Cl scr not working

I have innstalled oracle 11g
and trying to use generate some normal queries
but cl scr is not working in sqlplus
the error is : SP2-1531: No command prompt interpreter
Please give me the solution cause i need to know whether
It is my installation problem or my system problem

989959 wrote:
I have innstalled oracle 11g
and trying to use generate some normal queries
but cl scr is not working in sqlplus
the error is : SP2-1531: No command prompt interpreter
Please give me the solution cause i need to know whether
It is my installation problem or my system problemProblem Exists Between Keyboard And Chair
open Command Window when logged on to Windows as the same OS user who owns Oracle software
THen type line for line as below
sqlplus
/ as sysdba
COPY the results then Paste all back here
[oracle@localhost ~]$ oerr sp2 1531
01531,0, "No command interpreter\n"
// *Cause:  Unable to find command.com file.
// *Action: Check command.com file exists or not.

Similar Messages

  • Content Filter block attachment .scr/.cab etc... not working inside archive

    Hi,
    We have trouble that Content Filter for blocking attachments executable, scr, and cab is not working if .exe, .scr, or.cab are inside 7zip, zip or rar archive.
    How deep inside attachment ESA goes, if any?
    Antivirus config is set to 5 and some viruses passed like CryptoWall as .scr and .cab.
    So, we are blocking that extension but this time they were inside archive.  

    Hello Juraj,
    I apologise for the inconvenience.
    Currently if there are viral definitions within the attachment, the AV engine would be the first line of defence, if you for some reason notice some viral attachments bypassing your ESA, please open a TAC case so we can escalate the sample to Sophos for you to capture.
    As per content filtering.
    The scan depth on how deep it will go into a system is defined in 'scanconfig' in the CLI.
    This will show your current recursion depth.
    As per .cab and .7z attachments not being properly captured if .scr or .exe are inside it
    Currently there are some Enh request to allow the unpacking/decompression of these archive files to capture things inside it, at the moment the request is still undergoing review.
    As a temporary measure you can proactively send .7z and .cab files to the quarantine for your administrative review -- 
    The ESA will however be able to seek the executable should it be shrouded inside the .rar/.gzip and .zip archives however.
    I hope this helps.
    Regards,
    Matthew

  • Card reader not working out the box scr 3500?

    cac card reader not working out of box scr3500 help

    Welcome to discussions Kevin!
    I'm sorry to hear that first of all make sure that there is nothing sick on the eye of the camera it self, after that how is the lighting on the room that the computer will be set up? did the green light came on when you're trying to use iSight? i'm asking because the same thing happen to me but it was nothing but bad lighting in my office. If this doen't help call apple asap they should replace your computer with out a problem. Hope this helps good luck!
    Miguel

  • Issue with spamassassin, now mail not working

    Hi ! I installed spamtrainer almost two months ago. Been feeding the [email protected] for several weeks now , 700 emails each day at least .
    There was very little improvement if none at all. Tried to add "@local_domains_maps = (1)" to amavisd.conf last night thinking it might be the problem , though no virtual domain exist. This was one of the issue on the default Amavisd config. The other one is adding the symbolic link which I already done.
    Computer froze while adding the parameter "@local_domains_maps = (1)", so I manually turn off the Power Mac, then mail stopped altogether. The mails are filing up but the clients couldn't send or receive since this incidence .
    FF is the maincf. and amavis.conf
    All help are greatly appreciated.
    mail:/Users/sysadmin root# postconf -n
    alias_maps = hash:/etc/aliases,hash:/var/mailman/data/aliases
    always_bcc =
    command_directory = /usr/sbin
    config_directory = /etc/postfix
    content_filter = smtp-amavis:[127.0.0.1]:10024
    daemon_directory = /usr/libexec/postfix
    debug_peer_level = 2
    enable_server_options = yes
    html_directory = no
    inet_interfaces = all
    local_recipient_maps = proxy:unix:passwd.byname $alias_maps
    luser_relay =
    mail_owner = postfix
    mailbox_size_limit = 0
    mailbox_transport = cyrus
    mailq_path = /usr/bin/mailq
    manpage_directory = /usr/share/man
    maps_rbl_domains =
    message_size_limit = 31457280
    mydestination = $myhostname,localhost.$mydomain,localhost,mail.cpplaw.com,cpplaw.com
    mydomain = cpplaw.com
    mydomain_fallback = localhost
    myhostname = mail.cpplaw.com
    mynetworks = 127.0.0.1/32,192.168.1.0/24,127.0.0.1
    mynetworks_style = host
    newaliases_path = /usr/bin/newaliases
    owner_request_special = no
    queue_directory = /private/var/spool/postfix
    readme_directory = /usr/share/doc/postfix
    recipient_delimiter = +
    relayhost =
    sample_directory = /usr/share/doc/postfix/examples
    sendmail_path = /usr/sbin/sendmail
    setgid_group = postdrop
    smtpd_client_restrictions = permit_mynetworks permit
    smtpd_tls_key_file =
    unknown_local_recipient_reject_code = 550
    virtual_mailbox_domains =
    virtual_transport = virtual
    mail:/Users/sysadmin root# postconf -n
    alias_maps = hash:/etc/aliases,hash:/var/mailman/data/aliases
    always_bcc =
    command_directory = /usr/sbin
    config_directory = /etc/postfix
    content_filter = smtp-amavis:[127.0.0.1]:10024
    daemon_directory = /usr/libexec/postfix
    debug_peer_level = 2
    enable_server_options = yes
    html_directory = no
    inet_interfaces = all
    local_recipient_maps = proxy:unix:passwd.byname $alias_maps
    luser_relay =
    mail_owner = postfix
    mailbox_size_limit = 0
    mailbox_transport = cyrus
    mailq_path = /usr/bin/mailq
    manpage_directory = /usr/share/man
    maps_rbl_domains =
    message_size_limit = 31457280
    mydestination = $myhostname,localhost.$mydomain,localhost,mail.cpplaw.com,cpplaw.com
    mydomain = cpplaw.com
    mydomain_fallback = localhost
    myhostname = mail.cpplaw.com
    mynetworks = 127.0.0.1/32,192.168.1.0/24,127.0.0.1
    mynetworks_style = host
    newaliases_path = /usr/bin/newaliases
    owner_request_special = no
    queue_directory = /private/var/spool/postfix
    readme_directory = /usr/share/doc/postfix
    recipient_delimiter = +
    relayhost =
    sample_directory = /usr/share/doc/postfix/examples
    sendmail_path = /usr/sbin/sendmail
    setgid_group = postdrop
    smtpd_client_restrictions = permit_mynetworks permit
    smtpd_tls_key_file =
    unknown_local_recipient_reject_code = 550
    virtual_mailbox_domains =
    virtual_transport = virtual
    mail:/Users/sysadmin root#
    _______________________Amavisd.cof_________________________
    use strict;
    # Configuration file for amavisd-new
    # This software is licensed under the GNU General Public License (GPL).
    # See comments at the start of amavisd-new for the whole license text.
    #Sections:
    # Section I - Essential daemon and MTA settings
    # Section II - MTA specific
    # Section III - Logging
    # Section IV - Notifications/DSN, BOUNCE/REJECT/DROP/PASS destiny, quarantine
    # Section V - Per-recipient and per-sender handling, whitelisting, etc.
    # Section VI - Resource limits
    # Section VII - External programs, virus scanners, SpamAssassin
    # Section VIII - Debugging
    #GENERAL NOTES:
    # This file is a normal Perl code, interpreted by Perl itself.
    # - make sure this file (or directory where it resides) is NOT WRITABLE
    # by mere mortals, otherwise it represents a severe security risk!
    # - for values which are interpreted as booleans, it is recommended
    # to use 1 for true, and 0 or undef or '' for false.
    # THIS IS DIFFERENT FROM OLDER AMAVIS VERSIONS where "no" also meant false,
    # now it means true, like any nonempty string does!
    # - Perl syntax applies. Most notably: strings in "" may include variables
    # (which start with $ or @); to include characters @ and $ in double
    # quoted strings, precede them by a backslash; in single-quoted strings
    # the $ and @ lose their special meaning, so it is usually easier to use
    # single quoted strings. Still, in both cases a backslash need to be doubled
    # - variables with names starting with a '@' are lists, the values assigned
    # to them should be lists as well, e.g. ('one@foo', $mydomain, "three");
    # note the comma-separation and parenthesis. If strings in the list
    # do not contain spaces nor variables, a Perl operator qw() may be used
    # as a shorthand to split its argument on whitespace and produce a list
    # of strings, e.g. qw( one@foo example.com three ); Note that the argument
    # to qw is quoted implicitly and no variable interpretation is done within
    # (no '$' variable evaluations). The #-initiated comments can not be used
    # within the string. In other words, $ and # lose their special meaning
    # withing a qw argument, just like within '...' strings.
    # - all e-mail addresses in this file and as used internally by the daemon
    # are in their raw (rfc2821-unquoted and nonbracketed) form, i.e.
    # Bob "Funny" [email protected], not: "Bob \"Funny\" Dude"@example.com
    # and not <"@example.com>; also: '' and not ''.
    # Section I - Essential daemon and MTA settings
    # $MYHOME serves as a quick default for some other configuration settings.
    # More refined control is available with each individual setting further down.
    # $MYHOME is not used directly by the program. No trailing slash!
    #$MYHOME = '/var/lib/amavis'; # (default is '/var/amavis')
    # : $mydomain serves as a quick default for some other configuration settings.
    # : More refined control is available with each individual setting further down.
    # : $mydomain is never used directly by the program.
    $mydomain = 'cpplaw.com'; aol.com'; # (no useful default)
    # Set the user and group to which the daemon will change if started as root
    # (otherwise just keep the UID unchanged, and these settings have no effect):
    $daemon_user = 'clamav'; # (no default; customary: vscan or amavis)
    $daemon_group = 'clamav'; # (no default; customary: vscan or amavis)
    # Runtime working directory (cwd), and a place where
    # temporary directories for unpacking mail are created.
    # (no trailing slash, may be a scratch file system)
    $TEMPBASE = $MYHOME; # (must be set if other config vars use is)
    #$TEMPBASE = "$MYHOME/tmp"; # prefer to keep home dir /var/amavis clean?
    # $helpers_home sets environment variable HOME, and is passed as option
    # 'home_dir_for_helpers' to Mail::SpamAssassin::new. It should be a directory
    # on a normal persistent file system, not a scratch or temporary file system
    #$helpers_home = $MYHOME; # (defaults to $MYHOME)
    #$daemon_chroot_dir = $MYHOME; # (default is undef, meaning: do not chroot)
    #$pid_file = "$MYHOME/amavisd.pid"; # (default is "$MYHOME/amavisd.pid")
    #$lock_file = "$MYHOME/amavisd.lock"; # (default is "$MYHOME/amavisd.lock")
    # set environment variables if you want (no defaults):
    $ENV{TMPDIR} = $TEMPBASE; # wise, but usually not necessary
    # MTA SETTINGS, UNCOMMENT AS APPROPRIATE,
    # both $forward_method and $notify_method default to 'smtp:127.0.0.1:10025'
    # POSTFIX, or SENDMAIL in dual-MTA setup, or EXIM V4
    # (set host and port number as required; host can be specified
    # as IP address or DNS name (A or CNAME, but MX is ignored)
    #$forward_method = 'smtp:127.0.0.1:10025'; # where to forward checked mail
    #$notify_method = $forward_method; # where to submit notifications
    # NOTE: The defaults (above) are good for Postfix or dual-sendmail. You MUST
    # uncomment the approprate settings below if using other setups!
    # SENDMAIL MILTER, using amavis-milter.c helper program:
    #$forward_method = undef; # no explicit forwarding, sendmail does it by itself
    # milter; option -odd is needed to avoid deadlocks
    #$notify_method = 'pipe:flags=q argv=/usr/sbin/sendmail -Ac -i -odd -f ${sender} -- ${recipient}';
    # just a thought: can we use use -Am instead of -odd ?
    # SENDMAIL (old non-milter setup, as relay):
    #$forward_method = 'pipe:flags=q argv=/usr/sbin/sendmail -C/etc/sendmail.orig.cf -i -f ${sender} -- ${recipient}';
    #$notify_method = $forward_method;
    # SENDMAIL (old non-milter setup, amavis.c calls local delivery agent):
    #$forward_method = undef; # no explicit forwarding, amavis.c will call LDA
    #$notify_method = 'pipe:flags=q argv=/usr/sbin/sendmail -Ac -i -f ${sender} -- ${recipient}';
    # EXIM v3 (not recommended with v4 or later, which can use SMTP setup instead):
    #$forward_method = 'pipe:flags=q argv=/usr/sbin/exim -oMr scanned-ok -i -f ${sender} -- ${recipient}';
    #$notify_method = $forward_method;
    # prefer to collect mail for forwarding as BSMTP files?
    #$forward_method = "bsmtp:$MYHOME/out-%i-%n.bsmtp";
    #$notify_method = $forward_method;
    # Net::Server pre-forking settings
    # You may want $max_servers to match the width of your MTA pipe
    # feeding amavisd, e.g. with Postfix the 'Max procs' field in the
    # master.cf file, like the '2' in the: smtp-amavis unix - - n - 2 smtp
    $max_servers = 2; # number of pre-forked children (default 2)
    $max_requests = 10; # retire a child after that many accepts (default 10)
    $child_timeout=5*60; # abort child if it does not complete each task in n sec
    # (default: 8*60 seconds)
    # Check also the settings of @av_scanners at the end if you want to use
    # virus scanners. If not, you may want to delete the whole long assignment
    # to the variable @av_scanners, which will also remove the virus checking
    # code (e.g. if you only want to do spam scanning).
    # Here is a QUICK WAY to completely DISABLE some sections of code
    # that WE DO NOT WANT (it won't even be compiled-in).
    # For more refined controls leave the following two lines commented out,
    # and see further down what these two lookup lists really mean.
    #@bypass_virus_checks_acl = qw( . ); # uncomment to DISABLE anti-virus code
    #@bypass_spam_checks_acl = qw( . ); # uncomment to DISABLE anti-spam code
    # Any setting can be changed with a new assignment, so make sure
    # you do not unintentionally override these settings further down!
    # Lookup list of local domains (see README.lookups for syntax details)
    # NOTE:
    # For backwards compatibility the variable names @local_domains (old) and
    # @local_domains_acl (new) are synonyms. For consistency with other lookups
    # the name @local_domains_acl is now preferred. It also makes it more
    # obviously distinct from the new %local_domains hash lookup table.
    # local_domains* lookup tables are used in deciding whether a recipient
    # is local or not, or in other words, if the message is outgoing or not.
    # This affects inserting spam-related headers for local recipients,
    # limiting recipient virus notifications (if enabled) to local recipients,
    # in deciding if address extension may be appended, and in SQL lookups
    # for non-fqdn addresses. Set it up correctly if you need features
    # that rely on this setting (or just leave empty otherwise).
    # With Postfix (2.0) a quick reminder on what local domains normally are:
    # a union of domains spacified in: $mydestination, $virtual_alias_domains,
    # $virtual_mailbox_domains, and $relay_domains.
    @local_domains_acl = ( ".$mydomain" ); # $mydomain and its subdomains
    # @local_domains_acl = qw(); # default is empty, no recipient treated as local
    # @local_domains_acl = qw( .example.com );
    # @local_domains_acl = qw( .example.com !host.sub.example.net .sub.example.net );
    # @local_domains_acl = ( ".$mydomain", '.example.com', 'sub.example.net' );
    # or alternatively(A), using a Perl hash lookup table, which may be assigned
    # directly, or read from a file, one domain per line; comments and empty lines
    # are ignored, a dot before a domain name implies its subdomains:
    #read_hash(\%local_domains, '/var/amavis/local_domains');
    #or alternatively(B), using a list of regular expressions:
    # $local_domains_re = new_RE( qr'[@.]example\.com$'i );
    # see README.lookups for syntax and semantics
    # Section II - MTA specific (defaults should be ok)
    # if $relayhost_is_client is true, IP address in $notify_method and
    # $forward_method is dynamically overridden with SMTP client peer address
    # if available, which makes possible for several hosts to share one daemon
    #$relayhost_is_client = 1; # (defaults to false)
    #$insert_received_line = 1; # behave like MTA: insert 'Received:' header
    # (does not apply to sendmail/milter)
    # (default is true)
    # AMAVIS-CLIENT PROTOCOL INPUT SETTINGS (e.g. with sendmail milter)
    # (used with amavis helper clients like amavis-milter.c and amavis.c,
    # NOT needed for Postfix and Exim)
    $unix_socketname = "$MYHOME/amavisd.sock"; # amavis helper protocol socket
    #$unix_socketname = undef; # disable listening on a unix socket
    # (default is undef, i.e. disabled)
    # (usual setting is $MYHOME/amavisd.sock)
    # Do we receive quoted or raw addresses from the helper program?
    # (does not apply to SMTP; defaults to true)
    #$gets_addr_in_quoted_form = 1; # "Bob \"Funny\" Dude"@example.com
    #$gets_addr_in_quoted_form = 0; # Bob "Funny" [email protected]
    # SMTP SERVER (INPUT) PROTOCOL SETTINGS (e.g. with Postfix, Exim v4, ...)
    # (used when MTA is configured to pass mail to amavisd via SMTP or LMTP)
    $inet_socket_port = 10024; # accept SMTP on this local TCP port
    # (default is undef, i.e. disabled)
    # multiple ports may be provided: $inet_socket_port = [10024, 10026, 10028];
    # SMTP SERVER (INPUT) access control
    # - do not allow free access to the amavisd SMTP port !!!
    # when MTA is at the same host, use the following (one or the other or both):
    #$inet_socket_bind = '127.0.0.1'; # limit socket bind to loopback interface
    # (default is '127.0.0.1')
    @inet_acl = qw( 127.0.0.1 ); # allow SMTP access only from localhost IP
    # (default is qw( 127.0.0.1 ) )
    # when MTA (one or more) is on a different host, use the following:
    #@inet_acl = qw(127/8 10.1.0.1 10.1.0.2); # adjust the list as appropriate
    #$inet_socket_bind = undef; # bind to all IP interfaces
    # Example1:
    # @inet_acl = qw( 127/8 10/8 172.16/12 192.168/16 );
    # permit only SMTP access from loopback and rfc1918 private address space
    # Example2:
    # @inet_acl = qw( !192.168.1.12 172.16.3.3 !172.16.3/255.255.255.0
    # 127.0.0.1 10/8 172.16/12 192.168/16 );
    # matches loopback and rfc1918 private address space except host 192.168.1.12
    # and net 172.16.3/24 (but host 172.16.3.3 within 172.16.3/24 still matches)
    # Example3:
    # @inet_acl = qw( 127/8
    # !172.16.3.0 !172.16.3.127 172.16.3.0/25
    # !172.16.3.128 !172.16.3.255 172.16.3.128/25 );
    # matches loopback and both halves of the 172.16.3/24 C-class,
    # split into two subnets, except all four broadcast addresses
    # for these subnets
    # See README.lookups for details on specifying access control lists.
    # Section III - Logging
    # true (e.g. 1) => syslog; false (e.g. 0) => logging to file
    $DO_SYSLOG = 0; # (defaults to false)
    #$SYSLOG_LEVEL = 'user.info'; # (defaults to 'mail.info')
    # Log file (if not using syslog)
    $LOGFILE = "/var/log/amavis.log"; # (defaults to empty, no log)
    #NOTE: levels are not strictly observed and are somewhat arbitrary
    # 0: startup/exit/failure messages, viruses detected
    # 1: args passed from client, some more interesting messages
    # 2: virus scanner output, timing
    # 3: server, client
    # 4: decompose parts
    # 5: more debug details
    $log_level = 4; # (defaults to 0)
    # Customizeable template for the most interesting log file entry (e.g. with
    # $log_level=0) (take care to properly quote Perl special characters like '\')
    # For a list of available macros see README.customize .
    # only log infected messages (useful with log level 0):
    # $log_templ = '[? %#V |[? %#F ||banned filename ([%F|,])]|infected ([%V|,])]#
    # [? %#V |[? %#F ||, from=<%o>, to=[<%R>|,][? %i ||, quarantine %i]]#
    # |, from=<%o>, to=[<%R>|,][? %i ||, quarantine %i]]';
    # log both infected and noninfected messages (default):
    $log_templ = '[? %#V |[? %#F |[?%#D|Not-Delivered|Passed]|BANNED name/type (%F)]|INFECTED (%V)], #
    <%o> -> [<%R>|,][? %i ||, quarantine %i], Message-ID: %m, Hits: %c';
    # Section IV - Notifications/DSN, BOUNCE/REJECT/DROP/PASS destiny, quarantine
    # Select notifications text encoding when Unicode-aware Perl is converting
    # text from internal character representation to external encoding (charset
    # in MIME terminology)
    # to be used in RFC 2047-encoded header field bodies, e.g. in Subject:
    #$hdr_encoding = 'iso-8859-1'; # (default: 'iso-8859-1')
    # to be used in notification body text: its encoding and Content-type.charset
    #$bdy_encoding = 'iso-8859-1'; # (default: 'iso-8859-1')
    # Default template texts for notifications may be overruled by directly
    # assigning new text to template variables, or by reading template text
    # from files. A second argument may be specified in a call to read_text(),
    # specifying character encoding layer to be used when reading from the
    # external file, e.g. 'utf8', 'iso-8859-1', or often just $bdy_encoding.
    # Text will be converted to internal character representation by Perl 5.8.0
    # or later; second argument is ignored otherwise. See PerlIO::encoding,
    # Encode::PerlIO and perluniintro man pages.
    # $notify_sender_templ = read_text('/var/amavis/notify_sender.txt');
    # $notify_virus_sender_templ= read_text('/var/amavis/notify_virus_sender.txt');
    # $notify_virus_admin_templ = read_text('/var/amavis/notify_virus_admin.txt');
    # $notify_virus_recips_templ= read_text('/var/amavis/notify_virus_recips.txt');
    # $notify_spam_sender_templ = read_text('/var/amavis/notify_spam_sender.txt');
    # $notify_spam_admin_templ = read_text('/var/amavis/notify_spam_admin.txt');
    # If notification template files are collectively available in some directory,
    # use read_l10n_templates which calls read_text for each known template.
    # read_l10n_templates('/etc/amavis/en_US');
    # Here is an overall picture (sequence of events) of how pieces fit together
    # (only virus controls are shown, spam controls work the same way):
    # bypass_virus_checks set for all recipients? ==> PASS
    # no viruses? ==> PASS
    # log virus if $log_templ is nonempty
    # quarantine if $virus_quarantine_to is nonempty
    # notify admin if $virus_admin (lookup) nonempty
    # notify recips if $warnvirusrecip and (recipient is local or $warn_offsite)
    # add address extensions for local recipients (when enabled)
    # send (non-)delivery notifications
    # to sender if DSN needed (BOUNCE) or ($warnvirussender and D_PASS)
    # virus_lovers or final_destiny==D_PASS ==> PASS
    # DISCARD (2xx) or REJECT (5xx) (depending on final_*_destiny)
    # Equivalent flow diagram applies for spam checks.
    # If a virus is detected, spam checking is skipped entirely.
    # The following symbolic constants can be used in *destiny settings:
    # D_PASS mail will pass to recipients, regardless of bad contents;
    # D_DISCARD mail will not be delivered to its recipients, sender will NOT be
    # notified. Effectively we lose mail (but will be quarantined
    # unless disabled). Not a decent thing to do for a mailer.
    # D_BOUNCE mail will not be delivered to its recipients, a non-delivery
    # notification (bounce) will be sent to the sender by amavisd-new;
    # Exception: bounce (DSN) will not be sent if a virus name matches
    # $viruses_that_fake_sender_re, or to messages from mailing lists
    # (Precedence: bulk|list|junk);
    # D_REJECT mail will not be delivered to its recipients, sender should
    # preferably get a reject, e.g. SMTP permanent reject response
    # (e.g. with milter), or non-delivery notification from MTA
    # (e.g. Postfix). If this is not possible (e.g. different recipients
    # have different tolerances to bad mail contents and not using LMTP)
    # amavisd-new sends a bounce by itself (same as D_BOUNCE).
    # Notes:
    # D_REJECT and D_BOUNCE are similar, the difference is in who is responsible
    # for informing the sender about non-delivery, and how informative
    # the notification can be (amavisd-new knows more than MTA);
    # With D_REJECT, MTA may reject original SMTP, or send DSN (delivery status
    # notification, colloquially called 'bounce') - depending on MTA;
    # Best suited for sendmail milter, especially for spam.
    # With D_BOUNCE, amavisd-new (not MTA) sends DSN (can better explain the
    # reason for mail non-delivery, but unable to reject the original
    # SMTP session). Best suited to reporting viruses, and for Postfix
    # and other dual-MTA setups, which can't reject original client SMTP
    # session, as the mail has already been enqueued.
    $final_virus_destiny = D_BOUNCE; # (defaults to D_BOUNCE)
    $final_banned_destiny = D_BOUNCE; # (defaults to D_BOUNCE)
    $final_spam_destiny = D_PASS; # (defaults to D_REJECT)
    $final_bad_header_destiny = D_PASS; # (defaults to D_PASS), D_BOUNCE suggested
    # Alternatives to consider for spam:
    # - use D_PASS if clients will do filtering based on inserted mail headers;
    # - use D_DISCARD, if kill_level is set safely high;
    # - use D_BOUNCE instead of D_REJECT if not using milter;
    # There are no sensible alternatives to D_BOUNCE for viruses, but consider:
    # - use D_PASS (or virus_lovers) and $warnvirussender=1 to deliver viruses;
    # - use D_REJECT instead of D_BOUNCE if using milter and under heavy
    # virus storm;
    # Don't bother to set both D_DISCARD and $warn*sender=1, it will get mapped
    # to D_BOUNCE.
    # The separation of *_destiny values into D_BOUNCE, D_REJECT, D_DISCARD
    # and D_PASS made settings $warnvirussender and $warnspamsender only still
    # useful with D_PASS.
    # The following $warn*sender settings are ONLY used when mail is
    # actually passed to recipients ($final_*_destiny=D_PASS, or *_lovers*).
    # Bounces or rejects produce non-delivery status notification anyway.
    # Notify virus sender?
    #$warnvirussender = 1; # (defaults to false (undef))
    # Notify spam sender?
    #$warnspamsender = 1; # (defaults to false (undef))
    # Notify sender of banned files?
    #$warnbannedsender = 1; # (defaults to false (undef))
    # Notify sender of syntactically invalid header containing non-ASCII characters?
    #$warnbadhsender = 1; # (defaults to false (undef))
    # Notify virus (or banned files) RECIPIENT?
    # (not very useful, but some policies demand it)
    #$warnvirusrecip = 1; # (defaults to false (undef))
    #$warnbannedrecip = 1; # (defaults to false (undef))
    # Notify also non-local virus/banned recipients if $warn*recip is true?
    # (including those not matching local_domains*)
    #$warn_offsite = 1; # (defaults to false (undef), i.e. only notify locals)
    # Treat envelope sender address as unreliable and don't send sender
    # notification / bounces if name(s) of detected virus(es) match the list.
    # Note that virus names are supplied by external virus scanner(s) and are
    # not standardized, so virus names may need to be adjusted.
    # See README.lookups for syntax.
    $viruses_that_fake_sender_re = new_RE(
    qr'nimda|hybris|klez|bugbear|yaha|braid|sobig|fizzer|palyh|peido|holar'i );
    # where to send ADMIN VIRUS NOTIFICATIONS (should be a fully qualified address)
    # - the administrator address may be a simple fixed e-mail address (a scalar),
    # or may depend on the SENDER address (e.g. its domain), in which case
    # a ref to a hash table can be specified (specify lower-cased keys,
    # dot is a catchall, see README.lookups).
    # Empty or undef lookup disables virus admin notifications.
    $virus_admin = '[email protected]';
    # $virus_admin = undef; # do not send virus admin notifications (default)
    # $virus_admin = {'not.example.com' => '', '.' => '[email protected]'};
    # $virus_admin = '[email protected]';
    # equivalent to $virus_admin, but for spam admin notifications:
    #$spam_admin = '[email protected]';# $spam_admin = undef; # do not send spam admin notifications (default)
    # $spam_admin = {'not.example.com' => '', '.' => '[email protected]'};
    #advanced example, using a hash lookup table:
    # - $virus_admin = {
    # '[email protected]' => '[email protected]',
    # '.sub1.example.com' => '[email protected]',
    # '.sub2.example.com' => '', # don't send admin notifications
    # 'a.sub3.example.com' => '[email protected]',
    # '.sub3.example.com' => '[email protected]',
    # '.example.com' => '[email protected]', # catchall for our virus senders
    # '.' => '[email protected]', # catchall for the rest
    # whom notification reports are sent from (ENVELOPE SENDER);
    # may be a null reverse path, or a fully qualified address:
    # (admin and recip sender addresses default to $mailfrom
    # for compatibility, which in turn defaults to undef (empty) )
    # If using strings in double quotes, don't forget to quote @, i.e. \@
    $mailfrom_notify_admin = "virusalert\@$mydomain";
    $mailfrom_notify_recip = "virusalert\@$mydomain";
    $mailfrom_notify_spamadmin = "spam.police\@$mydomain";
    # 'From' HEADER FIELD for sender and admin notifications.
    # This should be a replyable address, see rfc1894. Not to be confused
    # with $mailfrom_notify_sender, which is the envelope address and
    # should be empty (null reverse path) according to rfc2821.
    # $hdrfrom_notify_sender = "amavisd-new <postmaster\@$mydomain>";
    # $hdrfrom_notify_sender = 'amavisd-new <[email protected]>';
    # (defaults to: "amavisd-new <postmaster\@$myhostname>")
    # $hdrfrom_notify_admin = $mailfrom_notify_admin;
    # (defaults to: $mailfrom_notify_admin)
    # $hdrfrom_notify_spamadmin = $mailfrom_notify_spamadmin;
    # (defaults to: $mailfrom_notify_spamadmin)
    # whom quarantined messages appear to be sent from (envelope sender)
    $mailfrom_to_quarantine = undef; # original sender if undef, or set explicitly
    # (default is undef)
    # Location to put infected mail into: (applies to 'local:' quarantine method)
    # empty for not quarantining, may be a file (mailbox),
    # or a directory (no trailing slash)
    # (the default value is undef, meaning no quarantine)
    $QUARANTINEDIR = '/var/virusmails';
    #$virus_quarantine_method = "local:virus-%i-%n"; # default
    #$spam_quarantine_method = "local:spam-%b-%i-%n"; # default
    #use the new 'bsmtp:' method as an alternative to the default 'local:'
    #$virus_quarantine_method = "bsmtp:$QUARANTINEDIR/virus-%i-%n.bsmtp";
    #$spam_quarantine_method = "bsmtp:$QUARANTINEDIR/spam-%b-%i-%n.bsmtp";
    # When using the 'local:' quarantine method (default), the following applies:
    # A finer control of quarantining is available through variable
    # $virus_quarantine_to/$spam_quarantine_to. It may be a simple scalar string,
    # or a ref to a hash lookup table, or a regexp lookup table object,
    # which makes possible to set up per-recipient quarantine addresses.
    # The value of scalar $virus_quarantine_to/$spam_quarantine_to (or a
    # per-recipient lookup result from the hash table %$virus_quarantine_to)
    # is/are interpreted as follows:
    # VARIANT 1:
    # empty or undef disables quarantine;
    # VARIANT 2:
    # a string NOT containg an '@';
    # amavisd will behave as a local delivery agent (LDA) and will quarantine
    # viruses to local files according to hash %local_delivery_aliases (pseudo
    # aliases map) - see subroutine mail_to_local_mailbox() for details.
    # Some of the predefined aliases are 'virus-quarantine' and 'spam-quarantine'.
    # Setting $virus_quarantine_to ($spam_quarantine_to) to this string will:
    # * if $QUARANTINEDIR is a directory, each quarantined virus will go
    # to a separate file in the $QUARANTINEDIR directory (traditional
    # amavis style, similar to maildir mailbox format);
    # * otherwise $QUARANTINEDIR is treated as a file name of a Unix-style
    # mailbox. All quarantined messages will be appended to this file.
    # Amavisd child process must obtain an exclusive lock on the file during
    # delivery, so this may be less efficient than using individual files
    # or forwarding to MTA, and it may not work across NFS or other non-local
    # file systems (but may be handy for pickup of quarantined files via IMAP
    # for example);
    # VARIANT 3:
    # any email address (must contain '@').
    # The e-mail messages to be quarantined will be handed to MTA
    # for delivery to the specified address. If a recipient address local to MTA
    # is desired, you may leave the domain part empty, e.g. 'infected@', but the
    # '@' character must nevertheless be included to distinguish it from variant 2.
    # This method enables more refined delivery control made available by MTA
    # (e.g. its aliases file, other local delivery agents, dealing with
    # privileges and file locking when delivering to user's mailbox, nonlocal
    # delivery and forwarding, fan-out lists). Make sure the mail-to-be-quarantined
    # will not be handed back to amavisd for checking, as this will cause a loop
    # (hopefully broken at some stage)! If this can be assured, notifications
    # will benefit too from not being unecessarily virus-scanned.
    # By default this is safe to do with Postfix and Exim v4 and dual-sendmail
    # setup, but probably not safe with sendmail milter interface without
    # precaution.
    # (the default value is undef, meaning no quarantine)
    #$virus_quarantine_to = '[email protected]'; # traditional local quarantine
    #$virus_quarantine_to = 'infected@'; # forward to MTA for delivery
    #$virus_quarantine_to = "virus-quarantine\@$mydomain"; # similar
    #$virus_quarantine_to = '[email protected]'; # similar
    #$virus_quarantine_to = undef; # no quarantine
    #$virus_quarantine_to = new_RE( # per-recip multiple quarantines
    # [qr'^user@example\.com$'i => 'infected@'],
    # [qr'^(.*)@example\.com$'i => 'virus-${1}@example.com'],
    # [qr'^(.*)(@[^@])?$'i => 'virus-${1}${2}'],
    # [qr/.*/ => 'virus-quarantine'] );
    # similar for spam
    # (the default value is undef, meaning no quarantine)
    #$spam_quarantine_to = '[email protected]';
    #$spam_quarantine_to = "spam-quarantine\@$mydomain";
    #$spam_quarantine_to = new_RE( # per-recip multiple quarantines
    # [qr'^(.*)@example\.com$'i => 'spam-${1}@example.com'],
    # [qr/.*/ => 'spam-quarantine'] );
    # In addition to per-recip quarantine, a by-sender lookup is possible. It is
    # similar to $spam_quarantine_to, but the lookup key is the sender address:
    #$spam_quarantine_bysender_to = undef; # dflt: no by-sender spam quarantine
    # Add X-Virus-Scanned header field to mail?
    $X_HEADER_TAG = 'X-Virus-Scanned'; # (default: undef)
    # Leave empty to add no header field # (default: undef)
    $X_HEADER_LINE = "by amavisd-new at $mydomain";
    $remove_existing_x_scanned_headers = 0; # leave existing X-Virus-Scanned alone
    #$remove_existing_x_scanned_headers= 1; # remove existing headers
    # (defaults to false)
    $remove_existing_spam_headers = 0; # leave existing X-Spam* headers alone
    #$remove_existing_spam_headers = 1; # remove existing spam headers if
    # spam scanning is enabled (default)
    # set $bypass_decode_parts to true if you only do spam scanning, or if you
    # have a good virus scanner that can deal with compression and recursively
    # unpacking archives by itself, and save amavisd the trouble.
    # Disabling decoding also causes banned_files checking to only see
    # MIME names and MIME content types, not the content classification types
    # as provided by the file(1) utility.
    # It is a double-edged sword, make sure you know what you are doing!
    #$bypass_decode_parts = 1; # (defaults to false)
    # don't trust this file type or corresponding unpacker for this file type,
    # keep both the original and the unpacked file
    # (lookup key is what file(1) utility returned):
    $keep_decoded_original_re = new_RE(
    qr'^(ASCII|text|uuencoded|xxencoded|binhex)'i,
    # Checking for banned MIME types and names. If any mail part matches,
    # the whole mail is rejected, much like the way viruses are handled.
    # A list in object $banned_filename_re can be defined to provide a list
    # of Perl regular expressions to be matched against each part's:
    # * Content-Type value (both declared and effective mime-type),
    # including the possible security risk content types
    # message/partial and message/external-body, as specified by rfc2046;
    # * declared (recommended) file names as specified by MIME subfields
    # Content-Disposition.filename and Content-Type.name, both in their
    # raw (encoded) form and in rfc2047-decoded form if applicable;
    # * file content type as guessed by 'file(1)' utility, both the raw result
    # from file(1), as well as short type name, classified into names such as
    # .asc, .txt, .html, .doc, .jpg, .pdf, .zip, .exe, ..., which is always
    # beginning with a dot - see subroutine determine_file_types().
    # This step is done only if $bypass_decode_parts is not true.
    # * leave $banned_filename_re undefined to disable these checks
    # (giving an empty list to new_RE() will also always return false)
    $banned_filename_re = new_RE(
    qr'\.[a-zA-Z][a-zA-Z0-9]{0,3}\.(vbs|pif|scr|bat|com|exe|dll)$'i, # double extension
    # qr'.\.(exe|vbs|pif|scr|bat|com)$'i, # banned extension - basic
    # qr'.\.(ade|adp|bas|bat|chm|cmd|com|cpl|crt|exe|hlp|hta|inf|ins|isp|js|
    # jse|lnk|mdb|mde|msc|msi|msp|mst|pcd|pif|reg|scr|sct|shs|shb|vb|
    # vbe|vbs|wsc|wsf|wsh)$'ix, # banned extension - long
    # qr'^\.(exe|zip|lha|tnef)$'i, # banned file(1) types
    # qr'^application/x-msdownload$'i, # banned MIME types
    # qr'^message/partial$'i, qr'^message/external-body$'i, # rfc2046
    # See http://support.microsoft.com/default.aspx?scid=kb;EN-US;q262631
    # and http://www.cknow.com/vtutor/vtextensions.htm
    # A little trick: a pattern qr'\.exe$' matches both a short type name '.exe',
    # as well as any file name which happens to end with .exe. If only matching
    # a file name is desired, but not the short name, a pattern qr'.\.exe$'i
    # or similar may be used, which requires that at least one character preceeds
    # the '.exe', and so it will never match short file types, which always start
    # with a dot.
    # Section V - Per-recipient and per-sender handling, whitelisting, etc.
    # %virus_lovers, @virus_lovers_acl and $virus_lovers_re lookup tables:
    # (these should be considered policy options, they do not disable checks,
    # see bypas*checks for that!)
    # Exclude certain RECIPIENTS from virus filtering by adding their lower-cased
    # envelope e-mail address (or domain only) to the hash %virus_lovers, or to
    # the access list @virus_lovers_acl - see README.lookups and examples.
    # Make sure the appropriate form (e.g. external/internal) of address
    # is used in case of virtual domains, or when mapping external to internal
    # addresses, etc. - this is MTA-specific.
    # Notifications would still be generated however (see the overall
    # picture above), and infected mail (if passed) gets additional header:
    # X-AMaViS-Alert: INFECTED, message contains virus: ...
    # (header not inserted with milter interface!)
    # NOTE (milter interface only): in case of multiple recipients,
    # it is only possible to drop or accept the message in its entirety - for all
    # recipients. If all of them are virus lovers, we'll accept mail, but if
    # at least one recipient is not a virus lover, we'll discard the message.
    # %bypass_virus_checks, @bypass_virus_checks_acl and $bypass_virus_checks_re
    # lookup tables:
    # (this is mainly a time-saving option, unlike virus_lovers* !)
    # Similar in concept to %virus_lovers, a hash %bypass_virus_checks,
    # access list @bypass_virus_checks_acl and regexp list $bypass_virus_checks_re
    # are used to skip entirely the decoding, unpacking and virus checking,
    # but only if ALL recipients match the lookup.
    # %bypass_virus_checks/@bypass_virus_checks_acl/$bypass_virus_checks_re
    # do NOT GUARANTEE the message will NOT be checked for viruses - this may
    # still happen when there is more than one recipient for a message, and
    # not all of them match these lookup tables. To guarantee virus delivery,
    # a recipient must also match %virus_lovers/@virus_lovers_acl lookups
    # (but see milter limitations above),
    # NOTE: it would not be clever to base virus checks on SENDER address,
    # since there are no guarantees that it is genuine. Many viruses
    # and spam messages fake sender address. To achieve selective filtering
    # based on the source of the mail (e.g. IP address, MTA port number, ...),
    # use mechanisms provided by MTA if available.
    # Similar to lookup tables controlling virus checking, there exist
    # spam scanning, banned names/types, and headers_checks control counterparts:
    # %spam_lovers, @spam_lovers_acl, $spam_lovers_re
    # %banned_files_lovers, @banned_files_lovers_acl, $banned_files_lovers_re
    # %bad_header_lovers, @bad_header_lovers_acl, $bad_header_lovers_re
    # and:
    # %bypass_spam_checks/@bypass_spam_checks_acl/$bypass_spam_checks_re
    # %bypass_banned_checks/@bypass_banned_checks_acl/$bypass_banned_checks_re
    # %bypass_header_checks/@bypass_header_checks_acl/$bypass_header_checks_re
    # See README.lookups for details about the syntax.
    # The following example disables spam checking altogether,
    # since it matches any recipient e-mail address (any address
    # is a subdomain of the top-level root DNS domain):
    # @bypass_spam_checks_acl = qw( . );
    # @bypass_header_checks_acl = qw( [email protected] );
    # @bad_header_lovers_acl = qw( [email protected] );
    # See README.lookups for further detail, and examples below.
    # $virus_lovers{lc("postmaster\@$mydomain")} = 1;
    # $virus_lovers{lc('[email protected]')} = 1;
    # $virus_lovers{lc('[email protected]')} = 1;
    # $virus_lovers{lc('some.user@')} = 1; # this recipient, regardless of domain
    # $virus_lovers{lc('[email protected]')} = 0; # never, even if domain matches
    # $virus_lovers{lc('example.com')} = 1; # this domain, but not its subdomains
    # $virus_lovers{lc('.example.com')}= 1; # this domain, including its subdomains
    #or:
    # @virus_lovers_acl = qw( [email protected] !lab.xxx.com .xxx.com yyy.org );
    # $bypass_virus_checks{lc('[email protected]')} = 1;
    # @bypass_virus_checks_acl = qw( some.ddd !butnot.example.com .example.com );
    # @virus_lovers_acl = qw( [email protected] );
    # $virus_lovers_re = new_RE( qr'(helpdesk|postmaster)@example\.com$'i );
    # $spam_lovers{lc("postmaster\@$mydomain")} = 1;
    # $spam_lovers{lc('[email protected]')} = 1;
    # $spam_lovers{lc('[email protected]')} = 1;
    # @spam_lovers_acl = qw( !.example.com );
    # $spam_lovers_re = new_RE( qr'^user@example\.com$'i );
    # don't run spam check for these RECIPIENT domains:
    # @bypass_spam_checks_acl = qw( d1.com .d2.com a.d3.com );
    # or the other way around (bypass check for all BUT these):
    # @bypass_spam_checks_acl = qw( !d1.com !.d2.com !a.d3.com . );
    # a practical application: don't check outgoing mail for spam:
    # @bypass_spam_checks_acl = ( "!.$mydomain", "." );
    # (a downside of which is that such mail will not count as ham in SA bayes db)
    # Where to find SQL server(s) and database to support SQL lookups?
    # A list of triples: (dsn,user,passw). (dsn = data source name)
    # Specify more than one for multiple (backup) SQL servers.
    # See 'man DBI', 'man DBD::mysql', 'DBD::Pg', ... for details.
    # @lookup_sql_dsn =
    # ( ['DBI:mysql:mail:host1', 'some-username1', 'some-password1'],
    # ['DBI:mysql:mail:host2', 'some-username2', 'some-password2'] );
    # ('mail' in the example is the database name, choose what you like)
    # With PostgreSQL the dsn (first element of the triple) may look like:
    # 'DBI:Pg:host=host1;dbname=mail'
    # The SQL select clause to fetch per-recipient policy settings.
    # The %k will be replaced by a comma-separated list of query addresses
    # (e.g. full address, domain only, catchall). Use ORDER, if there
    # is a chance that multiple records will match - the first match wins.
    # If field names are not unique (e.g. 'id'), the later field overwrites the
    # earlier in a hash returned by lookup, which is why we use '*,users.id'.
    # No need to uncomment the following assignment if the default is ok.
    # $sql_select_policy = 'SELECT *,users.id FROM users,policy'.
    # ' WHERE (users.policy_id=policy.id) AND (users.email IN (%k))'.
    # ' ORDER BY users.priority DESC';
    # The SQL select clause to check sender in per-recipient whitelist/blacklist
    # The first SELECT argument '?' will be users.id from recipient SQL lookup,
    # the %k will be sender addresses (e.g. full address, domain only, catchall).
    # The default value is:
    # $sql_select_white_black_list = 'SELECT wb FROM wblist,mailaddr'.
    # ' WHERE (rid=?) AND (sid=mailaddr.id) AND (mailaddr.email IN (%k))'.
    # ' ORDER BY mailaddr.priority DESC';
    # To disable SQL white/black list, set to undef (otherwise comment-out
    # the following statement, leaving it at the default value):
    $sql_select_white_black_list = undef; # undef disables SQL white/blacklisting
    # If you decide to pass viruses (or spam) to certain recipients using the
    # above lookup tables or using $final_virus_destiny=1, you can set
    # the variable $addr_extension_virus ($addr_extension_spam) to some
    # string, and the recipient address will have this string appended
    # as an address extension to the local-part of the address. This extension
    # can be used by final local delivery agent to place such mail in different
    # folders. Leave these two variables undefined or empty strings to prevent
    # appending address extensions. Setting has no effect on recipient which will
    # not be receiving viruses/spam. Recipients who do not match lookup tables
    # local_domains* are not affected.
    # LDAs usually default to stripping away address extension if no special
    # handling is specified, so having this option enabled normally does no harm,
    # provided the $recipients_delimiter matches the setting on the final
    # MTA's LDA.
    # $addr_extension_virus = 'virus'; # (default is undef, same as empty)
    # $addr_extension_spam = 'spam'; # (default is undef, same as empty)
    # $addr_extension_banned = 'banned'; # (default is undef, same as empty)
    # Delimiter between local part of the recipient address and address extension
    # (which can optionally be added, see variables $addr_extension_virus and
    # $addr_extension_spam). E.g. recipient address <[email protected]> gets changed
    # to <[email protected]>.
    # Delimiter should match equivalent (final) MTA delimiter setting.
    # (e.g. for Postfix add 'recipient_delimiter = +' to main.cf)
    # Setting it to an empty string or to undef disables this feature
    # regardless of $addr_extension_virus and $addr_extension_spam settings.
    $recipient_delimiter = '+'; # (default is '+')
    # true: replace extension; false: append extension
    # $replace_existing_extension = 1; # (default is false)
    # Affects matching of localpart of e-mail addresses (left of '@')
    # in lookups: true = case sensitive, false = case insensitive
    $localpart_is_case_sensitive = 0; # (default is false)
    # ENVELOPE SENDER WHITELISTING / BLACKLISTING - GLOBAL (RECIPIENT-INDEPENDENT)
    # WHITELISTING: use ENVELOPE SENDER lookups to ENSURE DELIVERY from whitelisted
    # senders even if the message is recognized as spam. Effectively, for the
    # specified senders, message RECIPIENTS temporarily become 'spam_lovers', with
    # further processing being the same as otherwise specified for spam lovers.
    # It does not turn off inserting spam-related headers, if they are enabled.
    # BLACKLISTING: messages from specified SENDERS are DECLARED SPAM.
    # Effectively, for messages from blacklisted senders, spam level
    # is artificially pushed high, and the normal spam processing applies,
    # resulting in 'X-Spam-Flag: YES', high 'X-Spam-Level' bar and other usual
    # reactions to spam, including possible rejection. If the message nevertheless
    # still passes (e.g. for spam loving recipients), it is tagged as BLACKLISTED
    # in the 'X-Spam-Status' header field, but the reported spam value and
    # set of tests in this report header field (if available from SpamAssassin,
    # which may have not been called) is not adjusted.
    # A sender may be both white- and blacklisted at the same time,
    # settings are independent. For example, being both white- and blacklisted,
    # message is delivered to recipients, but is tagged as spam.
    # If ALL recipients of the message either white- or blacklist the sender,
    # spam scanning (calling the SpamAssassin) is bypassed, saving on time.
    # The following variables (lookup tables) are available, with the semantics
    # and syntax as specified in README.lookups:
    # %whitelist_sender, @whitelist_sender_acl, $whitelist_sender_re
    # %blacklist_sender, @blacklist_sender_acl, $blacklist_sender_re
    # SOME EXAMPLES:
    #ACL:
    # @whitelist_sender_acl = qw( .example.com );
    # @whitelist_sender_acl = ( ".$mydomain" ); # $mydomain and its subdomains
    # NOTE: This is not a reliable way of turning off spam checks for
    # locally-originating mail, as sender address can easily be faked.
    # To reliably avoid spam-scanning outgoing mail,
    # use @bypass_spam_checks_acl .
    #RE:
    # $whitelist_sender_re = new_RE(
    # qr'^postmaster@.*\bexample\.com$'i,
    # qr'^owner-[^@]*@'i, qr'-request@'i,
    # qr'\.example\.com$'i );
    $blacklist_sender_re = new_RE(
    qr'^(bulkmail|offers|cheapbenefits|earnmoney|foryou|greatcasino)@'i,
    qr'^(investments|lose_weight_today|market.alert|money2you|MyGreenCard)@'i,
    qr'^(new\.tld\.registry|opt-out|opt-in|optin|saveonlsmoking2002k)@'i,
    qr'^(specialoffer|specialoffers|stockalert|stopsnoring|wantsome)@'i,
    qr'^(workathome|yesitsfree|your_friend|greatoffers)@'i,
    qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i,
    #HASH lookup variant:
    # NOTE: Perl operator qw splits its argument string by whitespace
    # and produces a list. This means that addresses can not contain
    # whitespace, and there is no provision for comments within the string.
    # You can use the normal Perl list syntax if you have special requirements,
    # e.g. map {...} ('one user@bla', '.second.com'), or use read_hash to read
    # addresses from a file.
    # a hash lookup table can be read from a file,
    # one address per line, comments and empty lines are permitted:
    # read_hash(\%whitelist_sender, '/var/amavis/whitelist_sender');
    # ... or set directly:
    # $whitelist_sender{''} = 1; # don't spam-check MTA bounces
    map { $whitelist_sender{lc($_)}=1 } (qw(
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    [email protected]
    returns.groups.yahoo.com
    # ENVELOPE SENDER WHITELISTING / BLACKLISTING - PER-RECIPIENT
    # The same semantics as for global white/blacklisting applies, but this
    # time each recipient (or its domain, or subdomain, ...) can be given
    # an individual lookup table for matching senders. The per-recipient lookups
    # override the global lookups, which serve as a fallback default.
    # Specify a two-level lookup table: the key for the outer table is recipient,
    # and the result should be an inner lookup table (hash or ACL or RE),
    # where the key used will be the sender.
    #$per_recip_blacklist_sender_lookup_tables = {
    # '[email protected]'=>new_RE(qr'^(inkjetplanet|marketopt|MakeMoney)\d*@'i),
    # '[email protected]'=>[qw( [email protected],org .d2.example,org )],
    #$per_recip_whitelist_sender_lookup_tables = {
    # '[email protected]' => [qw( [email protected] .other.example.org )],
    # '.my1.example.com' => [qw( !foe.other.example,org .other.example,org )],
    # '.my2.example.com' => read_hash('/var/amavis/my2-wl.dat'),
    # 'abuse@' => { 'postmaster@'=>1,
    # '[email protected]'=>1, '[email protected]'=>1 },
    # Section VI - Resource limits
    # Sanity limit to the number of allowed recipients per SMTP transaction
    # $smtpd_recipient_limit = 1000; # (default is 1000)
    # Resource limitations to protect against mail bombs (e.g. 42.zip)
    # Maximum recursion level for extraction/decoding (0 or undef disables limit)
    $MAXLEVELS = 14; # (default is undef, no limit)
    # Maximum number of extracted files (0 or undef disables the limit)
    $MAXFILES = 1500; # (default is undef, no limit)
    # For the cumulative total of all decoded mail parts we set max storage size
    # to defend against mail bombs. Even though parts may be deleted (replaced
    # by decoded text) during decoding, the size they occupied is _not_ returned
    # to the quota pool.
    # Parameters to storage quota formula for unpacking/decoding/decompressing
    # Formula:
    # quota = max($MIN_EXPANSION_QUOTA,
    # $mail_size*$MIN_EXPANSION_FACTOR,
    # min($MAX_EXPANSION_QUOTA, $mail_size*$MAX_EXPANSION_FACTOR))
    # In plain words (later condition overrules previous ones):
    # allow MAX_EXPANSION_FACTOR times initial mail size,
    # but not more than MAX_EXPANSION_QUOTA,
    # but not less than MIN_EXPANSION_FACTOR times initial mail size,
    # but never less than MIN_EXPANSION_QUOTA
    $MIN_EXPANSION_QUOTA = 100*1024; # bytes (default undef, not enforced)
    $MAX_EXPANSION_QUOTA = 300*1024*1024; # bytes (default undef, not enforced)
    $MIN_EXPANSION_FACTOR = 5; # times original mail size (must be specified)
    $MAX_EXPANSION_FACTOR = 500; # times original mail size (must be specified)
    # Section VII - External programs, virus scanners
    # Specify a path string, which is a colon-separated string of directories
    # (no trailing slashes!) to be assigned to the environment variable PATH
    # and to serve for locating external programs below.
    # NOTE: if $daemon_chroot_dir is nonempty, the directories will be
    # relative to the chroot directory specified;
    $path = '/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/bin:/bin';
    # Specify one string or a search list of strings (first match wins).
    # The string (or: each string in a list) may be an absolute path,
    # or just a program name, to be located via $path;
    # Empty string or undef (=default) disables the use of that external program.
    # Optionally command arguments may be specified - only the first substring
    # up to the whitespace is used for file searching.
    $file = 'file'; # file(1) utility; use 3.41 or later to avoid vulnerability
    $gzip = 'gzip';
    $bzip2 = 'bzip2';
    $lzop = 'lzop';
    $uncompress = ['uncompress', 'gzip -d', 'zcat'];
    $unfreeze = ['unfreeze', 'freeze -d', 'melt', 'fcat'];
    $arc = ['nomarch', 'arc'];
    $unarj = ['arj', 'unarj']; # both can extract, same options
    $unrar = ['rar', 'unrar']; # both can extract, same options
    $zoo = 'zoo';
    $lha = 'lha';
    $cpio = 'cpio';
    # SpamAssassin settings
    # $sa_local_tests_only is passed to Mail::SpamAssassin::new as a value
    # of the option local_tests_only. See Mail::SpamAssassin man page.
    # If set to 1, no tests that require internet access will be performed.
    $sa_local_tests_only = 1; # (default: false)
    #$sa_auto_whitelist = 1; # turn on AWL (default: false)
    $sa_mail_body_size_limit = 64*1024; # don't waste time on SA if mail is larger
    # (less than 1% of spam is > 64k)
    # default: undef, no limitations
    # default values, can be overridden by more specific lookups, e.g. SQL
    $sa_tag_level_deflt = -999; # add spam info headers if at, or above that level
    $sa_tag2_level_deflt = 3.0; # add 'spam detected' headers at that level
    $sa_kill_level_deflt = 22.0;
    #$sa_kill_level_deflt = $sa_tag2_level_deflt; # triggers spam evasive actions
    # at or above that level: bounce/reject/drop,
    # quarantine, and adding mail address extension
    # The $sa_tag_level_deflt, $sa_tag2_level_deflt and $sa_kill_level_deflt
    # may also be hashrefs to hash lookup tables, to make static per-recipient
    # settings possible without having to resort to SQL or LDAP lookups.
    # a quick reference:
    # tag_level controls adding the X-Spam-Status and X-Spam-Level headers,
    # tag2_level controls adding 'X-Spam-Flag: YES', and editing Subject,
    # kill_level controls 'evasive actions' (reject, quarantine, extensions);
    # it only makes sense to maintain the relationship:
    # tag_level <= tag2_level <= kill_level
    # string to prepend to Subject header field when message exceeds tag2 level
    $sa_spam_subject_tag = '*** JUNK MAIL ***'; # (defaults to undef, disables)
    # (only seen when spam is not to be rejected
    # and recipient is in local_domains*)
    $sa_spam_modifies_subj = 1; # may be a ref to a lookup table, default is true
    # Example: modify Subject for all local recipients except [email protected]
    #$sa_spam_modifies_subj = [qw( [email protected] . )];
    # @av_scanners is a list of n-tuples, where fields semantics is:
    # 1. av scanner plain name, to be used in log and reports;
    # 2. scanner program name; this string will be submitted to subroutine
    # find_external_programs(), which will try to find the full program
    # path name; if program is not found, this scanner is disabled.
    # Besides a simple string (full program path name or just the basename
    # to be looked for in PATH), this may be an array ref of alternative
    # program names or full paths - the first match in the list will be used;
    # As a special case for more complex scanners, this field may be
    # a subroutine reference, and the whole n-tuple is passed to it as args.
    # 3. command arguments to be given to the scanner program;
    # a substring {} will be replaced by the directory name to be scanned,
    # i.e. "$tempdir/parts"
    # 4. an array ref of av scanner exit status values, or a regexp (to be
    # matched against scanner output), indicating NO VIRUSES found;
    # 5. an array ref of av scanner exit status values, or a regexp (to be
    # matched against scanner output), indicating VIRUSES WERE FOUND;
    # Note: the virus match prevails over a 'not found' match, so it is safe
    # even if 4. matches for viruses too;
    # 6. a regexp (to be matched against scanner output), returning a list
    # of virus names found.
    # 7. and 8.: (optional) subroutines to be executed before and after scanner
    # (e.g. to set environment or current directory);
    # see examples for these at KasperskyLab AVP and Sophos sweep.
    # NOTES:
    # - NOT DEFINING @av_scanners (e.g. setting it to empty list, or deleting the
    # whole assignment) TURNS OFF LOADING AND COMPILING OF THE ANTIVIRUS CODE
    # (which can be handy if all you want to do is spam scanning);
    # - the order matters: although _all_ available entries from the list are
    # always tried regardless of their verdict, scanners are run in the order
    # specified: the report from the first one detecting a virus will be used
    # (providing virus names and scanner output); REARRANGE THE ORDER TO WILL;
    # - it doesn't hurt to keep an unused command line scanner entry in the list
    # if the program can not be found; the path search is only performed once
    # during the program startup;
    # CORROLARY: to disable a scanner that _does_ exist on your system,
    # comment out its entry or use undef or '' as its program name/path
    # (second parameter). An example where this is almost a must: disable
    # Sophos 'sweep' if you have its daemonized version Sophie or SAVI-Perl
    # (same for Trophie/vscan, and clamd/clamscan), or if another unrelated
    # program happens to have a name matching one of the entries ('sweep'
    # again comes to mind);
    # - it DOES HURT to keep unwanted entries which use INTERNAL SUBROUTINES
    # for interfacing (where the second parameter starts with \&).
    # Keeping such entry and not having a corresponding virus scanner daemon
    # causes an unnecessary connection attempt (which eventually times out,
    # but it wastes precious time). For this reason the daemonized entries
    # are commented in the distribution - just remove the '#' where needed.
    @av_scanners = (
    # ### http://www.vanja.com/tools/sophie/
    # ['Sophie',
    # \&ask_daemon, ["{}/\n", '/var/run/sophie'],
    # qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
    # qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
    # ### http://www.csupomona.edu/~henson/www/projects/SAVI-Perl/
    # ['Sophos SAVI', \&sophos_savi ],
    # ### http://clamav.elektrapro.com/
    # ['Clam Antivirus-clamd',
    # \&ask_daemon, ["CONTSCAN {}\n", '/var/amavis/clamd'],
    # qr/\bOK$/, qr/\bFOUND$/,
    # qr/^.*?: (?!Infected Archive)(.*) FOUND$/ ],
    # # NOTE: run clamd under the same user as amavisd,
    # # match the socket name in clamav.conf to the socket name in this entry
    # ### http://www.openantivirus.org/
    # ['OpenAntiVirus ScannerDaemon (OAV)',
    # \&ask_daemon, ["SCAN {}\n", '127.0.0.1:8127'],
    # qr/^OK/, qr/^FOUND: /, qr/^FOUND: (.+)/ ],
    # ### http://www.vanja.com/tools/trophie/
    # ['Trophie',
    # \&ask_daemon, ["{}/\n", '/var/run/trophie'],
    # qr/(?x)^ 0+ ( : | [\000\r\n]* $)/, qr/(?x)^ 1 ( : | [\000\r\n]* $)/,
    # qr/(?x)^ [-+]? \d+ : (.*?) [\000\r\n]* $/ ],
    # ### http://www.f-prot.com/
    # ['FRISK F-Prot Daemon',
    # \&ask_daemon,
    # ["GET {}/*?-dumb%20-archive HTTP/1.0\r\n\r\n",
    # ['127.0.0.1:10200','127.0.0.1:10201','127.0.0.1:10202',
    # '127.0.0.1:10203','127.0.0.1:10204'] ],
    # qr/(?i)<summary[^>]*>clean<\/summary>/,
    # qr/(?i)<summary[^>]*>infected<\/summary>/,
    # qr/(?i)<name>(.+)<\/name>/ ],
    ['KasperskyLab AntiViral Toolkit Pro (AVP)', ['avp','kavscanner'],
    "-* -P -B -Y -O- {}", [0,3,8], [2,4], # any use for -A -K ?
    qr/infected: (.+)/,
    sub {chdir('/opt/AVP') or die "Can't chdir to AVP: $!"},
    sub {chdir($TEMPBASE) or die "Can't chdir back to $TEMPBASE $!"},
    ['KasperskyLab AVPDaemonClient',
    [ '/opt/AVP/kavdaemon', 'kavdaemon',
    '/opt/AVP/AvpDaemonClient', 'AvpDaemonClient',
    '/opt/AVP/AvpTeamDream', 'AvpTeamDream',
    '/opt/AVP/avpdc', 'avpdc' ],
    '{}', [0,8], [3,4,5,6], qr/infected: ([^\r\n]+)/ ],
    # change the startup-script in /etc/init.d/kavd to:
    # DPARMS="-I0 -Y -* /var/amavis"
    # adjusting /var/amavis above to match your $TEMPBASE.
    # NOTE: cd /opt/AVP/DaemonClients; configure; cd Sample; make
    # cp AvpDaemonClient /opt/AVP/
    ### http://www.hbedv.com/ or http://www.centralcommand.com/
    ['H+BEDV AntiVir or CentralCommand Vexira Antivirus',
    ['antivir','vexira'],
    '--allfiles -noboot -nombr -rs -s -z {}', [0], qr/ALERT:|VIRUS:/,
    qr/(?x)^\s* (?: ALERT: \s* (?: \[ | [^']* ' ) |
    (?i) VIRUS:\ .*?\ virus\ '?) ( [^\]\s']+ )/ ],
    # NOTE: remove the -z if you only have a demo version
    ### http://www.commandsoftware.com/
    ['Command AntiVirus for Linux', 'csav',
    '-all -archive -packed {}', [50], [51,52,53],
    qr/Infection: (.+)/ ],
    ### http://www.symantec.com/
    ['Symantec CarrierScan via Symantec CommandLineScanner',
    ['cscmdline','savsecls'],
    '-a scan -i 1 -v -s 127.0.0.1:7777 {}',
    qr/Files Infected: 0/, qr/^Infected: /,
    qr/Info:\s+(.+)/ ],
    ### http://drweb.imshop.de/
    ['DrWeb Antivirus for Linux/FreeBSD/Solaris', 'drweb',
    '-al -ar -fm -go -ha -ml -ot -sd -up {}',
    [0], [1], sub {('no-name')} ],
    ### http://www.f-secure.com/products/anti-virus/
    ['F-Secure Antivirus', 'fsav',
    '--dumb --archive {}', [0], [3,8],
    qr/(?:infection|Infected): (.+)/ ],
    ['CAI InoculateIT', 'inocucmd',
    '-sec -nex {}', [0], [100],
    qr/was infected by virus (.+)/ ],
    ['MkS_Vir for Linux (beta)', ['mks32','mks'],
    '-s {}/*', [0], [1,2],
    qr/--[ \t]*(.+)/ ],
    ['MkS_Vir daemon',
    'mksscan', '-s -q {}', [0], [1..7],
    qr/^... (\S+)/ ],
    ### http://www.nod32.com/
    ['ESET Software NOD32', 'nod32',
    '-all -subdir+ {}', [0], [1,2],
    qr/^.+? - (.+?)\s*(?:backdoor|joke|trojan|virus|worm)/ ],
    ### http://www.nod32.com/
    ['ESET Software NOD32 - Client/Server Version', 'nod32cli',
    '-a -r -d recurse --heur standard {}', [0], [10,11],
    qr/^\S+\s+infected:\s+(.+)/ ],
    ### http://www.norman.com/products_nvc.shtml
    ['Norman Virus Control v5 / Linux', 'nvccmd',
    '-c -l:0 -s -u {}', [0], [1],
    qr/(?i).* virus in .* -> \'(.+)\'/ ],
    ### http://www.pandasoftware.com/
    ['Panda Antivirus for Linux', ['pavcl','pavc'],
    '-aut -aex -heu -cmp -nor -nso -eng {}',
    qr/Number of files infected\.*: 0(?!\d)/,
    qr/Number of files infected\.*: 0*[1-9]/,
    qr/Found virus :\s*(\S+)/ ],
    # Check your RAV license terms before fiddling with the following two lines!
    # ['GeCAD RAV AntiVirus 8', 'ravav',
    # '--all --archive --mail {}', [1], [2,3,4,

    You are welcome. I'm glad you got it back up.
    (1) You say you did the symbolic link. I will assume this is set correctly; it's very important that it is.
    (2) I don't know what you mean by "Been feeding the [email protected] for several weeks now, 700 emails each day at least." After the initial training period, SpamAssassin doesn't learn from mail it has already processed correctly. At this point, you only need to teach SpamAssassin when it is wrong. [email protected] should only be getting spam that is being passed as clean. Likewise, [email protected] should only be getting legitimate mail that is being flagged as junk. You are redirecting mail to both [email protected] and [email protected] ... right? SpamAssassin needs both.
    (3) Next, as I said before, you need to implement those "Frontline spam defense for Mac OS X Server." Once you have that done and issue "postfix reload" you can look at your SMTP log in Server Admin and watch as Postfix blocks one piece of junk mail after another. It's kind of cool.
    (4) Add some SARE rules:
    Visit http://www.rulesemporium.com/rules.htm and download the following rules:
    70sareadult.cf
    70saregenlsubj0.cf
    70sareheader0.cf
    70sarehtml0.cf
    70sareobfu0.cf
    70sareoem.cf
    70sarespoof.cf
    70sarestocks.cf
    70sareunsub.cf
    72sare_redirectpost
    Visit http://www.rulesemporium.com/other-rules.htm and download the following rules:
    backhair.cf
    bogus-virus-warnings.cf
    chickenpox.cf
    weeds.cf
    Copy these rules to /etc/mail/spamassassin/
    Then stop and restart mail services.
    There are other things you can do, and you'll find differing opinions about such things. In general, I think implementing the "Frontline spam defense for Mac OS X Server" and adding the SARE rules will help a lot. Good luck!

  • [SLOVED] All my USB not work after upgrade system.

    Hello all,
    I'm new in Arch, and i install my system with your LiveCD (2005).
    In the first boot, all work good. But after upgrade (pacman -Syu), all my USB device (Keyboard, Mouse) not work.
    I'm not using (yet) with Xorg, just in command shell (tty1), But i can't press anything cuz my keyboard not work.
    I try to do that (https://bbs.archlinux.org/viewtopic.php … 19#p906119), but no work to me too.
    What i can to do to fix this?
    My dmesg:
    Initializing cgroup subsys cpuset
    Initializing cgroup subsys cpu
    Linux version 2.6.33-ARCH (thomas@evey) (gcc version 4.5.0 (GCC) ) #1 SMP PREEMPT Thu May 13 11:32:37 CEST 2010
    Command line: BOOT_IMAGE=/vmlinuz26 root=/dev/sdb5 ro
    BIOS-provided physical RAM map:
    BIOS-e820: 0000000000000000 - 000000000009ec00 (usable)
    BIOS-e820: 000000000009ec00 - 00000000000a0000 (reserved)
    BIOS-e820: 00000000000e0000 - 0000000000100000 (reserved)
    BIOS-e820: 0000000000100000 - 00000000bf564000 (usable)
    BIOS-e820: 00000000bf564000 - 00000000bf5bb000 (ACPI NVS)
    BIOS-e820: 00000000bf5bb000 - 00000000bf5db000 (reserved)
    BIOS-e820: 00000000bf5db000 - 00000000bf5ec000 (ACPI NVS)
    BIOS-e820: 00000000bf5ec000 - 00000000bf600000 (reserved)
    BIOS-e820: 00000000bf600000 - 00000000bf602000 (usable)
    BIOS-e820: 00000000bf602000 - 00000000bf603000 (ACPI data)
    BIOS-e820: 00000000bf603000 - 00000000bf60b000 (reserved)
    BIOS-e820: 00000000bf60b000 - 00000000bf615000 (ACPI NVS)
    BIOS-e820: 00000000bf615000 - 00000000bf63e000 (reserved)
    BIOS-e820: 00000000bf63e000 - 00000000bf681000 (ACPI NVS)
    BIOS-e820: 00000000bf681000 - 00000000bf800000 (usable)
    BIOS-e820: 00000000fed1c000 - 00000000fed20000 (reserved)
    BIOS-e820: 00000000ff000000 - 0000000100000000 (reserved)
    BIOS-e820: 0000000100000000 - 000000023f800000 (usable)
    NX (Execute Disable) protection: active
    DMI 2.6 present.
    AMI BIOS detected: BIOS may corrupt low RAM, working around it.
    e820 update range: 0000000000000000 - 0000000000010000 (usable) ==> (reserved)
    No AGP bridge found
    last_pfn = 0x23f800 max_arch_pfn = 0x400000000
    MTRR default type: uncachable
    MTRR fixed ranges enabled:
    00000-9FFFF write-back
    A0000-BFFFF uncachable
    C0000-CFFFF write-protect
    D0000-E7FFF uncachable
    E8000-FFFFF write-protect
    MTRR variable ranges enabled:
    0 base 000000000 mask E00000000 write-back
    1 base 200000000 mask FC0000000 write-back
    2 base 0C0000000 mask FC0000000 uncachable
    3 base 23F800000 mask FFF800000 uncachable
    4 disabled
    5 disabled
    6 disabled
    7 disabled
    8 disabled
    9 disabled
    x86 PAT enabled: cpu 0, old 0x7040600070406, new 0x7010600070106
    e820 update range: 00000000c0000000 - 0000000100000000 (usable) ==> (reserved)
    last_pfn = 0xbf800 max_arch_pfn = 0x400000000
    Scanning 0 areas for low memory corruption
    modified physical RAM map:
    modified: 0000000000000000 - 0000000000010000 (reserved)
    modified: 0000000000010000 - 000000000009ec00 (usable)
    modified: 000000000009ec00 - 00000000000a0000 (reserved)
    modified: 00000000000e0000 - 0000000000100000 (reserved)
    modified: 0000000000100000 - 00000000bf564000 (usable)
    modified: 00000000bf564000 - 00000000bf5bb000 (ACPI NVS)
    modified: 00000000bf5bb000 - 00000000bf5db000 (reserved)
    modified: 00000000bf5db000 - 00000000bf5ec000 (ACPI NVS)
    modified: 00000000bf5ec000 - 00000000bf600000 (reserved)
    modified: 00000000bf600000 - 00000000bf602000 (usable)
    modified: 00000000bf602000 - 00000000bf603000 (ACPI data)
    modified: 00000000bf603000 - 00000000bf60b000 (reserved)
    modified: 00000000bf60b000 - 00000000bf615000 (ACPI NVS)
    modified: 00000000bf615000 - 00000000bf63e000 (reserved)
    modified: 00000000bf63e000 - 00000000bf681000 (ACPI NVS)
    modified: 00000000bf681000 - 00000000bf800000 (usable)
    modified: 00000000fed1c000 - 00000000fed20000 (reserved)
    modified: 00000000ff000000 - 0000000100000000 (reserved)
    modified: 0000000100000000 - 000000023f800000 (usable)
    initial memory mapped : 0 - 20000000
    found SMP MP-table at [ffff8800000fcda0] fcda0
    init_memory_mapping: 0000000000000000-00000000bf800000
    0000000000 - 00bf800000 page 2M
    kernel direct mapping tables up to bf800000 @ 16000-1a000
    init_memory_mapping: 0000000100000000-000000023f800000
    0100000000 - 023f800000 page 2M
    kernel direct mapping tables up to 23f800000 @ 18000-22000
    RAMDISK: 37c44000 - 37e19ab8
    ACPI: RSDP 00000000000f0420 00024 (v02 ALASKA)
    ACPI: XSDT 00000000bf5ae068 0004C (v01 ALASKA A M I 01072009 AMI 00010013)
    ACPI: FACP 00000000bf5b7ba0 000F4 (v04 ALASKA A M I 01072009 AMI 00010013)
    ACPI: DSDT 00000000bf5ae140 09A5C (v02 ALASKA A M I 00000000 INTL 20051117)
    ACPI: FACS 00000000bf60cf80 00040
    ACPI: APIC 00000000bf5b7c98 00072 (v03 ALASKA A M I 01072009 AMI 00010013)
    ACPI: SSDT 00000000bf5b7d10 00102 (v01 AMICPU PROC 00000001 MSFT 03000001)
    ACPI: MCFG 00000000bf5b7e18 0003C (v01 ALASKA A M I 01072009 MSFT 00000097)
    ACPI: HPET 00000000bf5b7e58 00038 (v01 ALASKA A M I 01072009 AMI. 00000004)
    ACPI: Local APIC address 0xfee00000
    (13 early reservations) ==> bootmem [0000000000 - 023f800000]
    #0 [0000000000 - 0000001000] BIOS data page ==> [0000000000 - 0000001000]
    #1 [0001000000 - 00016d7b38] TEXT DATA BSS ==> [0001000000 - 00016d7b38]
    #2 [0037c44000 - 0037e19ab8] RAMDISK ==> [0037c44000 - 0037e19ab8]
    #3 [00016d8000 - 00016d826b] BRK ==> [00016d8000 - 00016d826b]
    #4 [00000fcdb0 - 0000100000] BIOS reserved ==> [00000fcdb0 - 0000100000]
    #5 [00000fcda0 - 00000fcdb0] MP-table mpf ==> [00000fcda0 - 00000fcdb0]
    #6 [000009ec00 - 00000fca90] BIOS reserved ==> [000009ec00 - 00000fca90]
    #7 [00000fcd24 - 00000fcda0] BIOS reserved ==> [00000fcd24 - 00000fcda0]
    #8 [00000fca90 - 00000fcd24] MP-table mpc ==> [00000fca90 - 00000fcd24]
    #9 [0000010000 - 0000012000] TRAMPOLINE ==> [0000010000 - 0000012000]
    #10 [0000012000 - 0000016000] ACPI WAKEUP ==> [0000012000 - 0000016000]
    #11 [0000016000 - 0000018000] PGTABLE ==> [0000016000 - 0000018000]
    #12 [0000018000 - 000001d000] PGTABLE ==> [0000018000 - 000001d000]
    [ffffea0000000000-ffffea0007dfffff] PMD -> [ffff880001800000-ffff8800087fffff] on node 0
    Zone PFN ranges:
    DMA 0x00000010 -> 0x00001000
    DMA32 0x00001000 -> 0x00100000
    Normal 0x00100000 -> 0x0023f800
    Movable zone start PFN for each node
    early_node_map[5] active PFN ranges
    0: 0x00000010 -> 0x0000009e
    0: 0x00000100 -> 0x000bf564
    0: 0x000bf600 -> 0x000bf602
    0: 0x000bf681 -> 0x000bf800
    0: 0x00100000 -> 0x0023f800
    On node 0 totalpages: 2092659
    DMA zone: 56 pages used for memmap
    DMA zone: 110 pages reserved
    DMA zone: 3816 pages, LIFO batch:0
    DMA32 zone: 14280 pages used for memmap
    DMA32 zone: 765725 pages, LIFO batch:31
    Normal zone: 17892 pages used for memmap
    Normal zone: 1290780 pages, LIFO batch:31
    ACPI: PM-Timer IO Port: 0x408
    ACPI: Local APIC address 0xfee00000
    ACPI: LAPIC (acpi_id[0x01] lapic_id[0x00] enabled)
    ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled)
    ACPI: LAPIC (acpi_id[0x03] lapic_id[0x04] enabled)
    ACPI: LAPIC (acpi_id[0x04] lapic_id[0x06] enabled)
    ACPI: LAPIC_NMI (acpi_id[0xff] high edge lint[0x1])
    ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0])
    IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
    ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
    ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
    ACPI: IRQ0 used by override.
    ACPI: IRQ2 used by override.
    ACPI: IRQ9 used by override.
    Using ACPI (MADT) for SMP configuration information
    ACPI: HPET id: 0x8086a701 base: 0xfed00000
    SMP: Allowing 4 CPUs, 0 hotplug CPUs
    nr_irqs_gsi: 24
    PM: Registered nosave memory: 000000000009e000 - 000000000009f000
    PM: Registered nosave memory: 000000000009f000 - 00000000000a0000
    PM: Registered nosave memory: 00000000000a0000 - 00000000000e0000
    PM: Registered nosave memory: 00000000000e0000 - 0000000000100000
    PM: Registered nosave memory: 00000000bf564000 - 00000000bf5bb000
    PM: Registered nosave memory: 00000000bf5bb000 - 00000000bf5db000
    PM: Registered nosave memory: 00000000bf5db000 - 00000000bf5ec000
    PM: Registered nosave memory: 00000000bf5ec000 - 00000000bf600000
    PM: Registered nosave memory: 00000000bf602000 - 00000000bf603000
    PM: Registered nosave memory: 00000000bf603000 - 00000000bf60b000
    PM: Registered nosave memory: 00000000bf60b000 - 00000000bf615000
    PM: Registered nosave memory: 00000000bf615000 - 00000000bf63e000
    PM: Registered nosave memory: 00000000bf63e000 - 00000000bf681000
    PM: Registered nosave memory: 00000000bf800000 - 00000000fed1c000
    PM: Registered nosave memory: 00000000fed1c000 - 00000000fed20000
    PM: Registered nosave memory: 00000000fed20000 - 00000000ff000000
    PM: Registered nosave memory: 00000000ff000000 - 0000000100000000
    Allocating PCI resources starting at bf800000 (gap: bf800000:3f51c000)
    Booting paravirtualized kernel on bare hardware
    setup_percpu: NR_CPUS:16 nr_cpumask_bits:16 nr_cpu_ids:4 nr_node_ids:1
    PERCPU: Embedded 29 pages/cpu @ffff880008a00000 s89176 r8192 d21416 u524288
    pcpu-alloc: s89176 r8192 d21416 u524288 alloc=1*2097152
    pcpu-alloc: [0] 0 1 2 3
    Built 1 zonelists in Zone order, mobility grouping on. Total pages: 2060321
    Kernel command line: BOOT_IMAGE=/vmlinuz26 root=/dev/sdb5 ro
    PID hash table entries: 4096 (order: 3, 32768 bytes)
    Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes)
    Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes)
    xsave/xrstor: enabled xstate_bv 0x7, cntxt size 0x340
    Checking aperture...
    No AGP bridge found
    Calgary: detecting Calgary via BIOS EBDA area
    Calgary: Unable to locate Rio Grande table in EBDA - bailing!
    Memory: 8167004k/9428992k available (3449k kernel code, 1058356k absent, 202696k reserved, 1818k data, 484k init)
    SLUB: Genslabs=13, HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
    Hierarchical RCU implementation.
    NR_IRQS:768
    Extended CMOS year: 2000
    Console: colour VGA+ 80x25
    console [tty0] enabled
    allocated 83886080 bytes of page_cgroup
    please try 'cgroup_disable=memory' option if you don't want memory cgroups
    hpet clockevent registered
    Fast TSC calibration using PIT
    Detected 3311.105 MHz processor.
    Calibrating delay loop (skipped), value calculated using timer frequency.. 6624.13 BogoMIPS (lpj=11037016)
    Security Framework initialized
    Mount-cache hash table entries: 256
    Initializing cgroup subsys ns
    Initializing cgroup subsys cpuacct
    Initializing cgroup subsys memory
    Initializing cgroup subsys devices
    Initializing cgroup subsys freezer
    Initializing cgroup subsys net_cls
    CPU: Physical Processor ID: 0
    CPU: Processor Core ID: 0
    mce: CPU supports 9 MCE banks
    CPU0: Thermal monitoring enabled (TM1)
    CPU 0 MCA banks CMCI:0 CMCI:1 CMCI:3 CMCI:5 CMCI:6 CMCI:7 CMCI:8
    using mwait in idle threads.
    Performance Events: Nehalem/Corei7 events, Intel PMU driver.
    ... version: 3
    ... bit width: 48
    ... generic registers: 8
    ... value mask: 0000ffffffffffff
    ... max period: 000000007fffffff
    ... fixed-purpose events: 3
    ... event mask: 00000007000000ff
    ACPI: Core revision 20091214
    Setting APIC routing to flat
    ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
    CPU0: Intel(R) Core(TM) i5-2500 CPU @ 3.30GHz stepping 07
    Booting Node 0, Processors #1
    CPU 1 MCA banks CMCI:0 CMCI:1 CMCI:3 SHD:5 SHD:6 SHD:7 SHD:8
    #2
    CPU 2 MCA banks CMCI:0 CMCI:1 CMCI:3 SHD:5 SHD:6 SHD:7 SHD:8
    #3 Ok.
    CPU 3 MCA banks CMCI:0 CMCI:1 CMCI:3 SHD:5 SHD:6 SHD:7 SHD:8
    Brought up 4 CPUs
    Total of 4 processors activated (26499.22 BogoMIPS).
    NET: Registered protocol family 16
    ACPI: bus type pci registered
    PCI: MMCONFIG for domain 0000 [bus 00-3f] at [mem 0xe0000000-0xe3ffffff] (base 0xe0000000)
    PCI: not using MMCONFIG
    PCI: Using configuration type 1 for base access
    bio: create slab <bio-0> at 0
    ACPI: EC: Look up EC in DSDT
    ACPI: Executed 1 blocks of module-level executable AML code
    ACPI Error (psargs-0359): [RAMB] Namespace lookup failure, AE_NOT_FOUND
    ACPI Exception: AE_NOT_FOUND, Could not execute arguments for [RAMW] (Region) (20091214/nsinit-340)
    ACPI: Interpreter enabled
    ACPI: (supports S0 S1 S3 S4 S5)
    ACPI: Using IOAPIC for interrupt routing
    PCI: MMCONFIG for domain 0000 [bus 00-3f] at [mem 0xe0000000-0xe3ffffff] (base 0xe0000000)
    PCI: MMCONFIG at [mem 0xe0000000-0xe3ffffff] reserved in ACPI motherboard resources
    ACPI: BIOS _OSI(Linux) query ignored
    ACPI: No dock devices found.
    ACPI: PCI Root Bridge [PCI0] (0000:00)
    pci_root PNP0A08:00: ignoring host bridge windows from ACPI; boot with "pci=use_crs" to use them
    pci_root PNP0A08:00: host bridge window [io 0x0000-0x0cf7] (ignored)
    pci_root PNP0A08:00: host bridge window [io 0x0d00-0xffff] (ignored)
    pci_root PNP0A08:00: host bridge window [mem 0x000a0000-0x000bffff] (ignored)
    pci_root PNP0A08:00: host bridge window [mem 0x000c8000-0x000dffff] (ignored)
    pci_root PNP0A08:00: host bridge window [mem 0xc0000000-0xffffffff] (ignored)
    pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:01.0: PME# disabled
    pci 0000:00:16.0: reg 10: [mem 0xfe707000-0xfe70700f 64bit]
    pci 0000:00:16.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:16.0: PME# disabled
    pci 0000:00:1a.0: reg 10: [mem 0xfe706000-0xfe7063ff]
    pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:1a.0: PME# disabled
    pci 0000:00:1b.0: reg 10: [mem 0xfe700000-0xfe703fff 64bit]
    pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:1b.0: PME# disabled
    pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:1c.0: PME# disabled
    pci 0000:00:1c.4: PME# supported from D0 D3hot D3cold
    pci 0000:00:1c.4: PME# disabled
    pci 0000:00:1c.5: PME# supported from D0 D3hot D3cold
    pci 0000:00:1c.5: PME# disabled
    pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold
    pci 0000:00:1c.6: PME# disabled
    pci 0000:00:1c.7: PME# supported from D0 D3hot D3cold
    pci 0000:00:1c.7: PME# disabled
    pci 0000:00:1d.0: reg 10: [mem 0xfe705000-0xfe7053ff]
    pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold
    pci 0000:00:1d.0: PME# disabled
    pci 0000:00:1f.2: reg 10: [io 0xf0d0-0xf0d7]
    pci 0000:00:1f.2: reg 14: [io 0xf0c0-0xf0c3]
    pci 0000:00:1f.2: reg 18: [io 0xf0b0-0xf0b7]
    pci 0000:00:1f.2: reg 1c: [io 0xf0a0-0xf0a3]
    pci 0000:00:1f.2: reg 20: [io 0xf090-0xf09f]
    pci 0000:00:1f.2: reg 24: [io 0xf080-0xf08f]
    pci 0000:00:1f.3: reg 10: [mem 0xfe704000-0xfe7040ff 64bit]
    pci 0000:00:1f.3: reg 20: [io 0xf000-0xf01f]
    pci 0000:00:1f.5: reg 10: [io 0xf070-0xf077]
    pci 0000:00:1f.5: reg 14: [io 0xf060-0xf063]
    pci 0000:00:1f.5: reg 18: [io 0xf050-0xf057]
    pci 0000:00:1f.5: reg 1c: [io 0xf040-0xf043]
    pci 0000:00:1f.5: reg 20: [io 0xf030-0xf03f]
    pci 0000:00:1f.5: reg 24: [io 0xf020-0xf02f]
    pci 0000:01:00.0: reg 10: [mem 0xc0000000-0xcfffffff 64bit pref]
    pci 0000:01:00.0: reg 18: [mem 0xfe620000-0xfe63ffff 64bit]
    pci 0000:01:00.0: reg 20: [io 0xe000-0xe0ff]
    pci 0000:01:00.0: reg 30: [mem 0xfe600000-0xfe61ffff pref]
    pci 0000:01:00.0: supports D1 D2
    pci 0000:01:00.1: reg 10: [mem 0xfe640000-0xfe643fff 64bit]
    pci 0000:01:00.1: supports D1 D2
    pci 0000:00:01.0: PCI bridge to [bus 01-01]
    pci 0000:00:01.0: bridge window [io 0xe000-0xefff]
    pci 0000:00:01.0: bridge window [mem 0xfe600000-0xfe6fffff]
    pci 0000:00:01.0: bridge window [mem 0xc0000000-0xcfffffff 64bit pref]
    pci 0000:00:1c.0: PCI bridge to [bus 02-02]
    pci 0000:03:00.0: reg 10: [io 0xd040-0xd047]
    pci 0000:03:00.0: reg 14: [io 0xd030-0xd033]
    pci 0000:03:00.0: reg 18: [io 0xd020-0xd027]
    pci 0000:03:00.0: reg 1c: [io 0xd010-0xd013]
    pci 0000:03:00.0: reg 20: [io 0xd000-0xd00f]
    pci 0000:03:00.0: reg 30: [mem 0xfe500000-0xfe50ffff pref]
    pci 0000:03:00.0: supports D1 D2
    pci 0000:03:00.0: PME# supported from D1 D2 D3hot
    pci 0000:03:00.0: PME# disabled
    pci 0000:00:1c.4: PCI bridge to [bus 03-03]
    pci 0000:00:1c.4: bridge window [io 0xd000-0xdfff]
    pci 0000:00:1c.4: bridge window [mem 0xfe500000-0xfe5fffff]
    pci 0000:00:1c.5: PCI bridge to [bus 04-04]
    pci 0000:05:00.0: reg 10: [io 0xc000-0xc0ff]
    pci 0000:05:00.0: reg 18: [mem 0xd0004000-0xd0004fff 64bit pref]
    pci 0000:05:00.0: reg 20: [mem 0xd0000000-0xd0003fff 64bit pref]
    pci 0000:05:00.0: supports D1 D2
    pci 0000:05:00.0: PME# supported from D0 D1 D2 D3hot D3cold
    pci 0000:05:00.0: PME# disabled
    pci 0000:00:1c.6: PCI bridge to [bus 05-05]
    pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff]
    pci 0000:00:1c.6: bridge window [mem 0xd0000000-0xd00fffff 64bit pref]
    pci 0000:00:1c.7: PCI bridge to [bus 06-07] (subtractive decode)
    pci 0000:06:00.0: PCI bridge to [bus 07-07] (subtractive decode)
    pci_bus 0000:00: on NUMA node 0
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.P0P1._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PEX0._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PEX4._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PEX5._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PEX6._PRT]
    ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PEX7.BR19._PRT]
    ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 10 *11 12 14 15)
    ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 *10 11 12 14 15)
    ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 5 6 *10 11 12 14 15)
    ACPI: PCI Interrupt Link [LNKD] (IRQs *3 4 5 6 10 11 12 14 15)
    ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 *7 10 11 12 14 15)
    ACPI: PCI Interrupt Link [LNKF] (IRQs *3 4 5 6 7 10 11 12 14 15)
    ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 7 10 *11 12 14 15)
    ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 *7 10 11 12 14 15)
    vgaarb: device added: PCI:0000:01:00.0,decodes=io+mem,owns=io+mem,locks=none
    vgaarb: loaded
    PCI: Using ACPI for IRQ routing
    PCI: pci_cache_line_size set to 64 bytes
    NetLabel: Initializing
    NetLabel: domain hash size = 128
    NetLabel: protocols = UNLABELED CIPSOv4
    NetLabel: unlabeled traffic allowed by default
    hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
    hpet0: 8 comparators, 64-bit 14.318180 MHz counter
    Switching to clocksource tsc
    pnp: PnP ACPI init
    ACPI: bus type pnp registered
    pnp: PnP ACPI: found 14 devices
    ACPI: ACPI bus type pnp unregistered
    system 00:01: [mem 0xfed10000-0xfed19fff] has been reserved
    system 00:01: [mem 0xe0000000-0xe3ffffff] has been reserved
    system 00:01: [mem 0xfed90000-0xfed93fff] has been reserved
    system 00:01: [mem 0xfed20000-0xfed3ffff] has been reserved
    system 00:01: [mem 0xfee00000-0xfee0ffff] has been reserved
    system 00:02: [io 0x0290-0x029f] has been reserved
    system 00:07: [io 0x04d0-0x04d1] has been reserved
    system 00:0b: [io 0x0400-0x0453] has been reserved
    system 00:0b: [io 0x0458-0x047f] has been reserved
    system 00:0b: [io 0x0500-0x057f] has been reserved
    system 00:0b: [mem 0xfed1c000-0xfed1ffff] has been reserved
    system 00:0b: [mem 0xfec00000-0xfecfffff] could not be reserved
    system 00:0b: [mem 0xfed08000-0xfed08fff] has been reserved
    system 00:0b: [mem 0xff000000-0xffffffff] has been reserved
    system 00:0c: [io 0x0454-0x0457] has been reserved
    pci 0000:00:01.0: PCI bridge to [bus 01-01]
    pci 0000:00:01.0: bridge window [io 0xe000-0xefff]
    pci 0000:00:01.0: bridge window [mem 0xfe600000-0xfe6fffff]
    pci 0000:00:01.0: bridge window [mem 0xc0000000-0xcfffffff 64bit pref]
    pci 0000:00:1c.0: PCI bridge to [bus 02-02]
    pci 0000:00:1c.0: bridge window [io disabled]
    pci 0000:00:1c.0: bridge window [mem disabled]
    pci 0000:00:1c.0: bridge window [mem pref disabled]
    pci 0000:00:1c.4: PCI bridge to [bus 03-03]
    pci 0000:00:1c.4: bridge window [io 0xd000-0xdfff]
    pci 0000:00:1c.4: bridge window [mem 0xfe500000-0xfe5fffff]
    pci 0000:00:1c.4: bridge window [mem pref disabled]
    pci 0000:00:1c.5: PCI bridge to [bus 04-04]
    pci 0000:00:1c.5: bridge window [io disabled]
    pci 0000:00:1c.5: bridge window [mem disabled]
    pci 0000:00:1c.5: bridge window [mem pref disabled]
    pci 0000:00:1c.6: PCI bridge to [bus 05-05]
    pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff]
    pci 0000:00:1c.6: bridge window [mem disabled]
    pci 0000:00:1c.6: bridge window [mem 0xd0000000-0xd00fffff 64bit pref]
    pci 0000:06:00.0: PCI bridge to [bus 07-07]
    pci 0000:06:00.0: bridge window [io disabled]
    pci 0000:06:00.0: bridge window [mem disabled]
    pci 0000:06:00.0: bridge window [mem pref disabled]
    pci 0000:00:1c.7: PCI bridge to [bus 06-07]
    pci 0000:00:1c.7: bridge window [io disabled]
    pci 0000:00:1c.7: bridge window [mem disabled]
    pci 0000:00:1c.7: bridge window [mem pref disabled]
    pci 0000:00:01.0: PCI INT A -> GSI 16 (level, low) -> IRQ 16
    pci 0000:00:01.0: setting latency timer to 64
    pci 0000:00:1c.0: PCI INT A -> GSI 17 (level, low) -> IRQ 17
    pci 0000:00:1c.0: setting latency timer to 64
    pci 0000:00:1c.4: PCI INT A -> GSI 17 (level, low) -> IRQ 17
    pci 0000:00:1c.4: setting latency timer to 64
    pci 0000:00:1c.5: PCI INT B -> GSI 16 (level, low) -> IRQ 16
    pci 0000:00:1c.5: setting latency timer to 64
    pci 0000:00:1c.6: PCI INT C -> GSI 18 (level, low) -> IRQ 18
    pci 0000:00:1c.6: setting latency timer to 64
    pci 0000:00:1c.7: PCI INT D -> GSI 19 (level, low) -> IRQ 19
    pci 0000:00:1c.7: setting latency timer to 64
    pci 0000:06:00.0: PCI INT A -> GSI 17 (level, low) -> IRQ 17
    pci 0000:06:00.0: setting latency timer to 64
    pci_bus 0000:00: resource 0 [io 0x0000-0xffff]
    pci_bus 0000:00: resource 1 [mem 0x00000000-0xffffffffffffffff]
    pci_bus 0000:01: resource 0 [io 0xe000-0xefff]
    pci_bus 0000:01: resource 1 [mem 0xfe600000-0xfe6fffff]
    pci_bus 0000:01: resource 2 [mem 0xc0000000-0xcfffffff 64bit pref]
    pci_bus 0000:03: resource 0 [io 0xd000-0xdfff]
    pci_bus 0000:03: resource 1 [mem 0xfe500000-0xfe5fffff]
    pci_bus 0000:05: resource 0 [io 0xc000-0xcfff]
    pci_bus 0000:05: resource 2 [mem 0xd0000000-0xd00fffff 64bit pref]
    pci_bus 0000:06: resource 3 [io 0x0000-0xffff]
    pci_bus 0000:06: resource 4 [mem 0x00000000-0xffffffffffffffff]
    pci_bus 0000:07: resource 6 [io 0x0000-0xffff]
    pci_bus 0000:07: resource 7 [mem 0x00000000-0xffffffffffffffff]
    NET: Registered protocol family 2
    IP route cache hash table entries: 262144 (order: 9, 2097152 bytes)
    TCP established hash table entries: 262144 (order: 10, 4194304 bytes)
    TCP bind hash table entries: 65536 (order: 8, 1048576 bytes)
    TCP: Hash tables configured (established 262144 bind 65536)
    TCP reno registered
    UDP hash table entries: 4096 (order: 5, 131072 bytes)
    UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes)
    NET: Registered protocol family 1
    pci 0000:01:00.0: Boot video device
    PCI: CLS 64 bytes, default 64
    Unpacking initramfs...
    Freeing initrd memory: 1878k freed
    PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
    Placing 64MB software IO TLB between ffff88000979e000 - ffff88000d79e000
    software IO TLB at phys 0x979e000 - 0xd79e000
    Scanning for low memory corruption every 60 seconds
    audit: initializing netlink socket (disabled)
    type=2000 audit(1304838033.699:1): initialized
    VFS: Disk quotas dquot_6.5.2
    Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
    msgmni has been set to 15956
    alg: No test for stdrng (krng)
    Block layer SCSI generic (bsg) driver version 0.4 loaded (major 254)
    io scheduler noop registered
    io scheduler deadline registered
    io scheduler cfq registered (default)
    pcieport 0000:00:01.0: setting latency timer to 64
    pcieport 0000:00:01.0: irq 24 for MSI/MSI-X
    pcieport 0000:00:1c.0: setting latency timer to 64
    pcieport 0000:00:1c.0: irq 25 for MSI/MSI-X
    pcieport 0000:00:1c.4: setting latency timer to 64
    pcieport 0000:00:1c.4: irq 26 for MSI/MSI-X
    pcieport 0000:00:1c.5: setting latency timer to 64
    pcieport 0000:00:1c.5: irq 27 for MSI/MSI-X
    pcieport 0000:00:1c.6: setting latency timer to 64
    pcieport 0000:00:1c.6: irq 28 for MSI/MSI-X
    Linux agpgart interface v0.103
    Serial: 8250/16550 driver, 4 ports, IRQ sharing disabled
    serial8250: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
    00:09: ttyS0 at I/O 0x3f8 (irq = 4) is a 16550A
    input: Macintosh mouse button emulation as /devices/virtual/input/input0
    PNP: PS/2 Controller [PNP0303:PS2K] at 0x60,0x64 irq 1
    PNP: PS/2 appears to have AUX port disabled, if this is incorrect please boot with i8042.nopnp
    serio: i8042 KBD port at 0x60,0x64 irq 1
    mice: PS/2 mouse device common for all mice
    cpuidle: using governor ladder
    cpuidle: using governor menu
    TCP cubic registered
    NET: Registered protocol family 17
    PM: Resume from disk failed.
    registered taskstats version 1
    Initalizing network drop monitor service
    Freeing unused kernel memory: 484k freed
    SCSI subsystem initialized
    libata version 3.00 loaded.
    ata_piix 0000:00:1f.2: version 2.13
    ata_piix 0000:00:1f.2: PCI INT B -> GSI 20 (level, low) -> IRQ 20
    ata_piix 0000:00:1f.2: MAP [ P0 P2 P1 P3 ]
    ata_piix 0000:00:1f.2: setting latency timer to 64
    scsi0 : ata_piix
    scsi1 : ata_piix
    ata1: SATA max UDMA/133 cmd 0xf0d0 ctl 0xf0c0 bmdma 0xf090 irq 20
    ata2: SATA max UDMA/133 cmd 0xf0b0 ctl 0xf0a0 bmdma 0xf098 irq 20
    ata_piix 0000:00:1f.5: PCI INT B -> GSI 20 (level, low) -> IRQ 20
    ata_piix 0000:00:1f.5: MAP [ P0 -- P1 -- ]
    ata_piix 0000:00:1f.5: SCR access via SIDPR is available but doesn't work
    ata_piix 0000:00:1f.5: setting latency timer to 64
    scsi2 : ata_piix
    scsi3 : ata_piix
    ata3: SATA max UDMA/133 cmd 0xf070 ctl 0xf060 bmdma 0xf030 irq 20
    ata4: SATA max UDMA/133 cmd 0xf050 ctl 0xf040 bmdma 0xf038 irq 20
    pata_acpi 0000:03:00.0: PCI INT A -> GSI 16 (level, low) -> IRQ 16
    pata_acpi 0000:03:00.0: setting latency timer to 64
    pata_acpi 0000:03:00.0: PCI INT A disabled
    ata1.00: SATA link up 3.0 Gbps (SStatus 123 SControl 300)
    ata1.01: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
    ata1.00: ATA-8: SAMSUNG HD103SJ, 1AJ10001, max UDMA/133
    ata1.00: 1953525168 sectors, multi 16: LBA48 NCQ (depth 0/32)
    ata1.01: ATA-6: WDC WD1200JD-00GBB0, 02.05D02, max UDMA/100
    ata1.01: 234441648 sectors, multi 16: LBA48
    ata1.01: applying bridge limits
    ata1.00: configured for UDMA/133
    ata1.01: configured for UDMA/100
    scsi 0:0:0:0: Direct-Access ATA SAMSUNG HD103SJ 1AJ1 PQ: 0 ANSI: 5
    scsi 0:0:1:0: Direct-Access ATA WDC WD1200JD-00G 02.0 PQ: 0 ANSI: 5
    ata2.01: failed to resume link (SControl 0)
    ata2.00: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
    ata2.01: SATA link down (SStatus 0 SControl 0)
    ata2.01: link offline, clearing class 3 to NONE
    ata2.00: ATAPI: TSSTcorp CDDVDW SH-S223C, SB05, max MWDMA2
    ata2.00: configured for MWDMA2
    ata2.00: qc timeout (cmd 0xa0)
    ata2.00: TEST_UNIT_READY failed (err_mask=0x4)
    ata2.01: failed to resume link (SControl 0)
    ata2.00: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
    ata2.01: SATA link down (SStatus 0 SControl 0)
    ata2.01: link offline, clearing class 3 to NONE
    ata2.00: configured for MWDMA2
    ata2.00: qc timeout (cmd 0xa0)
    ata2.00: TEST_UNIT_READY failed (err_mask=0x4)
    ata2.00: limiting SATA link speed to 1.5 Gbps
    ata2.00: limiting speed to MWDMA2:PIO3
    ata2.01: failed to resume link (SControl 0)
    ata2.00: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
    ata2.01: SATA link down (SStatus 0 SControl 0)
    ata2.01: link offline, clearing class 3 to NONE
    ata2.00: configured for MWDMA2
    ata2.00: qc timeout (cmd 0xa0)
    ata2.00: TEST_UNIT_READY failed (err_mask=0x4)
    ata2.00: disabled
    ata2.00: hard resetting link
    ata2.01: hard resetting link
    ata2.01: failed to resume link (SControl 0)
    ata2.00: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
    ata2.01: SATA link down (SStatus 0 SControl 0)
    ata2.01: link offline, clearing class 3 to NONE
    ata2: EH complete
    pata_via 0000:03:00.0: version 0.3.4
    pata_via 0000:03:00.0: PCI INT A -> GSI 16 (level, low) -> IRQ 16
    pata_via 0000:03:00.0: setting latency timer to 64
    scsi4 : pata_via
    scsi5 : pata_via
    ata5: PATA max UDMA/133 cmd 0xd040 ctl 0xd030 bmdma 0xd000 irq 16
    ata6: PATA max UDMA/133 cmd 0xd020 ctl 0xd010 bmdma 0xd008 irq 16
    sd 0:0:0:0: [sda] 1953525168 512-byte logical blocks: (1.00 TB/931 GiB)
    sd 0:0:1:0: [sdb] 234441648 512-byte logical blocks: (120 GB/111 GiB)
    sd 0:0:1:0: [sdb] Write Protect is off
    sd 0:0:1:0: [sdb] Mode Sense: 00 3a 00 00
    sd 0:0:1:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
    sdb: sdb1
    sd 0:0:0:0: [sda] Write Protect is off
    sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00
    sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
    sdb2 sdb3 sdb4 < sdb5 >
    sda: sda1 sda2
    sd 0:0:1:0: [sdb] Attached SCSI disk
    sda3
    sd 0:0:0:0: [sda] Attached SCSI disk
    EXT4-fs (sdb5): mounted filesystem with ordered data mode
    <30>udev[901]: starting version 167
    Adding 7030776k swap on /dev/sdb2. Priority:-1 extents:1 across:7030776k
    Thanks a lots.
    Last edited by KingYes (2011-05-08 11:03:55)

    FYI, the latest installation CD version is "2010.05". It's best to use the latest. Get it from http://www.archlinux.org/download/
    I'm not sure but I believe all other LiveCDs are custom made outside of the official Archlinux development team.
    I recommend downloading the CD I mentioned and follow this guide: https://wiki.archlinux.org/index.php/Beginners%27_Guide
    I've installed arch many times on different hardware and the only time I lost mouse and keyboard was after I removed "10-evdev.conf" and "10-quirks.conf" from /etc/X11/xorg.conf.d/. I copied both back from backups, rebooted and m&k were functional again. My guess is  "10-evdev.conf" was the file I needed. Check both these files exist.

  • HelloWorld Example Not Working

    Hi,
    I am using JCDK 2.2.2.
    Converter and scriptgen run without errors from C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\samples (which is the existing samples directory):
    converter -classdir "C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\samples\classes" -exportpath "C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\api_export_files\;C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\samples\classes\com\sun\javacard\samples\HelloWorld\javacard" -applet  0xa0:0x0:0x0:0x0:0x62:0x3:0x1:0xc:0x1:0x1 com.sun.javacard.samples.HelloWorld.HelloWorld com.sun.javacard.samples.HelloWorld 0xa0:0x0:0x0:0x0:0x62:0x3:0x1:0xc:0x1 1.0
    scriptgen -o HelloWorld.scr ./classes/com/sun/javacard/samples/HelloWorld/javacard/HelloWorld.capI run cref from C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\bin:
    cref.exe -o HelloWorld.eepromAnd then in another command prompt from C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\bin:
    apdutool C:\java_card_kit-2_2_2-windows\java_card_kit-2_2_2\samples\HelloWorld.scrThe app installs fine. So now I want to test the code. I added a line to the script at the end to selecct the application:
    // Select HelloWorld
    0x00 0xA4 0x04 0x00 0x09 0xa0 0x0 0x0 0x0 0x62 0x3 0x1 0xc 0x1 0x7F;Which is not working (6d00 error)
    Any suggestions why this could be happening? Nothing throws errors except the line to select the app. It can't be a problem with the code, because I am running the sample files that came with the JCDK.
    P.S. I tried 'creating Helloworld' using the line
    0x80 0xB8 0x00 0x00 0x0b 0x09 0xa0 0x0 0x0 0x0 0x62 0x3 0x1 0xc 0x1 0x00 0x7F;But this gave a 6443 error.
    Edited by: Candice on Jul 11, 2011 2:14 AM

    P.S. I tried 'creating Helloworld' using the line
    0x80 0xB8 0x00 0x00 0x0b 0x09 0xa0 0x0 0x0 0x0 0x62 0x3 0x1 0xc 0x1 0x00 0x7F;But this gave a 6443 error.Applet not found for installation.
    • Cause: An attempt was made to create an applet instance, but the applet code was not installed on the card.
    • Solution: Verify that the applet package has been downloaded to the card.
    Remeber that after the first time you launch cref, you need to tell it where to load the EEPROM file from the last run with -i <file>. You can use the same file for -i and -o to be able to reuse the mask and store new state.
    Cheers,
    Shane

  • BDC not working in GB01

    Hi All,
    I have written a BDC program to upload data by GB01 tcode. In GB01 we have around 15 fields in my program after filling the first 8 fields i am using :  FLD 'BDC_OKCODE'    'DOWN' but, it is not working please see the below code. first 8 fields are overwritten by other one. How do i control this one.
      SCR 'SAPMGBUK' '0110'.
      FLD 'GLU1-TSL'      REC-AMOUNT.
      FLD 'RGBUK-O_V01'   REC-ACCOUNT.
      FLD 'RGBUK-O_V02'   REC-CONSACCT.
      FLD 'RGBUK-O_V03'   REC-DOCTYPE.
      FLD 'RGBUK-O_V04'   REC-LEDGERTYPE.
      FLD 'RGBUK-O_V05'   REC-RZZAFFILIATED.
      FLD 'RGBUK-O_V06'   REC-RZZAUTHORIZED.
      FLD 'RGBUK-O_V07'   REC-PROFITCENTER.
      FLD 'RGBUK-O_V08'   REC-RZZREINBASIS.
      FLD 'BDC_OKCODE'    'DOWN'.
      FLD 'RGBUK-O_V02'   REC-RZZRPTGREIND.
      FLD 'RGBUK-O_V03'   REC-LOB.
      FLD 'RGBUK-O_V04'   REC-RZZTRTYNO2.
      FLD 'RGBUK-O_V05'   REC-ZZCEDCO.
    FLD 'RGBUK-O_V06'   REC-LOB.
      FLD 'RGBUK-O_V07'   REC-ZZREFSYSID.
      FLD 'RGBUK-O_V08'   REC-ZZREIND.
      FLD 'GLU1-SGTXT'    HEADTEXT.
      FLD 'BDC_OKCODE'    'NEW'.

    I have just written a GB01 BDC as well and got the page down section to work with this code:
    It looks like you just need to change 'DOWN' to '=DOWN'.
    ---hope it works for you.
        PERFORM bdc_dynpro      USING 'SAPMGBUK' '0110'.
        PERFORM bdc_field       USING 'BDC_OKCODE'
                                      '=DOWN'.         "second
        PERFORM bdc_field       USING 'RGBUK-O_V01'
                                       it_input-prod_cat.    "Prod Catg
        PERFORM bdc_field       USING 'RGBUK-O_V02'
                                       it_input-cost_ctr.   "Cost Centre
        PERFORM bdc_field       USING 'RGBUK-O_V03'
                                       it_input-prod_des.   "Prod.Orig.Design.Ctr
        PERFORM bdc_field       USING 'RGBUK-O_V04'
        PERFORM bdc_field       USING 'RGBUK-O_V05'
                                       it_input-label.        . "Label
        PERFORM bdc_field       USING 'RGBUK-O_V06'
                                       it_input-exp.          "Expense
        PERFORM bdc_field       USING 'RGBUK-O_V08'
                                       it_input-material.     "Material
        PERFORM bdc_dynpro      USING 'SAPMGBUK' '0110'.
        IF wa_last IS INITIAL .
          PERFORM bdc_field       USING 'BDC_OKCODE'
                                        '=DOWN'.        "third
        ELSE.
          PERFORM bdc_field       USING 'BDC_OKCODE'
                                        '=BOOK'.
        ENDIF.
    ---then you can reuse the same RGBUK-O_V fields

  • Flash 11 not working

    I just installed flash 11.0.1.152 and all youtube videos are not working. Running Firefox 7.0.1, and Windows 7. All are 64bit. Videos just say a missing plugin needs to be installed and tries to get me to download flash 10.  Also I already tried uninstalling, redownloading and installing again.

    Enabled plugins
    Find more information about browser plugins at mozilla.org.
    Find updates for installed plugins at mozilla.com/plugincheck.
    Help for installing plugins is available from plugindoc.mozdev.org.
    Shockwave for Director
    File: np32dsw.dll
    Version: 11.6.1.629
    Adobe Shockwave for Director Netscape plug-in, version 11.6.1.629
    application/x-director
    Shockwave Movie
    dir,dxr,dcr
    Silverlight Plug-In
    File: npctrl.dll
    Version: 4.0.60831.0
    4.0.60831.0
    application/x-silverlight
    npctrl
    scr
    application/x-silverlight-2
    QuickTime Plug-in 7.7
    File: npqtplugin7.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    image/tiff
    TIFF image
    tif,tiff
    image/x-tiff
    TIFF image
    tif,tiff
    image/jp2
    JPEG2000 image
    jp2
    image/jpeg2000
    JPEG2000 image
    jp2
    image/jpeg2000-image
    JPEG2000 image
    jp2
    image/x-jpeg2000-image
    JPEG2000 image
    jp2
    QuickTime Plug-in 7.7
    File: npqtplugin6.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    video/x-m4v
    Video (protected)
    m4v
    image/x-macpaint
    MacPaint image
    pntg,pnt,mac
    image/pict
    PICT image
    pict,pic,pct
    image/x-pict
    PICT image
    pict,pic,pct
    image/png
    PNG image
    png
    image/x-png
    PNG image
    png
    image/x-quicktime
    QuickTime image
    qtif,qti
    image/x-sgi
    SGI image
    sgi,rgb
    image/x-targa
    TGA image
    targa,tga
    QuickTime Plug-in 7.7
    File: npqtplugin5.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    audio/3gpp
    3GPP media
    3gp,3gpp
    video/3gpp2
    3GPP2 media
    3g2,3gp2
    audio/3gpp2
    3GPP2 media
    3g2,3gp2
    video/sd-video
    SD video
    sdv
    application/x-mpeg
    AMC media
    amc
    video/mp4
    MPEG-4 media
    mp4
    audio/mp4
    MPEG-4 media
    mp4
    audio/x-m4a
    AAC audio
    m4a
    audio/x-m4p
    AAC audio (protected)
    m4p
    audio/x-m4b
    AAC audio book
    m4b
    QuickTime Plug-in 7.7
    File: npqtplugin4.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    video/mpeg
    MPEG media
    mpeg,mpg,m1s,m1v,m1a,m75,m15,mp2,mpm,mpv,mpa
    audio/mpeg
    MPEG audio
    mpeg,mpg,m1s,m1a,mp2,mpm,mpa,m2a
    audio/x-mpeg
    MPEG audio
    mpeg,mpg,m1s,m1a,mp2,mpm,mpa,m2a
    video/3gpp
    3GPP media
    3gp,3gpp
    QuickTime Plug-in 7.7
    File: npqtplugin3.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    audio/x-gsm
    GSM audio
    gsm
    audio/AMR
    AMR audio
    AMR
    audio/aac
    AAC audio
    aac,adts
    audio/x-aac
    AAC audio
    aac,adts
    audio/x-caf
    CAF audio
    caf
    audio/ac3
    AC3 audio
    ac3
    audio/x-ac3
    AC3 audio
    ac3
    video/x-mpeg
    MPEG media
    mpeg,mpg,m1s,m1v,m1a,m75,m15,mp2,mpm,mpv,mpa
    QuickTime Plug-in 7.7
    File: npqtplugin2.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    audio/aiff
    AIFF audio
    aiff,aif,aifc,cdda
    audio/x-aiff
    AIFF audio
    aiff,aif,aifc,cdda
    audio/basic
    uLaw/AU audio
    au,snd,ulw
    audio/mid
    MIDI
    mid,midi,smf,kar
    audio/x-midi
    MIDI
    mid,midi,smf,kar
    audio/midi
    MIDI
    mid,midi,smf,kar
    audio/vnd.qcelp
    QUALCOMM PureVoice audio
    qcp
    QuickTime Plug-in 7.7
    File: npqtplugin.dll
    Version: 7.7.0.0
    The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    application/sdp
    SDP stream descriptor
    sdp
    application/x-sdp
    SDP stream descriptor
    sdp
    application/x-rtsp
    RTSP stream descriptor
    rtsp,rts
    video/quicktime
    QuickTime Movie
    mov,qt,mqv
    video/flc
    AutoDesk Animator (FLC)
    flc,fli,cel
    audio/x-wav
    WAVE audio
    wav,bwf
    audio/wav
    WAVE audio
    wav,bwf
    iTunes Application Detector
    File: npitunes.dll
    Version: 1.0.1.1
    iTunes Detector Plug-in
    application/itunes-plugin
    This plug-in detects the presence of iTunes when opening iTunes Store URLs in a web page with Firefox.
    Adobe Acrobat
    File: nppdf32.dll
    Version: 9.4.5.236
    Adobe PDF Plug-In For Firefox and Netscape "9.4.5"
    application/pdf
    Acrobat Portable Document Format
    pdf
    application/vnd.adobe.pdfxml
    Adobe PDF in XML Format
    pdfxml
    application/vnd.adobe.x-mars
    Adobe PDF in XML Format
    mars
    application/vnd.fdf
    Acrobat Forms Data Format
    fdf
    application/vnd.adobe.xfdf
    XML Version of Acrobat Forms Data Format
    xfdf
    application/vnd.adobe.xdp+xml
    Acrobat XML Data Package
    xdp
    application/vnd.adobe.xfd+xml
    Adobe FormFlow99 Data File
    xfd
    DivX Web Player
    File: npdivx32.dll
    Version: 2.1.2.265
    DivX Web Player version 2.1.2.265
    video/divx
    DivX Video Files
    divx,div
    DivX VOD Helper Plug-in
    File: npovshelper.dll
    Version: 1.0.0.403
    DivX VOD Helper Plug-in
    application/x-divxovshelper
    Java Deployment Toolkit 6.0.240.7
    File: npdeployJava1.dll
    Version: 6.0.240.7
    NPRuntime Script Plug-in Library for Java(TM) Deploy
    application/java-deployment-toolkit
    Java(TM) Platform SE 6 U24
    File: npjp2.dll
    Version: 6.0.240.7
    Next Generation Java Plug-in 1.6.0_24 for Mozilla browsers
    application/x-java-applet
    Java Applet
    application/x-java-bean
    JavaBeans
    application/x-java-vm
    application/x-java-applet;version=1.1.1
    application/x-java-bean;version=1.1.1
    application/x-java-applet;version=1.1
    application/x-java-bean;version=1.1
    application/x-java-applet;version=1.2
    application/x-java-bean;version=1.2
    application/x-java-applet;version=1.1.3
    application/x-java-bean;version=1.1.3
    application/x-java-applet;version=1.1.2
    application/x-java-bean;version=1.1.2
    application/x-java-applet;version=1.3
    application/x-java-bean;version=1.3
    application/x-java-applet;version=1.2.2
    application/x-java-bean;version=1.2.2
    application/x-java-applet;version=1.2.1
    application/x-java-bean;version=1.2.1
    application/x-java-applet;version=1.3.1
    application/x-java-bean;version=1.3.1
    application/x-java-applet;version=1.4
    application/x-java-bean;version=1.4
    application/x-java-applet;version=1.4.1
    application/x-java-bean;version=1.4.1
    application/x-java-applet;version=1.4.2
    application/x-java-bean;version=1.4.2
    application/x-java-applet;version=1.5
    application/x-java-bean;version=1.5
    application/x-java-applet;version=1.6
    application/x-java-bean;version=1.6
    application/x-java-applet;jpi-version=1.6.0_24
    application/x-java-bean;jpi-version=1.6.0_24
    Windows Live™ Photo Gallery
    File: NPWLPG.dll
    Version: 15.4.3508.1109
    NPWLPG
    application/x-wlpg3-detect
    Windows Live™ Photo Gallery
    wlpg
    application/x-wlpg-detect
    Windows Live™ Photo Gallery
    wlpg
    Java Deployment Toolkit 6.0.220.4
    File: npdeployJava1.dll
    Version: 6.0.220.4
    NPRuntime Script Plug-in Library for Java(TM) Deploy
    application/java-deployment-toolkit
    Media Go Detector
    File: npmediago.dll
    Version: 1.0.0.1
    1.5
    application/mediago-plugin
    RealPlayer Version Plugin
    File: nprpjplug.dll
    Version: 6.0.12.448
    6.0.12.448
    application/vnd.rn-realplayer-javascript
    RealPlayer Version Plugin
    rpj
    RealPlayer(tm) G2 LiveConnect-Enabled Plug-In (32-bit)
    File: nppl3260.dll
    Version: 6.0.12.450
    RealPlayer(tm) LiveConnect-Enabled Plug-In
    audio/x-pn-realaudio-plugin
    RealPlayer(tm) as Plug-in
    rpm
    DivX Player Netscape Plugin
    File: npDivxPlayerPlugin.dll
    Version: 6.1.0.0
    npdivxplayerplugin
    application/divxplayer-plugin
    npdivxplayerplugin
    scr

  • Cost Centre drop down not working in Shopping Cart

    Hi Experts,
    Cost Centre drop down is not working in Shopping Cart.
    Version: SRM 7.0 SP05
    Message - no input help due to errors when checking the display authoriz.
    I have checked there are some SAP Notes available for this issue, but it is for SRM 5.0 version
    725247 - Search help and BAdI BBP_F4_READ_ON_ENTRY in accnt assgn scr
    839534 - Problems with dropdown list in Acc. ***. overview
    925890 - Cost centre drop down not working
    I have raised OSS Message, Please gothrough the reply from SAP below
    Note
    656633
    815849 top 5
    Customizing Recommendations
    - Note 656633 desribes pre-requisites for ERP RFC-user using F4-help.
    - Assign SRM standard role /SAPSRM/EMPLOYEE during F4-help testing.
    - Check RFC-dialog for F4-help destination using SM59.
    - ERP F4-help destination must be maintained in IMG table bbp_backend_dest.
    - Using PPOMA_BBP dropdown disable BE_F4_HELP authority activity as of note 815849. Multiple values must be maintained in  attribute CNT cost center.
    - Hint: Mix of ERP F4-help and PPOMA_BBP dropdown is not possible.
    Return
    a.SRM system ID, client, remote access, logon data buyer who face the problem incl. sap_all
    b.ERP RFC-dialog access via SRM, RFC-user incl. display or sap_all
    I have followed both the notes, but still problem presists
    Please advice.
    BR,
    Siva

    Hi,
    This issue has been resloved.
    Solution:
    Step:1
    Assign SRM standard or custom role like /SAPSRM/EMPLOYEE to user; Please make sure multiple values been maintained in attribute CNT cost center in PPOMA_BBP for the user
    Step: 2
    Disable BE_F4_HELP authority activity for role /SAPSRM/EMPLOYEE in BBP Component > SRM: General Access Authorizations in EBP
    Step: 3
    Apply SAP Note 668746 - COIN - Switching off OKB9 in EBP scenario in SAP R/3 as per note 815849 Solution 1
    System will check during the processing of account assignment objects in an EBP scenario, the backend system reads the default account assignment (Transaction OKB9) as usual if EBP does not provide any account assignment. This note will Switch off OKB9 in EBP scenario and it will list the CNT values from PPOMA in the shopping cart account assignment F4 help.
    BR,
    Siva

  • Not work tablet UI on Prestigio 5080 PRO tablet

    I read that browser.ui.layout.tablet = "1" can fix this problem. But it not works. I can work only in pnone interface that is not good for my 8'' tablet.

    Would it be possible for you to share the problematic pdf and OS information  with us at [email protected] so that we may investigate?
    Thanks,
    Adobe Reader Team

  • Why self-defined access sequences of free goods can not work?

    Hi gurus,
    I have maintained access sequences of free goods self-defined.but when i creat the SO it does not work!
    when i used the standard access sequences ,it is OK .
    Can anybody tell me why?
    thanks in advance

    Dear Sandy,
    Go to V/N1 transaction select your self defined access sequence then go in to the accesses and fields and check all fields are activated.
    Make sure that these fields are flowing in your sales order.
    I hope this will help you,
    Regards,
    Murali.

  • Adobe bridge raw not working with windows vista in photoshop cc, why?

    adobe bridge raw not working in photoshop cc, is there a fix?

    Your sure your using photoshop cc on windows vista?
    I was under the impression that photoshop cc would not even install on windows vista.
    What version of camera raw do you have?
    In photoshop under Help>About Plugin does it list Camera Raw and if so which version is it?
    (click on the words Camera Raw to see the version)
    Camera raw doesn't work if it's a camera raw file or some other file type such as jpeg or tif?
    What camera are the camera raw files from?
    Officially camera raw 8.3 is the latest version of camera raw that will work on windows vista.

  • Adobe Bridge CS5 in windows 7 not working?

    Adobe Bridge CS5 in windows 7 not working. I was using bridge perfectly for last 2 years. It stops working since 3 days. I tried to install updates. Showing some error to install.
    Tried to install creative cloud..again some error. Error code : 82
    Could you please advice how I can fix my adobe bridge.

    https://www.youtube.com/watch?v=xDYpTOoV81Q&feature=youtu.be
    please check this video I uploaded..this is what happens when I click adobe bridge.. just blinks and go off. bridge not working on task manager

  • ADOBE CLOUD ON MY DESKTOP WILL NOT WORK. IT LOADS UP BUT NOTHING FILLS THE WINDOW

    ADOBE CLOUD ON MY DESKTOP WILL NOT WORK. IT LOADS UP BUT NOTHING FILLS THE WINDOW

    BLANK Cloud Screen http://forums.adobe.com/message/5484303 may help
    -and step by step http://forums.adobe.com/thread/1440508?tstart=0
    -and http://helpx.adobe.com/creative-cloud/kb/blank-white-screen-ccp.html

  • Partner application logoff not working

    We have a partner application registered with sso with custom login screen. The login works fine. We use the following code to logoff the partner application in logoff.jsp
    response.setHeader("Osso-Return-Url", "http://my.oracle.com" );
    response.sendError(470, "Oracle SSO");
    session.invalidate();
    but the logoff is not working properly. It is not invalidating the session and the logout http request is not going from the application server to the sso server.
    Are there any additional configurations for SSO logoff.Any help is appreciated.
    Thanks

    Hi
    The WF should also trigger if i add the Partner function in UI.If i change any Attribute the WF triggers but i dont want to change the attribute when i add the partner function.
    If i have only one event for WF that is Partner Change the WF will not trigger it for the 1st time when i save the UI. But next i come to the same saved doc and add a partner function then the Wf triggers.
    So this means that Partner change is active.
    the issue here is i need to trigger the WF on , the 1st time i save the UI, for which i wil be using Attribute Change and next time when i come back to saved doc the and add only the partner function and no changes are made to attributes the WF should again trigger.
    Thanks
    Tarmeem

Maybe you are looking for

  • Update New Records is taking much time to complete. How to reduce

    Hi, Iam having a Table with 200 Clumns and trying to Update 5 columns and the table has 5lakh Records. It is taking very much time 2hours to complete. Pls let me know why is this taking time how to reduce.... In my ssis Package iam using Oracle Sourc

  • CALMONTH IN BEX report

    Hi experts, i am workng on bw 3.5 i am loading data through flat file in a Cube. i am taking two date fields one is creation date and one posting date. when i am taking the creation date in the report for display its showing only date as 01.11.2011 i

  • Problem with JMS AQ in Oracle 8i

    Hi Everyone I found an exception when I tried to publish the message which shown below. The connection is already established bit it's exception at publisher.publish(topic, obj_message); Could anyone please help me sort it out? The exception is: java

  • Strange behaviour with smart music list in iTunes

    I don't know how is the name of this list in english. In portuguese iTunes calls "Lista Inteligente". So, I eddited a list to show all musics never played up to 100 months ago. If I click on a music in this list, before it plays, the music disappear

  • Photoshop stops responding when creating a 11x8.5 collage

    I've been using Adobe Photoshop Elements 11 for a couple of months to create 11x8.5 photo collage's as part of my digital scrapbook. Yesterday, when I tried to create a new collage the program stopped responding and forced me to close it. It will onl