ABS quirks / auditing question / kernel request
My original post is below but it's wrong. All I'm asking now is if someone can enable CONFIG_AUDIT in the kernel or tell me a program that lets you spy on files just as well as auditd.
Today when I was making packages, something I haven't done in awhile and badly needed to do again, I noticed exclamation marks appearing beside the filenames in the medit tabs. Those exclamation marks mean that since I last saved the text file in medit, another process edited the file on the disk. Subsequent saving required me to click "yes I'm sure I want to overwrite" in this popup window. This was responsive to my saves. Every time I saved something (a PKGBUILD, a patch, anyting under the /var/abs tree) it was changed half a second later.
I tried to find out what was going on. Inotify-tools told me when the PKGBUILD was being modified but not by what process. Lsof and Glsof had no hope because they don't watch a specific file in real time, they only tell you things that are currently open so I'd need inhuman reflexes to get useful information out of them.
One thing that looks perfect for me is auditd. This page http://www.cyberciti.biz/tips/linux-aud … -file.html says how you can use it to see what process edited what file. I spent a couple hours fine tuning the PKGBUILD of it only to hit the error where auditd says "Connection refused." Every other poster reporting this did so because his or her kernel did not have audit support and sure enough in the kernel26 package, CONFIG_AUDIT is not set.
So I need to ask three things:
1. Does anyone know why my files are being accessed this way in /var/abs?
2. Does anyone know a program compatible with the default kernel26 that could help me investigate?
3. If it's not too much trouble, would the kernel26 maintainers consider adding CONFIG_AUDIT so I don't have to start using a custom kernel over this one triviality?
Thanks alot.
Last edited by ConnorBehan (2008-12-27 00:13:11)
ConnorBehan wrote:
Oh thanks monster, Thunar was open for me too. And it happened again today in /home so it's nothing to do with ABS. I guess my question now is:
Could someone enable CONFIG_AUDIT in kernel26 or tell me a way to audit with the kernel I have out of curiosity?
No problem, I'm glad I could help. I was a little unsure of what was going on myself until I stumbled on to the connection. If you figure out what is going on could you try and pass that along? I am curious to know the answer but not knowledgeable enough to dig into kernel audits to figure it out
Similar Messages
-
Read attachment details of Audit Question (PLMD_AUDIT)
Hi Experts,
Kindly request you to assist me on the below.
I'm trying to build a solution using ABAP for a requirement, where the logic has to find the attachment details of an audit question or action on the audit transaction (PLMD_AUDIT).
For example, please see the attached:
Screen shot 1.--> I'm not able to build the solution to check whether an audit question/action is having an attachment.
Screen shot 2.--> If the attachment exists, then how to get the attachment and send an email.
Appreciate your valuable inputs.
Thank you
MahendraHi Experts,
Kindly request you to assist me on the below.
I'm trying to build a solution using ABAP for a requirement, where the logic has to find the attachment details of an audit question or action on the audit transaction (PLMD_AUDIT).
For example, please see the attached:
Screen shot 1.--> I'm not able to build the solution to check whether an audit question/action is having an attachment.
Screen shot 2.--> If the attachment exists, then how to get the attachment and send an email.
Appreciate your valuable inputs.
Thank you
Mahendra -
EHS- Audit question and findings table?
Hi Gurus
I wanted to know what is the table for Audit questions and findings and also wanted to know where do these corresponding texts are getting stored in SAP.
Thanks
MuraliHello Murali,
please check the following tables
PLMM_AUDIT - for Audit results
For questions:
PLMM_QUEST_H
PLMM_QUEST_I
PLMM_QUEST_RES
for text
CGPL_TEXT
CGPL _ PROJECT
Regards
gajesh -
kindly guide me how to upload audit questions in sap system my query is sap also provide one temple in that templet what is contents to be filled i cont understood any body work that temple kindly guide me in that templet we have filed like that external id description ext position hierarchy level task level assessm entsug desc
Please check the sap note: 597982. You can find the SAP supplied XL template as a zip atatchment in the note and step by step guidance on how to upload audit questions using import/export functionality of audit management.
Thanks,
Ram -
Hi,
From the specification, SMB2 Query Info is defined as -Query_Info {
uint16_t structure_size;
uint8_t info_type;
uint8_t file_info_class;
uint32_t output_buf_len;
uint16_t input_buffer_off;
uint16_t res;
uint32_t input_buf_len;
uint32_t additional_information;
uint32_t flags;
uint8_t file_id[16];
I am looking at smb traffic between 2 Windows 7 Pro machines and I see that for SMB Query_Info Request records, for some compounded requests, the last Query_Info request has an extra byte after the 16 byte file_id. This is only for SMB2 Query_Info
requests.
On checking Query_Info requests that are single(not compounded), I don't see this extra byte.
I have attached images below from wireshark for both with and without this extra byte, from the same flow.
Can we consider this a quirk of the windows client issuing Query_Info Compounded requests?
Image1 - http://postimg.org/image/th8fubvuz <- As you can see, this is a comounded series of requests and the last requset which is a query_info request *HAS* an extra byte after the file_id.
Image2 - http://postimg.org/image/kkp4adxe7/ <- As you can, this is a compounded series of requests and the last request which is a query_info request, DOES *NOT* HAVE an extra byte after the file_id unlike Image1
Image3- http://postimg.org/image/5w7061vrr/ <- As you can see, this is a single Query_Info request, and we don't have the extra byte here after the file_id.We worked with cressnet and resolved these questions offline. Here is a summary of resolution.
Regarding the comments on compounded messages with QueryInfo,
this is not specific to QueryInfo.
The receiver’s transport layer delivers the message to the SMB2 layer (server/redirector). The SMB2 PDU starts with its header. The PDU is casted and interpreted based on the SMB2 command. What matters is the message’s structure
itself.
The transport’s (e.g. Nbtss or SMBoverTCP) indicates the length of its payload. Each SMB2 message has a structure which may include some variable length fields. Padding is one element that may complement the message for alignment
purpose. Any extra byte (s) that is not part of the SMB2 message fields would be irrelevant and ignored.
Regarding the comments on ErrorData,
the CHANGE_NOTIFY response packets look valid as documented in the [MS-SMB2] specification. In this particular case, even if the error is not a success code (i.e. STATUS_NOTIFY_ENUM_DIR), the response is an empty CHANGE_NOTIFY
Response, rather than a standard ERROR Response.
The exception cases that are not considered error messages are listed in [MS-SMB2] section 3.3.4.4. When in doubt, please consult the server processing of the specific SMB2 command.
[MS-SMB2] 3.3.4.4 Sending an Error Response
https://msdn.microsoft.com/en-us/library/cc246722.aspx
When the server is responding with a failure to any command sent by the client, the response message MUST be constructed as described here. An error code other than one of the following indicates a failure:
• STATUS_MORE_PROCESSING_REQUIRED in an SMB2 SESSION_SETUP Response specified in section 2.2.6.
• STATUS_BUFFER_OVERFLOW in an SMB2 QUERY_INFO Response specified in section 2.2.38.
• STATUS_BUFFER_OVERFLOW in a FSCTL_PIPE_TRANSCEIVE, FSCTL_PIPE_PEEK or FSCTL_DFS_GET_REFERRALS Response specified in section 2.2.32.<190>
• STATUS_BUFFER_OVERFLOW in an SMB2 READ Response on a named pipe specified in section 2.2.20.
• STATUS_INVALID_PARAMETER in an FSCTL_SRV_COPYCHUNK or FSCTL_SRV_COPYCHUNK_WRITE response, when returning an SRV_COPYCHUNK_RESPONSE as described in section 3.3.5.15.6.2.
• STATUS_NOTIFY_ENUM_DIR in an SMB2 CHANGE_NOTIFY Response specified in section 2.2.36.
[MS-SMB2] 3.3.5.19 Receiving an SMB2 CHANGE_NOTIFY Request
https://msdn.microsoft.com/en-us/library/cc246747.aspx
Change notification processing in the object store MUST be handled as specified in section 3.3.1.3. It is also outlined in [MS-CIFS] section 3.3.5.59.4.
If the server is unable to copy the results into the buffer of the SMB2 CHANGE_NOTIFY Response, then the server MUST construct the response as described below, with an OutputBufferLength of zero, and set the Status in the SMB2
header to STATUS_NOTIFY_ENUM_DIR.
Thanks,
Edgar -
Question regarding Request Notification Template - OIM 9.1.0.2
Hi All,
I have a question regarding notification generated when a request is raised. Currently, the body of the notification is referring the requestor who raise the request (the body of email has attributes like <%Requester Info.First Name%>, <%Requester Info.Last Name%>). Its fine if the requestor is raising the request for him/her self. However, if the requestor is raising the request on behalf of another user, then this notification is causing confusions, since its referring the requestor only in its body and not the beneficiary.
Is there a way to include the end beneficiary's details in the body of the notification?
Please help in this regard
Regards
VinayHi Gurus,
Any idea on this?
Regards
Vinay -
Our VOIP enviroment raised some flags on the latest audit scan and I am trying to resolve the items:
A few items have me confused:
The following showed up on 3 of the devices:
remote network time service has denial of service (123/udp)...Upgrade to NTP 4.2.4p8 or later.
1 callmanager had this and it running the latest revision 7.1.3.32900-4 and is supposed to be resolved. (Another CCM running the same version didn't have the vulernability).
Our 2 UCCX servers running Cisco Application Administration - 7.0(1)_Build168 had the same vulerability. From what I can tell Cisco has fixed for most products but not the UCCX platform. I know this is going to a linux based version soon but is there a patch or ugrade that can reslove this?
Also Weak Ciphers appear on almost all of the Linux based servers...is there a way to disable this?
Thanks,
JoeDear Laxmi
You can upload the questions through excel , XML template. The template and details is available in the SAP note 597982
Regards
Gajesh -
Oracle Auditing question.
Hi All,
I have a application schema called SPRE. I want to audit insert/update/delete/alter on any SPRE objects by any database user but I dont want to audit any action performed by "SPRE" user itself.
I know how to setup this.....like run below as system
audit inser,update,delete on SPRE.table1;
audit inser,update,delete on SPRE.table2;
audit inser,update,delete on SPRE.table3;
but questions I have is...
1. How to audit if sys user perform any insert,update,delete?
2. How to stop audit entry if SPRE user performed insert,update,delete
Thanks,
Anujsys.aud$, dba_audit_trail
OR
SELECT view_name FROM dba_views WHERE view_name LIKE 'DBA%AUDIT%' ORDER BY view_name;
SELECT view_name
FROM dba_views
WHERE view_name LIKE 'DBA%AUDIT%'
ORDER BY view_name;
VIEW_NAME
DBA_AUDIT_EXISTS
DBA_AUDIT_OBJECT
DBA_AUDIT_POLICIES
DBA_AUDIT_POLICY_COLUMNS
DBA_AUDIT_SESSION
DBA_AUDIT_STATEMENT
DBA_AUDIT_TRAIL
DBA_COMMON_AUDIT_TRAIL
DBA_FGA_AUDIT_TRAIL
DBA_OBJ_AUDIT_OPTS
DBA_PRIV_AUDIT_OPTS
DBA_REPAUDIT_ATTRIBUTE
DBA_REPAUDIT_COLUMN
DBA_STMT_AUDIT_OPTSHTH
-Anantha
Edited by: Anantha R on Mar 29, 2010 3:23 PM -
Hello, people!
I have question about auditing in Oracle Internet Directory.
1. I turn audit on in my OID.
2. Restart OID.
3. Searching for Audit Log Entries by Using ldapsearch. The DN for the audit log container is cn=auditlog. To search for audit log entries, perform a subtree or one-level search, with the container object cn=auditlog as the base of the search. Work fine.
4. But when i add some user to some group, i get record like:
orclSequence=348,cn=auditlog
objectclass=top
objectclass=orclauditoc
orcluserdn=cn=orcladmin
orcleventtype=Modify
orclauditmessage=Modifying entry cn=XMLP_ADMIN,cn=Groups,dc=rd,dc=local
orclsequence=348
orclopresult=Success
orcleventtime=20091125141137z
Did any one knows, how determine what changes done?
Thanks,
Jeff.it will be good if you are adding HR as OU , in case if you have IT or someother Organization Unit it will can be easily added and identified.
Once you add it as OU autimatically all required class will be added automatically , further if you have any custom attribute you can add your own custom class -
Audit Question - Access to SU01
I have a question in regards to access to SU01. We currently have a team to setup users and assign roles. We are SOx regulated and have been questioned about having individual having this access.
Does it make sense to have one user setting up the ID without any authorizations assigned and then another person add the roles? We have compliance calibrator installed and no issues from that, but I am aware sometimes it is a business process decision from our auditors.
To me this does not make sense to me at all. Not sure if this would be the same for all our other applications either at this point including BW, IPC, XI, network access etc. etc. etc.Chris,
This causes a lot of confusion and consternation across the industry. Having been on both sides of the fence from an audit perspective, I tend to take a pragmatic approach.
The key issue is about being able to amend roles and assign to users. Wherever possible, this should be avoided. It is up to you how you manage that but if you have a situation whereby a single person can create a role / profile and assign it to a user they control, then you have a potential audit issue.
You can split it in any way you like but you are basically trying to stop that SoD.
Some choose to have a dedicated team who are able to create users but not create or assign authorisations, a separate team who can assign authorisations and not create users or roles and a third team who can only create roles but not create or assign to users.
While that is ideal, it is not always practical so it is often somewhere in the middle.
As long as your central team cannot amend the roles and authorisations that they are assigning (or assign super user access like SAP_ALL) without appropriate controls in place, then you can generally have a fairly reasonable discussion with your auditors.
Simon -
Question of Request-CSCertificate command
I have to generate a SAN certificate for my two 2013 FE servers. I want to use the Request-CSCertificate command. The question I have is on the switch "Computerfqdn". I am not sure what to specify for this value.
The Microsoft documentation says the fqdn of the server you are requesting the certificate for but I want this certificate to be on both FE servers. I plan to get a certificate with a couple of SAN's from our public CA and install it on both FE servers by
exporting it out. If I am going to do it that way, should I use the pool name for the Computerfqdn? The pool name points to both FE servers by way of a VIP and a load balancer. Seems to me if I specify the name of one of the FE servers in the command string,
that I might have some issues when I export it and install it on the other FE server.
If you need the actual command I am using, I can post it. It's a standard Request-CSCertificate command with the required switches.Hi,
You should use the computer name instead of poo name when requesting a certificate. The Request-CsCertificate cmdlet will automatically add the pool name to the SAN list of certificate obtained using this cmdlet.
Actually you can add all required SANs including two FEs using Lync deployment Certificate wizard directly.
Kent Huang
TechNet Community Support -
CRL question, LDAP request goes to 255.255.255.255
I am trying to get CRL on Router 3620 with IOS=12.2(11)T6 (c3620-ik9s-mz.122-11.T6.bin) but LDAP request seems to be sent to 255.255.255.255 not the right address - 10.10.2.49 !
Configuration looks like this :
ip domain name lmt.lv
ip host tau.2k.mydom.net 10.10.2.49
ip host tau 10.10.2.49
crypto ca trustpoint LMT-PKI
enrollment mode ra
enrollment url http://tau:80/certsrv/mscep/mscep.dll
usage ike
serial-number
ip-address 10.10.90.240
crl query ldap://10.10.2.49
If I try to get CRL, it seems router is trying LDAP on broadcast address, output of "debug crypto pki transactions" :
r-c3620-vpn1(config)#crypto ca crl request LMT-PKI
r-c3620-vpn1(config)#ldap search: server=255.255.255.255, base=CN=TestCA,CN=tau,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=2k,DC=mydom,DC=net, attribute=certificateRevocationList
: scope=0, filter=objectclass=cRLDistributionPoint
May 26 16:37:58.993: CRYPTO_PKI:ldap_bind ERROR: status = 82
May 26 16:37:58.993: CRYPTO_PKI: ldap bind error: status = 82
May 26 16:37:58.993: CRYPTO_PKI: transaction GetCRL completed
I suppose it should go to the address specified with "crl query ldap://10.10.2.49" but it does not ?
I have successfully got certificates of the CA and the router itself :
r-c3620-vpn1>show crypto ca certificates
Certificate
Status: Available
Certificate Serial Number: 610D081E000000000009
Certificate Usage: General Purpose
Issuer:
CN = TestCA
OU = LMT-VPN
O = LMT-VPN
L = Riga
ST = Riga
C = LV
EA =<16> [email protected]
Subject:
Name: r-c3620-vpn1.lmt.lv
IP Address: 10.10.90.240
Serial Number: 21464125
OID.1.2.840.113549.1.9.2 = r-c3620-vpn1.lmt.lv
OID.1.2.840.113549.1.9.8 = 10.10.90.240
OID.2.5.4.5 = 21464125
CRL Distribution Point:
ldap:///CN=TestCA,CN=tau,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=2k,DC=mydom,DC=net?certificateRevocationList?base?objectclass=cRLDistributionPoint
Validity Date:
start date: 14:29:10 EEST May 15 2003
end date: 14:29:10 EEST May 14 2005
renew date: 02:00:00 EET Jan 1 1970
Associated Trustpoints: LMT-PKI
CA Certificate
Status: Available
Certificate Serial Number: 49F2340E73872AB44CCAD9CB46657697
Certificate Usage: General Purpose
Issuer:
CN = TestCA
OU = LMT-VPN
O = LMT-VPN
L = Riga
ST = Riga
C = LV
EA =<16> [email protected]
Subject:
CN = TestCA
OU = LMT-VPN
O = LMT-VPN
L = Riga
ST = Riga
C = LV
EA =<16> [email protected]
CRL Distribution Point:
ldap:///CN=TestCA,CN=tau,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=2k,DC=mydom,DC=net?certificateRevocationList?base?objectclass=cRLDistributionPoint
Validity Date:
start date: 12:25:09 EEST May 15 2003
end date: 12:30:06 EEST May 15 2005
Associated Trustpoints: LMT-PKI
Anybody can tell where is my fault ?
Many thanks !Thanks for advice ! It helped. Actually this is quite often my favorite suggestion: try to upgrade IOS, if somebody is complaining about bugs in IOS. At this time I failed to advise myself :-)( The confusion was caused because I was looking at Feature Navigator for the feature "Easy VPN Server" with the smallest Feature Set for 3DES which was "IP Plus IPSec 3DES" and the only release Cisco offered was 12.2(11)T ! After Your advise I looked again at feature navigator and it turned out that there are 12.2(13)T but only IP/FW/IDS PLUS IPSEC 3DES. After upgrade to this release CRLS and LDAP started to work.
-
Simple auditing question...
Hello,
We are running 11.2.0.2 on AIX 7.1.
I'm trying to understand why our auditing is not behaving the way I think it should.
First, we have the default auditing turned on as part of 11GR2.
It seems to be capturing some things, but not always everything.
In some cases, it captures the creation of a table by a user, but in other cases, it may not.
Even though the same user created a table, or dropped a table.
Today, trying to figure this out, I created a test user and logged in as that test user (in SQL*Plus) and created a simple table, then inserted a record into it and did a commit. I then logged out.
But when I check the audit views, I don't see the audit actions, or even the session logon information.
I've checked using both Toad and by selecting from the dba_audit_objects and dba_audit_session views in SQL*Plus.
What am I missing?
That last DDL statement I see that was captured in the audit records was on July 20th.
In this case, it captured the drop and creation of a public synonym, but not of the underlying table that was also dropped.
I don't believe anyone has changed any of the audit settings.
First, let's confirm everything:
sho parameter audit
NAME TYPE VALUE
audit_file_dest string /u01/app/oracle/admin/xxxxxxxx
/adump
audit_sys_operations boolean FALSE
audit_syslog_level string
audit_trail string DB
SQL> SELECT privilege from dba_priv_audit_opts where user_name is NULL;
PRIVILEGE
ALTER SYSTEM
AUDIT SYSTEM
CREATE SESSION
CREATE USER
ALTER USER
DROP USER
CREATE ANY TABLE
ALTER ANY TABLE
DROP ANY TABLE
CREATE PUBLIC DATABASE LINK
GRANT ANY ROLE
ALTER DATABASE
CREATE ANY PROCEDURE
ALTER ANY PROCEDURE
DROP ANY PROCEDURE
ALTER PROFILE
DROP PROFILE
GRANT ANY PRIVILEGE
CREATE ANY LIBRARY
EXEMPT ACCESS POLICY
GRANT ANY OBJECT PRIVILEGE
CREATE ANY JOB
CREATE EXTERNAL JOB
23 rows selected.
SQL> select object_name, object_type, owner, created from dba_objects where object_name = 'EXPENDABLE_USE';
OBJECT_NAME OBJECT_TYPE OWNER CREATED
EXPENDABLE_USE SYNONYM PUBLIC 20-JUL-11
EXPENDABLE_USE TABLE SISI 20-JUL-11
2 rows selected.
Now, view the dba_audit_objects view:
1 select os_username, username, timestamp, action_name from dba_audit_object where timestamp > sysdate-9
2* order by timestamp desc
SQL> /
OS_USERNAME USERNAME TIMESTAMP ACTION_NAME
scmsrvacct SISI 20-JUL-2011 11:44 CREATE PUBLIC SYNONYM
scmsrvacct SISI 19-JUL-2011 19:40 DROP PUBLIC SYNONYM
scmsrvacct SISI 19-JUL-2011 19:40 DROP PUBLIC SYNONYM
3 rows selected.Notice that the table created on 20-JUL-2011 is not included above.
why not?
Any why isn't my test user shown, or the creation of the simple table created by the test user?Well, I can't exactly do what you asked because 'privilege' is not a column.
But I'm guessing this is what you are asking for:
1* select * from dba_stmt_audit_opts where user_name is NULL
SQL> /
USER_NAME PROXY_NAME AUDIT_OPTION SUCCESS FAILURE
ALTER ANY TABLE BY ACCESS BY ACCESS
SYSTEM GRANT BY ACCESS BY ACCESS
DROP ANY TABLE BY ACCESS BY ACCESS
CREATE ANY PROCEDURE BY ACCESS BY ACCESS
DROP ANY PROCEDURE BY ACCESS BY ACCESS
ALTER ANY PROCEDURE BY ACCESS BY ACCESS
GRANT ANY PRIVILEGE BY ACCESS BY ACCESS
GRANT ANY OBJECT PRIVILEGE BY ACCESS BY ACCESS
GRANT ANY ROLE BY ACCESS BY ACCESS
SYSTEM AUDIT BY ACCESS BY ACCESS
CREATE EXTERNAL JOB BY ACCESS BY ACCESS
CREATE ANY JOB BY ACCESS BY ACCESS
CREATE ANY LIBRARY BY ACCESS BY ACCESS
CREATE PUBLIC DATABASE LINK BY ACCESS BY ACCESS
EXEMPT ACCESS POLICY BY ACCESS BY ACCESS
ALTER USER BY ACCESS BY ACCESS
CREATE USER BY ACCESS BY ACCESS
ROLE BY ACCESS BY ACCESS
CREATE SESSION BY ACCESS BY ACCESS
DROP USER BY ACCESS BY ACCESS
ALTER DATABASE BY ACCESS BY ACCESS
ALTER SYSTEM BY ACCESS BY ACCESS
ALTER PROFILE BY ACCESS BY ACCESS
DROP PROFILE BY ACCESS BY ACCESS
DATABASE LINK BY ACCESS BY ACCESS
PROFILE BY ACCESS BY ACCESS
PUBLIC SYNONYM BY ACCESS BY ACCESS
CREATE ANY TABLE BY ACCESS BY ACCESS
28 rows selected.also
SQL> select distinct(user_name) from dba_stmt_audit_opts;
USER_NAME
1 row selected. -
CC 2014 Using "Edit in Adobe Audition" question?
In Premiere Pro CC (2014). When I send an audio clip that is an .aif from the timeline to Audition using “Edit in Adobe Audition > Clip”, when it shows up in Audition, the file is a .wav file. Is there a preference that will keep it a .aif file?
Dont know... but possibly an Audition Preference or a workflow actually in Audition for Mixer or Sound File Editor setup
-
Unanswered Questions a request and a suggestion
I, like others, have an inaccessible unanswered question. It has been deleted but still shows up as unanswered and there is no way for me to mark it as answered. I would appreciate it if the mods would mark it answered.
I would like to suggest that when a question is deleted it should always disappear from the asker's unanswered list.Hi Hardy,
You should have no unresolved questions now.
We try to mark it as answered when we lock or remove but some slip by. I have been going back to some older ones and marking them when I can.
Regards,
Kady
Maybe you are looking for
-
Do I need a NI serial device?
I am working on an application which involves reading pressure data from two pressure gauges (differential and vacuum). My PC has two free serial ports. My questions: 1) Can I use the PC serial ports or is it advisable to opt for a NI 2-port serial d
-
I'm using a SoundBlaster Li've! external for li've soundfont music playing. I am using that soundfont file manager / librarian program that comes free with the SoundBlaster Li've! external soundcard and disk. My questions are these:? ()? I don't unde
-
I cant see facebook notifications in the notifications bar on mountain lion?
i cant see facebook notifications in the notifications bar on mountain lion?
-
WCCP: Is dot1Q trunking needed on Router I/F to avoid redirection loop
Hi everyone, I have a question how configure Router I/F to avoid redirection loop. I understand Router and WAE must not be attached to the same segment to avoid redirection loop as written in the Quick Configuration Guide. However the sample configur
-
hi all. got trouble with an barcode issue. here it comes. got 2 taggs that are concat:ed to one single barcode: *<?format-barcode:concat(tag1,tag2);'code128b';'XMLPBarVendor'?>* works as a charm. but now i need to include a "tab" between the two tags