Censor Effect is confusing for me to use

I drag the effect onto the clip. Simple enough. I read somewhere I go into Video Animation so I'm trying that. I also see how you can make keyframes with Option + K.
However, I'm not getting the keyframes part in FCP. I notice after I start setting keyframes that the censor seems to go all over the place.
Any pointers? Thanks!

None. Just a plain clip with a finger I have to blur. Ha.
I agree, a keyframe on every frame should never be necessary but the traditional method of expecting it to move wasn't happening.
For example, I'd set a keyframe on one position. Great. I set it on another position a second later. Great. But for whatever reason, if I add more and go back and look at the censor between the first two keyframes the censor is sometimes almost off screen. As if the tweening of the keyframes is jacked. And I'm literally only moving the cursor a few pixels.
Very frustrating.

Similar Messages

  • Hi there, I got confused... which product is most suitable for me to use and i urgently have to send the file to someone. Please give me an advice.

    Hi there, i got confused.. which product is most suitable for me to use. Please advise.

    Hi hanachan1,
    If you're looking to send and track files, then Adobe Send is a great way to go. For more information, please see Send Large Files Easily - Select, Send, & Confirm & Track| Adobe Send
    Best,
    Sara

  • How to set resize effect for border container using flex 4 or 4.5

    Hi friends,
    resize effect works fine for one control (image). if want to same for custom comp, then is not working.
    below is the code is in custom comp,
    <?xml version="1.0" encoding="utf-8"?>
    <s:VGroup xmlns:fx="http://ns.adobe.com/mxml/2009" width="200"
             xmlns:s="library://ns.adobe.com/flex/spark" horizontalAlign="left" verticalAlign="bottom"
             xmlns:mx="library://ns.adobe.com/flex/mx"  xmlns:parsley="http://www.spicefactory.org/parsley"
             xmlns:general="com.presentation.components.general.*">
        <fx:Declarations>
            <parsley:Configure/>
        </fx:Declarations>
        <s:BorderContainer id="bcMain" backgroundColor="#f4f4f4" borderColor="#CDC7C7" borderStyle="solid" borderVisible="true" width="100%">
            <s:layout>
                <s:VerticalLayout horizontalAlign="left" verticalAlign="middle" paddingTop="5" paddingLeft="5" paddingRight="5" paddingBottom="5"/>
            </s:layout>
            <s:HGroup id="hg1" horizontalAlign="left" verticalAlign="middle" width="100%" gap="5"
                      buttonMode="true" useHandCursor="true" >
                <s:Image id="img1" source="@Embed(source='assets/flex.png" width="15" height="17" cachePolicy="on" cacheAsBitmap="true"/>
                <s:Label text="label 1" textAlign="center"/>
            </s:HGroup>
            <mx:HRule width="100%"/>
            <s:HGroup horizontalAlign="left" verticalAlign="middle" width="100%" gap="10">
                <s:BorderContainer id="bc1" width="35" useHandCursor="true" buttonMode="true"
                          backgroundColor="#f4f4f4" height="40">
                    <s:layout>
                        <s:VerticalLayout horizontalAlign="center" verticalAlign="middle"/>
                    </s:layout>
                    <s:Image id="img2" source="@Embed(source='assets/flex.png" cachePolicy="on" cacheAsBitmap="true"/>
                    <s:Label text="label 2" textAlign="center"/>
                </s:BorderContainer>
                <s:BorderContainer id="bc2" width="35" useHandCursor="true" buttonMode="true"
                          backgroundColor="#f4f4f4" height="40">
                    <s:layout>
                        <s:VerticalLayout horizontalAlign="center" verticalAlign="middle"/>
                    </s:layout>
                    <s:Image id="img3" source="@Embed(source='assets/flex.png" cachePolicy="on" cacheAsBitmap="true"/>
                    <s:Label text="label 3" textAlign="center"/>
                </s:BorderContainer>
                <s:BorderContainer id="bc3" width="35" useHandCursor="true" buttonMode="true"
                          backgroundColor="#f4f4f4" height="40">
                    <s:layout>
                        <s:VerticalLayout horizontalAlign="center" verticalAlign="middle"/>
                    </s:layout>
                    <s:Image id="img4" source="@Embed(source='assets/flex.png" cachePolicy="on" cacheAsBitmap="true"/>
                    <s:Label text="label 4" textAlign="center"/>
                </s:BorderContainer>
            </s:HGroup>
        </s:BorderContainer>
    </s:VGroup>
    I followed how resize effects works for image control,
    <mx:Resize id="expand" target="{img}" widthTo="100" heightTo="200"  duration="2000"/>
            <mx:Resize id="contract" target="{img}" widthTo="30" heightTo="60"  duration="2000"/>
    <s:Panel title="Resize Effect Example" width="100%" height="100%">
            <s:VGroup width="100%" height="200" horizontalAlign="left" verticalAlign="bottom">           
                <mx:Image id="img" source="@Embed(source='assets/05_ipad.png')" width="10" height="10"/>
                <mx:Button label="Expand" click="expand.end(); expand.play();"/>
                <mx:Button label="Contract" click="contract.end(); contract.play();"/>
            </s:VGroup>
        </s:Panel>
    Please help me.

    BorderContainer wont resize if the fixed width is specified, if u want to give some minimum width you can use minWidth . Give  Width = "100%", now it will get Resizing capabilities

  • Newbie M5 question - How does the Censor effect blur only the inside of the circle?

    I'm brand new to Motion 5. I'm trying to understand how an effect like "Censor" applies the blur to only the inside of the circle. I opened the Censor effect in M5 and studied it, but the answer is just out of my grasp. Can someone explain it to me, or point me to an article that will help? Thanks.
    Dan

    In Motion, in the Censor effect project, if you turn off the Effect Source (lowest layer) you'll see the "circle" used to "limit" the effect.
    Actually, this is just an illusion:
    The original Effect Source (in FCPX, that's whatever clip this effect is applied to) is Cloned (the layer is called "Mask"): a clone is basically a "rasterized copy" of the original -- what I mean by that is that Clones not only copy original objects, but also all their filters and other layers/effects if you clone a group of objects -- reducing them all down to a single layer copy.  This copy can be treated just like any other object in Motion (with an interesting exception*): you can add masks and other filter effects and/or behaviors to create new actions while the original source of the clone is left intact.
    In this effect, there is a Circle Mask applied to the Clone, as well as three different Filters: Pixellate, Gaussian Blur, and Brightness. These three different filters are turned on and off separately by use of a "pop-up" rig so that only one of the filters is applied to the clone at a time.  The gear shaped objects are Behaviors, in this case Link behaviors that "link" to the Circle Blur filter properties that is attached to the Effect Source which control the location in the canvas and the scale of the mask (Radius to Scale-X and another to Scale-Y). The Circle Blur filter has Onscreen Controls of a center point and a "radius" and those property values can be shared to other objects in a project via these link behaviors. The Circle  Blur filter effect is turned off in this project because it *only* needed as a *source* for the onscreen control properties (and those can be turned on for use in FCPX [Publish OSC] whether the filter type is used or not.)  All of the visible action in this project is created by applying other filter effects to the Clone copy and masking the area so that the rest of the source is uneffected while this effect (Censor) is active in FCPX.
    The *interesting exception: Clones can be "retimed" -- even timed to go in reverse. No other object (other than actual video) can be made to do the same. What does this mean? It means that you can create, basically, an "in-project" video of other objects in animation (without exporting the animation first) and retime them to loop over and over, go in reverse, speed up, slow down, etc... Clones are a very useful tool in Motion (not to mention "light-weight").  Their only drawback: they *flatten* 3D animations, so you can't apply "more 3D" effects to them because they'll just look flattened on a plane if you do. So any time you feel you need to duplicate something, ask yourself if you would be better served by a clone instead.
    HTH

  • How does select stmt with for all entries uses Indexes

    Hello all,
    I goes through a number of documents but still confused how does select for all entries uses indexes if fields are not in sequences. i got pretty much the same results if i take like two cases on Hr tables HRP1000 and HRP1001(with for all entries based upon hrp1000). Here is the sequence of index fields on hrp1001 (MANDT, OTYPE, OBJID, PLVAR, RSIGN, RELAT, ISTAT, PRIOX, BEGDA, ENDDA, VARYF, SEQNR). in second case objid field is in sequence as in defined Index but i dont see significant increase in field even though the number of records are around 30000. My question is does it make a differrence to use field sequence (same as in table indexes) in comparison to redundant field sequence (not same as defined in table indexes), secondly how we can ge tto know if table index is used in Select for entries query i tried Explain in ST05 but its not clear if it uses any index at all in hrp1001 read.
    here is the sample code i use to get test results.
    test case 1
    REPORT  zdemo_perf_select.
    DATA: it_hrp1000 TYPE STANDARD TABLE OF hrp1000 WITH HEADER LINE.
    DATA: it_hrp1001 TYPE STANDARD TABLE OF hrp1001 WITH HEADER LINE.
    DATA: it_hrp1007 TYPE STANDARD TABLE OF hrp1007 WITH HEADER LINE.
    DATA: it_pa0000 TYPE STANDARD TABLE OF pa0000 WITH HEADER LINE.
    DATA: it_pa0001 TYPE STANDARD TABLE OF pa0001 WITH HEADER LINE.
    DATA: it_pa0002 TYPE STANDARD TABLE OF pa0002 WITH HEADER LINE.
    DATA: it_pa0105_10 TYPE STANDARD TABLE OF pa0105 WITH HEADER LINE.
    DATA: it_pa0105_20 TYPE STANDARD TABLE OF pa0105 WITH HEADER LINE.
    DATA: t1 TYPE timestampl,
          t2 TYPE timestampl,
          t3 TYPE timestampl 
    SELECT * FROM hrp1000 CLIENT SPECIFIED  INTO TABLE it_hrp1000 bypassing buffer
                WHERE mandt EQ sy-mandt AND
                      plvar EQ '01' AND
                      otype EQ 'S'AND
                      istat EQ '1' AND
                      begda <= sy-datum AND
                      endda >= sy-datum AND
                      langu EQ 'EN'.
    GET TIME STAMP FIELD t1.
    SELECT * FROM hrp1001 CLIENT SPECIFIED INTO TABLE it_hrp1001 bypassing buffer
                FOR ALL ENTRIES IN it_hrp1000
                 WHERE mandt EQ sy-mandt AND
                        otype EQ 'S' AND
    *                    objid EQ it_hrp1000-objid and
                        plvar EQ '01' AND
                        rsign EQ 'B' AND
                        relat EQ '007' AND
                        istat EQ '1' AND
                        begda LT sy-datum AND
                        endda GT sy-datum and
                        sclas EQ 'C' and
                        objid EQ it_hrp1000-objid.
    *                    %_hints mssqlnt 'INDEX(HRP1001~0)'.
    *delete it_hrp1001 where sclas ne 'C'.
    GET TIME STAMP FIELD t2.
    t3 = t1 - t2.
    WRITE: 'Time taken - ', t3.
    test case 2
    REPORT  zdemo_perf_select.
    DATA: it_hrp1000 TYPE STANDARD TABLE OF hrp1000 WITH HEADER LINE.
    DATA: it_hrp1001 TYPE STANDARD TABLE OF hrp1001 WITH HEADER LINE.
    DATA: it_hrp1007 TYPE STANDARD TABLE OF hrp1007 WITH HEADER LINE.
    DATA: it_pa0000 TYPE STANDARD TABLE OF pa0000 WITH HEADER LINE.
    DATA: it_pa0001 TYPE STANDARD TABLE OF pa0001 WITH HEADER LINE.
    DATA: it_pa0002 TYPE STANDARD TABLE OF pa0002 WITH HEADER LINE.
    DATA: it_pa0105_10 TYPE STANDARD TABLE OF pa0105 WITH HEADER LINE.
    DATA: it_pa0105_20 TYPE STANDARD TABLE OF pa0105 WITH HEADER LINE.
    DATA: t1 TYPE timestampl,
          t2 TYPE timestampl,
          t3 TYPE timestampl 
    SELECT * FROM hrp1000 CLIENT SPECIFIED  INTO TABLE it_hrp1000 bypassing buffer
                WHERE mandt EQ sy-mandt AND
                      plvar EQ '01' AND
                      otype EQ 'S'AND
                      istat EQ '1' AND
                      begda <= sy-datum AND
                      endda >= sy-datum AND
                      langu EQ 'EN'.
    GET TIME STAMP FIELD t1.
    SELECT * FROM hrp1001 CLIENT SPECIFIED INTO TABLE it_hrp1001 bypassing buffer
                FOR ALL ENTRIES IN it_hrp1000
                 WHERE mandt EQ sy-mandt AND
                        otype EQ 'S' AND
                        objid EQ it_hrp1000-objid and
                        plvar EQ '01' AND
                        rsign EQ 'B' AND
                        relat EQ '007' AND
                        istat EQ '1' AND
                        begda LT sy-datum AND
                        endda GT sy-datum and
                        sclas EQ 'C'." and
    *                    objid EQ it_hrp1000-objid.
    *                    %_hints mssqlnt 'INDEX(HRP1001~0)'.
    *delete it_hrp1001 where sclas ne 'C'.
    GET TIME STAMP FIELD t2.
    t3 = t1 - t2.
    WRITE: 'Time taken - ', t3.

    Mani wrote:
    Thank you for your answer, its very helpful but i am still nor sure how does parameter rsdb/max_blocking_factor affect records size.
    Hi,
    The blocking affects the size of the statement and the memory structures for returning the result.
    So if your itab has 500 rows and your blocking is 5, the very same statement will be executed 100 times.
    Nothing good or bad about this so far.
    Assume, your average result for an inlist 5 statement is 25 records with an average size of 109 bytes.
    You average result size will be 2725 byte plus overhead which will nearly perfectly fit into two 1500 byte ethernet frames.
    Nothing to do in this case.
    Assume your average result for an inlist 5 statement is 7 records with an average size of 67 bytes.
    You average result size will be ~ 470 byte plus overhead which will only fill 1/3 of a 1500 byte ethernet frame.
    In this case, setting the blocking to 12 ... 15 will give you 66% network transfer performance gain,
    and reduces the number of calls to the DB by 50%, giving additional benefit.
    Now this is an extreme example. The longer the average row length is, the lower will be the average loss in the network.
    You have the same effects in memory structures, but on that layer you are fighting single micro seconds instead of
    hundreds of these, so in real life it is rarely measurable.
    Depending on table-statistics, oracle might decide for short inlists to use a concatanation instead of an inlist.
    This is supposed to be more costy, but I never had a case where I could proove a big difference.
    Values from 5 to 15 for blocking seem to be ok for me. If you have special statements in customer coding,
    it #might# be benefitial to do the mentioned calculations and do some network tracing to see if you can squeeze your
    network efficiency by tuning the blocking.
    If you have jumbo frames enabled, it might be worth to be analyzed as well.
    If you are only on a DB-CI system that is loopback connected to the DB, I doubt there might be a big outcome.
    Hope this helps
    Volker

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Can I purchase a legitimate version of After Effects 5.5 for a Mac Pro running 10.6 or 10.7? If so how?

    I would like to do this rather than upgrade the Mac since it won't accept anything later than 10.7.

    I think that you are confused about the hardware requirements. There is no need for any GPU features beyond OpenGL 2.0. There is one feature of After Effects CS6 and later that _can_ use CUDA, but that doesn't mean that you need one of these cards to use the rest of After Effects.
    Details:
    GPU (CUDA, OpenGL) features in After Effects CS6 and After Effects CC

  • How to create a cache for JPA Entities using an EJB

    Hello everybody! I have recently got started with JPA 2.0 (I use eclipseLink) and EJB 3.1 and have a problem to figure out how to best implement a cache for my JPA Entities using an EJB.
    In the following I try to describe my problem.. I know it is a bit verbose, but hope somebody will help me.. (I highlighted in bold the core of my problem, in case you want to first decide if you can/want help and in the case spend another couple of minutes to understand the domain)
    I have the following JPA Entities:
    @Entity Genre{
    private String name;
    @OneToMany(mappedBy = "genre", cascade={CascadeType.MERGE, CascadeType.PERSIST})
    private Collection<Novel> novels;
    @Entity
    class Novel{
    @ManyToOne(cascade={CascadeType.MERGE, CascadeType.PERSIST})
    private Genre genre;
    private String titleUnique;
    @OneToMany(mappedBy="novel", cascade={CascadeType.MERGE, CascadeType.PERSIST})
    private Collection<NovelEdition> editions;
    @Entity
    class NovelEdition{
    private String publisherNameUnique;
    private String year;
    @ManyToOne(optional=false, cascade={CascadeType.PERSIST, CascadeType.MERGE})
    private Novel novel;
    @ManyToOne(optional=false, cascade={CascadeType.MERGE, CascadeType.PERSIST})
    private Catalog appearsInCatalog;
    @Entity
    class Catalog{
    private String name;
    @OneToMany(mappedBy = "appearsInCatalog", cascade = {CascadeType.MERGE, CascadeType.PERSIST})
    private Collection<NovelEdition> novelsInCatalog;
    The idea is to have several Novels, belonging each to a specific Genre, for which can exist more than an edition (different publisher, year, etc). For semplicity a NovelEdition can belong to just one Catalog, being such a Catalog represented by such a text file:
    FILE 1:
    Catalog: Name Of Catalog 1
    "Title of Novel 1", "Genre1 name","Publisher1 Name", 2009
    "Title of Novel 2", "Genre1 name","Pulisher2 Name", 2010
    FILE 2:
    Catalog: Name Of Catalog 2
    "Title of Novel 1", "Genre1 name","Publisher2 Name", 2011
    "Title of Novel 2", "Genre1 name","Pulisher1 Name", 2011
    Each entity has associated a Stateless EJB that acts as a DAO, using a Transaction Scoped EntityManager. For example:
    @Stateless
    public class NovelDAO extends AbstractDAO<Novel> {
    @PersistenceContext(unitName = "XXX")
    private EntityManager em;
    protected EntityManager getEntityManager() {
    return em;
    public NovelDAO() {
    super(Novel.class);
    //NovelDAO Specific methods
    I am interested at when the catalog files are parsed and the corresponding entities are built (I usually read a whole batch of Catalogs at a time).
    Being the parsing a String-driven procedure, I don't want to repeat actions like novelDAO.getByName("Title of Novel 1") so I would like to use a centralized cache for mappings of type String-Identifier->Entity object.
    Currently I use +3 Objects+:
    1) The file parser, which does something like:
    final CatalogBuilder catalogBuilder = //JNDI Lookup
    //for each file:
    String catalogName = parseCatalogName(file);
    catalogBuilder.setCatalogName(catalogName);
    //For each novel edition
    String title= parseNovelTitle();
    String genre= parseGenre();
    catalogBuilder.addNovelEdition(title, genre, publisher, year);
    //End foreach
    catalogBuilder.build();
    2) The CatalogBuilder is a Stateful EJB which uses the Cache and gets re-initialized every time a new Catalog file is parsed and gets "removed" after a catalog is persisted.
    @Stateful
    public class CatalogBuilder {
    @PersistenceContext(unitName = "XXX", type = PersistenceContextType.EXTENDED)
    private EntityManager em;
    @EJB
    private Cache cache;
    private Catalog catalog;
    @PostConstruct
    public void initialize() {
    catalog = new Catalog();
    catalog.setNovelsInCatalog(new ArrayList<NovelEdition>());
    public void addNovelEdition(String title, String genreStr, String publisher, String year){
    Genre genre = cache.findGenreCreateIfAbsent(genreStr);//##
    Novel novel = cache.findNovelCreateIfAbsent(title, genre);//##
    NovelEdition novEd = new NovelEdition();
    novEd.setNovel(novel);
    //novEd.set publisher year catalog
    catalog.getNovelsInCatalog().add();
    public void setCatalogName(String name) {
    catalog.setName(name);
    @Remove
    public void build(){
    em.merge(catalog);
    3) Finally, the problematic bean: Cache. For CatalogBuilder I used an EXTENDED persistence context (which I need as the Parser executes several succesive transactions) together with a Stateful EJB; but in this case I am not really sure what I need. In fact, the cache:
    Should stay in memory until the parser is finished with its job, but not longer (should not be a singleton) as the parsing is just a very particular activity which happens rarely.
    Should keep all of the entities in context, and should return managed entities form mehtods marked with ##, otherwise the attempt to persist the catalog should fail (duplicated INSERTs)..
    Should use the same persistence context as the CatalogBuilder.
    What I have now is :
    @Stateful
    public class Cache {
    @PersistenceContext(unitName = "XXX", type = PersistenceContextType.EXTENDED)
    private EntityManager em;
    @EJB
    private sessionbean.GenreDAO genreDAO;
    //DAOs for other cached entities
    Map<String, Genre> genreName2Object=new TreeMap<String, Genre>();
    @PostConstruct
    public void initialize(){
    for (Genre g: genreDAO.findAll()) {
    genreName2Object.put(g.getName(), em.merge(g));
    public Genre findGenreCreateIfAbsent(String genreName){
    if (genreName2Object.containsKey(genreName){
    return genreName2Object.get(genreName);
    Genre g = new Genre();
    g.setName();
    g.setNovels(new ArrayList<Novel>());
    genreDAO.persist(t);
    genreName2Object.put(t.getIdentifier(), em.merge(t));
    return t;
    But honestly I couldn't find a solution which satisfies these 3 points at the same time. For example, using another stateful bean with an extended persistence context (PC) would work for the 1st parsed file, but I have no idea what should happen from the 2nd file on.. Indeed, for the 1st file the PC will be created and propagated from CatalogBuilder to Cache, which will then use the same PC. But after build() returns, the PC of CatalogBuilder should (I guess) be removed and re-created during the succesive parsing, although the PC of Cache should stay "alive": shouldn't in this case an exception being thrown? Another problem is what to do when the Cache bean is passivated. Currently I get the exception:
    "passivateEJB(), Exception caught ->
    java.io.IOException: java.io.IOException
    at com.sun.ejb.base.io.IOUtils.serializeObject(IOUtils.java:101)
    at com.sun.ejb.containers.util.cache.LruSessionCache.saveStateToStore(LruSessionCache.java:501)"
    Hence, I have no Idea how to implement my cache.. Can you please tell me how would you solve the problem?
    Many thanks!
    Bye

    Hi Chris,
    thanks for your reply!
    I've tried to add the following into persistence.xml (although I've read that eclipseLink uses L2 cache by default..):
    <shared-cache-mode>ALL</shared-cache-mode>
    Then I replaced the Cache bean with a stateless bean which has methods like
    Genre findGenreCreateIfAbsent(String genreName){
    Genre genre = genreDAO.findByName(genreName);
    if (genre!=null){
    return genre;
    genre = //Build new genre object
    genreDAO.persist(genre);
    return genre;
    As far as I undestood, the shared cache should automatically store the genre and avoid querying the DB multiple times for the same genre, but unfortunately this is not the case: if I use a FINE logging level, I see really a lot of SELECT queries, which I didn't see with my "home made" Cache...
    I am really confused.. :(
    Thanks again for helping + bye

  • Is it possible for the Adobe to put video instructions on these following things as my professor works on CS4 and I have CS6,it is really confusing for me to follow the disparitie between the two.

    Is it possible for the Adobe to put video instructions on these following things as my professor works on CS4 and I have CS6,it is really confusing for me to follow the disparitie between the two
    Modifying the header
    Changing page background color
    Changing sidebars in CSS
    Adding/changing a Spry link's background and hover colors in navbar
    Formatting headers in split view
    Deleting placeholder copy in the content container
    Inserting a video in a table
    Changing table background color
    Formatting text in the content container
    Format hyperlinks in CSS
    Insert page anchors and link to them with navbar hyperlinks
    Enter text in footer with a hyperlink
    Insert and format headers
      Use of a color picker (Color Cop)

    Use CS6 Help (F1).  Those are the most up to date articles for your product version.
    <Changing page background color>
    We've already told you how to do that with CSS code.
    <Deleting placeholder copy in the content container>
    Placeholders are deprecated.  Adobe removed them.
    <Inserting a video in a table>
    Insert > Media > HTML5 Video
    <Insert page anchors and link to them with navbar hyperlinks>
    Named anchors are deprecated in HTML.  Adobe removed them from DW.  Use Div IDs instead.
    Why are you taking a course that teaches outdated methods in CS4 which is no longer supported?
    Nancy O.

  • New Discussions: for day time use only? (-: A darker blue, please!

    Thanks a lot Mods for your efforts.
    I spend some time on these boards every day, so I can see things are going better and better.
    I like the new Discussions better than the previous, especially everything that comes with this new ability to put much more on one page (like being able to see A LOT (not only five) of "Recent topics in this category", or that the topic's titles can be longuer than before, or being able to read the whole thread without jumping to "the next 15 posts" like before. I set "My Posts" to "50", this too was not possible before. Etc.)
    Now my request:
    At first I thought, like many others, that the "blue dot" and the "blue half-dot" were too small, and that we couldn't see the small grey "New!" because it was not red.
    Now after all this time since Nov14, I finally understood what was wrong, because
    (1) the new kind of eye fatigue I didn't experienced before, and
    (2) a change in my computer's room lighting configuration.
    The real problem is not the blue dot size (altough I'm sure if it was a square it would work better), it is its environment.
    We have a white line after a light blue line, and this is a great feature to differenciate between topics. Works great within a thread too, to differenciate posts.
    But one side effect of this is that the whole page "feels" slightly blue.
    I'm not sure, but a human eye physicist could perhaps explain another kind of (more insidious?) side effect caused by the alternance of lines. Perhaps depending on which color are chosen for them?
    Anyway, there is no problem with a page that "feels" blue, when the text is black.
    The problem starts when the text ALSO is blue. Especially light blue...
    I find the text blue color too light. Even the "visited link" purple is too light.
    Given that the background is blueish, I mean. Otherwise it'd be fine.
    This was not easy to understand, because the [defect/effect] is not obvious: the overall picture is nice.
    But it became obvious to me when I saw that I have no problem IF I set my screen's brightess to "very bright".
    New Discussions: for day time use only?
    ==> Please, would it be a problem (or too difficult to set perhaps?), to try a darker blue text for two or three weeks, see if we like it better? (along with a slightly darker purple for the visited links).
    Thanks again for all the great work!
    Axl

    Hi Axl,
    Some one had posted this about color,I do not remember who,sorry.
    I thought it was interesting.Hopeful this color issue can be alter but deepening the colors as you & many have requested.
    http://www.grc.nasa.gov/WWW/usability/colorcss.html
    Good luck, Eme

  • Report name for services where used in task lists

    plz let me know report name for services  where used in task lists.

    Hello Sairam,
    I am abit confused. Are you looking for report to find where the task list is used ? You can find all the available reports in The menu path Logistics -> Production -> Master Data -> Routings -> Reporting.
    If you want a specific one then please provide more details
    Thanks
    Amber

  • 2g data allowance in single line plan is only for 4g LTE or for all data using?

       I got a single line plan and an iPhone 5s a couple days ago.  I am confused the data allowance is for 4g LTE only or for all data using?  Thank you!

        Hello edsun1997
    I would love to answer this for you. You have 2 GB's to use on our network this will start over at the beginning of your cycle. If you use Wifi and turn off our network, Wifi would not go against that 2 GB bucket.
    JoeL_VZW
    Follow us on Twitter @VZWSupport

  • Is there a practical and effective iFrame extension for DW CS5 ?

    I have been looking for a oractical and effective iFrame extension for CS5.
    There used to be an excellent one years ago for DW4 and some other versions, that manipulated the iLayer properties inspector so that you had complete and thorough control over all aspects of you iFrame from just one tool bar/property inspector. This was a free given away extension, but absolutely superb in its function and precticality.
    Does anyone know of anything similar for todays versions of DW ?

    I code my own which is very simple with the <iframe> tag.
    http://www.w3schools.com/html/html_iframe.asp
    Four Level offers this extension for DW CS5
    http://www.fourlevel.com/product/iframe/
    Nancy O.

  • Will After Effect work well for adding subtitles to a music video?

    Will after effect work well for adding subtitles to a music video?  Or is there an easier Adobe product I should use?

    Is there a way to protect music and video after a change is made to the beginning of a finished movie so as not to throw off the already completed music and video timeline?
    If you are referring to music in the "floating" green background, then no. It will automatically readjust itself to the start of your project each time new material is added to the beginning of your project. On the other hand, you can add your music to a clip rather than a background and this audio you can "pin" to a clip so that it remains in the same position relative to the clip and any following clips which it may overlap.
    ADDED: Oops! Looks like Winston beat me out here...
    Message was edited by: Jon Walker

  • Prerequisite script for Exadata Discovery using wrong domainname command?

    Does the Prerequisite script for Exadata Discovery use the Wrong domainname command? It uses domainname, should it be using dnsdomainname?
    The script is found in this MOS note: Prerequisite script for Exadata Discovery in Oracle Enterprise Manager Cloud Control 12c [ID 1473912.1]
    My System administrator wrote "what the precheck script says it is watching out for, is NOT what it’s checking, and what it is checking is NOT needed.
    They say they need the “domain name” to be set, but what they’re checking is the NIS domain name. This is echoed in the man page for “domainname” …
    The man page even has a warning NOT to use “domainname” to check the DNS domain"
    So is the pre-check script wrong, or is the running OEM/agents/discoverer going to look for the apparently doaminname set value within a NIS construct?
    The sysadmins are trying to avoid having anything set with NIS, for fear it confuses a new admin or consultant.
    Thanks in advance for your thoughts. -- Shaun
    PS, if it is wrong, how do we get it corrected with Oracle?

    This answer came in from the Oracle Support Community via an Oracle employee:
    According to a remark that is attached to the note that you mention, your concerns are correct:
    "domainname" command does indeed return NIS domainname.
    The DNS domain name that we actually want to use should be checked by "dnsdomainname" command.
    [root@hostname ~]# dnsdomainname
    hostname.example.com
    [root@hostname ~]# domainname
    (none)
    [root@hostname ~]# domainname -h
    Usage: hostname [-v] hostname set hostname (from file)
    domainname [-v] nisdomain set NIS domainname (from file)
    hostname [-v] [-d|-f|-s|-a|-i|-y|-n] display formatted name
    hostname [-v] display hostname
    The response to the remark explains that we are testing this in our internal environment. We have found one issue with this check. The NOTE authors plan to upload the new version of the script when the updated script is fully tested.
    At your service,
    Dave M.

Maybe you are looking for