Camera and user permissions

Hi,
I want to make a web app with that can take snapshot with the webcam.
When the user gives access to the camera everything is fine, however I want to handle the situation when the user denies the access to the camera.
I have two issues I wish to solve :
1) I want to be able to pop again the permission dialog using as3 on a button click (in case the user accidently pressed on "Deny" I don't want him to reload the web page if he wishes to use it (the camera is needed). I know it is possible to right click and give permission but most people don't know about it.
Is there a way to pop back the dialog. when I tried to access again the camera it didn't help.
2) It seems to me I came across some bug in flash. I want to add an EventHandler that detects if the user pressed "Allow" or "Deny".
this is how it's done :
var cam:Camera = Camera.getCamera();if (cam != null)
    cam.addEventListener(StatusEvent.STATUS, statusHandler);
    var vid:Video = new Video();
    vid.attachCamera(cam);
    addChild(vid);
function statusHandler(event:StatusEvent):void
    // This event gets dispatched when the user clicks the "Allow" or "Deny"
    // button in the Flash Player Settings dialog box.
    trace(event.code); // "Camera.Muted" or "Camera.Unmuted"
BUT, it only dispathes the "StatusEvent" when the code runs on the timeline and not in a function.
for example this DOESN'T dispatch the "StatusEvent" :
myFunc();
function myFunc()
var cam:Camera = Camera.getCamera();
if (cam != null)
cam.addEventListener(StatusEvent.STATUS, statusHandler);
var vid:Video = new Video();
vid.attachCamera(cam);
addChild(vid);
function statusHandler(event:StatusEvent):void
    // This event gets dispatched when the user clicks the "Allow" or "Deny"
    // button in the Flash Player Settings dialog box.
    trace(event.code); // "Camera.Muted" or "Camera.Unmuted"
Any ideas?
Thank you

http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/media/Camera.html #includeExamplesSummary
Check the muted property to know when the user denied and activate the showSetting dialog again.

Similar Messages

  • Disk utility's encrypted drives and user permissions

    I've decided against using filevault based on some of the feedback and research I have conducted. I am still interested, however, in encryption of some documents. I have used the Disk Utility to create a 128 bit encrypted .dmg image. I mount it using my user account, but only as r-x. I see that root has write permission, and so I assume it is safe to write to these drives. What is the best way to make it so that my user account has rwx permissions? I could manually do a chmod each time I mount the drive, but that seems silly. Also I noticed that apple doesnt seem to mount drives using the same files as linux, so I'm a little confused. Could someone please provide some insight to this. Also, *put on tin foil hat* how secure is this? When I access the drive is it writing unencrypted data to the swap file? thanks,

    Hi, iMacGyver.
    A. You wrote: " I have used the Disk Utility to create a 128 bit encrypted .dmg image. I mount it using my user account, but only as r-x. I see that root has write permission, and so I assume it is safe to write to these drives."Were you logged in as root when you created the dmg? Or did you create a read-only image from a folder containing the documents?
    To create a disk image to which you can add/remove documents and on which you will have Read/Write permissions:
    1. Log in to your account.
    2. Launch Disk Utility.
    3. Select File > New > Blank Disk Image...
    4. In the New Blank Image window, type a name for the new disk image in the Save As field, then select a location for saving the disk image, the desired Size, Encryption (select AES-128 in the pop-up menu), and leave Format as "read/write disk image."
    5. Click Create.
    6. Provide a password for the disk image when prompted. If you want extra security, de-select the option to save the password in your keychain, but be sure to never forget the password if elect to not save it in your Keychain.
    You can then double-click the disk image you just created, type the password when prompted, the disk image will mount, and you can add files to it. Ejecting the disk image will unmount it and all the content you added will be encrypted.
    One can use Disk Utility > File > New > Disk Image from Folder... to create either a Read Only or Read/Write encrypted disk image of an existing folder of documents, but if you elect to make it Read/Write there isn't much spare capacity for adding documents as the size of the disk image is based on the size of the folder.
    Also, if your comfortable with Terminal, you can look into the hdiutil command for creating and managing disk images.
    For example, if in step 4 above you selected the format as "sparse disk image", you'd later need to use the hdiutil command to compact the sparse image to recover disk space from files deleted from the spares disk image. Spare disk images are always Read/Write and only occupy as much hard drive space as the data they contain, e.g. a 100 MB sparse disk image containing 30 MB of files only uses 30 MB of hard disk space: they grow as files are added. A conventional R/W disk image of 100 MB in size takes up 100 MB of hard drive space even if it is empty.
    However, when you delete files from a sparse disk image, the amount of hard disk space it occupies does not decrease until you compact it using the compact verb of hdiutil. Disk Utility does not expose all of hdiutil's functions.
    B. You wrote: "Also I noticed that apple doesnt seem to mount drives using the same files as linux, so I'm a little confused. Could someone please provide some insight to this. "I don't understand what you mean. You'll need to be more specific.
    C. You wrote: " Also, *put on tin foil hat* how secure is this? When I access the drive is it writing unencrypted data to the swap file? thanks"To use encrypted swap files, select "Use secure virtual memory" in System Preferences > Security. Depending on the applications you use, there may be a slight performance reduction with encrypted swap.
    D. Your questions imply you're new to Mac. While you may be familiar with Linux, there are differences, especially in doing things through the GUI. If that's the case, my "Learning About Mac OS X" FAQ has a number of resources that you will find helpful including books, online training, and more.
    Good luck!
    Dr. Smoke
    Author: Troubleshooting Mac® OS X
    Note: The information provided in the link(s) above is freely available. However, because I own The X Lab™, a commercial Web site to which some of these links point, the Apple Discussions Terms of Use require I include the following disclosure statement with this post:
    I may receive some form of compensation, financial or otherwise, from my recommendation or link.

  • Juniper MX Regular expressions and user permissions ACS 5.4

    Hi everyone!
    Im having some trouble with regular expressions and permissions on our Juniper MX routers through ACS 5.4, and i would like some insight/help/poitners!!
    We have a team of engineers that should only have read only permissions (important: show configuration) and also be able to just change the description on interfaces.
    Thus far with the following regular expressions set for the shell profile they are going through i have managed the above, however the problem is when an engineer inputs "Show configuration", only the interfaces descriptions configuration is shown! The rest of the configuration will not be printed.
    deny-commands1=.*.
    allow-commands1=configure
    deny-configuration1=.*.
    allow-commands2=interfaces .*. description .*$
    allow-configuration1=interfaces .*. description .*$
    allow-commands2=show configuration.*
    allow-commands3=show configuration
    (some of these regex i know that are not needed, i was just playing around to check everything before posting)
    Any pointers as to why or how to resolve this?
    example output with the above:
    show configuration
    ## Last commit: 2014-01-09 09:34:44 EET by someone
    interfaces {
        xe-0/0/0 {
        xe-0/0/1 {
            description xxxx;
        xe-0/1/0 {
            description xxxx;
        xe-0/1/1 {
            description xxxx;
        xe-0/2/0 {
            disable;
        xe-0/2/1 {
            description xxxx;
        xe-0/3/0 {
            description xxxx;
        xe-0/3/1 {
            description xxxx;
        ae0 {
            description "xxxx";
        ae1 {
            description xxxx;
        demux0 {
        lo0 {
    {master}
    Thanks in advance!
    Spyros

    You are absolutely right!!  I was doing research online after posting the above.  The correct RADIUS attribute to use is actually CVPN3000/ASA/PIX7.x-Group-Based-Address-Pools.  Then create the pool in ASA, and call that pool's name in ACS under that RADIUS attribute.  Someone explained this perfectly in this community before.  Much appreciate your answer!
    Here's from another post last year:
    ACS  5 does not have the feature of IP pools. Logically its always good to  setup pools locally on vpn server and if you want user to pick ip from  specific local pool you can configure acs to push that attribute.
    On ACS Go to > Policy Elements  -> Network Access ->   Authorization Profiles -> Create ->
    Name of the Policy ->Dictionary Type: Radius-Cisco VPN 3000/ASA/PIX7.x
    Attribute Type : CVPN3000/ASA/PIX7.x-Group-Based-Address-Pools
    Attribute Type: String
    Attribute Value : Static MYPOOL (Name of the Pool which is defined on the ASA)
    Access Policies ->Default Network Access -> Authorization ->  Create -> Under result section call the Authorization p

  • I'm running LabVIEW 8.5, so where would I find a list of compatible for certain cameras and user reviews?

    Hello All,
    I'm narrowing down on my selection of cameras for my lab.
    First there are two cameras from Point Gray which are:
    - Grasshopper: Grasshopper
    GRAS-14S3M/C
    - Flea2: Flea 2 FL2-14S3M/C
    And the third camera is from Allied Technology:
    - Prosilica GX1910 GigE Monochrome Camera
    One question is where would I find actual reviews from users who've had these cameras? Instead of referring to the website and looking at datasheets.
    Will these camera run on LABVIEW 8.5/IMAQ-DX?
    Your help would be appreciated.
    Thanks,
    HumanCondition

    Hi HumanCondition,
    I just wanted to let you know that the latest version of our NI Vision Acquisition Software 2010.08 supports LabVIEW 8.5 development.  Also, if you are looking for currently supported cameras I would check out our Industrial Camera Advisor. This lists all currently supported cameras.  It appears as though we do not currently support the Grasshopper GRAS-14S3M/C or the Prosilica GX1910.  We do support the Flea2 FL2-14S3M/C cameras.  If the camera that you are needing is currently unsupported, you do have the option of generating a cameras file for that camera using our NI Camera File Generator.  This software is free to download on the Overview tab.
    Enjoy!
    Lynn
    National Instruments
    Staff Systems Engineer

  • CAM and user mixed environment

    Is it possible to have both users and CAM mode all with or without smart cards? i.e. Without any smart cards, I want to have some Rays specified to be kiosks and others to be user log in terminals, and all Rays should connect to the same server. I know I can do one or the other, or I can do both with separate servers and VLANs. Even one server with multiple VLANs (interfaces) would be fine, with one interface per purpose.

    Is it possible to have both users and CAM mode all with or without smart cards?In the current release the CAM decision is made strictly on a card vs. non-card basis. There's a good chance that this will change in the next release but so far there's been no announcement of a date for that release, or even a date for a beta.

  • USB Camera and users

    I can use my USB camera on my Lab computers when I log in as an administrator, but when I log in as a student, I cannot. The Group for students is marked with "Never" managed for removable media. Any help?
    Student Machine: emac running 10.3.8
    Server: Duel G4 tower running 10.4.8

    Hello,
    I wanted to update this post for those users who may be looking for a solution on using USB cameras with LabVIEW or Vision Assistant. Recently NI-IMAQ for USB Cameras was released as an example program on National Instruments' Developer Exchange (see link below). NI-IMAQ for USB Cameras is a free software driver for acquiring images from any DirectShow imaging device into LabVIEW. These devices include USB cameras, webcams, microscopes, scanners, and many consumer-grade imaging products. With the driver, users can configure their device, and acquire images into LabVIEW.
    NI-IMAQ for USB Cameras
    Note: While NI-IMAQ for USB Cameras comes with complete documentation, it is not supported by National Instruments' Applications Engineers. Any support questions should be directed to other users through the Discussion Forums.
    Regards,
    Michael
    Applications Engineer
    National Instruments

  • Migration Assistant and user permissions broken

    I just used Migration Assistant to my old early 2008 unibody 15" MBP to import stuff to my brand new 15" quad core i7. The old machine was connected through FW800 in target disk mode.
    Somehow this process failed and it left me to an odd result which I cannot figure out how or why such things would happen. I have used migration assistant often successfully, if not exactly this way.
    I already decided to start things from scratch, but I would appreciate any insight that somebody might have. Like what just happened? Do you have similar experiences?
    The process:
    - In my old machine I had two users, for the sake of argument, "MainUser" and "OldUser".
    - In my new machine I had two users made right after a clean install, "Admin" and "MainUser". I usually work with "MainUser" so I made one without thinking about it much.
    - I connected the old machine in Target Disk mode and started Migration Assistant under Admin of the new machine. First question I answered to migrate from another disk, as the other machine was in Target Disk mode. Next one asked to pick the disk and that is followed by a selection "What to migrate". I wanted to install applications from scratch, so I checked everything except applications. I do not know if this is relevant, but I would imagine it is not.
    - A pop-up appeared, which correctly told that there already is MainUser on the new machine. The dialog gave me three options: 1. Rename the account that I am transferring, two with the same name could not exist 2. Replace the existing account with the one I am transferring 3. Do not transfer this account.
    - I chose 2, because there was nothing worth saving in the MainUser account on the new machine. Continue.
    - Watch a few hours of progress bar
    - After the migration process the machine was in very odd state. I logged in as MainUser and it oddly looked like default Snow Leopard state, not like the desktop of the migrated account. No folder items that I had on the desktop previously were visible, language was default English and desktop background was the Snow Leopard nebula. I tried, but could not change that in the system preferences.
    - Closer inspection revealed that I did not have permissions to access any of the folders under my username, like Documents, Music, Movies etc. This also explained the desktop problems. It meant that none of the programs were allowed to read or write any data under Library folder so everything was and stayed as default. For instance, any settings that I tried to change and which might even apparently change, would reset back on logout. Programs settings were empty, like no bookmarks on Safari or Apple Mail did not show the mail accounts.
    - I checked with Terminal what was on with permissions, and for some odd reason, all the folder owners under MainUser belonged to OldUser(!).
    - There is no reason that I can think of why that user account would have anything to do with this migration -- after all, the whole deal was supposed to be to migrate (or overwrite) MainUser, not to mess with OldUser in any way, except bring that over as a separate item.
    - For the sake of argument, I also logged to OldUser account and that seemed to be transferred correctly. No issues with file permissions or the desktop. Only MainUser was messed.
    - I decided to take the ownership of all files under MainUser account back. I did "sudo chmod -R MainUser *" to grab everything. Immediately the stuff on desktop appeared. After logout and login rest of things seemed to return (mostly) to those places that the migrated MainUser should have had, like the desktop background, dock position and even Apple Mail now showed my old emails.
    Even if I sort of fixed things, I have iffy feeling about the whole process.
    I decided to start over. This time I will not have MainUser account on the new machine to avoid any further hassle. While I suggest everyone to avoid this situation and not to have users with same name or let Migration Assistant to run this overwrite -option, I would like to hear any speculation why or how this might have happened.
    If Apple is listening, you might check the latest Migration Assistant in the above case. There might be a bug. Thank you for listening.

    I think it is inadvisable to have the same user account on the target machine when using Migration Assistant - just from recollection this is known to cause problems.
    However, in my experience (and I have used MA many times across many machines), even when apparently completing successfully, MA simply does not work properly when it comes to permissions.
    For example, after using MA to import my previous user account to my new MBP 2.3 i7, I cannot drag anything out of the dock - it just doesn't work.
    Also, content of my desktop folder does NOT display on the desktop itself.
    I have tried applying specific permissions to this folder, for my user account AND "Everyone" - it makes no difference.
    I do not regard Migration Assistant as fit for purpose.

  • KM Document iView and User Permissions

    Hi all,
    I have created a KM Document iView to display a document (stored within KM) to my users. However, it is happening something I believe is not correct.
    When I set only READ permission for this folder, the KM Document iView is not able to display the document for my users. On the other hand, when I change the permission to, at least, READ/WRITE, the iView works fine.
    Is it really the behaviour of that iView? Or am I doing something wrong?
    Thanks in advance
    Fernando Urzedo

    Fernando,
    Read permissions should allow users to see the content. Please check this link on Assigning Permissions to Folders.
    http://help.sap.com/saphelp_nw04/helpdata/en/a8/d349d2e488964da38a661fa722e7a9/content.htm
    Check if the eu role has read permissions.
    Also check this link for information on permissions iview.
    -Dileep

  • CUIC "Login User" permissions

    Hi,
    We are using CUIS 7.5.4 for our Contact Center (CC) reporting.
    Now, we have installed CUIC 9.0(1) in another server and testing all the reports and user permissions. In CUIS, all the CC Supervisors provided with Restricted User permission but they are individually provided permissions for their CC folder and reports. I want to achieve this in CUIC.
    I assume that the "Login User" in CUIC is equivalent to "Restricted User" in CUIS. Based on this understanding, we provided "Login User" permission to a user and also enabled permissions to his report folder and reports. But, whenever we login as Login User, we do not find any folders under Report folder and if we click on Report folder, it says "Access Denied - please contact Administrator for permission".
    I have another user for the administrator but I do not know which permission needs to be enabled for that restricted user/login user to access his reports (only). Can anyone help me on this please.
    Thanks & Regards
    Velan

    "Login User" only allows the user to login to CUIC, it doesn't allow access to any features. "Report Designer" will allow the user to run and create reports, and "Dashboard Designer" will allow the user to run and create Dashboards.
    New Reports/Dashboards can only be created in folders that the user has proper permissions on. Likewise, you can use permissions to restrict which existing folders and reports the user can use.
    -Jameson

  • HTMLDB, Database Users, Permissions

    I am working with a client that has an Oracle DB app that uses Forms 6i for the UI. We want to start using HTMLDB in addition to Forms. Currently, all the users have a database username and password, and user permissions are controlled by database roles and individual table permissions. The goal is to allow the users to login to HTMLDB with their db username and password so the existing db roles and permissions will be in effect.
    I have my HTMLDB configuration setup without a PLSQL Username/Password in the marvel.conf file, and this allows users to login to the HTMLDB apps with their DB username and password. This works fine.
    I have a report setup that selects from an employee table. Only a few roles have select permissions on this table. (I will also add that this table is in a schema that is mapped to the HTMLDB workspace) What I am finding is that, regardless of the permissions assigned to the logged in user, they can run this report.
    Looking at the DB connections in Enterprise Manager, it shows the username of the logged in user, so it would apper that the webserver is connecting to the DB as I would expect. How is it that even non-privileged users can run this report?
    If I login via sqlplus as the same user and attempt to run a select against this table, I get "ora-00942 table or view does not exist", so I am sure my permissions are correct. What am I missing?
    Any help on this is greatly appreciated.
    -Tony

    Tony,
    It is not your imagination, this is how things are 'sposed to work. At a Forms/HTML DB site we worked on, individual users were granted database roles, as you described. Forms controlled access to functionality by interrogating user_role_privs and would display access points to modules via menus in strict accordance with the connected user's privileges. In the back-end, however, the application executed in the super-user schema that had object privileges on everything. But user-level access control had already been accomplished by filtering what could be presented in the UI.
    With HTML DB, your users are connected as their database account. This achieves authentication and obtains the value of USER from the database for :APP_USER. Those users have privileges on schema objects through roles. Roles are not enabled in stored procedures, which is the mechanism through which all database interaction is performed in HTML DB.
    The minimum that you'll need to do is to establish row-level access control by using Oracle's Virtual Private Database feature, or VPD (aka, FGAC/RLS), which you can enable for every page request using the VPD application attribute. There will be an excellent how-to published very soon about that. (BTW, you don't need to connect using the database accounts to use this feature, in fact it's designed assuming the opposite situation.)
    When you need to limit access to application components based on user privileges, you'll have to do much more. For example, you might build an authorization model based on user_role_privs. Ensure that all SQL against the application schema is performed through APIs. The APIs will run in the application schema which should own the objects and would therefore have all required object privileges. The authorization model will be implemented as an API that is called from HTML DB authorization schemes attached to pages, regions, processes, etc. Then you can do things like, if the current user is not a manager don't show them links to the 'Show My Employee Detail' page and don't let them run the page if they attempt to do so and also send someone an email if that happens.
    Scott

  • Lite H.264 DVR User Permissions for certian Cameras

    In our building we have a lite H.264 DVR. We have one camera that we need to share with a new user on the DVR.
    I cant for the life of me know how to go about doing this.
    First I thought it would be in the user permissions but within that there wasn't much in the way of setting to restrict what cameras could and couldn't be viewed.
    If someone could give me some feedback on how this could be set up that would be brilliant.
    This topic first appeared in the Spiceworks Community

    Love marriage specialist baba, Vashikaranspecialist baba, black magic specialist baba..+91-9829791419 No1 Indian AstrologerAGHORI Ji +91-9829791419 15 time gold medalist Baba ji...inuk...usa....canada....in india..... love Vashikaran specialist ,voodoo spellget your love back by Vashikaran, blackmagic love Vashikaran specialist, bringyour love back, get back your lost love, win your lost love back, spells andtips to get your love back,Vashikaran WORLD FAMOUS BEST INDIAN molvi baba JIINDIA / AMERICA / CANADA / AUSTRALIA / UK / USA/INTERNATIONAL SERVICE WITHAGHORI ji 50 YRS EXPERIENCE.... love mantra to get back your lost love, Vashikaranspecialist to bring love back, solve love problems, bring your love back bytantra and ilam, powerful Vashikaran mantra to win the the about black magicspecialist molvi baba ji love back, indian hindu...

  • What are high and low values in sharepoint 2013 user permissions?

    So I hit this api:
    http://win-a3q7ml82p8f/sharepoint_site/_api/web/roledefinitions/
    And got the different high and low values. But I am not clear with what they mean:
    For eg:
    High: 176, Low: 138612833
    and
    High: 176, Low: 138612801
    So for different values of Low how does it change the permissions?
    For 176 its binary is 10110000. So looking at this table here: http://www.dctmcontent.com/sharepoint/Articles/Permissions%20and%20Mask%20Values.aspx
    I can understand that 176 would mean the following set of permissions:
    DeleteVersions
    OpenItems
    ApproveItems
    But what's confusing me is, that user has OpenItems permissions but not ViewListItems permission? Am I wrong in understanding this?
    Also how does the value of Low change the overall user permissions?
    Note: I looked at this answer: http://social.msdn.microsoft.com/Forums/sharepoint/en-US/9d6df168-e8f5-4323-8c34-0646c03eff68/rest-api-what-are-high-and-low-in-effectivebasepermissions-and-getusereffectivepermissions?forum=sharepointdevelopment
    But honestly I cant understand what that means. Can someone help please?

    check this blog may explain you...
    http://jamestsai.net/Blog/post/Understand-SharePoint-Permissions---Part-1-SPBasePermissions-in-Hex2c-Decimal-and-Binary---The-Basics.aspx
    Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog

  • Unknown User Permissions - Erase and Install Backup Plan

    Hi everyone,
    I upgraded from Tiger and therefore have the unknown user permissions problems. I'd like to erase and install my system and am writing to verify the following:
    If I copy my data (with the funny permissions) to a Powerbook in Firewire Disk Mode, reinstall Leopard on my new iMac, then copy the data back from the Powerbook in disk target mode, will the permissions be fixed?
    Thank you, Tom Bertram.

    Thomas,
    If you are talking about the "unknown" group problem seen in the permissions portion of Get Info, be aware that Apple is in the process of putting out a Knowledge Base article to address this and it may be wise to be patient a little longer.
    The user accounts inherited from Tiger belong to a "group" that has a missing piece of information -- a group name that Leopard wants. The installer should have dealt with this but it didn't. Anyway, a couple of simple Terminal commands can fix this for each such account. Once the Group description is proper, there will no longer be any need to change the group membership of your files.
    Unfortunately the first couple tries Apple made of describing how to do this appear to be in error. See the following thread:
    http://discussions.apple.com/thread.jspa?threadID=1280472&tstart=0
    The correct commands should be posted by Apple shortly and then you can resolve this without having to do a whole re-install.
    --Bob

  • How to set NTFS and share permissions for Users share for home directories in Server 2012

    I have a new Server 2012 server, and I want to set up a Users share, that will contain subfolders of each user's username and contain their home directory.  But what do I set the share and NTFS permissions as on the root level, lets call the folder
    Users? Is the following older article the correct permissions I need?
    https://support.microsoft.com/kb/274443

    Hi RJO22,
    You can choose configure the Folder Redirection, Folder Redirection enables you to redirect the location of specific folders within user profiles to a new location, such as
    a shared network location. Folder redirection is used in the process of administering user profiles and roaming user profiles. You can configure Folder Redirection using the Group Policy Management Console to redirect specific user profile folders, as well
    as edit Folder Redirection policy settings.
    The related KB:
    Folder Redirection Overview
    http://technet.microsoft.com/en-us/library/cc732275.aspx
    Specify the Location of Folders in a User Profile
    http://technet.microsoft.com/en-us/library/cc771969.aspx
    I’m glad to be of help to you!
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • How to view hidden user files and reset permissions

    I am having difficulties getting the hidden files to appear first of all. I have tried a couple of different things that have been suggested in other posts. And I would really like a point in the right direction to find information on resetting permissions. Thanks in advance for any help.

    To view hidden files, I use a third party program called Desktop Utility, takes only a few seconds to activate and have them shown. Quick and easy.
    http://sweetpproductions.com/
    Resetting Permissions info and How TO;
    http://osxdaily.com/2011/11/15/repair-user-permissions-in-mac-os-x-lion/
    When you use the Disk Utility app and Repair Permissions — it doesn’t actually repair the permission settings on folders and files in your Home folder where your documents and personal applications reside.
    There is an additional Repair Permissions application utility hidden away. This tool is located inside boot Repair Utilities. Here’s how to access it.
    Restart Lion and hold down the Command and R keys.
    You will boot into the Repair Utilities screen. On top, in the Menu Bar click the Utilities item then select Terminal.
    In the Terminal window, type resetpassword and hit Return.
    The Password reset utility launches, but you’re not going to reset the password. Instead, click on the icon for your Mac’s hard drive at the top. From the drop-down below it, select the user account where you are having issues.
    At the bottom of the window, you’ll see an area labeled ‘Reset Home Directory Permissions and ACLs’. Click the Reset button there.

Maybe you are looking for

  • 30:6519:Target application does not exist.

    Hello, I want to delete an existing application, but I'm getting the following error "Target application does not exist" and I can't delete neither deploy. Do you know what I can do to resolve this issue? Regards, Rodrigo

  • Icon for a Custom Component

    Hi -- I am building a custom component and I have tried to create the icon for the component using [IconFile("iconMaskInput.png")] but its not working. Can someone help me out? Rich

  • Clearing doc

    A payment was posted to clean the invoice 1900158825. At the same time a Overpayment was applied. But after bank reconciliation we found that there is no an overpayment this was an error in the deposit slip. So, in order to reflect the correct postin

  • How to create sales employee without HR module

    Dear Experts IMGSDMASTER DATABUSINESS PARTNER-USE SALES EMPLOYEE WITHOUT HR 2. Define PErsonnel area (usually locations) 3. Define PErsonnel Subarea (bifurcations within loctions, may not exist but recommended to be maintained) 4. Define Employee Gro

  • Exchange Server 2013 SP1 - How to create Resource Mailbox on powershell?

    Hi, I'm having a hard time trying to create a resource mailbox. The "Resource" page on ECP doesn't have the option to create (probably after the SP1 update deploy) so I'm trying to create on Powershell. The problem is that the help examples doesn't w