Controlling access to build in iSight/microphone
I hate to say I told you so, but considering some of the answers I got on my original posting (http://discussions.apple.com/thread.jspa?threadID=426480&tstart=0) I can not but say "I told you so" ...
Fact 1: security update 2006-008
Fact 2: exploit demo
My question is not answered yet: How do I control which applications/processes accesses my iSight/microphone? As far as I can tell, Apple provides no way for that ...
Regards
Jim
AiPB 15'' 1,25 GHz Mac OS X (10.4.8)
Thanks for your reply, Leopard Pagan, but my question goes into another direction: What if an application does make use of the build in camera without telling my so as to spy on me, for example?
I know there is a small light that is supposed to warn me that the camera is on. But it might be overlooked or nobody is sitting in front of the computer or maybe it can be turned off while the camera is still on.
So, what I am looking for basically is a way to control which application can make use of the camera/microphone, and I have'nt found one yet. Maybe there is none at the time, but then hopefully someone finds one soon.
Regards
Jim
Similar Messages
-
Controlling Access to Build In Camera & Microphone
Is there a way to control which application has access to the build in camera and microphone?
Thanks in advance
JimThanks for your reply, Leopard Pagan, but my question goes into another direction: What if an application does make use of the build in camera without telling my so as to spy on me, for example?
I know there is a small light that is supposed to warn me that the camera is on. But it might be overlooked or nobody is sitting in front of the computer or maybe it can be turned off while the camera is still on.
So, what I am looking for basically is a way to control which application can make use of the camera/microphone, and I have'nt found one yet. Maybe there is none at the time, but then hopefully someone finds one soon.
Regards
Jim -
I have an iMac Intel Core 2 Duo. And I absolutely love GarageBand. I'm using the iSight Microphone to record vocals, and it seems to sound okay. I was just wondering if there's any tips you could give me to make it sound professional.
Fan shouldn't be an issue with your iMac. Well mine never comes on anyways.
Whether using the internal mic or tracking Christina with an old tube 47 through a 1073. IMO it's a very good question, since it applies no matter what you are using.
My best suggestion is to research, read and experiment.
Other then the front end and matching the mic to the singer...The room, placement, levels, and effects are a good place to start for building blocks to better vocals.
The room is generally a huge issue. Using blankets and/or towels, you can give yourself some isolation and dampen the room.
Compression. EQ, short delay's or a hint of reverb. Double tracking. All things to experiment with and figure out.
Work with different volume levels on your mic slider in GB and distances from the mic to find the right spot.
A pop filter can also help.
Here are a couple of links that may be helpful.
http://mixguides.com/microphones/tipsandtechniques/vocal-recording-microphones-0706
http://mixguides.com/microphones/tipsand_techniques/audio_recording_vocalsfebruary
http://www.mixbuss.com/section.php?section=Tutorials -
ISight microphone not working on Brand New Leopard Install Solved
Hi everybody,
I had this problems during last days, and after solving it I want to share it with everybody thinking it may be helpful.
I got ten brand new never used iSights and I wanna to use them on a few MacPro Intel 2xCpu QuadCore 2,8 OS X 10.5.4 to 10.5.7 for videoconferencing using Skype and iChat.
With the video everything was fine but there was any solution to make the built-in iSight microphone works.
After a week googling and talking around I found by myself that the problems was the camera firmware.
Mac OS X 10.5.x doesn't update the iSight firmware so the audio mic doesn't work.
If you connect the camera to an old OS X (I used 10.4.11), open iChat and log in, it will ask you to update the iSight firmware to the latest version.
After that, if you unplug the camera and put it back to OS X 10.5.x the audio mic magically works.
Hoping to help somebody else I give my best regards,
Michele Eustacchi
Rome, ItalyIf you running 10.5.X the updater is found here, go to your hard drive\System\Library\CoreServices\iSight Updaters\iSight Updater
For external iSights only. -
cannot provisioning a SharePoint 2013 site with full control access, I get the page with the "Sorry, you don’t have access to this page”. Any help will be greatly appreciated.
Hi,
Which template did you use for the parent site?
Please check whether the site collection administrator could create a subsite.
Please grant permissions on the Device Channels list
http://sitecollection_URL/DeviceChannels/AllItems.aspx -> List -> List Settings -> Permissions for this list -> granted Read rights for the Everyone group, compare the result as
it.
Please navigated to the hidden list "TaxonomyHiddenList" on the site collection i.e.
http://somdnetsp/lists/TaxonomyHiddenList/AllItems.aspx and check permissions on this list. Check whether the list has unique permissions and there were no users added to the list. If yes,
add "authenticated users" in the list permissions.
Then, try to create sub site, compare the result.
If this issue still exists, please check the log file to find whether there are some message about this issue.
Best Regards,
Wendy
Forum Support
Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback
for TechNet Subscriber Support, contact [email protected]
Wendy Li
TechNet Community Support -
WebDynpro accessing custom-build EJB applications
Hi there,
I have a query regarding WebDynpro accessing custom-build applications deployed on web-logic server and J2EE servers.Following is the scenario.
There is central authentication mechanism deployed in J2EE server. GUI users (in EP) have to be authenticated through this application(EJB).
In EP, this remote call would happen through the WebDynpro. After successful authentication, calls will be sent to another Weblogic server.
Too many remote calls. How about the scalability & performance factors with WebDynPro?HI,
Webdynpro and EP are almost same except coustomisation coming to picture in EP, why do you want webdynpro to EP to web logic, Just crate your UI in dynpro convert them to Iviews in EP through EP call wenlogic server/J2ee server i hope there will not be any hindarence to scalability or perfomance.
when it comes to remote calls after all your going to call weblogic through EP but dynpro UI will be as an Iview
I hope it helps you
in case if you need further details let me know
Regards
RK -
Custom Google Map Widget Control for Guide Builder
Hi,
I would like to build a custom control for Guide Builder. This custom control will basically wraps around the Google Map control (provided by Google api for Flex/as3). This custom map control can then be used as part of Guide Builder when building the guides.
I am not sure how to go about doing this, or if this is at all possible. I just want to get an idea before I attempt to do this. Any help is appreciated.
Thanks in advance,
NelsonI'm still looking for help on this one, anybody? Thanks.
-
Control Access in Message Monitoring
Can I control access to payload within PI-Message-Monitoring? The topic has been discussed already: How to Control Access To Payload
By using the "S_XMB_MONI-authorization-object" I can protect access to payload for certain messages, regardless of viewing it with Transcation "SXMB_MONI" or with "RuntimeWorkbench";
For me it is not clear, whether the "S_XMB_MONI-authorization-object" does only affect messages within the Integration-Server, or does it also work for messages in adapter-engine-message-monitoring? I mean, when using "Runtime-Workbench --> Message-Monitoring --> AdapterEngine..."?
Regards, JosefHi,
It works only for SXMB_MONI (ABAP stack), user on adapter engine can still see payload.
One hint I can give you to explore further, authorization on RWB are controlled by Visual Admin, you can explore something there to block user to view payload on RWB.
I am exploring it and will update you.
Regards,
Gourav
reward points if it helps you -
Is following message due to 'Java' setting left unchecked?
Mac OSX supportsUser Authentication Mechanism (UAM) plug - ins from other manufacturers to control access to servers.To use a UAM, copy the plug - in to: Library/ Filesystems/ AppleShare/ AuthentiMan that is an ancient message.
The last time I saw that was using Mac clients connected to a Microsoft (Windows) Server running 'Services for Macintosh' which included the ability to act as an AppleShare compatible file server. Because Microsoft have a different security system for defining accounts which includes the 'domain' as well as username, the standard Mac AFP client did not know how to send that information.
Therefore Apple made it possible to installed a plugin in the form of a UAM or User Authentication Mechanism which added the ability to send this information to login to the fileserver.
See http://support.microsoft.com/kb/101747
However Microsoft have long discontinued 'Services for Macintosh' and now the only way for a Mac to connect to a standard Windows Server is via SMB not AFP. I don't believe this plugin is available to download anymore. -
Problem in accessing integration builder tool of XI
Hi
i am having problem in accessing integration builder tool of XI system , when i enter the user credentials it is getting hanged
can any body please help me with this
thanks and regards
PendyalaHi,
check whether your xi server is working fine or is it down. If you are not able to open the integration builder, what is the exact error message you are getting.
How are you trying to open your IB.
Are you able to login to SAPGUI for the XI client.
If so try to provide the tcode sxmb_ifr and check whether you are able to open the IB.
Reward points
Regards,
Nithiyanandam -
Is there a way to control access by IP Address?
I'd like to follow up on this question using WLS 6.0/6.1.
What I need to do is block access to a set of directories to public IP
addresses. My usual approach would be to tweak the webserver
configuration to deny the requests, but I can't seem to find
documentation on how to accomplish this.
So, if approach this with a ConnectionFilter, I can look at the
ConnectionEvent's getRemoteAddress() method to determine whether the
requestor is public or trusted, but can I get enough information from
getProtocol() method to determine which directory they're requesting?
Thanks,
Matt Kleiderman
Alvin wrote:
Hi,Michael,
Is there any way to control access to a particular application by ip address?
For instance, there are multiple applications reside on the same WLS, some can
be accessed publically, some only can be accessed by users from a certain ip address?
The example you mentioned only applys to the whole WLS.
Thanks.
"Michael Girdley" <[email protected]> wrote:
Yes:
http://www.weblogic.com/docs51/classdocs/javadocs/weblogic/security/net/Conn
ectionFilterImpl.html
Thanks,
Michael
Michael Girdley
Product Manager, WebLogic Server & Express
BEA Systems Inc
Mitchel Lang <[email protected]> wrote in message
news:[email protected]..
I was wondering if there is anyway to restrict access to WLS 5.1 by
IP
Address?
I have a NES Server with SSL running communicating with a WLS server
through
the NASPI proxy. In order to maintain SSL we do not want anybody going
directly against the WLS.
Any Ideas would be helpful.
Mitchel Lang
Mgr. Application Architecture
Time Inc.
212.522.0748
[email protected] -
Controlled Access to device password - How do I disable it?
Really hoping someone can help,
I set up the controlled access to device password, however earlier today it rejected the password even though I had entered it correctly. On the last attempt it told me that failure would wipe device of all data! My network provider told me that if I entered it wrong on a final attempt it would wipe and block the phone and the only way to have phone unblocked would be to have it sent away! As a few hours had passed and I was unable to use the phone I took the chance of entering the password again and it worked.
However, when I went to disable the password it would not allow me to!
Is there any way to disable it as I mostly use my phone for business I can not afford to have it blocked and/or wiped!Doesn't sound like it. Your employer has put that in place. You can change the password, but you cannot remove it.
Please click the Thumbs Up icon if this comment has helped you!
If your issue is resolved, please click the solution button on the resolution!
Every BlackBerry should have BlackBerry Protect, get it now! | Follow me on Twitter | Bring Back BBM Music! -
Using Oracle 11gR1 OID to control access to 11gR2 RAC database ?
I have a two 11gR2 RAC Node database that I would like to implement Oracle 11gR1 OID to manage all access to the RAC database.
Should I install and configure Oracle 11gR1 OID into the same RAC database to control access to the RAC database? Is this the appropriate approach?
Please share your ideas... I couldn't make it to Openword to ask this type of question.Hi,
I think there is some confusion here. OID doesnt protect your database. All OID is doing is taking the authentication of the user and authorization (privileges) of the user to OID and out of the database. This way you can centralize the management of all user accounts in one place and not worry about it in the database. This is helpful only if you have many databases. If you have a very small number of databases and small number of user accounts, then OID is not really buying you anything. The best practices is published in the oracle docs. Just that you have to read a lot to figure it all out. Here are some info from our installation.
1. weblogic and oid application is installed on a application server
2. Repository database is a independant database (not shared with other apps) in a shared RAC cluster.
3. Replication (OID application replication) setup between a primary oid server and a secondary oid server in the DR site
4. Load balancer configured to point to the primary server and if primary server is not available, point the connection to secondary server
5. DIP configured to pull all users and groups from active directory
6. Password filter installed on all DC's to capture passwords and ship it to oid.
7. Users creation, modification,deletion, expiry, etc., is all controlled on active directory.
8. Database registered with OID for user authentication and authorization
For protecting you data, you will need to use additional security methods/products like :
1. Database vault (to prevent privileged users from operating on the data)
2. Database auditing
3. Fine-grained access control
4. table level policies
5. Fine-grained auditing (column level)
6. Audit vault (to consolidate all audit records to a central place for auditors to classify and research each audit event)
7. operational/process to enforce security.
Good luck :-).
Regards,
Shaji. -
Best authentication method for controlling access to wlan
What is the best method for controlling access to a wlan with a 5508 wlan controller
The requirments are
-Needs to support all types of clients (Mac, PC, smartphones, tablets)
-Clients need to be able to connect easily and without errors or installing certs or wireless profiles etc..
-Secure
This doesn't seem like alot to ask but I keep running into problems.
What are people using?
ThanksI can't find an errors in any area of the event viewer.
Here is these files cat'd together.
GeoTrustGlobalCA
GeoTrustDVSSLCA
corp-vs-ca2.########-export
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIID+jCCAuKgAwIBAgIDAjbSMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
YWwgQ0EwHhcNMTAwMjI2MjEzMjMxWhcNMjAwMjI1MjEzMjMxWjBhMQswCQYDVQQG
EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UECxMURG9tYWluIFZh
bGlkYXRlZCBTU0wxGzAZBgNVBAMTEkdlb1RydXN0IERWIFNTTCBDQTCCASIwDQYJ
KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKa7jnrNpJxiV9RRMEJ7ixqy0ogGrTs8
KRMMMbxp+Z9alNoGuqwkBJ7O1KrESGAA+DSuoZOv3gR+zfhcIlINVlPrqZTP+3RE
60OUpJd6QFc1tqRi2tVI+Hrx7JC1Xzn+Y3JwyBKF0KUuhhNAbOtsTdJU/V8+Jh9m
cajAuIWe9fV1j9qRTonjynh0MF8VCpmnyoM6djVI0NyLGiJOhaRO+kltK3C+jgwh
w2LMpNGtFmuae8tk/426QsMmqhV4aJzs9mvIDFcN5TgH02pXA50gDkvEe4GwKhz1
SupKmEn+Als9AxSQKH6a9HjQMYRX5Uw4ekIR4vUoUQNLIBW7Ihq28BUCAwEAAaOB
2TCB1jAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIz02ZMKR7wAoErOS3VuoLaw
sn78MB8GA1UdIwQYMBaAFMB6mGiNifurBWQMEX2qfWW4ysxOMBIGA1UdEwEB/wQI
MAYBAf8CAQAwOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybC5nZW90cnVzdC5j
b20vY3Jscy9ndGdsb2JhbC5jcmwwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzAB
hhhodHRwOi8vb2NzcC5nZW90cnVzdC5jb20wDQYJKoZIhvcNAQEFBQADggEBADOR
NxHbQPnejLICiHevYyHBrbAN+qB4VqOC/btJXxRtyNxflNoRZnwekcW22G1PqvK/
ISh+UqKSeAhhaSH+LeyCGIT0043FiruKzF3mo7bMbq1vsw5h7onOEzRPSVX1ObuZ
lvD16lo8nBa9AlPwKg5BbuvvnvdwNs2AKnbIh+PrI7OWLOYdlF8cpOLNJDErBjgy
YWE5XIlMSB1CyWee0r9Y9/k3MbBn3Y0mNhp4GgkZPJMHcCrhfCn13mZXCxJeFu1e
vTezMGnGkqX2Gdgd+DYSuUuVlZzQzmwwpxb79k1ktl8qFJymyFWOIPllByTMOAVM
IIi0tWeUz12OYjf+xLQ=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE----- -
What to do if you use a segmented control in interface builder and it doesn't work ?
What to do if you use a segmented control in interface builder and it doesn't work ?
The first thing to do would probably be to update your profile and/or signature so people will know what OS, language, and development system you are using, then perhaps include some additional information such as what "it doesn't work" means, and possibly a few other things like some error logs, what you have done so far, maybe a code snippet or two, etc.
Maybe you are looking for
-
I have tried clearing my cache but this hasnt made any difference. I haven't made any changes to my settings. The posts simply dont appear on my timeline or in my activity log. A few of my friends had the same problem and have had to downgrade to an
-
Snow Leopard and GSM Modems (Vodafone)
I'm not sure if this is the proper place to post this, but I'd like to share my experience with GSM (GPRS/3G) modems and Mac OS X. The main reason for doing this is the fact that I wasn't able to find any related information for my issues on the web
-
How to acheive the purchase order items in Crystal report
Hi In crystal Report am using purchase order layout ,how to remove the unwanted space(i'm using only one item like cement alone so lot of space in page 1 )below screen shot show the clear view how to remove this using formula.if suppose am usin
-
HTTP reciever adapter URL parameters
Hello all, I have a question regarding passing parameters as querystring in the url of reiever HTTP adapter. This is an RFC> XI> HTTP scenario and we're posting to an external URL. Here are the details URL: xxxx.yyyyy.com Service Number: 80 Path: /ap
-
I was trying to convert a PDF to word but I cannot sign in to my account
I am not able to convert PDF file at this time. It's asking me to sign in but when I sign in, its saying invalid email address of password.