FBI and Histogrammes

Hi,
Database configuration:
SQL> select * from v$version;
BANNER
Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bi
PL/SQL Release 10.2.0.4.0 - Production
CORE    10.2.0.4.0      Production
TNS for Solaris: Version 10.2.0.4.0 - Production
NLSRTL Version 10.2.0.4.0 - ProductionI have bad performance in a production database with the following query:
SELECT X.NUBIX,X.NUFDP,X.COMAR,X.COINT,X.NUCPT,X.CDCOF,NVL(S.RGCOD,R.RGCOD),NVL(S.RGCID,R.RGCID),TO_DATE('16112009','DDMMYYYY'),
X.COINI,X.CTFLU,X.NUPRO,X.NCCOF,X.CTCOF,X.MHCOF,X.MGCOF,X.MHPND,X.MGPND,X.TXCLO
FROM VCOAT3 X,TYPSCR S,RGCCAL R
WHERE X.COMAR IN ('ICE') AND S.CTCOF=X.CTCOF AND S.COLAN='A' AND R.COMAR(+)=X.COMAR AND R.COINT(+)=X.COINT AND NVL(R.NUCPT(+),'#*#')=NVL(X.NUCPT,'#*#') VCOAT3 is a view defined by this script below:
SELECT /*+ OPT_PARAM('optimizer_index_cost_adj' 100) OPT_PARAM('optimizer_index_caching' 0) */
L.NUBIX,L.NUFDP,
L.COMAR,
DECODE(X.NCCOF,5,L.COINT,6,L.COINT,7,L.COINT,8,L.COINI,9,L.COINI,10,L.COINI,11,NULL   ,12,D.COINA,13,D.COINV,14,L.COINT),
DECODE(X.NCCOF,5,L.NUCPT,6,L.NUCPT,7,L.NUCPT,8,L.NUCPI,9,L.NUCPI,10,L.NUCPI,11,NULL   ,12,NULL   ,13,NULL   ,14,L.NUCPT),
DECODE(X.NCCOF,5,L.COINI,6,L.COINI,7,L.COINI,8,NULL   ,9,NULL   ,10,NULL   ,11,NULL   ,12,NULL   ,13,NULL   ,14,L.COINI),
DECODE(X.NCCOF,5 ,'D',
               6 ,'D',
               7 ,'D',
               8 ,DECODE(I.CTINT,'I','S','T'),
               9 ,DECODE(I.CTINT,'I','S','T'),
               10,DECODE(I.CTINT,'I','S','T'),
               11,'N',
               12,'A',
               13,'O',
               14,'L'),
L.DANEG,L.CSENS,L.QTCCP,L.MTULP,L.CSOPT,L.CNACT,L.CMECH,L.CAECH,L.MTSNA,L.NUCON,
X.NUPRO,X.NCCOF,X.CTCOF,X.CDCOF,
X.MHCOF,
X.MGCOF,
X.MHPND,
X.MHPND*(1+X.TTCOF/100),
X.TXCLO
FROM
LIGPOR L,
HISCRD X,
IHSDEP D,
INTERV I
WHERE
X.NUBIX=L.NUBIX    AND
X.NUFDP=L.NUFDP    AND
SIGN(X.MHPND) IN (-1,1) AND
D.NUBIX=L.NUBIX    AND
D.NUFDP=L.NUFDP    AND
I.COINT=L.COINT;here is the execution plan:
| Id  | Operation                    | Name   | Rows  | Bytes |TempSpc| Cost (%CPU)| Time     | Pstart| Pstop
|
|   0 | SELECT STATEMENT             |        |    49M|  9979M|       |   418K  (6)| 00:26:15 |       |
|
|*  1 |  HASH JOIN                   |        |    49M|  9979M|       |   418K  (6)| 00:26:15 |       |
|
|*  2 |   TABLE ACCESS FULL          | TYPSCR |    31 |   682 |       |     3   (0)| 00:00:01 |       |
|
|*  3 |   HASH JOIN RIGHT OUTER      |        |    34M|  6350M|       |   417K  (6)| 00:26:11 |       |
|
|   4 |    TABLE ACCESS FULL         | RGCCAL |  1826 | 60258 |       |     5   (0)| 00:00:01 |       |
|
|   5 |    VIEW                      | VCOAT3 |    34M|  5253M|       |   416K  (6)| 00:26:09 |       |
|
|*  6 |     HASH JOIN                |        |    34M|  3890M|    56M|   416K  (6)| 00:26:09 |       |
|
|*  7 |      HASH JOIN               |        |   678K|    49M|       |   153K  (4)| 00:09:37 |       |
|
|   8 |       TABLE ACCESS FULL      | INTERV |  1254 | 12540 |       |    13   (0)| 00:00:01 |       |
|
|*  9 |       HASH JOIN              |        |   678K|    42M|    36M|   153K  (4)| 00:09:37 |       |
|
|  10 |        PARTITION RANGE SINGLE|        |   689K|    28M|       | 10554   (3)| 00:00:40 |    16 |    16
|
|* 11 |         TABLE ACCESS FULL    | LIGPOR |   689K|    28M|       | 10554   (3)| 00:00:40 |    16 |    16
|
|  12 |        TABLE ACCESS FULL     | IHSDEP |    15M|   325M|       |   125K  (4)| 00:07:53 |       |
|
|* 13 |      TABLE ACCESS FULL       | HISCRD |    54M|  2150M|       |   174K  (8)| 00:10:58 |       |
|
Predicate Information (identified by operation id):
   1 - access("S"."CTCOF"="X"."CTCOF")
   2 - filter("S"."COLAN"='A')
   3 - access("R"."COMAR"(+)="X"."COMAR" AND "R"."COINT"(+)="X"."COINT" AND
              NVL("R"."NUCPT"(+),'#*#')=NVL("X"."NUCPT",'#*#'))
   6 - access("X"."NUBIX"="L"."NUBIX" AND "X"."NUFDP"="L"."NUFDP")
   7 - access("I"."COINT"="L"."COINT")
   9 - access("D"."NUBIX"="L"."NUBIX" AND "D"."NUFDP"="L"."NUFDP")
  11 - filter("L"."COMAR"='ICE')
  13 - filter(SIGN("X"."MHPND")=(-1) OR SIGN("X"."MHPND")=1)
Note
   - 'PLAN_TABLE' is old version
   - dynamic sampling used for this statementThe problem is the FTS performed on HISCRD table.
The HISCRD table contains 100M of rows and 99.88% of the table have MHPN=0.
Thats's why I have used the following filter predicate:
AND
SIGN(X.MHPND) IN (-1,1)I have created an FBI for this column :
CREATE INDEX HISCRD2 ON HISCRD (SIGN("MHPND")); Statistics exists for this column and a histogramme is calculated:
SQL> select INDEX_NAME,INDEX_TYPE,BLEVEL,CLUSTERING_FACTOR,STATUS,NUM_ROWS,LAST_ANALYZED
  2  from user_indexes
  3  where TABLE_NAME='HISCRD';
INDEX_NAME                     INDEX_TYPE                      BLEVEL CLUSTERING_FACTOR STATUS     NUM_ROWS LAST_ANALYZED
HISCRD2                        FUNCTION-BASED NORMAL                2           1032922 VALID     115850590 15/11/2009 00:30:1
2
HISCRD1                        NORMAL                               3          43339640 VALID     108514554 15/11/2009 00:30:1
4
SQL> select density,NUM_DISTINCT,num_nulls, num_buckets, histogram
  2  from user_tab_columns
  3  where table_name = 'HISCRD' and column_name in ('MHPND');
   DENSITY NUM_DISTINCT  NUM_NULLS NUM_BUCKETS HISTOGRAM
4.5427E-09            5          0           5 FREQUENCY
SQL> select num_rows, sample_size, blocks from user_tables where table_name = 'HISCRD';
  NUM_ROWS SAMPLE_SIZE     BLOCKS
109981839     5987368     732097How does the CBO estimate that there's going to be 54M rows returned in HISCRD table after it has applied the filter predicate SIGN(X.MHPND) IN (-1,1):
SQL> select count(1) from hiscrd where SIGN(MHPND) IN (1);
  COUNT(1)
    127451
SQL> select * from table(dbms_xplan.display_cursor);
PLAN_TABLE_OUTPUT
SQL_ID  80whqnuycnc5x, child number 0
select count(:"SYS_B_0") from hiscrd where SIGN(MHPND) IN (:"SYS_B_1")
Plan hash value: 3957584767
| Id  | Operation         | Name    | Rows  | Bytes | Cost (%CPU)| Time     |
|   0 | SELECT STATEMENT  |         |       |       | 10743 (100)|          |
|   1 |  SORT AGGREGATE   |         |     1 |     3 |            |          |
|*  2 |   INDEX RANGE SCAN| HISCRD2 |    54M|   157M| 10743   (3)| 00:00:41 |
Predicate Information (identified by operation id):
   2 - access("HISCRD"."SYS_NC00017$"=:SYS_B_1)
19 rows selected.
SQL> select count(1) from hiscrd where SIGN(MHPND) IN (0);
  COUNT(1)
110380609
SQL> select * from table(dbms_xplan.display_cursor);
PLAN_TABLE_OUTPUT
SQL_ID  80whqnuycnc5x, child number 0
select count(:"SYS_B_0") from hiscrd where SIGN(MHPND) IN (:"SYS_B_1")
Plan hash value: 3957584767
| Id  | Operation         | Name    | Rows  | Bytes | Cost (%CPU)| Time     |
|   0 | SELECT STATEMENT  |         |       |       | 10743 (100)|          |
|   1 |  SORT AGGREGATE   |         |     1 |     3 |            |          |
|*  2 |   INDEX RANGE SCAN| HISCRD2 |    54M|   157M| 10743   (3)| 00:00:41 |
Predicate Information (identified by operation id):
   2 - access("HISCRD"."SYS_NC00017$"=:SYS_B_1)Why the CBO doesn't consider histogram in the MHPND column?

Timur Akhmadeev wrote:
Another oddity is why CBO decided to not merge the view's subquery - even though it is a costed tranformation in 10g, usually CBO prefers to merge subqueries.The join is an outer join, and the view being joined is a join view. This combination is one of the restrictions listed as blocking view merging. (It is a case where a push_pred() hint could be used to force the optimizer into using "join predicate pushdown").
Regards
Jonathan Lewis
http://jonathanlewis.wordpress.com
http://www.jlcomp.demon.co.uk
To post code, statspack/AWR report, execution plans or trace files, start and end the section with the tag {noformat}{noformat} (lowercase, curly brackets, no spaces) so that the text appears in fixed format.
"Science is more than a body of knowledge; it is a way of thinking"
Carl Sagan                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   

Similar Messages

  • I got a fake message from the FBI and now I supposedly have the Reveton virus and Citadel malware. Can a Mac even get these? If so, how do I get rid of them?

    Can a Mac get the Reveton virus and Citadel malware? If so, how do I get rid of them?

    See:
    FBI ransomware “virus” rampant

  • I received some bogus page on my yahoo.finance page that accused me of visiting child pornographer sites, claiming to be the FBI and Interpol, and that they were going to lock down my computer unless I paid them $300. I could not switch from that window

    anyone else have their computer momentarily freezed by some peddlers accusing you of pronoting pornagraphy and asking for $300 to release your files?

    Some of those scam pages can be dismissed very easily. Press command-W to close the tab or window. A huge box will pop up. Press the return key and both the box and the page will close. If that doesn't happen, continue.
    From the Safari menu bar, select
    Safari ▹ Preferences... ▹ Security
    and uncheck the box marked Enable JavaScript. Leave the preferences dialog open.
    Close the malicious window or tab.
    Re-enable JavaScript and close the preferences dialog.
    If the Preferences menu item is grayed out, quit Safari. Force quit if necessary. Relaunch it by holding down the shift key and clicking its icon in the Dock. From the menu bar, select
    Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    to get rid of any cookies or other data left by the server. Open your Downloads folder and delete anything you don't recognize.

  • In Practice 30years and my entire network ,profiles,insurance claims reputation have been compromized by a ex. FBI has been notified

    About a month ago I noticed changes on my computer such as passwords especially in Google changed every day. All my messages and contacts from about 13 sites stopped and I found some of them being exported in my yahoo account. I am a psychologist and do
    electronic insurance on line and patient files. Also I am a author and most of my book is on my website and other places. All of my insurance $20,000 claims have been exported through I think a android phone which I found in my system. Most , destructive is
    numerous emails I found in Microsoft word and my mail.com accounts. Some emails were to try to buy a car using my name. Some were inappropriate to other professionals and patients signed by me. I have not received an insurance check in four months. I am about
    to lose my practice and please help me solve this ASAP. I have four Google accounts that I am locked out of some of them are 10 years old. All of my new patients come from a network called psychology today that connects with my five Google profiles and
    I get at least two patient sent to me a day. I have not received a new patient from them in a month. I looked at my profile on P.T. and it said my phone number is no longer online nor on any Google sites. I have reported all this to FBI and Cyber crime
    unit and Blue Cross. I am quite sure it is a ex. who lives in Miami. My latest site made on Google is the name of my book. I made it this month. I have attempted to get it back  but another name email and phone number have been changed
    on all my sites. Another phone number and name of taken ownership.  All messages and copyrighted material as well as insurance claims radio station which were folders  that he exported my entire network. Sharing permissions I cannot change
    that allow him to send my information to his phone and computer. If someone can not help me my reputation ,online presence, financial means to support my son and all new patients have made it no longer possible to make a living. My emails are hacked so call
    me I have money to take care of this problem. Please help me. Kristy Summers LCSW. {removed} my phone. My one account left because I make no money off it is on Face Book under Kristen Summers where you will see my email but notice the phone number is wrong.
    It took 30 years to build all that I have and to have someone commit so many crimes and destroy my life is not fair. If you can not help maybe a suggestion of who can. Thank you.

    Sorry to read this, but you have landed in wrong place. This forum is aimed at IT professionals.
    From your contribution I guess that you are not very careful
    and allow bad people to compromise you computer and data.
    Ask a specialized company for help. As doctor cannot heal remotely, at least real doctors, we cannot heal your computer and your feelings.
    Do not include telephone number, bank account, personal data and other sensitive data
    everywhere in internet if you are not sure enough.... Think ten times when you respond to unknown people in e-mail communication as well as do not respond to known people when there is request for personal or bank data or at least something "strange".
    Adapt security standards. Start here to have some insight into problem
    http://en.wikipedia.org/wiki/Computer_security
    Regards
    Milos

  • Two subjects one is be aware of (855)999-9115 calling you and how can i secure my mac or my Netgear Box

    Two subjects here:
    1: I got a call from this phone number telling me this is so and so from Netgear , (855)999-9115 .The reason i am calling you is we detected that someone had hacked your Netgear Router and he told me to type in the Google search bar logmein123.com , So i did so and then he told me to type 5 or 6 numbers so he can go inn to my computer to repare it (All this over my cell phone) Not sure how he got it or he was the original to hack my system and get all my infor from my Two Iphones,Macbook Pro ,Ipad Air and my Imac .
    So he start doing not sure what put me on hold each time and then he pops up a page higlighting a name by Midnight Gracie a few times that she or he had hacked your system and he will remove it for free.I trusted him since Netgear is a respectful company , Aftey 32 minutes he tells me i spoke to my supervisor and you pay one time lifetime fee of $399.00 charged to your credit card ,I said no way cant ,Then put me on hold again , came back said ok my supervisor said $299.00 to make story short he siad ok you are over 65 years old special price $49.00 and i will fix your system.Then i said no so he started loging out of my system but in the 32 minutes or more what did he do to my computer ?
    The guy sunded as a Philipino . Two guys after this scam since when he called me first i was driving and asked me to be called back , But when i got home i called him and the other guy asnwerd the phone and said ok the Technician that called you is here and talk to him,It it was Netgear how would you knopw who called.
    This namber is a big scam , Many people got screwed paid money and wrote reviews on Yelp and other places that thye where great fixed there computer and so helpfull.
    I filed a complaint at the Internet FBI and other place that i called forgot there names they take complaints for internet fraud .
    BE AWARE NOT TO GET THROUGH THIS , REPORT THEM SO THEY GO TO JAIL ASAP.
    2:
    How can i protect my systems at home?
    I went changed my users name and passwrod on my router and all my computers. But if he got in to my system who can i be sure that he will not get inn to it again since he had all my info and ny IP#.
    Please tey to help .
    Best regards
    Sam

    1. I'd backup all of my personal data (only) and perform a clean install of OSX if I experienced your problem as no one here or elsewhere could guarantee your machine is free from compromise after that scenario. You should also change your Apple ID password if you haven't done this already.
    2. Ultimately trust no one other than yourself even though this is difficult if not impossible in the real world. There are measures you can take however which will lessen your chances of being compromised. Here's a link to one of the most concise write-ups I've ever read on basic computer security essentials by ASC contributer Linc Davis for the average person (scroll to Linc's reply at the bottom of this linked page):
    https://discussions.apple.com/message/21065409#21065409

  • List Guibb with FBI

    Hi everyone, I am a newbie of FBI and trying now to create a FPM Application with FBI.
    Now I create my own Business object zd_sale_quote, which has a root node ROOT. and I want to directly display ROOT in a List Guibb wihout the initial screen. The Guibb is FPM_LISU_UIBB and the feeder class ist /BOFU/CL_FBI_GUIBB_LIST. I test the App and get the error:
    500 SAP Internal Server Error
    ERROR: Dynamic type conflict during the assignment of references. (termination: RABAX_STATE).
    could someone help me with this?
    thanks in advance.

    Hello Yinxiao,
    I understand your requirement to have a kind of a list of all master records. To get this list you need a query to collect these records. Although you might not need an entry screen I would suggest to use a search uibb to execute the query. In order to execute the search immediately without any input you can leave the option Enable Alternate Display for Result List in your feeder class empty. You can also set the search uibb to be collapsed to have the full screen for the result list.
    Regads,
    Kai

  • Outgoing email alleged to be "SPAM": ominous and serious privacy implications

    I attempted to send a link to a friend, and Verizon's software prevented me from sending the message, with a message saying "....the mail server responded 5.7.1...determined to be spam."
    By using the old standby workaround--guile, trickery and deceit--I was able to convey the info to my intended recipient.
    But as I think about it, it's clear that Verizon must be scanning *every* email a customer sends!  What other method could Verizon be using to determine that a messge is objectionable, other than scanning the message?  And if Verizon is doing that, what is it doing with that information?  Is it reporting the info to someone, like CIA or NSA?
    Now I'm wondering:  does Verizon maintain a list of "bad" addresses?
    The fact that Verizon blocked this URL is additional support for something I noticed long ago:  the folks at Verizon are not too bright. First of all, the target URL contains innocuous, unoffensive information  But even more significant, how could I be attempting to spam someone if I'm sending my message to ONE individual--and at that, an individual who;s a friend, and to whom I've sent hundreds of messages?
    (Nor was it easy to find this forum!  But I can see why Verizon would want to keep customers from complaining, when other customers could see that info.)
    These Verizon folks are so dumb (this is not the first problem I've had with Verizon) I'm gonna start looking around for  an ISP that's not a "legacy" company, as Verizon is.  

    Turtles:
    Yes, I'm aware that gazillions of emails are sent daily.  It's also clear that Verizon has software (not humans) that *does* analyze messages you send--I've had the experience a few times now of trying to send innocuous, clearly non-spam messages that Verizon refused to send.
    I got around it by finding the part of the message (as I recall, always a URL) that Verizon did not like and altering it in one way or another.
    And the dangers are *real*, not imaginary, as you believe.  Clearly, humans have to be involved, and both humans and machines must cope with an extremely large numbero f emails, and "suspects".  We know for a certainty that the . phone companies have coopoerated with CIA and NSA, even without those agencies having to present warrants for their snooping.  And it's equally clear that it's done by computer.  No doubt NSA takes "suspicious" or otherwise flagged messages and looks at, for example, the sender and recipient, and adds those names to a database. 
    I would guess that the messages sit in the database until there is a sufficient level of activity to warrant raising an alarm, e.g. a sufficient number of messages to some individual on a watch list.  Then---if I were managing a NSA or CIA effort that examined emails--I would have the software kick out a list of "names to be followed up on", with priorities attached.
    I personally am not worried, because anyone reading my messages will go bonkers with boredom in a short period of time.  But clearly the potential exists.  And if you doubt me, then clearly you are not aware of recent US history, e.g. various efforts the Army, FBI, and other agencies mounted decades ago (even opening snailmail!)in which innocent individuals had their privacy seriously invaded, illegally.  I would be happy to give you more details if you wish--details that are a matter of public record. 

  • GNU Screen and framebuffer (uvesafb)

    Hello,
    I am using arch linux without X. I have installed a framebuffer (uvesafb) and
    am using GNU screen to multitask. I have seen that the screen cannot use a
    frame buffer as when a try to use fbi I get this output:
    ioctl VT_GETSTATE: Invalid argument (not a linux console?)
    But when I use mplayer it seems to work fine. The vidoes play fine (although
    there is some flickering and the size is a bit small) and w3m seems to display
    the pictures properly inline too. Which means that screen can use a framebuffer.
    So my question is how do I use fbi and fbgrab (or fbshot) in screen. Is there a way
    for screen to communicate directly with the frame buffer?

    Moyamo wrote:Is there any other terminal multiplexer that can support a framebuffer besides screen?
    Tmux. I've been using it successfully for quite a while.

  • The FBI warning - Where can one find that?

    Greetings board,
    Does anyone know where you can find a clean FBI warning to import into the final cut timeline?
    Thanks,
    Lin

    I would contact the FBI about it
    as if you check http://www.fbi.gov/ipr/
    you would see Unauthorized use of the FBI seal, name, and initials are subject to prosecution under Federal Criminal law, including Sections 701, 709, and 712 of Title 18 of the United States Code.
    it is perfectly fine for anyone, without FBI approval, to use the following generic language on material protected under U.S. copyright law: "Warning: The unauthorized reproduction or distribution of this copyrighted work is illegal. Criminal copyright infringement, including infringement without monetary gain, is investigated by the FBI and is punishable by up to 5 years in federal prison and a fine of $250,000."
    DAVE

  • Image quality with fbi/fbida

    Hey everyone, I'm trying doing all my work from the console right now (links2 awesome!) and after a lot of work (with still more to go since I don't have the permissions set up yet for fbi to use as a normal user) I finally got fbi to work... but the image quality isn't as good as I was expecting. I'm not trying to bash fbi here since it's running from the framebuffer but I'm wondering if there's anyway to make the quality better (I'm talking misplaced color and other large displacements). I've looked at man fbi and tried some of the settings there but I just want to know if there's anything I can do to improve quality... if not I can live with it no problem, but it would be nice to know.

    Fixed it... apparently the framebuffer uses something from the Xorg.conf (I don't know if that would be the case if I didn't have Xorg installed... actually it isn't my desktop doesn't have Xorg and it worked fine) when you have X installed and I just had to change the driver from radeon to vesa!

  • What is the safest way to learn whether or not my MacBookPro has fallen victim to DNSChanger?

    Hundreds of Thousands Losing the Internet in July?
    I didn't know if anyone else had heard about this, but the following article was recently published in the Denver Post.  Since the Denver Post usually checks this type of stuff out pretty thoroughly, I was wondering if anyone at Apple had heard anything about this event.  I don't use Microsoft or Internet Explorer, so I am hoping that my computer probably won't be affected.  But I was wondering if this was the sort of thing which other Apple customers ought to be learning about.
    FROM THE DENVER POST
    http://www.denverpost.com/breakingnews/ci_20444978/hundreds-thousands-may-lose-i nternet-july
    Hundreds of thousands may lose Internet in July
    LOLITA C. BALDOR Associated Press News Fuze
    Posted:
    DenverPost.com
    WASHINGTON—For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections this summer.
    Unknown to most of them, their problem began when international hackers ran an online advertising scam to take control of infected computers around the world. In a highly unusual response, the FBI set up a safety net months ago using government computers to prevent Internet disruptions for those infected users. But that system is to be shut down.
    The FBI is encouraging users to visit a website run by its security partner, http://www.dcwg.org, that will inform them whether they're infected and explain how to fix the problem. After July 9, infected users won't be able to connect to the Internet.
    Most victims don't even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.
    Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.
    "We started to realize that we might have a little bit of a problem on our hands because ... if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service," said Tom Grasso, an FBI supervisory special agent. "The average user would open up Internet Explorer and get 'page not found' and think the Internet is broken."
    On the night of the arrests, the agency brought in Paul Vixie, chairman and founder of Internet Systems Consortium, to install two Internet servers to take the place of the truckload of impounded rogue servers that infected computers were using. Federal officials planned to keep their servers online until March, giving everyone opportunity to clean their computers. But it wasn't enough time. A federal judge in New York extended the deadline until July.
    Now, said Grasso, "the full court press is on to get people to address this problem." And it's up to computer users to check their PCs.
    This is what happened:
    Hackers infected a network of probably more than 570,000 computers worldwide. They took advantage of vulnerabilities in the Microsoft Windows operating system to install malicious software on the victim computers. This turned off antivirus updates and changed the way the computers reconcile website addresses behind the scenes on the Internet's domain name system.
    The DNS system is a network of servers that translates a web address—such as www.ap.org— into the numerical addresses that computers use. Victim computers were reprogrammed to use rogue DNS servers owned by the attackers. This allowed the attackers to redirect computers to fraudulent versions of any website.
    The hackers earned profits from advertisements that appeared on websites that victims were tricked into visiting. The scam netted the hackers at least $14 million, according to the FBI. It also made thousands of computers reliant on the rogue servers for their Internet browsing.
    When the FBI and others arrested six Estonians last November, the agency replaced the rogue servers with Vixie's clean ones. Installing and running the two substitute servers for eight months is costing the federal government about $87,000.
    The number of victims is hard to pinpoint, but the FBI believes that on the day of the arrests, at least 568,000 unique Internet addresses were using the rogue servers. Five months later, FBI estimates that the number is down to at least 360,000. The U.S. has the most, about 85,000, federal authorities said. Other countries with more than 20,000 each include Italy, India, England and Germany. Smaller numbers are online in Spain, France, Canada, China and Mexico.
    Vixie said most of the victims are probably individual home users, rather than corporations that have technology staffs who routinely check the computers.
    FBI officials said they organized an unusual system to avoid any appearance of government intrusion into the Internet or private computers. And while this is the first time the FBI used it, it won't be the last.
    "This is the future of what we will be doing," said Eric Strom, a unit chief in the FBI's Cyber Division. "Until there is a change in legal system, both inside and outside the United States, to get up to speed with the cyber problem, we will have to go down these paths, trail-blazing if you will, on these types of investigations."
    Now, he said, every time the agency gets near the end of a cyber case, "we get to the point where we say, how are we going to do this, how are we going to clean the system" without creating a bigger mess than before.
      

    I have Windows capability but have never used it.  I can't imagine anyone using anything other than Pages for Word Processing, etc.  I use Safari and Firefox for Browsing.  I use Safari primarily and Firefox occassionally.  I have not used Internet Explorer for years and years.  In fact, I was sort of surprised when I learned that some people do still use Internet Explorer. 
    I wasn't sure whether or not there was an Ultra-Safe way to go about checking to discover whether or not Apple Users had to worry about a problem with this particular bug.  
    Although there IS a link provided in the Denver Post's on-line version of this particular news article, I hated to click on a strange link - even if it was provided by the local newspaper.  It is just as easy for the local newspaper to be fooled by bogus links as it is for anyone else to be fooled. 
    My understanding from friends is that there are a whole lot of local newspapers - all across the country - who are currently running this news article - or an article very similar to it. 
    So it would seem to me that a whole lot of Apple users all across the country might suddenly be wondering whether or not they have anything to worry about - and whether or not there was an Ultra-Safe way for Apple users to check all of this out. 
    I contacted my service provider about this issue but, so far, have not heard anything back from them.
    Thanks for the response.
    Sincerely,
    Hannah

  • Map security roles to group within LDAP using external 3rd Party LDAP

    I'm haveing a problem mapping my logical role defined in my web.xml to a role within Active Directory. I'm currently authenticating using Active Directory succsfully, however after the user is authenticated I get a message from the OC4J container that my role can not be found. Can you map a logical role to group within Active Directory? Below are details about my configuration.
    Any help would be greatly appreciated.
    Log.xml log entry that confirms webtA is communicating successfully with AD.
    SG_TEXT>JAAS-LDAPLoginModule: authenticating user wmgraham</MSG_TEXT>
    </PAYLOAD>
    </MESSAGE>
    <MESSAGE>
    <HEADER>
    </CORRELATION_DATA>
    <PAYLOAD>
    <MSG_TEXT>JAAS-LDAPLoginModule: DN for user wmgraham is cn=wmgraham,ou=endusers,ou=itod,ou=endusers,ou=div20,ou=hq,dc=fbinet,dc=fbi</MSG_TEXT>
    </PAYLOAD>
    </MESSAGE>
    <MESSAGE>
    <HEADER>
    Error reported in the log
    <MESSAGE>
    <HEADER>
    <TSTZ_ORIGINATING>2008-08-27T11:38:05.991-04:00</TSTZ_ORIGINATING>
    <COMPONENT_ID>j2ee</COMPONENT_ID>
    <MSG_TYPE TYPE="TRACE"></MSG_TYPE>
    <MSG_LEVEL>16</MSG_LEVEL>
    <HOST_ID>F2287032-W</HOST_ID>
    <HOST_NWADDR>30.30.16.14</HOST_NWADDR>
    <MODULE_ID>security</MODULE_ID>
    <THREAD_ID>14</THREAD_ID>
    <USER_ID>wmgraham</USER_ID>
    </HEADER>
    <CORRELATION_DATA>
    <EXEC_CONTEXT_ID><UNIQUE_ID>30.30.16.14:59560:1219851485804:6</UNIQUE_ID><SEQ>0</SEQ></EXEC_CONTEXT_ID>
    </CORRELATION_DATA>
    <PAYLOAD>
    <MSG_TEXT>for group=[JAZNGroupAdaptor: webta] there's no matching role found.</MSG_TEXT>
    </PAYLOAD>
    </MESSAGE>
    Web.xml Logical Role definition
    <security-constraint>
    <web-resource-collection>
    <web-resource-name>allpages</web-resource-name>
    <url-pattern>/servlet/*</url-pattern>
    <http-method>GET</http-method>
    <http-method>POST</http-method>
    </web-resource-collection>
    <auth-constraint>
    <role-name>WEBTA_J2EE_USER</role-name>
    </auth-constraint>
    </security-constraint>
    <security-role>
    <role-name>WEBTA_J2EE_USER</role-name>
    </security-role>
    Orion-web.xml This file maps the logical role defined in webxml to a group within Active Directory.
    <security-role-mapping name="WEBTA_J2EE_USER">
    <group name="webta"/> <-- Group defined in AD -->
    </security-role-mapping>

    What is the name of the group in AD (provide the DN) that you want to map the j2ee logical role WEBTA_J2EE_USER? What are the group search base and group mapping attribute?
    When wmgraham logs into the app, the 3rd party ldap login module will attempt to query for the groups wmgraham is a member of - this is done using the group search base configuration for the provider.
    In this example, the DN is "cn=wmgraham,ou=endusers,ou=itod,ou=endusers,ou=div20,ou=hq,dc=fbinet,dc=fbi" and likely user search base is set to "ou=endusers,ou=itod,ou=endusers,ou=div20,ou=hq,dc=fbinet,dc=fbi".
    Assuming group search base is (say) "ou=groups,ou=itod,ou=endusers,ou=div20,ou=hq,dc=fbinet,dc=fbi" and and group mapping attr is "cn", then the role mapping you mention should work for group DN "cn=webta,ou=groups,ou=itod,ou=endusers,ou=div20,ou=hq,dc=fbinet,dc=fbi"

  • Suddenly New York Times website not working in Safari

    I often leave the NYT website up on a tab in Safari, where it auto-refreshes every five minutes or so.  Worked fine earlier today.  Now I get "Page Not Found" posted by NYT with some suggestions and a short list of content.  This is on my iMac, see identical behavior on my MacBook Pro with Safari.  But: the site works fine in Firefox, on both machines.  I have the NYT extension in Safari on the iMac but not on the MBP.  No other extensions.
    Did run into some kind of malware yesterday when looking up song lyrics in Safari, somehow got a popup from url "security-lmeniagy-chk.in/js?t=<bunch of stuff>" that claimed to be "from the FBI" and tried to extort money; had to Force Quit Safari and hold Shift on the re-launch so as not to reopen that page, but after that Safari seemed fine.  Or maybe there's some lingering problem?  (But this wouldn't explain the behavior on the MBP.)  Kinda puzzling.  Thanks for any tips.  (Safari v6.0.5, OSX 10.8.5)

    Thanks for the tip!  I checked for malicious adware per Safe Mac instructions, found nothing suspicious. (Doubted DNS or network or other causes because is Safari-specific problem.) Meanwhile, the problem has gone away!  I suspect the NYT folks found and fixed something, because all I did was refresh their page in Safari (on iMac and MBP) and voila!, it displayed correctly. 
    Might it be useful for Apple to know more about this problem, since it appeared to expose a vulnerability in Safari that was not present in Firefox?  I'd suggest contacting NYT to see if they can enlighten.
    Thanks again for help.

  • Virtual Catalogs in 10g database

    I have heard that you need an 11g catalog to use virtual catalogs. I have also heard that it's possible to run an 11g catalog from a 10g database. Is there a way to create the 11g catalog on a 10g database directly, or do I need to make it in an 11g database then datapump it to the 10g database?

    Hej Henrik,
    You can mimick it by creating a function based index (FBI), and optionally creating a view on top the table, ensuring that the FBI is used.
    Example:
    SQL> create table t (x number primary key check (x > 0), y number not null check (y > 0))
    Table created.
    SQL> create index fbi on t(x/y)
    Index created.The index will now have a "virtual column" of x/y.
    And if you like, put a view on top:
    SQL> create view v
    as
       select x, y, x/y as virtual_column
         from t
    View created.
    SQL> select * from v
    where virtual_column = 3
    no rows selected.Hilsen
    Peter
    Edited by: Peter on Mar 11, 2009 5:05 AM
    - Added example

  • FrameMaker 11.0.2 Patch Released

    Hello Everyone,
    I am working as FrameMaker Product Manager at Adobe. I am pleased to announce the availability of FrameMaker 11.0.2 patch, in which we have fixed several critical issues reported by our valued partners and customers.
    The detailed blog, describing all the bugs fixed in the patch, is available at http://blogs.adobe.com/techcomm/?p=6824
    I encourage everyone to install the patch using "Help -> Update" command from within FrameMaker 11.
    I would like to thank all those who contributed by reporting the issues and helping us improve the product.
    Vikram Verma
    Product Manager
    RoboHelp I FrameMaker I Technical Communication Suite I RoboHelp Server

    Does the trial download include this wonderful patch #11.0.2?  If not would I be able to patch the trial version if I decide to download and try it on my machine?
    i don't have framework on my system yet but would like to try it to see what it can do for me.  I hope it doesn't go on the cloud soon now that we know FBI and CIA are trawling the major players (M$, google and Facebook to name the few) to mine data for their very big database for the entire planet.
    Thanks.

Maybe you are looking for

  • Question on controlling area

    Hi All, During purchase order creation and goods receipt i get the below error message. "No control indicators exist in fiscal year 2010 for controlling area RBBA." What setting needs to be carried out in order to avoid the error. Awaiting your input

  • How do I get a hp email for the eprint app

    Idk This question was solved. View Solution.

  • Pivot a Table Records

    Dear All, Here is my Thread.. I have a one table [ABC] with Column Name [YEAR_MONTH], [RECORD_ID],[SALE],[MANAGER] The Distinct [MANAGER]s are -  [AAA],[BBB],[CCC] & [DDD] I want to pivot a report from TABLE in this way.. Please help..

  • What is Status Reporting Component in SCCM 2012 R2?

       Hello to all, I checked the following config. "Status Reporting Component Properties" for a primary site but didn't get its purpose. Its default config brings a server and client component status, that are concentraed in "All Milestones" report .

  • Basic System Requirements for running 3rd party samples

    Here's a VSL instruments conundrum. From what I can see, I've got approximately double the minimum system requirements spelled out by VSL for running Vienna Instruments II. But my system is crashing immediately with only one instrument plugged in. He