Does my bashrc need to source /etc/bashrc

In Fedora/Centos, my local .bashrc file seems to need to have a line to source global definitions:
if [ -f /etc/bashrc ]; then
        . /etc/bashrc
fi
On Mountain Lion and Mavericks, it appears that /etc/bashrc is always sourced whether I have a local .bashrc or not. Verified with echo statements inside various files to show me what is being executed.
I am trying to get confirm if this is true (for both interactive shells and child processes spawned by parent process) and, if so, does it do any harm to keep the sourcing of /etc/bashrc. I'd prefer to not have to have different .bashrc files for Linux and OSX.
Thanks in advance for any advice

I've got my answer for an interactive earlier in this thread (or at least enough to begin figuring out what I need to do regarding interactive shells and my local .bashrc). I pretty well understand the order that things are sourced in interactive, but was unprepared for the difference of OSX /etc/profile sourcing /etc/bashrc (which doesn't seem to happen on Linux).
As for non-interactive, I tried to do as much research before querying on this forum. I know that they just do .bashrc. Hence why I see advice (and I have long followed such) to have .bash_profile source .bashrc to have all "my stuff" in one file that both interactive and non-interactive source. However, I can not figure out whether a non-interactive / subshell inherits and/or sources /etc/bashrc (which on OSX I now know comes through /etc/profile). My sense is that it does on OSX based on the other reply I got. Which would mean that whether I need to source /etc/bashrc is the same for interactive and non-interactive since, on OSX, I get the sense that any shell, interactive or non-interactive, is going to first call /etc/profile. As you can tell, I am having to make this final statement based on "best understanding".
If I am misunderstanding non-interactive, can you please point me to a good link(s) that pertain to what OSX does (now that I know there is a very real difference between Linux and OSX and info for one might/will not work for the other).
Thanks for your reply

Similar Messages

  • Does UMI-7774 need power source?

    This may seem like an obvious question, but I need to ask it anyway:
    I am using the PCI-7334 and UMI-7774 to control my E-DC drive and step motor. Does the UMI needs any power? For now, the UMI is plugged to the PCI-7334 and the step motor and power source are plugged to the E-DC drive which is plugged to the UMI.
    Please help me!!
    Thanks

    A regulated power supply will hold its rated voltage.  An unregulated one will not.  Stepper drives typically don't get along with regulated power supplies because at start up there is a larger current draw.  The power supply may think this is a short-circuit and either foldback or trip.  Regulated supplies are also more expensive.

  • Why does Merge Join needs its sources to be sorted

    Hi,
    Can anyone explain why Merge Join needs its sources to be sorted ?
    I saw an explanation in another thread that this is the way to not load all the data to memory, but isnt the data that is about to be merged already all in memory becuase the SORT component waits for all the rows to arrive ?
    Why are there no options for Full cache, Partial Cache and No Cache like in the Lookup component ?

    MERGE Join is one of Join algorithms in SQL Server needs sorted inputs and efficient for large set of records.
    You may refer the below(Craig
    Freedman) link to understand the MERGE JOIN algorithm in details.
    http://blogs.msdn.com/b/craigfr/archive/2006/08/03/merge-join.aspx
    http://technet.microsoft.com/en-us/library/ms137653.aspx
    Nope
    This is SSIS forum and I guess poster is asking about MERGE JOIN transformation in SSIS
    Please Mark This As Answer if it helps to solve the issue Visakh ---------------------------- http://visakhm.blogspot.com/ https://www.facebook.com/VmBlogs

  • Cannot source /etc/profile from within the PKGBUILD anymore

    Hi,
    Short story: the command
    source /etc/profile
    within the build() section of my PKGBUILD now returns a build() error. It used to work before, is there a reason for this? Should it be executed in another section than build()? (Note source /etc/profile works properly in console, within the build directory)
    Long story:
    I need to use $JAVA_HOME in my PKGBUILD (to patch a lua source file with the current JDK path, which can be detected with $JAVA_HOME. Patching is done with a sed command). However, if java-environment is installed for the first time (as a makedepends) along with my package, then I need to source /etc/profile first to set the $JAVA_HOME environment variable, before being able to use it within my build() section. Otherwise it is not set yet and building fails.
    Many thanks for your help.
    Last edited by zebulon (2012-12-28 14:57:23)

    Hi,
    Many thanks for the advice. I was unclear though: I maintain the aacskeys package in AUR, not the lua package. However, the file I am patching in aacskeys is named premake.lua, used for the project file generator premake.sourceforge.net.
    I'll try your first suggestion, since this is the only one which may work without touching the system. Another alternative would be to directly source the /etc/profile.d/jdk.sh file. EDIT: nope, because there could be openjdk6.sh instead. I really need to be able to source the correct file. The maintainer of opencascade uses:
    if [ -z $JAVA_HOME ]; then
    [ -e /etc/profile.d/openjdk6.sh ] && source /etc/profile.d/openjdk6.sh
    [ -e /etc/profile.d/jdk.sh ] && source /etc/profile.d/jdk.sh
    fi
    which is efficacious but less generic.
    Besides, is it normal that we get this error code, since the Arch documentation only recommends to set LANG in /etc/locale.conf? SHould I report it as a bug or request a design change for /etc/profile.d/locale.sh there (as suggested in your (b) entry)? I am asking this because my PKGBUILD is not the only one to use this trick, and this problem breaks them all.
    Thanks.
    Last edited by zebulon (2012-12-30 06:14:58)

  • Bash 4.2.008-1 does not source /etc/bash.bashrc.local

    I don't know if this was intended change or not but it seems that /etc/bash.bashrc.local is no longer sourced by default.  All the global alias that I had set there are no longer being set.  Was /etc/bash.bashrc.local depreciated (if so where is the new place for such aliases) or is this a bug?

    Allan wrote:/etc/bash.bashrc does not source /etc/bash.bashrc.local by default.  You can either put your alias in /etc/bash.bashrc directly or do the sourcing yourself.
    Hmmm, you are right http://projects.archlinux.org/svntogit/ … 657ba94213
    Last edited by karol (2011-05-01 00:03:02)

  • Just updated itunes now menu bar has dissapeared no black and white box at top left and ctr b does not bring anything up. i need file view etc please help driving me crazy

    just updated itunes now menu bar has dissapeared no black and white box at top left and ctr b does not bring anything up. i need file view etc please help driving me crazy

    Is the iTunes window in FullScreen mode?
    If so, press esc key.

  • Aterm now opens with source /etc/profile

    I was in aterm when I did source /etc/profile, but now whenever I open aterm I get the results of source /etc/profile. Xterm doesn't do this, only aterm. Why is it doing this and how can I fix it?

    just add "source /etc/profile" (without the quotes) to .bashrc (thats located in ur home directory)

  • Output Column does not have a matching source column in the schema

    Hi Everyone,
                           Can you please help me in this. Already an ETL is loading the data from AS400 TO SQL server. I need to add a new
    column. In the Source (OLEDB source) am pulling the data from AS400 using ADO.NET connection manager.
    New column is added in AS400. To bring the new column from AS400, I added column name in the query in OLEDB source. Test connection is good. In the Source editor, when I click on preview it gives me the values of the new column and if I click on build
    new query also it gives me values for the new column.
    After mapping the columns and refreshing the data in OLEDB destination, I don't see any errors or warnings.
    But when I start executing the package it throws me the below error.
     Error: The output column  (4659) does not have a matching source column in the schema.
    [SSIS.Pipeline] Error: "component  (2861)" failed validation and returned validation status "VS_NEEDSNEWMETADATA".
    I need suggestion on this.
    Thanks
    Veeresh

    Hi Veeresh,
    As per my understanding, this error happens when the OLE DB Source component cannot find the corresponding source column in the database table. Possible reason is the the column name in the external database table has changed or
    the column has been removed.
    To verify this issue, please go to the Advanced Editor for OLE DB Source Input and Output Properties tab to see the External columns and Output columns. To fix it, please refresh the data or recreate the Source.
    Thanks,
    Katherine Xiong
    Katherine Xiong
    TechNet Community Support

  • Time series does not exist, Error in Source System

    Hi friends,
    I am loading the data from APO system and i am getting the below error after scheduling the info Packs.. can you analyze and let me know your suggestions
    Error Message : Time series does not exist,
                             Error in Source System
    I have pasted the ststus message below
    Diagnosis
    An error occurred in the source system.
    System Response
    Caller 09 contains an error message.
    Further analysis:
    The error occurred in Extractor .
    Refer to the error message.
    Procedure
    How you remove the error depends on the error message.
    Note
    If the source system is a Client Workstation, then it is possible that the file that you wanted to load was being edited at the time of the data request. Make sure that the file is in the specified directory, that it is not being processed at the moment, and restart the request.
    Thanks,
    YJ

    Hi,
    You better search for the notes with the message ""Time series does not exist". You will get nearly 18 notes. Go through each note and see the relevence to your problem and do the needful as it is mentioned in the note .
    Few notes are:
    528028,542946,367951,391403,362386.
    With rgds,
    Anil Kumar Sharma .P

  • Firefox freezes when using "Save link as" or doing anything that needs to browse local file directory?

    System: Windows XP, Firefox 17.0.1.
    Firefox freezes when doing anything that needs to browse local directory such as saving file, uploading, etc....For example, can't save any image using "save link as". When attaching a file in email, whenever the browsing to other location on the hard drive will freeze firfox, which turns to "not responding"....

    We're sorry to hear that your Firefox seems to be crashing. Please perform the following steps to give us a crash report ID that helps us find out more about the cause of the crash.
    #Enter about:crashes in the Firefox location bar (that's where you enter your website names) and press Enter. You should now see a list of submitted crash reports.
    #Copy the most recent 5 report IDs that you see in the crash report window and paste them into your forum response.
    Thanks in advance for your help!
    More information and further troubleshooting steps can be found in the [[Firefox crashes]] article.

  • I want to reinstall CS4 as it has been doing some strange things regarding printing, etc. However, when I did this before, it created a major problem and I ended up buying a new computer because no one could figure out why it kept hanging up during the in

    I want to reinstall CS4 as it has been doing some strange things regarding printing, etc. However, when I did this before, it created a major problem and I ended up buying a new computer because no one could figure out why it kept hanging up during the installation. Hours on the phone, no results. I'm scared to do it on this computer. Should I try? Not even the Adobe support could get it resolved. I believe it was somehow reading a product number that could not be deleted or something, and nothing worked.
    Message was edited by: Doug Doug

    Hello, as an addition:
    In your case I would download a really new trial version of your program(s) in question and change it/them into a "real" version later, BUT because you said, that you "re-installed" already, so it will become a little bit more complicated. It would be necessary that you have to use "Adobe Creative Suite Cleaner Tool" as Keith wrote.
    Here an advice for that (The order varies depending on your individual needs. Please read all my proposals first, so you can better choose the first step:)
    1. Maybe you have to activate/deactivate, so please have a look there:
    http://helpx.adobe.com/x-productkb/policy-pricing/activation-deactivation-products.html
    2. Sometimes, we know in the meantime, the "opm.db file" is the culprit. In this case you should delete it.
    3. Be careful with (de)installing aso. by (de)installing by your own resources. As much as I regret it and as strange as it may seem I fear it's a challenge for Adobe's Creative Cloud Cleaner Tool. Sometimes - for whatever reasons - CC doesn't "want" to work. In this case you should CC completely delete and reinstall by help of Adobe Creative Cloud Cleaner Tool. (A try to uninstall by own resources is not enough!)
    I quote: Adobe Creative Suite Cleaner Tool helps resolve installation problems for Adobe Creative Cloud and Adobe Creative Suite (CS3-CS6) applications. The tool removes installation records for prerelease installations of Creative Cloud or Creative Suite applications. It does not affect existing installations of previous versions of Creative Cloud or Creative Suite applications.
    Please use: http://helpx.adobe.com/creative-suite/kb/cs5-cleaner-tool-installation-problems.html   and follow the prescribed sequence of operations
    4. If necessary and for further questions click through http://helpx.adobe.com/contact.html and if "open" please use the chat, I for may part - as it seems unlike you - had the best experiences. I quote from Adobe's employee Preran: The chat button is activated as soon as there is an agent available to help.
    Hans-Günter

  • Every time i go to write something it stops the circle circles and then it writes everything, does my mac need service or something

    every time i go to write something it stops, the circle goes round and then it starts writing, does my mac need servicing or what is going on

    What model of iMac do you have?
    How much memory is installed?
    What version of Mac OS X are you running?
    When did the issue start occurring?
    Did you recently install any software updates or new software that coincide with the onset of the issue?
    Your post contains very little information to work with, but here's what I would do if it were my system.
    First check the status of your hard driveby launching the Disk Utility application that is located in the Applications/Utilities folder. Click on the Verify Disk option and observe whether it reports any major errors. You can also boot from the Install DVD that came with your system by holding down the 'c' key and then pulling down the Utilities menu bar item to select Disk Utility. Either way will work. If the disk checks out OK then click on the Repair Permissions option.
    To get a more detailed picture of the SMART status (hard drive error logging) you can use an application like SMART Utility which can be downloaded here. Obviously downloading a new application could be a problem if you're system is 'hanging' whenever you try to write something, so this may not be an option.
    http://www.volitans-software.com/smart_utility.php
    If you find any significant errors, make sure you back up your data if you haven't already done so. If there aren't any significant errors then go into the System Preferences and click on Users & Groups. Try creating a new user account and then log into it to see if you have the same issues. Creating a new user for test purposes will help confirm whether you are dealing with some sort of software issue.
    If a new user account resolves the issue then open the Activity Monitor application located in the Applications/Utiliteis folders and click on the CPU button. In the lower left corner you should see a summary listing the % User, % System, % Idle. What are these percentages? If the CPU idle percentage is near zero then you have a process running that is consuming your SPU time. To try and find it pull down the menu to select 'All Processes', then click on the %CPU column to sort by the percent that each process is consuming your CPU.   The numbers constantly change, but do your best to see if there are one or two processes consuming the majority of the CPU time and post the names. Then do the same test in the new user account. I suspect you may have some process from a previously installed utility, virus checker, etc. that is keeping your system busy. I've included a screenshot from my system below. It doesn't have much going on, and as you can see in the lower left corner the CPU is basically idle most of the time. If I were to launch a CPU intensive app the numbers would change dramatically.

  • Does my computer need to be connected to the internet for tune-up to work?

    does my computer need to be connected to the internet for tune-up to work?
    This question was solved.
    View Solution.

    Hi,
    Yes because it updates your machine:
      Updates, which help to protect against future system performance issues by updating the PC with the then-current Windows, firmware BIOS, and security software updates
    Source: http://www.hp.com/sbso/services/pc-tune-up-pro-datasheet.pdf
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

  • Does my iMac need antivirus protection

    Does my iMac need antivirus software or is it built into the OS X operating system?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some red flags that indicate danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent or Usenet.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web popups.
    Software that is plainly illegal or does something illegal
    Software that you would otherwise have to pay for is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you install an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Unexpected events
    You open what looks like a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file or message.
    An application does something inexplicable, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Why does my iphone need wifi to update

    Why does my iphone need wifi to download and install new software update!?
    While other iphones can do that with their cellular internet

    This is your phone's operating temp range:
    Operating ambient temperature: 32° to 95° F (0° to 35° C)
    You exceed that range & you'll get that warning...you do nothing, & your phone will shut down to prevent damage. Easy to exceed that range while your phone is navigating & exposed to sun or another heat source.
    It is what it is.

Maybe you are looking for

  • Is there a way to create a slideshow viewable with a DVD player?

    Hi there, is there amongst the Apple programs (or else) something that would allow me to show my digital photos on TV with a DVD player? Manually commanded with the remote, or with auto time lapse, fading or transitions?

  • Error in WBS Element Hierarchy load after ECC 6.0 Upgrade

    Hi All, After ECC 6.0 Upgrade in R/3, we are doing test load in a Test server. While doing, we have encountered an issue with 0WBS_ELEMENT Hierarchy load. The message in the monitor is like below. "Node ID 00014240 has not been included in the hierar

  • Get associated TextStyleRange of XmlElement

    Hello All, I am trying to retrieve the textStyleRange associated with an XMLElement in InCopy CS3. I am recursing the XML Tree to associate the characterStyle with the Xml Node Name. The key here is that I must recurse the XmlElements. I tried someth

  • Setup system monitoring wrong text

    Dear all, After implementing Basis patch SAPKB70011 togather with SAPKITL420, Solution Manager system displays wrong text for Alerts in SOLUTION_MANAGER transaction -> Solution Monitoring-> System monitoring -> Operation setup in Setup system monitor

  • XYGraph Cursor legend bug instantly crashes LabView 2012

    Hi! I am just facing a very annoying bug. Please find my example VI attached, I would like to know wheather you can confirm the bug? Run the VI if you wish to see some curve (actually the bug appears even if you do not put any data on the graph, if y