Acess and restrictions on a wrt110

I have been tryin to restrict my daughter from accessing the internet on hours i have assigned . i Want her to be able to access the internet between 3pm to 6pm monday to friday. and 10am to 6pm on saturday to sunday. Can u please help. as everytime i try to get it right i keep blockin the whole network from accessing the internet. Your help in this would make the mrs happy .  PLS HELP !
 thnx  davo

Well, this looks to me as if you have to block the times you don't want instead of allowing times you want. If you only set allow policies there seems to be a default deny all rule at the end.
I would suggest you set up deny rules instead.
Policy 1, deny, Mon-Fri, 0:00-15:00
Policy 2, deny, Sat-Son, 0:00-10:00
Policy 3, deny, Mon-Sun, 18:00-23:55
Apply Policy 1-3 to the MAC address of her ethernet card (if she uses wireless and you have neighbors she will probably surf through your neighbor's access point at any time she wants...)
If this still blocks all other traffic as well, then add a Policy 4, Allow, Everyday, 24 hours, and don't enter anything into the list of pcs. If that's not possible enter IP range 192.168.1-254.

Similar Messages

  • HT201304 Hi! My My mom bought me an iPhone 5 and I have a problem with my facetime I cant find it! Cant find it in settings and restrictions. She bought this in Bahrain both my iPhone and she ipad mini and she has facetime on her. What should I do?

    Hi! My My mom bought me an iPhone 5 and I have a problem with my facetime. I cant find it! Cant find it in settings and restrictions. I remember when she gave me this I see facetime in settings and after a couple of days its gone! She bought this in Bahrain both my iPhone and her iPad Mini. And I'm just wondering why she has facetime and why mine is missing? Please help! My iMessage is perfectly working. I lived in the Philippines

    Are you trying to use the phone in Bahrain with a supported carrier there? I suspect not. If you try to use this phone outside of Bahrain, you won't have FaceTime. This is done to prevent folks from simply crossing the border to purchase iPhones in Bahrain...FaceTime is banned in Saudi Arabia & the UAE. Sorry, but you'll only have FaceTime on that phone while using it in Bahrain on a supported carrier's network there.

  • MP3 and restricted codec support

    hi,
    finally I have my system set and running. I did go for the KDE4 which I like very much and followed all the steps as stated in the Beginner'S Guide.
    However, I don't have MP3 neither other multimedia propietary format access like MP4, AAC, MOV, WMA, WMV or RMVB - I carry my multimedia collection of songs, videos and movies from when I was on WinXP (yikes!)- despite I installed Xine and other utilities as desccribed in the Beginner's Guide.
    I do can watch some AVI files but can't access sound stream so they're muted. How do I add full multimedia support to my fresh shiny Arch? I did try to search the forums but there's to seem a problem because I keep receiving desconnections errors.

    http://bbs.archlinux.org/viewtopic.php?id=93862
    Re: MP3 and restricted codec support
    why did you opened a new thread instead of discussion in the previous one?
    oops, I did it again, sorry! (yeah, I know you prefer Brtiney saying that )
    I just did the same of my very first post: promise to don't screw things again and follow the rules.
    @Bralkein: thanks for your tips and useful research, I will stick with xine until I backup my root, then maybe I try gstreamer.
    @.:B:.: I have panic of installing things that can break my system, before installing Arch few days ago I came from an entire life in *buntuland, so you'll see : D
    Last edited by martin77 (2010-03-27 05:10:09)

  • How to Restrict printing the document using IRM for a Single Document?Allow printing for some documents and restrict the printing for particular documents in same document library?

    Can we able to Configure the IRM in Document Level in SharePoint Document libraries?
    The document library contains multiple document sets , Can we restrict the printing according to document sets? Allow printing for some documents and restrict the printing for particular documents in same document library
     Is this possible?Please suggest.

    Yes, that can be done. But note that all administrators will have the same right to print, so you need to make sure the users are not administrators. You can include a macro to disable printing, but if the users disable macro, they can print the documents.
    Hence, there is no foolproof way to prevent printing documents. If you still need a foolproof security, PDF format provides password based security (viewing doesn't require a password) that can be implemented to prevent the document from printing,
    which doesn't require any special scripts and is tough.
    You can have a look at the following links:
    http://msdn.microsoft.com/en-us/library/office/ms458245(v=office.14).aspx
    http://msgroups.net/microsoft.public.word.docmanagement/prevent-printing-of-docum/91353
    http://www.go4sharepoint.com/Forum/prevent-printing-saving-documents-10150.aspx
    The following link explains about the security features in PDF. This is for information purpose only and not for promotion of any products:
    http://www.pdflib.com/knowledge-base/pdf-security/
    Balaji Kundalam

  • I lost my restrictions password and want to reset my ipod so i can put a new one on, when i try reset it it makes me put in my device password and restrictions password! How can i reset my ipod if i need the restrictions password why i am resetimg my

    I lost my restrictions password and want to reset my ipod so i can put a new one on, when i try reset it it makes me put in my device password and restrictions password! How can i reset my ipod if i need the restrictions password which is why i am resetimg my. Ipod

    Forgotten RESTRICTIONS Passcode
    - Restore from a backup that was make before you added the Restrictions passcode. If you restore from a backup made with the Restrictions passcode the Restrictions passcode is also restored. Place the iOS device in Recovery Mode if necessary to allow the restore.
    - Restore to factory settings/new iPod. . Place the iOS device in Recovery Mode if necessary to allow the restore.   
    - If you are up to file manipulation see the following but it may not work for iOS 6.1.3 or iOS 7
    How to reset forgotten Restrictions...: Apple Support Communities
    - How to Recover Restrictions Forgotten iPhone Restrictions Passcode | The iPhone and iPad Blog

  • List of Calculated KFs and Restricted KFs created by end users

    Hi all,
    Is there one way that I can run a list of all Calcuated KFs and Restricted KFs created by end users in Production. We would like to DELETE all CKFs and RKFs created by end users that are not following the naming convention. So we are looking for a tool to list all CKFs and RKFs created by end users. Can you help?
    Thank you
    J.

    Hi
    Table RSZELTDIR will give you the CKF and RKF but will not tell who has created. The user entry you will find in table RSZCOMPDIR.
    So first go to second table display result by restricting to user name for which you want to delete the CKF and RKF. Select all the component ID and Put in first table and restrict the selection to CKF and RKF .
    thanks
    Tripple k

  • F4 Help in Module pool and restricting the entries

    Hi all,
          I was looking how to give F4 help in module pool program and restrict the number of entries on tht event.
    Take a example of VBELN, it is having number of entries so for F4 help we first take all the entries for VBAK for VBELN and then use FM 'F4IF_INT_TABLE_VALUE_REQUEST' and pass the table.
    So how can we restrict number of entries initially 200 and then user can input number of hits.
    ( How to use Callback subroutin ).
       Waiting for valuable additions.
    Thanks,
    Anmol.

    Hi ,
        This is my query, I want to restrict the number of entries fetched by the search help depending on the user input like in standard help.
    Like VBELN is having number of records how can we asign a help to field like VBELN( for example ), is there any way to restrict the entries on search help rather than selection all the entries for tht field from database which is not good for performance. Like initially it should fetch 100 or 200 records, then if user want more entries to be fetch he can input the number of entries like in standard help. Any idea on this.
    Thanks,
    Anmol.

  • Auditing and restricting 3rd party vendor access for compliance and sec purposes

    There are two products out there that I am looking into for managing 3rd party vendor access to our systems. The first one is Bomgar's Embassy. I'm not too sure if it's a separate product from their standard remote support products or just an added feature. Also I am aware that Bomgar's licensing can be pretty pricey.The second product I was looking into is called SecureLink. It seems to have all of the bases covered in terms of auditing and restricting but there are not a whole lot of reviews of the product or live demonstrations of it. Even the video on their site shows XP screens so I'm fearful that the product development has been halted.If anyone has any experience with these products or others I would be very interested to hear what you have to say.
    For anyone that's curious, what we are currently doing is just policy based. No...
    This topic first appeared in the Spiceworks Community

    There are two products out there that I am looking into for managing 3rd party vendor access to our systems. The first one is Bomgar's Embassy. I'm not too sure if it's a separate product from their standard remote support products or just an added feature. Also I am aware that Bomgar's licensing can be pretty pricey.The second product I was looking into is called SecureLink. It seems to have all of the bases covered in terms of auditing and restricting but there are not a whole lot of reviews of the product or live demonstrations of it. Even the video on their site shows XP screens so I'm fearful that the product development has been halted.If anyone has any experience with these products or others I would be very interested to hear what you have to say.
    For anyone that's curious, what we are currently doing is just policy based. No...
    This topic first appeared in the Spiceworks Community

  • Allow connection to RDS applicatoins and restrict RDP connection for domain users

    I have configured RDS setup, with the following Roles: RD Web Access, RD Gate Way, RD Connection Broker, RD Session Host and RD Licensing.
    the problem is that the domain users can't run the published applications unless I add the "Domain Users" group into the remote desktop users on the RDS servers, but now all domain users can connect RDP to the RDS servers.
    so we need domain users to connect to the RDS published applications and restricting them from connecting RDP to the RDS servers, in addition I can see that internal servers are accessible from outside through the RD gateway server.
    any ideas ? 

    Hi,
    Thank you for posting in Windows Server Forum.
    For a test you can create one group, assign the specified user under that group. Add that group under “Remote Desktop User” local group. For getting access to published Remote Application you can simply assign\add the group under collection properties of the
    application and that user can get access.
    For restricting user to server remotely, you can add that group of user under “Deny logon through remote desktop service” under User Rights assignment. Also you can check “Deny
    New User Logons to an RD Session Host Server” settings.
    Hope it helps!
    Thanks.
    Dharmesh Solanki

  • My appstore n camera icon has gone..anyone can help me..i already try to go setting and restriction but did not works..

    My appstore n camera icon has gone..anyone can help me..i already try to go setting and restriction but did not works..
    I also cannot update ios..how to solve this problem..?

    Your going to have to perform a restore.

  • Filter and restricted keyfigure

    Hi gurus,
          Can anybody clear my doubt? filters are used for restricting some records and restricted key figures are also used for same thing? can any body explain me clearly , what and where is use of filters and key figures?
    i promise to reward points.
    thanks
    bw bw

    Hello,
    Let me explain you .
    Filters:
    Filters represent the conditions that message types and BAPIs have to satisfy so that they can be distributed by ALE outbound processing.
    Restricted Key Figure:
    If You have defined a restricted key figure for reuse.
    You can now use this restricted key figure in all queries based on this InfoProvider by moving the key figure into the rows or columns of the query using Drag&Drop.
    The restricted key figure is not an actual element in this query, but a placeholder referenced to the restricted key figure in the InfoProvider.
    Hope this helps you.
    Thanks
    Ramu
    Message was edited by: Pidugu Ramu

  • Bringing in Calculated and Restricted Key Figs

    How do I bring in calculated and restricted key figs from one query to another in BI 7.0? When I created these key figs it said that they were reusable.
    Thanks

    Hello Atif
    When you make CKF or RKF at query level which means right hand side in your column these are local to your query and not useable.....but when you make them global by defining in left hand side they can be reused in other query....so when u willl create another query...these CKF and RKF will be available...just drag and drop them they will work
    Thanks
    Tripple k

  • VOC shipping control and restrictions-approach?

    Hello experts,
    We are implementing the VOC shipping control and restrictions.
    It could be possible to implement this with SVT notification check and specification database with expert server.But it will be very complex solution, since the managing data from legacy will be a challenge. Is there any implementation documentation available on this approach?
    There may be some better solution available.Is there any standard solution in ECC 6.0 for this?
    Thanks for your help.
    Regards
    Milind

    Deatr Milind
    VOC topic is discusseed very rarely here. As mentioned by you: one solution approach is SVT; There is may be only at max 5 threads discussing VOC; and only one threads is SVT related: Check: Substance Volume Tracking using SAP EHS MANAGEMENT
    VOC is discussed (with several subitems) in these threads:
    VOC specification symbols..
    Maximum VOC Value to be printed on a label
    VOC highest value
    These are more "WWI" oriented. In regards of your topic:;
    VOC (Volitile Organic Compounds) Shipping Control and Restrictions?
    is "nearly" the same as you are looking for. (may be)
    IN completely other context VOC is discussed here:
    Waste Management
    and here:
    parameter readings entry on day to to day basis in EHS -reg
    Regarding:
    "There may be some better solution available.Is there any standard solution in ECC 6.0 for this?"
    a.) no standard solution avaialble as far as I know about
    b.) "other" solution involves e.g. SAP GTS
    In regards of:
    .But it will be very complex solution, since the managing data from legacy will be a challenge.
    I can not "confirm" your finding/Statement. A solution scenario like:
    "It could be possible to implement this with SVT notification check and specification database with expert server" is stable and robust and not complex (from my point of view)
    To use EHS (with e.g. SVT and other subapplications) is a suitable solution approach to context of VOC (but it does not cover all of the VOC aspects (refer below and pay attention with VOC term !)
    C.B.
    PS: pay attention with VOC term ! VOC does have a lot of "unknown" topics on the top; there are a lot of regulations in place in VOC are; but thgey do not all have "complete" overlap in their demands; some of them extend the demandto a chemical company acting (e.g. Switzerland is a good example); here it is on the top a "Tax" issue (therefore it is not 100% related to Environment Health and Safety topics (which is EHS).
    Conclusion: the legislation in regards of VOC is quite complex ! (refer to the links as shown (only examples; you will find more !))
    May be check e.g: some of these links
    www.eurofins.com/Swiss-VOC-tax
    What Are VOC Regulations? (with picture) - mobile wiseGEEK
    Volatile organic compound - Wikipedia, the free encyclopedia
    http://www.epd.gov.hk/epd/english/environmentinhk/air/prob_solutions/voc_reg.html
    The Volatile Organic Compounds in Paints, Varnishes and Vehicle Refinishing Products Regulations 2012
    http://www.issa.com//data/File/regulatory/VOC%20Limits%20Summary%204-25-14.pdf
    Volatile Organic Compounds - Department of the Environment, Community & Local Government
    :: Volatile Organic Compounds (VOC) Requirements ::
    Consumer Products Program Regulations
    Volatile Organic Compound (VOC) Concentration Limits for Architectural Coatings Regulations
    Volatile Organic Compounds-VOC-VOCs-VOC Regulations-Volatile Organic Compounds Regulations-Adhesive VOCs-Sealant VOCs

  • Running and restricting unsafe code within a safe application

    My application (actually a web application) will do the following:
    - Obtain Java source code from an untrusted source. One such piece of source code will be a JUnit test class (and another will be the class(es) it is testing).
    - Compile the source code in memory, storing the compiled classes into byte[] arrays, using the JSR-199 compiler.
    - Load the JUnit test class that was just compiled, using a URLClassLoader.
    - Run the JUnit test (using the JUnitCore core class in JUnit 4.4) and report the results to the client.
    Since the source code is untrusted, it may do malicious things that I want to prevent. I have wide flexibility in limiting the permissions of the code; for example, I can disallow file reading and writing, network access, etc. However, I do not want to restrict these permissions on my own application, or the JUnit code itself (such as the class JUnitCore, which runs the JUnit test). So the flow will go like this:
    1. Allow unrestricted security policy initially.
    2. Obtain source code.
    3. Compile source code.
    4. Apply restricted security policy.
    5. Load compiled classes and use JUnitCore to run the JUnit test class. (Loading should be restricted so that static initializers in the unsafe code cannot do harm.)
    6. Remove restricted security policy.
    7. Report results (in particular, violating the security policy means, "Test failed").
    However, my very basic understanding of the security policies in Java is that permission granting within a call stack seems to go the other way; untrusted code is run with a restricted security policy, but it may make a call to a system library, for instance, that runs as a privileged block and has extra permissions that the unsafe calling code does not have. I want to flip that around and say, "My code is okay, but when it executes the method JUnitCore.run, restrict the access of that method". Or, to be even more fine-grained, "My code, and any code from junit-4.4.jar such as JUnitCore, is okay, but somewhere in the bowels of JUnitCore.run, some unsafe code will eventually be called, and I want its access restricted."
    I don't even know if this is possible the way I have stated it, and if so, I am having trouble mapping the abstract concepts of a codebase, code signers, etc., on to the specific pieces of code in my project. Someone on another forum suggested that the URLClassLoader used to load the unsafe classes would somehow play the role of a codebase, so that I could state that anything loaded with that class loader should be restricted, but I have not seen a syntax for expressing this in the documentation. Plus, I don't see how using the URLClassLoader used to load the unsafe classes would play a role, since permissions are granted, not denied. It seems that I need a way to map a codebase to the safe code, not the unsafe code, and then grant permissions to the unsafe code.
    It seems like it could be as simple as creating a policy file (say, unsafe.policy) with the contents
    grant codebase "My Application + supporting classes I wrote + any class in junit-4.4.jar" {
        permission java.security.AllPermission;
    };and running java -Djava.security.manager -Djava.security.policy=unsafe.policy MyApp, except that I don't really know how to specify the codebase, or if it is possible to draw a box around my code + junit-4.4.jar in that way.
    Thank you,
    Dave
    Edited by: pexatus on Aug 10, 2008 12:48 PM

    >
    Have a look at AccessController and AccessControlContext. These are the tools you need for this task.
    >
    By "this task", do you mean, "writing a custom SecurityManager"? Or do you mean the more general task of creating a security policy (such as by writing a policy file) to ensure untrusted code does no damage?
    I'm sorry to be so slow, but I don't see how to use the two classes you mention for my task. I assume that the only reason I need AccessController is to call AccessController.getContext() to get an instance of AccessControlContext, since the other methods of AccessController don't seem to be what I need. AccessController.checkPermission presumes I have successfully written the security policy already, which is the problem I am trying to solve, and the various AccessController.doPrivileged methods appear to grant extra privileges to code that is called, which is the problem I mentioned earlier: I want certain code that I call to have fewer privileges, rather than more.
    Similarly, I do not see any methods in AccessControlContext that could tell me whether the current executing code is trusted or not. It, too, has a checkPermission method that will work if I set up the security policy correct, which is what I cannot figure out how to do in the first place, and a getDomainCombiner() method. A DomainCombiner has only a single method, which assumes that I already have an array of ProtectionDomain objects. To create a ProtectionDomain, I need to specify a CodeSource, which is, as the documentation indicates, an extension of "the concept of a codebase". It is at this point I get completely lost in the abstract and generic nouns such as domain, codebase, code source, context, and I do not see how to connect them to concrete nouns that I understand such as class file, package, method, etc. Is it the case that I need to create a CodeSource representing the trusted classes? Is there an elegant way to create a CodeSource representing all the classes in a a project (say, under a given directory, or contained within a given jar file), short of enumerating them or digging into directories and jar files doing a search? And once I create this CodeSource within my program, what do I do with it to specify that I want my security policy to allow all permissions for the classes represented by the CodeSource, and restricted permissions for all classes outside the CodeSource, regardless of call order? (since trusted code will call untrusted code, and I do not want the permissions of the trusted code to be inherited by the untrusted code)
    Again, I am sorry to be so ignorant, and I appreciate the help, but I am simply having trouble connecting the concepts described in the documentation to the specific concrete aspects of my application.
    Dave

  • How to delete everthing without itunes and restriction password

    i need to delete everthing without itunes and restriction password

    Can you go to Settings>General>Reset>Erase all content and settings? That is the only way.

Maybe you are looking for

  • How to connect a DV camera through the IEEE 1394 port on my A50?

    Hi I have been trying to connect a video camera to my notebook SA50-109 throught the IEEE 1394 port.. but the notebook didn't recognize the camera at all.. although the camera shows 'DV-in' when i plug the cable witch is (4-pin to 4-pin) DV cable.. i

  • 3.0EA1/2.1: Recent Objects "which object" confusion

    The new Recent Objects window in 2.1 could be handy, but really needs to show types where the icon isn't unique (ie package spec and package body get same icon). As the connection navigator forces you to open the spec before opening the body, you alw

  • Keyboard hides bottom of FormSheet modal view

    I am working on an iPad portrait view app, with modal views using FormSheet. When the keyboard pops up, the bottom of the modal view is hidden... not by much, but it is behind the keyboard. Is there any way of moving the modal view up a bit higher to

  • Integration model for sales orders failing repeatedly

    Integration model for Sales Orders to APO is failing and in the CIF the error says "Customer requirement G BR 0082372353 900010 0000: liveCache problem, retu". This error appears everytime you we run the integration model and it says in the Job log;

  • Can we create Criteria based groups of computers?

    Hi Team, We have imported the computer objects to FIM portal and it has few attributes which can help creating the criteria based group of computers. But when we tried creating the criteria based security group, we were not able to select any custom