Controlling access to build in iSight/microphone

I hate to say I told you so, but considering some of the answers I got on my original posting (http://discussions.apple.com/thread.jspa?threadID=426480&tstart=0) I can not but say "I told you so" ...
Fact 1: security update 2006-008
Fact 2: exploit demo
My question is not answered yet: How do I control which applications/processes accesses my iSight/microphone? As far as I can tell, Apple provides no way for that ...
Regards
Jim
AiPB 15'' 1,25 GHz   Mac OS X (10.4.8)  

Thanks for your reply, Leopard Pagan, but my question goes into another direction: What if an application does make use of the build in camera without telling my so as to spy on me, for example?
I know there is a small light that is supposed to warn me that the camera is on. But it might be overlooked or nobody is sitting in front of the computer or maybe it can be turned off while the camera is still on.
So, what I am looking for basically is a way to control which application can make use of the camera/microphone, and I have'nt found one yet. Maybe there is none at the time, but then hopefully someone finds one soon.
Regards
Jim

Similar Messages

  • Controlling Access to Build In Camera & Microphone

    Is there a way to control which application has access to the build in camera and microphone?
    Thanks in advance
    Jim

    Thanks for your reply, Leopard Pagan, but my question goes into another direction: What if an application does make use of the build in camera without telling my so as to spy on me, for example?
    I know there is a small light that is supposed to warn me that the camera is on. But it might be overlooked or nobody is sitting in front of the computer or maybe it can be turned off while the camera is still on.
    So, what I am looking for basically is a way to control which application can make use of the camera/microphone, and I have'nt found one yet. Maybe there is none at the time, but then hopefully someone finds one soon.
    Regards
    Jim

  • ISight Microphone

    I have an iMac Intel Core 2 Duo. And I absolutely love GarageBand. I'm using the iSight Microphone to record vocals, and it seems to sound okay. I was just wondering if there's any tips you could give me to make it sound professional.

    Fan shouldn't be an issue with your iMac. Well mine never comes on anyways.
    Whether using the internal mic or tracking Christina with an old tube 47 through a 1073. IMO it's a very good question, since it applies no matter what you are using.
    My best suggestion is to research, read and experiment.
    Other then the front end and matching the mic to the singer...The room, placement, levels, and effects are a good place to start for building blocks to better vocals.
    The room is generally a huge issue. Using blankets and/or towels, you can give yourself some isolation and dampen the room.
    Compression. EQ, short delay's or a hint of reverb. Double tracking. All things to experiment with and figure out.
    Work with different volume levels on your mic slider in GB and distances from the mic to find the right spot.
    A pop filter can also help.
    Here are a couple of links that may be helpful.
    http://mixguides.com/microphones/tipsandtechniques/vocal-recording-microphones-0706
    http://mixguides.com/microphones/tipsand_techniques/audio_recording_vocalsfebruary
    http://www.mixbuss.com/section.php?section=Tutorials

  • ISight microphone not working on Brand New Leopard Install Solved

    Hi everybody,
    I had this problems during last days, and after solving it I want to share it with everybody thinking it may be helpful.
    I got ten brand new never used iSights and I wanna to use them on a few MacPro Intel 2xCpu QuadCore 2,8 OS X 10.5.4 to 10.5.7 for videoconferencing using Skype and iChat.
    With the video everything was fine but there was any solution to make the built-in iSight microphone works.
    After a week googling and talking around I found by myself that the problems was the camera firmware.
    Mac OS X 10.5.x doesn't update the iSight firmware so the audio mic doesn't work.
    If you connect the camera to an old OS X (I used 10.4.11), open iChat and log in, it will ask you to update the iSight firmware to the latest version.
    After that, if you unplug the camera and put it back to OS X 10.5.x the audio mic magically works.
    Hoping to help somebody else I give my best regards,
    Michele Eustacchi
    Rome, Italy

    If you running 10.5.X the updater is found here, go to your hard drive\System\Library\CoreServices\iSight Updaters\iSight Updater
    For external iSights only.

  • "Sorry, you don't have access to this page" when creating a sub site. I am in the owners group with full control access

    cannot provisioning a SharePoint 2013 site with full control access, I get the page with the "Sorry, you don’t have access to this page”. Any help will be greatly appreciated.

    Hi,
    Which template did you use for the parent site?
    Please check whether the site collection administrator could create a subsite.
    Please grant permissions on the Device Channels list
    http://sitecollection_URL/DeviceChannels/AllItems.aspx -> List -> List Settings -> Permissions for this list -> granted Read rights for the Everyone group, compare the result as
    it.
    Please navigated to the hidden list "TaxonomyHiddenList" on the site collection i.e.
    http://somdnetsp/lists/TaxonomyHiddenList/AllItems.aspx and check permissions on this list. Check whether the list has unique permissions and there were no users added to the list. If yes,
    add "authenticated users" in the list permissions.
    Then, try to create sub site, compare the result.
    If this issue still exists, please check the log file to find whether there are some message about this issue.
    Best Regards,
    Wendy
    Forum Support
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback
    for TechNet Subscriber Support, contact [email protected]
    Wendy Li
    TechNet Community Support

  • WebDynpro accessing custom-build EJB applications

    Hi there,
    I have a query regarding WebDynpro accessing custom-build applications deployed on web-logic server and J2EE servers.Following is the scenario.
    There is central authentication mechanism deployed in J2EE server. GUI users (in EP) have to be authenticated through this application(EJB).
    In EP, this remote call would happen through the WebDynpro. After successful authentication, calls will be sent to another Weblogic server.
    Too many remote calls. How about the scalability & performance factors with WebDynPro?

    HI,
    Webdynpro and EP are almost same except coustomisation coming to picture in EP, why do you want webdynpro to EP to web logic, Just crate your UI in dynpro convert them to Iviews in EP through EP call wenlogic server/J2ee server i hope there will not be any hindarence to scalability or perfomance.
    when it comes to remote calls after all your going to call weblogic through EP but dynpro UI will be as an Iview
    I hope it helps you
    in case if you need further details let me know
    Regards
    RK

  • Custom Google Map Widget Control for Guide Builder

    Hi,
    I would like to build a custom control for Guide Builder.  This custom control will basically wraps around the Google Map control (provided by Google api for Flex/as3).  This custom map control can then be used as part of Guide Builder when building the guides.
    I am not sure how to go about doing this, or if this is at all possible.  I just want to get an idea before I attempt to do this.  Any help is appreciated.
    Thanks in advance,
    Nelson

    I'm still looking for help on this one, anybody?   Thanks.

  • Control Access in Message Monitoring

    Can I control access to payload within PI-Message-Monitoring? The topic has been discussed already:  How to Control Access To Payload
    By using the "S_XMB_MONI-authorization-object" I can protect access to payload for certain messages, regardless of viewing it with Transcation "SXMB_MONI" or with "RuntimeWorkbench";
    For me it is not clear, whether the "S_XMB_MONI-authorization-object" does only affect messages within the Integration-Server, or does it also work for messages in adapter-engine-message-monitoring? I mean, when using "Runtime-Workbench --> Message-Monitoring --> AdapterEngine..."?
    Regards, Josef

    Hi,
    It works only for SXMB_MONI (ABAP stack), user on adapter engine can still see payload.
    One hint I can give you to explore further, authorization on RWB are controlled by Visual Admin, you can explore something there to block user to view payload on RWB.
    I am exploring it and will update you.
    Regards,
    Gourav
    reward points if it helps you

  • Is following message due to 'Java' setting left unchecked? Mac OSX supportsUser Authentication Mechanism (UAM) plug - ins from other manufacturers to control access to servers.To use a UAM, copy the plug - in to: Library/ Filesystems/ AppleShare/ Authenti

    Is following message due to 'Java' setting left unchecked?
    Mac OSX supportsUser Authentication Mechanism (UAM) plug - ins from other manufacturers to control access to servers.To use a UAM, copy the plug - in to: Library/ Filesystems/ AppleShare/ Authenti

    Man that is an ancient message.
    The last time I saw that was using Mac clients connected to a Microsoft (Windows) Server running 'Services for Macintosh' which included the ability to act as an AppleShare compatible file server. Because Microsoft have a different security system for defining accounts which includes the 'domain' as well as username, the standard Mac AFP client did not know how to send that information.
    Therefore Apple made it possible to installed a plugin in the form of a UAM or User Authentication Mechanism which added the ability to send this information to login to the fileserver.
    See http://support.microsoft.com/kb/101747
    However Microsoft have long discontinued 'Services for Macintosh' and now the only way for a Mac to connect to a standard Windows Server is via SMB not AFP. I don't believe this plugin is available to download anymore.

  • Problem in accessing integration builder tool of XI

    Hi
    i am having problem in accessing integration builder tool of XI system , when i enter the user credentials  it is getting hanged
    can any body please help me with this
    thanks and regards
    Pendyala

    Hi,
    check whether your xi server is working fine or is it down. If you are not able to open the integration builder, what is the exact error message you are getting.
    How are you trying to open your IB.
    Are you able to login to SAPGUI for the XI client.
    If so try to provide the tcode sxmb_ifr and check whether you are able to open the IB.
    Reward points
    Regards,
    Nithiyanandam

  • Is there a way to control access by IP Address?

     

    I'd like to follow up on this question using WLS 6.0/6.1.
    What I need to do is block access to a set of directories to public IP
    addresses. My usual approach would be to tweak the webserver
    configuration to deny the requests, but I can't seem to find
    documentation on how to accomplish this.
    So, if approach this with a ConnectionFilter, I can look at the
    ConnectionEvent's getRemoteAddress() method to determine whether the
    requestor is public or trusted, but can I get enough information from
    getProtocol() method to determine which directory they're requesting?
    Thanks,
    Matt Kleiderman
    Alvin wrote:
    Hi,Michael,
    Is there any way to control access to a particular application by ip address?
    For instance, there are multiple applications reside on the same WLS, some can
    be accessed publically, some only can be accessed by users from a certain ip address?
    The example you mentioned only applys to the whole WLS.
    Thanks.
    "Michael Girdley" <[email protected]> wrote:
    Yes:
    http://www.weblogic.com/docs51/classdocs/javadocs/weblogic/security/net/Conn
    ectionFilterImpl.html
    Thanks,
    Michael
    Michael Girdley
    Product Manager, WebLogic Server & Express
    BEA Systems Inc
    Mitchel Lang <[email protected]> wrote in message
    news:[email protected]..
    I was wondering if there is anyway to restrict access to WLS 5.1 by
    IP
    Address?
    I have a NES Server with SSL running communicating with a WLS server
    through
    the NASPI proxy. In order to maintain SSL we do not want anybody going
    directly against the WLS.
    Any Ideas would be helpful.
    Mitchel Lang
    Mgr. Application Architecture
    Time Inc.
    212.522.0748
    [email protected]

  • Controlled Access to device password - How do I disable it?

    Really hoping someone can help,
    I set up the controlled access to device password, however earlier today it rejected the password even though I had entered it correctly. On the last attempt it told me that failure would wipe device of all data! My network provider told me that if I entered it wrong on a final attempt it would wipe and block the phone and the only way to have phone unblocked would be to have it sent away! As a few hours had passed and I was unable to use the phone I took the chance of entering the password again and it worked.
    However, when I went to disable the password it would not allow me to! 
    Is there any way to disable it as I mostly use my phone for business I can not afford to have it blocked and/or wiped!

    Doesn't sound like it.  Your employer has put that in place.  You can change the password, but you cannot remove it.
    Please click the Thumbs Up icon if this comment has helped you!
    If your issue is resolved, please click the solution button on the resolution!
    Every BlackBerry should have BlackBerry Protect, get it now! | Follow me on Twitter | Bring Back BBM Music!

  • Using Oracle 11gR1 OID to control access to 11gR2 RAC database ?

    I have a two 11gR2 RAC Node database that I would like to implement Oracle 11gR1 OID to manage all access to the RAC database.
    Should I install and configure Oracle 11gR1 OID into the same RAC database to control access to the RAC database? Is this the appropriate approach?
    Please share your ideas... I couldn't make it to Openword to ask this type of question.

    Hi,
    I think there is some confusion here. OID doesnt protect your database. All OID is doing is taking the authentication of the user and authorization (privileges) of the user to OID and out of the database. This way you can centralize the management of all user accounts in one place and not worry about it in the database. This is helpful only if you have many databases. If you have a very small number of databases and small number of user accounts, then OID is not really buying you anything. The best practices is published in the oracle docs. Just that you have to read a lot to figure it all out. Here are some info from our installation.
    1. weblogic and oid application is installed on a application server
    2. Repository database is a independant database (not shared with other apps) in a shared RAC cluster.
    3. Replication (OID application replication) setup between a primary oid server and a secondary oid server in the DR site
    4. Load balancer configured to point to the primary server and if primary server is not available, point the connection to secondary server
    5. DIP configured to pull all users and groups from active directory
    6. Password filter installed on all DC's to capture passwords and ship it to oid.
    7. Users creation, modification,deletion, expiry, etc., is all controlled on active directory.
    8. Database registered with OID for user authentication and authorization
    For protecting you data, you will need to use additional security methods/products like :
    1. Database vault (to prevent privileged users from operating on the data)
    2. Database auditing
    3. Fine-grained access control
    4. table level policies
    5. Fine-grained auditing (column level)
    6. Audit vault (to consolidate all audit records to a central place for auditors to classify and research each audit event)
    7. operational/process to enforce security.
    Good luck :-).
    Regards,
    Shaji.

  • Best authentication method for controlling access to wlan

    What is the best method for controlling access to a wlan with a 5508 wlan controller
    The requirments are
    -Needs to support all types of clients (Mac, PC, smartphones, tablets)
    -Clients need to be able to connect easily and without errors or installing certs or wireless profiles etc..
    -Secure
    This doesn't seem like alot to ask but I keep running into problems.
    What are people using?
    Thanks

    I can't find an errors in any area of the event viewer.
    Here is these files cat'd together.
    GeoTrustGlobalCA
    GeoTrustDVSSLCA
    corp-vs-ca2.########-export
    -----BEGIN CERTIFICATE-----
    MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg
    R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9
    9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq
    fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv
    iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU
    1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+
    bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW
    MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA
    ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l
    uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn
    Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS
    tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF
    PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un
    hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV
    5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMw==
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIID+jCCAuKgAwIBAgIDAjbSMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMTAwMjI2MjEzMjMxWhcNMjAwMjI1MjEzMjMxWjBhMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UECxMURG9tYWluIFZh
    bGlkYXRlZCBTU0wxGzAZBgNVBAMTEkdlb1RydXN0IERWIFNTTCBDQTCCASIwDQYJ
    KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKa7jnrNpJxiV9RRMEJ7ixqy0ogGrTs8
    KRMMMbxp+Z9alNoGuqwkBJ7O1KrESGAA+DSuoZOv3gR+zfhcIlINVlPrqZTP+3RE
    60OUpJd6QFc1tqRi2tVI+Hrx7JC1Xzn+Y3JwyBKF0KUuhhNAbOtsTdJU/V8+Jh9m
    cajAuIWe9fV1j9qRTonjynh0MF8VCpmnyoM6djVI0NyLGiJOhaRO+kltK3C+jgwh
    w2LMpNGtFmuae8tk/426QsMmqhV4aJzs9mvIDFcN5TgH02pXA50gDkvEe4GwKhz1
    SupKmEn+Als9AxSQKH6a9HjQMYRX5Uw4ekIR4vUoUQNLIBW7Ihq28BUCAwEAAaOB
    2TCB1jAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIz02ZMKR7wAoErOS3VuoLaw
    sn78MB8GA1UdIwQYMBaAFMB6mGiNifurBWQMEX2qfWW4ysxOMBIGA1UdEwEB/wQI
    MAYBAf8CAQAwOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybC5nZW90cnVzdC5j
    b20vY3Jscy9ndGdsb2JhbC5jcmwwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzAB
    hhhodHRwOi8vb2NzcC5nZW90cnVzdC5jb20wDQYJKoZIhvcNAQEFBQADggEBADOR
    NxHbQPnejLICiHevYyHBrbAN+qB4VqOC/btJXxRtyNxflNoRZnwekcW22G1PqvK/
    ISh+UqKSeAhhaSH+LeyCGIT0043FiruKzF3mo7bMbq1vsw5h7onOEzRPSVX1ObuZ
    lvD16lo8nBa9AlPwKg5BbuvvnvdwNs2AKnbIh+PrI7OWLOYdlF8cpOLNJDErBjgy
    YWE5XIlMSB1CyWee0r9Y9/k3MbBn3Y0mNhp4GgkZPJMHcCrhfCn13mZXCxJeFu1e
    vTezMGnGkqX2Gdgd+DYSuUuVlZzQzmwwpxb79k1ktl8qFJymyFWOIPllByTMOAVM
    IIi0tWeUz12OYjf+xLQ=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIFaDCCBFCgAwIBAgIDBo5UMA0GCSqGSIb3DQEBBQUAMGExCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRh
    dGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENBMB4XDTEzMDQyNTA4
    NTEzNVoXDTE1MDQxNTA0NDcyOVowgdQxKTAnBgNVBAUTIHNZbkoyTG0tb2dGZnZC
    aFlodWRqWVZIMndEek43MGdOMRMwEQYDVQQLEwpHVDU3NDYxMTU1MTEwLwYDVQQL
    EyhTZWUgd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMvY3BzIChjKTEzMTcwNQYD
    VQQLEy5Eb21haW4gQ29udHJvbCBWYWxpZGF0ZWQgLSBRdWlja1NTTChSKSBQcmVt
    aXVtMSYwJAYDVQQDEx1jb3JwLXZzLWNhMi5wb3BtdWx0aW1lZGlhLmNvbTCCASIw
    DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM4jgpKBeo8rtM/zJIEyho3HppeU
    tZeK+wmLfPeBTJxr2UmQFOmcniQblgsHREAGyJR0KT5yrYzxx6wpZaqCUcZlxl1Z
    lUz5mfxHnL5Oc14sUnqwaJuxprXV5Rnclci6W6BMFjI4QoxXjQwSa+3A1enf+ZsO
    sXUojQbQx62MX8rINuQ+srgdDielK/mJqTAMt11x6+NqIpwlGAgOxKd7vjG6aKRf
    a2efvS/hK4Pi0ieWPGn1GXz/AlYpHQv0cppUr8huL/+2+9cEvd1sp8XN/ASN3YTm
    WWo//fVpbXIlzp8mU4Q7t8+7LglxFQabhl4eMBarMi8SnNuh2zYKQxJRPvsCAwEA
    AaOCAbMwggGvMB8GA1UdIwQYMBaAFIz02ZMKR7wAoErOS3VuoLawsn78MA4GA1Ud
    DwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwKAYDVR0R
    BCEwH4IdY29ycC12cy1jYTIucG9wbXVsdGltZWRpYS5jb20wQQYDVR0fBDowODA2
    oDSgMoYwaHR0cDovL2d0c3NsZHYtY3JsLmdlb3RydXN0LmNvbS9jcmxzL2d0c3Ns
    ZHYuY3JsMB0GA1UdDgQWBBSODVVgPunABo61x13N20tEP66egDAMBgNVHRMBAf8E
    AjAAMHUGCCsGAQUFBwEBBGkwZzAsBggrBgEFBQcwAYYgaHR0cDovL2d0c3NsZHYt
    b2NzcC5nZW90cnVzdC5jb20wNwYIKwYBBQUHMAKGK2h0dHA6Ly9ndHNzbGR2LWFp
    YS5nZW90cnVzdC5jb20vZ3Rzc2xkdi5jcnQwTAYDVR0gBEUwQzBBBgpghkgBhvhF
    AQc2MDMwMQYIKwYBBQUHAgEWJWh0dHA6Ly93d3cuZ2VvdHJ1c3QuY29tL3Jlc291
    cmNlcy9jcHMwDQYJKoZIhvcNAQEFBQADggEBAC2Kadfzc6X/3dI//J5SGR9fnCa7
    6NVl8SV5aAYAvmOdkZBiurIYa1eHYYaDUGmOO8awTOXTfc4QzX75QwBUmcZeZKdj
    ZMPiJlm7Bsz/3Q1eolxHCqkAiDZIEohoT0o8Spw6+Eq8KcPnhf+K5+rIzJnWBZ9P
    tmpS4SEtrGHIfj3+638eqTydxuOCZ0Be9EanVK0ERav25fTRgRoZ+yEDiFP/MjQd
    rAgW7SyLOjm4I6bTmzjugmXf2Axm2kFuoyyZdrvdrJ+GBku5F6DOufGdGu13j80S
    lp148qh7gCREWrCqn3pH14qPKeHwC47jAQ3+ikRDfB090h9HGRi/8+w7Tx4=
    -----END CERTIFICATE-----

  • What to do if you use a segmented control in interface builder and it doesn't work ?

    What to do if you use a segmented control in interface builder and it doesn't work ?

    The first thing to do would probably be to update your profile and/or signature so people will know what OS, language, and development system you are using, then perhaps include some additional information such as what "it doesn't work" means, and possibly a few other things like some error logs, what you have done so far, maybe a code snippet or two, etc.

Maybe you are looking for