    control the look and feel in terms of colors and button/icons
    images.
    Provide a consistent look and feel on all platforms and
    operating systems.
    Enable you to comment, in addition to using other advanced
    features such as Breadcrumbs, Mini TOC and Security (Digital
    Signatures).
    The output generated after running this tool is an .air file.
    This is a single file that has built-in logic to install itself.
    The same file can be installed on any platform that has Adobe®
    AIR installed. Installing the Adobe AIR runtime is as seamless as
    installing the Adobe Flash® Player for your browsers.
    Another important aspect of the Adobe AIR installer file is
    that it is a single file that contains all of the information
    regarding the look and feel of the Help along with the content. It
    is one package with no separate viewer required.
    To read more about the benefits of packaging your help as
    .air file, please visit the following link:
    http://labs.adobe.com/technologies/robohelp/aboutoutput.html

    When you are comparing this to Flash, does this comparison
    extend to the requirement for each end user to install the Air
    runtime on their PCs before they can access our RoboHelp system?
    And that they will also get reminders to update to the latest
    version of Air runtime?

  • Will there be any plug ins or separate enhancement packages for iMovie 8?

    Will Apple or 3rd parties offer new plug ins or Plus packages for iMovie 8 to restore themes, provide additional transitions, titles and special effects?

    .. got a mail from Bruce too (as a few forum members, frequent posters in this section, are on a single-digit adress list...) ...
    indeed, it looks like, Apple has 'forgotton' to include and document a kind of API/whatever, to allow 3rd party plug-ins...
    as we all know, iM was a very reliable horse, and those plug-ins tought it new tricks.. (horses, dogs.. got lost in the metaphors......). the actual numbers of 'effects' is even reduced to the ones preinstalled in iM6 ... we all speculated about some simple pic-in-pic for all you podcasters... the new 'Crop' tool would be perfect... but is for one clip only.. the User Interface avoids any 'layers' (no audio tracks anymore...), so probably, that now famous scuba diving technician has no need to show the shark AND his wife's face expression simultanously...
    iM08 seems to me an excellent fast 'movie video maker', with some astonishing, groundbraking, breathtaking User Interface Ideas.. (I still spread the fully fictitious rumor, Kai Krause has to do with it in some way )
    ... but is a totally new app, no iMovie/version ...

  • What is the "BW shell creation package for BW system" in TDMS?

    I see for lower version of SAP systems such as 4.6 and BW(e.g.3.0, etc), there is a "shell creation package " for those
    types of systems.
    Could you explain what is that for?
    Thanks!

    1) where to find the info about the copy sequence such as: first shell creation, then initial package or whatever, then ...?
    > TDMS solution operation guide will be helpful, the same is available at SAP service market place. In short the sequence is  -
    first shell (only if the repository is not in sync) then initial package (ex. TDTIM) and then refresh packages (as an when needed)
    2) for HR we do not have shell creation, what we have is "initial package for master data and customizing" , the next step is "ERP initial package for HCM personel dev. PA & PD". Why we do not have shell creation here?
    > For HR as only few objects are transfered the need of a full shell system does not arise. only the object to be transfered are synced.
    3) Will TDMS replace system copy for ERP, BW, CRM completely?
    > Shell will not replace them but we may say that it will supplement it. When you need a complete copy means repository along with application data then you need to go for system copy but if you only need repository to be copied from source to destination then shell is helpful. Also it should be noted that Shell is an TDMS package whereas System copy is a SAP standard tool.
    I hope the above response is helpful.
    Regards,
    Pankaj

  • How would I create kernel devel package for OVM3.2.1 ?

    I am new to OVM SDK ..Please help me to understand how to create kernel devel package for OVM3.2.1 ?
    I tried below command "rpmbuild --rebuild kernel-uek...src.rpm" on my OEL5.9 machine. It throw few errors w.r.t KaBI checks fails.
    Is there hard rule to run above command only on OVM 3.2.1 SDK template ? I am going to try that now, but it will be good to know limitation/assumption on OVM 3.2.1.
    Is there any simplest method to get kernel devels/headers for OVM3.2.1 ?

    Thanks JB. It works like a charm. I earlier doubt the same, but real pain was to get gcc,rpm utils without ULN access. I used oel5_latest repo to get gcc and other supported utils. Everything works as expected.
    Just for info to help others... Below are the list of package required.
    yum install gcc.x86_64 --skip-broken
    yum install make.x86_64 --skip-broken
    yum install rpm-build.x86_64--skip-broken
    yum install make.x86_64 --skip-broken
    yum install redhat-rpm-config --skip-broken
    yum install m4 --skip-broken
    yum install elfutils.x86_64 --skip-broken
    yum install gnupg --skip-broken
    Below are final RPMs generated using rpmbuild --rebuild <kernel-source>.rpm
    kernel-uek-debuginfo-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-debuginfo-common-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-devel-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-debug-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-headers-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-debug-debuginfo-2.6.39-300.22.2uek.x86_64.rpm
    kernel-uek-debug-devel-2.6.39-300.22.2uek.x86_64.rpm

  • Multi-language Package for BlackBerry

    Hi, Guys,
    Do you know where I can download Chinese language packages for the BlackBerry ?
    Thanks

    Hey Quan,
    Welcome to the BlackBerry Support Community Forums.
    What BlackBerry are you currently using?  Also who is your wireless provider?
    -ViciousFerret
    Come follow your BlackBerry Technical Team on Twitter! @BlackBerryHelp
    Be sure to click Like! for those who have helped you.
    Click  Accept as Solution for posts that have solved your issue(s)!

  • Change deployment package for software updates

    Hi there
    Currently we have different deployment packages and software update groups based on year, product, etc.
    In the near future i'd like to rearange our software deployment process in configuration manager 2012:
    1x Deployment Package for all updates
    1x "Full" Software Update Groups with all updates in it. Additional to that we'll create a "Diff" Software Update Group at the Patchday and merge the updates later via edit membership in the "Full" Software Update Group.
    Are the following steps which i would perform correct?
    1. Select all updates which are deployed and not expired and not superseeded
    2. Create a new Software Update Group "Full"
    3. Select the new Software Update Group --> Download --> Create my new deployment package
    4. Deploy the new software update group to my collections
    5. Delete the obsolete software update groups / deployment package
    6. Delete the old updates source folders on our filer.
    I current don't know if the redownload process let the updates "forget" the old deployment package. With the above described steps i should get rid of all expired and superseeded updates.
    Thanks for any advice :-)
    Regards,
    Simon

    That is correct they only receive and install the updates they require, but don't confuse the metadata and deployments with the updates themselves. They will still receive the metadata and the policies for every update you deploy to them and that's where
    the problem lies. Each and every update assigned to a client (using a deployment) has it's own policy which of course must be downloaded by the client and stored in WMI causing the bloat. Note that I haven't experienced this first-hand but am relying on the
    accounts of others here in the forums but to me, if there is any chance of this being an issue, I would avoid it.
    For Update Groups, just a few categories is sufficient to break things up and I typically do three: workstations, server, office. These are often on different patching schedules anyway so it makes sense to have three separate ADRs for them anyway.
    For packages, I typically organize based on the calendar creating a new package every 3-6 months with the package containing all updates. There's really no need to divide the package up by product unless you have DPs dedicated to a specific product. Note
    that pre-R2, to change the package an ADR referenced you had to use PowerShell -- it's been added into the GUI in R2 though.
    Jason | http://blog.configmgrftw.com

  • Help - Need few JARs for Turnkey installation

    A couple of JAR/EAR files missing for turnkey installation.
    Can someone copy these JARs from your trial installation and share them across?
    Please find the below screenshot showing the list of missing files..
    These files can be searched within ES2 installation folder. e.g. C:\Adobe\Adobe LiveCycle ES2\deploy
    Thanks,
    Nith

    Thanks a lot for your reply. I downloaded few packages from Sun freeware website. My issue is when i installed emacs-23.1-sol10-sparc-local.gz which i downloaded from SUN freeware website installs SMCemacs. My required package is SFWemacs. Similar scenarios persist for few more packages. So if you know where i can get the following packages apart from Sun website and Sun freeware website:
    IS94de812
    ISCbemBui
    ISCbemCli
    ISCsmMult
    ISHelpMul
    ISJavaMul
    ISLockhar
    ISSadeCli
    ISSsmMult
    ISSunStor
    ISa974c6c
    IScbembui
    IScbemcli
    ISd4d0026
    ISfb91cb1
    ISjavaAss
    ISonlineh
    ISsadecli
    NBSMpre
    SFWxaw3d
    SFWungif
    SFWtop
    SFWemacs
    SFWgcmn
    SFWlexpt
    SFWncur
    SFWrsync
    SMCgtk+
    SUNWc2540
    SUNWc6130
    SUNWc6140
    SUNWc6540
    SUNWced.2
    SUNWdc
    SUNWfruip
    SUNWpsvrr
    SUNWpsvru
    SUNWstc
    Thanks,
    Ram.

  • Suitable Creative Suite Package for PC

    Dear all,
    I need some help as I am a bit clueless.
    I am thinking of buying a Creative Suite package for my PC but wondering if any will work with my system spec which is as follows:
    Intel Core 2 Duo Processor 2 GHZ
    Running on Windows Vista
    Memory 4 GB RAM
    32 bit operating system
    Hardisk memory 456GB
    Any thoughts as to what creative system will work on this system?
    I beleive Creative Suite 6 requires a lot more power?

    CS6 may not be supported officially on Vista, but most apps will work just fine on your system - that is the ones that are 32bit. Should you need After Effects, Premiere Pro and a few otehrs, those will be missing, as they are only 64bit. Which suite you get will of course depend on what you do, but as per your own observation, using any of the current Adobe apps on a system like yours won't be the most enjoyable experience. They will run, but due to the shortage of RAM and your weak processor you may notice considerable lag in some of them. Also, for Photoshop and others GPU acceleration via your graphics hardware may not be available depending on what card or shipset you use. So in summary: It won't be impossible, just not necessarily fun.
    Mylenium

  • Need to monitor 7201 router without package for Ciscoworks

    Hello,
    I'm a few months away from upgrading our Ciscoworks platform from LMS 2.6 to 3.1. However, I need to monitor a 7201 router and will not be able to to install the package for that system. I 'm getting snmp traps and get request, but the system is shown as unkown because I don't have the package installed. My support has run out until I get the 3.1 LMS software approved for purchase. Until then is it possible to monitor the 7201 router, I am receiving snmp message but Ciscowork doesn't seem to relate them correctly without the package being installed. I want to monitor the system for reachablity and sent a e-mail message out if it fails that test.
    Jeff

    Perhaps something like eWatch would work for you. Leopard will also offer some tracking and monitoring abilities as part of the upgraded Parental Controls.

  • Can I create another package for another module?

    Hi,
    I am doing a project in NetBeans.
    I used a JFrame with Menu and a JDesktopPane with five JInternalFrames for my I module.Now I first module is finished.
    My designing and coding are in Package Javaapp1.
    For II module I have to create another JDesktopPane with five jInternalFrames.
    If I use the same Javaapp1 package for II Module my coding is very large and difficult to trace.
    can I create another package Javaapp2 for II module and import
    in my first package?
    if it is possible? please give me few lines about this.
    Thank you so much.
    Meena.

    Hi,
    Thank you so much for your reply.
    I understand what you mean.
    I am developing only one project not two many.
    But I have four modules in my project.So I try to the concept of package.
    In NetBeans I first create one project named Javaapp1.
    It automatically comes under the name Package Javaapp.
    In this I finished my first module.
    Now I want to develop second module.To avoid confusion in coding I need to create second module in different package.
    So I create another project Javaapp2.It comes under the name
    Package Javaapp2.I develop II module here.
    Then I try to import Javaapp2 in Javaapp1.I got the error "Package Javaapp1 doesnot exist".Thenonly i add needed jar file(Javaapp2.jar) into my project.Now there is no error.
    You told me that "The Above Approch is for when we create more than one project and take something from one to other".
    But I donot know how can I create another package without creating another project and without including the jaf files.
    I donot know is there any way to do.
    I am also have a look at netBeans.org.
    Can I continue with this?
    will you please comment on my lines.That should be useful to me to get a idea.
    Thank you so much.
    Meena.

  • Spotify Debian package for Jessie(testing)

    The package that is on spotify repository is not working in Debian Jessie, this is happening because Debian Jessie has libssl1.0.0 and spotify works with libssl0.9.8. I removed the dependency for ssl from the package and i add to data folder the compilied files of libssl and libcrypto. I just sharing this package for other people that using Jessie and have the same problem, until the problem solved officialy from spotiy.
     Download the package
    http://83.212.107.72/spotify-client_0.9.4.183.g644e24e.428-1_amd64.deb
    Install the spotify-client(is only for 64bit)
    dpkg -i spotify-client_0.9.4.183.g644e24e.428-1_amd64.deb
    The next command is needed if you have missing dependencies
    sudo apt-get install -f (maybe you have to install dependencies manualy)

    Thanks alot for this solution miza, I recall having to fix this myself manually a few times and it's not fun. Just wanted to let you know that this was greatly appreciated.
    And I also appreciate jooon replying to this thread and I'd also like to add that I very much appreciate a Linux client and I can deal with using workarounds like this and having the software slightly out of date, as long as it's still usable :)
    Thanks again!

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Business Package for ECC6.0 EHP 4 Installation Guide

    Hello Experts,
    We have a reqt to install BP for ESS MSS compatible with ECC EHP 4 and identified below versions
    BP ERP05 ESS 1.41
    BP ERP05 MSS 1.41
    BP ERP05 COMMON PARTS 1.41
    BP ERP05 BUYER 1.41
    BP ERP05 HR ADMINISTRATOR 1.11
    ....few others
    Queries below -
    1 - Link : [http://help.sap.com/erp2005_ehp_04/helpdata/EN/76/77594d165144a1a9bff9aae1e26b26/frameset.htm] under prerequisites : Business Packages are mentioned:
    ○       Business Package for Manager Self-Service (SAP ERP) 1.3
    ○       Business Package for Common Parts (SAP ERP) 1.3
    ○       Business Package for Project Self-Service (SAP ERP) 1.0
    ○       Business Package for HR Administrator (SAP ERP) 1.1
    Should we upload the above BP before we deploy main packages like ESS 1.41, MSS 1.41 and HR Admin 1.11?
    2 - We need to download and install BP from both paths - "installation and Upgrades" and "support packages and patches" in SMP one after the other?
    3 - Installation sequence to be followed is PCUI_GP followed by Common Parts?
    4 - I am unable to locate any proper installation guide for BP.
    Thanks for your inputs,
    Dhanz

    Hi Dhanz
    See the following guide for details
    http://www.sdn.sap.com/irj/scn/index?rid=/library/uuid/e0df0afb-44fb-2b10-46b1-c026264bcbc4
    In order to calculate which SP packages  to download from /swdc please see
    https://www.sdn.sap.com/irj/scn/wiki?path=/display/profile/marcio+leoni
    --->HOW TO GET RID OF SP STACK MISMATCH ISSUES
    This tells you which BP or XSS packages work together and which back-end SP levels works with them
    Good luck
    Stuart

  • Creation of Add-on package for 64 bit and 32 bit SAP Business One Client

    Please help me creating package for 64 bit and 32 bit SAP Business One. If Add-on executable is compiled with x86 option then there is no issue of connecting Add-on with 32 bit SAP Business one and if Add-on executable is compiled with Any CPU option then there is no issue of connecting Add-on with 64 bit SAP Business one. Problems are mentioned as below
    1. My Add-on uses MS ACCESS connection and the connection is read using Jet OLEDB 4.0 provider. It works fine for x86 compile mode but not when compile mode is Any CPU. I searched for the issue on Google and found a solution to change MS ACCESS connection provider to ACE.OLEDB.12.0 but again ACE provider is installed according to the Office version i.e. 32 bit or 64 bit office suite. If I install 32 bit ACE provider then Add-on executable compiled with x86 version is working fine but with Any CPU option throws error as provider is not registered on current machine.
    2. Secodly, our license validation activex dll is build using vb 6.0 and therefore when Add-on executable is compiled using Any CPU option, Add-on EXE cannot read from license dll. Any suggestion, how the activeX dll can be compiled whose component can be created from for X86 compiled exe and any cpu compiled exe.
    Please help because we are stuck in this issue and cannot move forward.
    Thanks.

    Hi Alejandro,
    That is one solution but did your add on used ms access connection? if you used Jet oledb to connection string or ace oledb connection string? what if 32 bit office is installed and what if 64 office is installed? how did you found the office version in install script? after determining the office version how did you installed Microsoft redistributable for ace oledb (32 bit or 64 bi )?
    I am sorry that I asked many questions but these are the problems where I am stuck with the addon installer?
    Thanks

Maybe you are looking for

  • How can I move video down the timeline?

    New user here. Please can anyone help. When you import a picture into Soundtrack, why does it always automatically go to the first frame of your project title. For example, if I want the picture to be at 10 00 00 00, I will put this in the project ti

  • Audio Crash - No Audio Output Device Detected

    Since I installed the BOOM volume booster program, I experience crashes with the audio of my MacBook Pro. No Audio device is Detected, and there is no sound. i can only fix it by reinitializing the PRAM which fixes it temporarily. But it comes back m

  • My pc can not detect my time machine formatted external hd

    Help! I purchased a new western digital external hard drive(320gb)to use with both my pc and mac. when i first attached to usb hub on my macbook pro, I answered "yes" to the question if I wanted to use the drive as time machine backup..it said that a

  • 16:9 problem from fcp- compressor- dvd studio.

    Using Compressor 1.2.1 I shot mini-dv(xl-2) in 16:9 mode. I tried using the widescreen Compressor preset but when I import the my assets to DVD studio 2.0 the aspect ratio is squished to 4:3. Using the display tab I changed it to 16:9, looks fine. Bu

  • QOSMIO x870 shutting down when in sleep mode

    I'm not sure if this is working as intended or not. I was working with the ECO setting to put my computer to sleep after certain amount of time. Once it was asleep for a certain amount of time, it would go into a shutdown/hibernation mode. It turns b