About protect my applet

hi friends:
i used jcop tool create a applet ,and use jcrmi to load the applet,but how can i protect the applet to hold third-party load it? it's must to change default security domain AID? but it's seem that jcrmi won't provide to input security domain AID.

It apparently affects Windows platform only, I guess.

Similar Messages

  • Keeps asking for an address. and says something about protecting family details..is this a scam. what should i do? what address is it asking

    screen keeps asking for an address. and says something about protecting family details..is this a scam. what should i do? what address is it asking for. it is my elderly mothers I don't have one and am far away so I can't advise her. please help.
     I don't think it is an email as it comes up after she has turned it off/on

    tell her to go to settings/safari/clear history and clear cookies and data

  • How do I about protect my mac from malware zeus?

    how do I about protect my mac from malware zeus?

    It apparently affects Windows platform only, I guess.

  • Best Buy Associates lied about protection plan through Geek Squad

    I finally have the time and energy to re-address the ongoing issue that I am having with Best Buy and their geek squad. Before the Thanksgiving holiday of 2013, my sister came to visit me from Virginia. She is currently in the military and came home for a final visit before a 9 month deployment. She was in a need of a new phone, so being the loyal Best Buy customer that I am, I took her to Best Buy and signed up for a new 2-year agreement so that she could update her phone. The rep was nice enough to explain that there was a Geek Squad protection plan that I could purchase through Best Buy that would cover the phone if ANYTHING were to happen to the phone. I was told that I could just bring the phone in and they would either fix it or replace it. Previously I would always get my insurance from my cellular service provider, but this Geek Squad protection seemed like a great deal. I was satisfied with my purchase and the Geek Squad protection, and returned later on in the week to purchase a new phone for my Mother as an early Christmas gift, and I was sold the EXACT same Geek Squad protection.
    Every month over the next several months, there was $20 dollars deducted from my account, $10 for my sister’s phone and $10 for my mother’s phone. My sister had since been deployed overseas and had an accident with her phone where it is completely un-responsive. Feeling fully confident that we had insured the purchase and that Best Buy would uphold their end of the bargain, I had her mail her phone back to the United States.
    I took the phone to Best Buy and explained that the phone is not powering on and that I was covered under the Geek Squad warranty. To my complete surprise, I was informed that I was misinformed. The Geek Squad agent told me that the Cell phone group was misinforming customers and that in fact the protection information that was relayed to me, not once, but twice was the incorrect information. This is a big issue because I was given this false information twice and I have been clearly misled.
    I was given a number to the Geek Squad line. I called and explained the situation and the woman basically said that there is nothing that she can do, so I inquired about a refund of the money that I paid for the protection plans. The rep stated that she would put a case in. When the case was settled, I received $20 dollars for the current month. I paid for the insurance for more than one month, I paid for 5 months. After the $20 dollar refund, I decided that instead of continuing on with the back and forth, I would just keep the insurance that I had been misled about. So I called back. Low and behold, just a few days after the initial call, I was informed that they could no longer assist me because I had dropped the insurance. I was given a corporate number who told me they couldn’t assist me and that they didn’t know why I was given their number. I went around the entire loop again and was referred to the store manager, who left a VM that I would need to contact the geek squad 1-800 number.
    Just as this is a long letter, imagine the time and energy it took to go through this entire process. Lying and misleading loyal and faithful customers is bad enough, but to know that when my sister who is serving our country overseas, and who has been doing so for the past 7 months will come home to a phone that doesn’t work is very upsetting. I was tempted to let this situation go but being a loyal customer to Best Buy should mean something to the store and to the management. If I am a future best buy customer will be dependent on how Best Buy handles this situation. Customers shouldn’t be lied to and mislead.

    Hello CM2014,
    Staying in touch with family members is difficult without a phone, even more so when a loved one is overseas. It was very nice of you to make sure your sister had one while on deployment, so I can imagine your frustration if we denied her request for service when you brought in her mailed phone for repair. I’m not sure of the exact reason as to why this might’ve happened; however, there are a few reasons why a Rapid Exchange repair underneath her Geek Squad Protection (GSP) plan wasn’t an option.
    With Rapid Exchange, a damaged or non-working phone should be sent out for service. To save our customers valuable time, a service order is simultaneously created from our service provider to ship out an already repaired phone. These phones go through a rigorous refurbishment process to make sure that a customer receives a phone meeting its manufacturer’s standards.  If a smartphone is damaged though, we do request that a $149.99 deductible be paid to receive a repaired phone. This fee will also be applied should service be needed after the manufacturer’s warranty has expired. You are limited to three claim submissions after which the plan would be considered fulfilled.
    Our GSP plan should cover any hardware issues with the phone along with liquid spills or damage such as a cracked screen. Please know that it wouldn’t cover products that have been submerged, dropped from extreme heights, or have been run over by or fallen from moving vehicles.  Having said this, our associates should be fully explaining why a phone was rejected for service, and I’m sorry if this wasn’t the case. If you don’t me asking, what was wrong with your sister’s phone?
    To see how I may help with this, I pulled up your account using the email address attached to your forum profile. I did notice though that the GSP plan is underneath a name other than your own, and due to our Privacy Policy, I’d be unable to discuss the situation at hand. Please have the owner of the phone and plan create a forum profile and private message me with their contact information so that I may see what options we may have available from here. To send me a message, please have them sign into their profile, and click on the button in my signature below.
    Thank you for posting,
    Alex|Social Media Specialist | Best Buy® Corporate
     Private Message

  • General question about SWT in applet

    Hi all,
    I am absolutely new to SWT and wondering whether I should use it for my applet application. I am currently using SWING objects for my applet. Can I use SWT for applet, since SWT is not standard java objects? WIll there be any problem / drawbacks if this is used? Many thanks!

    The Terms of Use don't really allow folks to sell their services on this forum.
    Of course you could contact some of the top users off-line and ask about such a service.
    It wouldn't be cheap, and it most likely wouldn't be immediate since most of the top users work for a living.
    The beauty of this forum though is the kind and generous help you get for free from really bright professionals, and occasionally even the really dumb ones like myself.
    Go ahead and give it a shot if you like, the worst that could happen is all those you approach say "no".
    You will want to keep it clean from the forum though, and if you're looking for them to reach out to you then you will need to put your email address on your user profile. As of this post you do not have that information.

  • Security can protect the client, what about protecting the app from client?

    This is not about code obfuscation or preventing decompilation.
    I'm actually interested in trying to build an extensible application without a managed full-time server (the clients may go mobile and become disconnected) that can protect itself from not necessarily a malicious user, but more like an incompetent one.
    As I looked into using Eclipse RCP, I realised that this is going to be too fragile (delete a single file and it's all going to fail) or even worse, an unapproved plugin could be installed.
    As a client, I can require that jars be signed and everything, but how as an application can I require that the client VM is running secure?
    Short of Sun's "Sun Secure Global Desktop" product, does anyone see any obvious solutions?
    Thanks in advance.

    300+ users that, honestly, can break a bowling ball in 500 ways. This is a perfect reason to use a web app, until you find out that we've been asked to provide offline capability.
    Most frameworks/environments (hibernate/cayenne, RCP, JPF) all have configuration files that can be messed up by well meaning users and support staff. In a way, I'd love to have that info available from a web server, but we're back to offline support.
    A possible solution is a local (in office) server to manage the apps for local clients, I'd just like to make sure we've thought about everything before we commit resources and staff. To properly support offline, we're probably going to need this anyway.
    I'm just wondering if anyone's managed to begin to address any of these kinds of issues.

  • About array in applet

    hi all..
    i want to initialize an fixed-size array in applet
    and i write this
    byte[] array=new byte[40];
    but now what is the type of the number "40"?
    is short? or byte? or int??
    i'm confused about this,
    or i should write byte[] array=new byte[(short) 40];
    or byte[] array=new byte[(byte) 0x28]; ??
    thanx for replies

    it can't be an int unless the vendor is supporting it. Chances are to support int would cost a lot more therefore you don't see it often. So your "40" would be a short. If you want to use it as a 0x28 the results are the same.
    One gotcha about the JC implementation is to be careful when performing calculations. Theycould by default, get interpreted at an int by the J2SE JDK compiler.
    for example, offset = (apduBuffer[ISO7816.OFFSET_P1]&0xFF) * dataMax ;
    might not work !
    correct it to read: offset = ( short ) ( (apduBuffer[ISO7816.OFFSET_P1]&0xFF) * ( short )240 );
    You only find this out when you create your cap file by NOT utilizing int.

  • Copy protecting java applets - hosting only from my server

    I'd like to host a game on my web server. I wouldn't mind letting others play for free, but I would mind them copying my game and hosting it on their own server. How can I prevent copying? I read something about using steganography to embed a key in the HTML of the hosting web page. It seems that others would eventually figure out to copy the HTML... security through obscurity. Any ideas or insightful approaches? Maybe this problem has already been solved?

    Thanks, Linc. I previously looked at the CoRD page and felt intimidated and then forgot about it. I've downloaded and run it now and my feelings were justified.
    I put in the settings I know, which are something like:
         https://xxx.xx.x.xxx/cgi-bin/welcome/{users_name}
    and it simply fails at that point.
    It works from IE or Opera (within Fusion, Vista), but not from Safari, and I haven't tried it with Firefox for Mac etc. because of complicated reasons ...
    So CoRD says:
         Couldn't connect to {name_I_used}
         The host name could not be resolved.
    So honestly, I've looked through the help files, read about "Connection Preferences" and looked at the "Connection Inspector" and it's all "computereze". It says I may use my user name and password or not - neither way works. When I go through IE (or Opera, from Vista), then there is a domain specified in a 3rd field, and it does't matter if I type that word in the Connection Inspector "Domain" field or not.
    I had an idea it would be complicated.
    Anyway, in the meantime, I'm managing through Fusion -> Windows_Vista. Actually, it's malfunctioning this morning as well, so this is just normal computer networking! Today, Java through IE wants to install MLWebCacheCleaner.cab... then I have to say "continue" to various security alerts 3 times ... and it's still not working, even after updating Java, rebooting Vista - so it might not be COrd at all. Will have to come back to it some other day ...
    Thanks again.
    Charles

  • About images on applet

    Hi im creating an awt applet and i want to know theese 2 things
    1-)how can i make an image as a background image?
    2-)how can i use an image regularly(i mean giving its coordinate).
    Thanks

    I tried something like that but it didnt work
    import java.awt.*;
    import java.awt.event.*;
    import javax.swing.*;
    import javax.swing.event.*;
    import java.util.*;
    import java.io.*;
    import java.awt.image.*;
    public class applet extends java.applet.Applet {
        private Image background;
        private ImageObserver obs;
        public void init()
            background = getImage(getCodeBase(),"background.jpg");
        public void paint(Graphics g)
            g.drawImage(background,10,10,400,400,obs);
    }this was what i found on google if there is any other way i would be appreciated if you share it with me?

  • Question about protection mode in Stdby env.

    Hi,
    In a standby environment, can we have primary database working in two protection mode simultaneously.
    e.g. There are 2 standby databases for a primary database. One is situated in another city (Stdby_A) connected via a slow link and another is in the same data center connected via 1Gbps link (Stdby_B).
    Can we have primary database working in Maximum Performance mode for 'Stdby_A; and in maximum protection mode for 'Stdby_B'.
    Thanks
    Amit.

    thanks,
    what could be the best possible solution in above scenario.
    Regards,
    Amit

  • I'm confused about protected access - any insight ?

    I'm trying to understand how the protected access modifier works. I have tried to compile some example code and I'm seeing behavior which appears to go against what the text I'm using claims should happen. To wit:
    My understanding is that any subclass and any class in the same package has access to the protected member of a class. Default access (when no access modifier is used at all) allows access only to classes in the same package.
    I have the following two classes:
    //--------  Parent.java ---------------
    package testpkg.p1;
    public class Parent
        public int x = 7;
        protected int getXValue ()
            return x;
    //--------- Child.java --------------
    package testpkg.p2;
    import testpkg.p1.Parent;
    public class Child
        extends Parent
        public static void main (String[] args)
            Child child = new Child();
            System.out.println("Child X: " + child.getXValue() + "\n");
            System.out.println("Parent X: " + child.testParent());
        public int testParent ()
            Parent parent = new Parent();
            return parent.getXValue();
    }I get the following compilation error:
    $ javac -d ../lib Parent.java Child.java
    Child.java:18: getXValue() has protected access in testpkg.p1.Parent
    return parent.getXValue();
    ^
    1 error
    Now it seems to me that everything should compile fine since the Child class is a subclass of the Parent class, and as such should have access to the protected member method getXValue(). However this obviously isn't the case. It seems that the behavior is more like what is described for default access, i.e. no access by any class outside of the package, no matter if it is a subclass or not.
    Can anyone enlighten me on this ? Am I missing something obvious ?
    Thanks in advance for any feedback.
    -James

    You know that you don't have to use the "protected"
    modifier.Yes you do.
    In fact, when I learned Java, it was called
    "package" scope, not protected. But the same
    principle applies.No, the principles outlined above and in the Java Language Spec apply.
    "protected" or "package" means that only classes
    within the package itself can have access. You do not
    actually have to place any modifier at all since this
    is the default scope.No, protected adds the ability to access ex-package super class members from a child class instance. Try compiling the above example without specifying protected access.
    Pete

  • Adobe Reader Question about protected password

    I have adobe reader on my computer and I need to email an pdf file and password protect it, is that possible with the reader version?

    Kimberly,
    Moving this question to the Adobe Acrobat forum, since it's not related to CreatePDF.
    No, you cannot password protect a PDF with Reader. This requires Adobe Acrobat. See the "Protect" section here. A trial is here.
    Dave

  • About Form6i's Applet Display

    Anyone know how can I hidden the bar of Oracle in the applet? Because we are migrating the forms from 5i to 6i Web, the orignal forms are full window size, but in 6i Web, the Oracle bar is too big. And except the form's title, there also a applet title. All of these affect our layout. We have hundreds of the forms, can we not adjust the layout of every form?
    I set the OtherParams = useSDI=yes. And the bar is still here.
    Please help me!

    First I'll suggest that you try and play with the clientDPI parameter, more info on this is at metalink.oracle.com
    To hide the console bar, in the forms property have null in the console window property.

  • New articles about protecting websites are now on OTN

    OTN have posted a couple of interesting articles, applicable to any website you might create. Take a look:
    Combating Spam for Healthier Websites Spam is a fact of life on Websites with user-generated content, but there are steps you can take to minimize its risk and impact.
    Preventing Nefarious Website Manipulation (Gaming a System) Learn techniques to help prevent the gaming of your MySQL-PHP Website.

    Purchases are considered final but you can try contacting iTunes Support and see if they will refund or credit you (these are user-to-user forums) : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Purchases, Billing & Redemption
    You will possibly need to the order numbers, which you can get via your computer's iTunes : log into your account on your computer's iTunes via the Store > View Account menu option and you should then see a Purchase History section with a 'see all' link to the right of it, click on that and you should then see a list of the purchases on it.

  • Why are applets restricted to connecting to only one host?

    I'd like someone to help me out with an explanation of why Java applets are restricted to connecting to (opening up Socket objects to, etc.) only the host from which the applet was downloaded. Why would allowing the applet to connect to arbitrary hosts be dangerous? The very point of applets is to run things from untrusted servers, using the security limitations Java places on applets for protection, right?

    cronosprime1 wrote:
    Well, isn't it true that if my employer wanted to programmatically communicate this information to a third party without my consent he'd be able to do so anyway? He'd just not use an applet to do it. Or he'd just use another applet, one connected to Viruses-R-Backwards from his computer, to whore my information out. It seems to me that in the end, I either trust the party I'm sending information to or I don't. If I don't, an applet can't keep my information safe because the party I'm communicating with could simply forward all of that information to untrusted parties. The only way to keep my information safe in this case is not to send it. If I do trust the party I'm communicating with, then I also trust that I won't be connected to malicious hosts. Given what I said, I still don't see how the single host limitation helps protect me. On the other hand, it prevents a great number of useful applications - such as delegating clients to alternate servers for a video game, etc.Realistically, yeah, there probably aren't many cases where the single-host limitation will help you. But by making it the default, and forcing you to explicitly allow other connections, it means you can always know where your applet is connecting to. Also note that, as I pointed out above, it's not just about protecting you, but also about making it harder for you to spread malware.
    Here's one more potential scenario. You run an app from TrustyCorp™. The folks at TrustyCorp™ trust IffyCorp™, and want their app to communicate with it as part of its operation. You may or may not trust IffyCorp™. Without the default single-server limitation, it could go behind your back to connect to a site that TrustyCorp™ is okay with, but you're not.
    Really, it just comes down to keeping things as minimal as possible unless you explicitly open them up. I wouldn't get too hung up on it.

Maybe you are looking for