Flex apps and users activity monitoring

Hi
My question is simple : is there a way to monitor users
activity inside a Flex app ?
Best regards

In that case you have to set up appropriate state variable
representing the things you want to track, then pass them to your
db using any of the available communication services available.
Personally I'M using CF with RemoteObjects and writing the
necessary CFC functions to handle the data updates. I also use the
SharedObject to capture state in case the user happens to hit
'refresh' or 'back' in their browser.

Similar Messages

  • Updated to Mavericks. Now theres tons of activity in my terminal and my activity monitor doesn't seem normal. I want to think someone's hacking me, but i need experienced help please!

    I spent all night trying to fix this. It seems to me that someone has been trying to hack into my system with all of the random codes/lines in my terminal and i have all of his foreign IP addresses. And now i get this strange message that popped up in my terminal. Idk what it entirely means? I would very appreciate if someone could just walk me through this. Thank you very much.
    First time poster. I have Macbook Pro. OSX. Just downloaded the new mavericks. I'm i have my firewall on. I stay secure. I run Netbarrier, Virusbarrier, IdentityScrubber.
    I know something is a little odd or just doesn't make since about my activity monitor. Then my WiFi was hacked last night and this person was writing tons lines of commands/codes that i found in my terminal and my activity monitor doesn't look normal,  and I've only been a mac owner for about a year now and i'm learning more and more but while trying to figure out what was going on this message popped up which concerned me the most. Any help would be most appreciated, thanks guys. I have my terminal full of his foreign ip addresses i noticed, and a lot of other commands and lines he wrote out that i definitely did not type myself. Can anyone give me a hand on this? Thanks
    --- 192.168.1.103 ping statistics ---
    10 packets transmitted, 0 packets received, 100.0% packet loss
    Extol:~ FBI$ who
    FBI      console  Nov  7 02:14
    FBI      ttys000  Nov  7 04:33
    Extol:~ FBI$ whois
    usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
    Extol:~ FBI$ whois 192.168.1.103
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.1.103"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.1.103?showDetails=true&showARIN=false& ext=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    RegDate:
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone: 
    OrgTechEmail:
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone
    OrgAbuseEmail: 
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    Extol:~ FBI$
    Extol:~ FBI$ hosts
    -bash: hosts: command not found
    Extol:~ FBI$ who
    FBI      console  Nov  7 02:14
    FBI      ttys000  Nov  7 04:33
    Extol:~ FBI$ whois
    usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
    Extol:~ FBI$ whois  192.168.0.0 - 192.168.255.255
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.0.0"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.0.0?showDetails=true&showARIN=false&ex t=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    OrgId:          IANA
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone: 
    OrgTechEmail
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone: 
    OrgAbuseEmail:
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    Whois Server Version 2.0
    Domain names in the .com and .net domains can now be registered
    with many different competing registrars. Go to http://www.internic.net
    for detailed information.
    No match for "-".
    >>> Last update of whois database: Thu, 07 Nov 2013 13:19:14 UTC <<<
    NOTICE: The expiration date displayed in this record is the date the
    registrar's sponsorship of the domain name registration in the registry is
    currently set to expire. This date does not necessarily reflect the expiration
    date of the domain name registrant's agreement with the sponsoring
    registrar.  Users may consult the sponsoring registrar's Whois database to
    view the registrar's reported date of expiration for this registration.
    TERMS OF USE: You are not authorized to access or query our Whois
    database through the use of electronic processes that are high-volume and
    automated except as reasonably necessary to register domain names or
    modify existing registrations; the Data in VeriSign Global Registry
    Services' ("VeriSign") Whois database is provided by VeriSign for
    information purposes only, and to assist persons in obtaining information
    about or related to a domain name registration record. VeriSign does not
    guarantee its accuracy. By submitting a Whois query, you agree to abide
    by the following terms of use: You agree that you may use this Data only
    for lawful purposes and that under no circumstances will you use this Data
    to: (1) allow, enable, or otherwise support the transmission of mass
    unsolicited, commercial advertising or solicitations via e-mail, telephone,
    or facsimile; or (2) enable high volume, automated, electronic processes
    that apply to VeriSign (or its computer systems). The compilation,
    repackaging, dissemination or other use of this Data is expressly
    prohibited without the prior written consent of VeriSign. You agree not to
    use electronic processes that are automated and high-volume to access or
    query the Whois database except as reasonably necessary to register
    domain names or modify existing registrations. VeriSign reserves the right
    to restrict your access to the Whois database in its sole discretion to ensure
    operational stability.  VeriSign may restrict or terminate your access to the
    Whois database for failure to abide by these terms of use. VeriSign
    reserves the right to modify these terms at any time.
    The Registry database contains ONLY .COM, .NET, .EDU domains and
    Registrars.
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    # Query terms are ambiguous.  The query is assumed to be:
    #     "n 192.168.255.255"
    # Use "?" to get help.
    # The following results may also be obtained via:
    # http://whois.arin.net/rest/nets;q=192.168.255.255?showDetails=true&showARIN=fals e&ext=netref2
    NetRange:       192.168.0.0 - 192.168.255.255
    CIDR:           192.168.0.0/16
    OriginAS:
    NetName:        PRIVATE-ADDRESS-CBLK-RFC1918-IANA-RESERVED
    NetHandle:      NET-192-168-0-0-1
    Parent:         NET-192-0-0-0-0
    NetType:        IANA Special Use
    Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
    Comment:
    Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
    Comment:
    Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
    Comment:        http://datatracker.ietf.org/doc/rfc1918
    RegDate:        1994-03-15
    Updated:        2013-08-30
    Ref:            http://whois.arin.net/rest/net/NET-192-168-0-0-1
    OrgName:        Internet Assigned Numbers Authority
    OrgId:          IANA
    RegDate:
    Updated:        2012-08-31
    Ref:            http://whois.arin.net/rest/org/IANA
    OrgTechHandle: IANA-IP-ARIN
    OrgTechName:   Internet Corporation for Assigned Names and Number
    OrgTechPhone:
    OrgTechEmail
    OrgTechRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    OrgAbuseHandle: IANA-IP-ARIN
    OrgAbuseName:   Internet Corporation for Assigned Names and Number
    OrgAbusePhone: 
    OrgAbuseEmail: 
    OrgAbuseRef:    http://whois.arin.net/rest/poc/IANA-IP-ARIN
    # ARIN WHOIS data and services are subject to the Terms of Use
    # available at: https://www.arin.net/whois_tou.html
    <Personal Information Edited by Host>

    haha, so now i'm thinking. I'm learning the terminal as fast as i can but there are several lines of codes and commands in there that throws up red flags to me that i don't fully understand. It just looks fishy too me. It would be highly appreciated if someone could just check this out just to tell me that i don't need to worry about it. Or point me in the right direction. I just feel un easy about this. ha.

  • How do you get quicklook app. back on Activity monitor

    I am not very technically minded.
    I accidentally deleted the Quicklook App. from my Activity Monitor,can
    anybody tell me how you can get it back on the Activity Monitor.
    Thanks in advance.

    In Finder`s top menu bar there is no Icon of the Quicklook App.
    Is the Icons up above "View" where it shows the option`s to show has
    a List,Cover Flow,or Grid.
    The titles on top of the Finder window are Back,View, Action,and Path,and that`s it  
    What does the Quicklook Icon look like.
    I hope this helps you to solve my problem. Thanks.

  • Best Practice in maintaining multiple apps and user logins

    Hi,
    My company is just starting to use APEX, and none of us (the developers) have worked on this before either. It is greatly appreciated if we can get some help here.
    We have developed quite a few applications in the same workspace. Now, we are going to setup UAT and PRD environments and also trying to understand what the best practice is to maintain multiple apps and user logins.
    Many of you have already worked on APEX environment for sometime, can you please provide some input?
    Should we create multiple apps(projects) for one department or should we create one app for one department?
    Currently we have created multiple apps for one department, but, we are not sure if a user can login once and be able to access to all the authenticated apps.
    Thank you,
    LC

    LC,
    I am not sure how much of this applies to your situation - but I will share what I have done.
    I built a single 700+ page application for my department - other areas create separate smaller applications.
    The approach I chose is flexible enough to accomdate both.
    I built a separate access control application(Control) in its own schema.
    We use database authenication fo this app - an oracle account is required.
    We prefer to use LDAP for authentication for the user applications.
    For users that LDAP is not option - an encrypted password is stored - reset via email.
    We use position based security - priviliges are based on job functions.
    We have applications, appilcations have roles , roles have access to components(tabs,buttons,unmasked card numbers,etc.)
    We have positions that are granted application roles - they inherit access to the role components.
    Users have a name, a login, a position, and a site.
    We have users on both the East Coast and the West Coast, we use the site in a sys_context
    and views to emulate VPD. We also use the role components,sys_contexts and views to mask/unmask
    card numbers without rewriting the dependent objects(querys,reports,views,etc.)
    The position based security has worked well, when someone moves,
    we change the position they are assigned to and they immediately have the privileges they need.
    If you are interested I can rpovide more detail.
    Bill

  • I'm trying to get rid of logmein. I threw away the entire application but I can't remove it form my overhead menu bar and the activity monitor tells me it's still running.

    I'm trying to get rid of logmein. I threw away the entire application but I can't remove it from my overhead menu bar and the activity monitor tells me it's still running. How do I get rid of it completely?

    Install it again and use the developers uninstall instructions
    How to uninstall/install software on your Mac

  • Is it normal for 10-20% cpu to be used when idle and watching activity monitor?

    Is it normal for 10-20% cpu to be used when idle and watching activity monitor?
    I have a macbook 6,1, 4gb of ram, and my os seems to be spinning the rainbow quite often and laggy. I watch my activity monitor and it never drops below 90% cpu available. Is this normal? if not what can I do to clean up my os. Does anyone have any resources or help? Thanks

    Hello:
    Answer - no.
    The activity monitor should indicate what is consuming the processor when your system is idle. 
    I just looked at my own system with Safari running and the usage is about 3%.
    Barry

  • Incorrect app name in Activity Monitor

    Has anyone else ever noticed an application's name misspelled or incorrect in the Activity Monitor list? E.g.: Illustrator is spelled without the 'r' as 'Illustrato'. Other apps are spelled correctly, including longer names. I have never seen this on other machines with Illustrator or any other app's name.

    You may have to inspect the computer's desktop and other file/folders once you
    change settings to allow +invisible items+ to appear, where you may see them all.
    The system uses invisible files, and sometimes a user accessible file may go
    invisible. While I have not done it, some of my utilities (OnyX) can make them
    appear; this usually requires an admin password to alter system settings.
    If a file name accidentally gets a . (period) in front of it, the file may change and
    this may make it invisible, too. And if you change the name of an item whose
    icon is on the Dock, the link back there probably won't work anymore.
    And if you see a null item in Activity Monitor, you may turn it off or delete it.
    Sorry to not be of more help.
    Good luck & happy computing!

  • Spinning Ball 4 1 App. + No Activity Monitor!?

    So I'm having some issues with my G4, running 10.3.9. It is having real problems accessing a certain file and program. I haven't quite been able to reason it down to some corrupt application or file...I believe the problem is bigger than that.
    Not sure what I did, but I can't download anything with my download manager Speed Download! I get the spinning-ball-of-death when I try to open or run S.D. I get the same spinning-ball when I try to open the folder where S.D. stores it's downloaded files.
    I've unistalled the application and deleted/changed the download folder that S.D. uses. I figure this would cancel out any corrupt files within the app; however, when I try to open the new version of Speed Download it starts the process and then just spins. I can't click on anything to do with the app. But everything else on the machine functions as normal.
    Other issues: I have no ability to open Activity Monitor to find out more about the computer's processes. And I get the same spinning ball when I try to open Console, so I can't look to the log files.
    I've tried repairing permissions and optimizing the directories with Disk Warrior, but don't know which way to turn.
    Any advice is good advice,
    Thanks,
    Ben
    800 MHz Powermac G4   Mac OS X (10.3.9)   1.25 GB RAM + Multiple drives

    Question regarding this continuing problem...
    It seems that it is a font corruption problem. I would love to be able to root out the corupt fonts and keep the rest. I can temporarily remove the fonts, or move them to another folder, but this is temporary!
    I have tried to resolve duplicate fonts, and disable fonts (even delete) fonts within Font Book. I have used Font Finangler to "clean the cache" of my fonts.
    But Speed Download is back to not working. And Word lists corrupt fonts whenever I open it, new ones each time. I've tried deleting the listed fonts from within my main library with Font Book, and erased theOffice font cache before rebooting.
    Any easy programs that would allow me to keep the majority of my collected fonts? Do they continue to infect other fonts; spreading like a virus?
    Thank you,
    it is frustrating,
    Ben
    800 MHz Powermac G4   Mac OS X (10.3.9)   1.25 GB RAM + Multiple drives

  • How do I locate and install Activity Monitor?

    I cannot find Activity Monitor on my computer.
    When and how it disappeared I do not know, but is there anyway of locating and installing a copy without a complete re-install?

    "Activity Monitor" is stored on the Utilities folder, inside the Applications folder. Before reinstalling OS X, I recommend you to search it with Spotlight.
    To search it in Spotlight, press Command and Space keys so, if you have a look at the top right of the display, Spotlight will appear. Then, type "Activity Monitor" without quotes, and check if the application appears. If it appears, it hasn't disappeared because you can use it. If it doesn't appear, you have to reinstall Mac OS X. Insert the Mac OS X disc, hold the C key while your computer is starting, and reinstall Mac OS X. You won't lose anything from your computer

  • Oracle 9i and user activity logging

    Hi,
    i am new on the matter but i have to trace the user activity and build a small application.
    those are the specifications :
    i'm using oracle 9i database version on 64 bit
    the O.S. used is Unix Aix 5.2
    for each data base we using i have to trace the user activity all of them, about 3 DB + application
    i have create some some triggers to get some information, but still the work is there :
    create trigger ... after logoff on database .. begin insert into table xx_tab ( ,,,,) end ;
    create trigger ... after ddl on database .. begin insert into table xx_tab ( ,,,,) end ;
    create trigger ... after logon on database .. begin insert into table xx_tab ( ,,,,) end ;
    create trigger ... after servererror on schema .. begin insert into table xx_tab ( ,,,,) end ;
    Here is the issue i am faced to /
    how could we simulate a create trigger ... after DML on database or schema ? as far as i know we trigger a DML only on a specific table. Is there any possibility to trigger a DML on any database object or schema?
    for the moment i don't know if it 's the good think to do but, but it's a try, if you have any idea or other methods to trace the user activities on DB, please don't hesitate to get me informed.
    Rgds,
    Paul

    This is the forum for the SQL Developer tool. You'll get more answers in the General or SQL And PL/SQL forums.
    Regards,
    K.

  • Cisco Flex Connect and users can not get IP Address by WAN

    Hello my name is Ivan
    I have a wlc 5508 with license base to 50 aps, i use a deployment flex connect. I already registered all my access points, I use web authentication to authenticate users guest, and the service dhcp is in the central site.
    My issue is the users in each remote site, can not get an ip address by dhcp from the central site, they can authenticate in the guest ssid, but any users can not get an ip.
    The request is passing by the wan in this way
    Central Site DHCP - Router WAN - Remote Site - Users with notebooks. I use flex connect central deployment (all the traffic consulting to the wlc) .
    perhaps i should use local deploy? The wlc is in the central site.
    Can you help me to resolving this issue please? , perhaps any advice?
    Regards
    Ivan.

    Thanks Osita
    If I configure Central Authentication and  I configure central switching I need to create a dynamic interafce for each remote site and each dynamic interface associated with a different VLAN ID, because I can not associate a single interface dynamic to the same  VLAN ID, but in my case the client remote in each remote site have the same network segment with the same VLAN ID with the same SSID for guests. My goal is to configure web authentication with the local DHCP server at each remote site, will this work?.Each remote site have its own server dhcp.
    If I configure authentication central authentication with central switching with web authenticacion as I set in my scenario?
    My issues are the interfaces dynamics, because I have the same network to the customer guest with the same ID VLan in each remote site
    Regards

  • Headset with boom and user voice monitoring?

    Has anyone come across a headset for the 3G that has a boom mic AND allows the user to hear his/her voice in the headset as they speak? Regular wired phones do this, but I haven't found a cell phone headset yet to do the same thing.

    There are several that have booms (of sorts) such as http://www.plantronics.com/northamerica/enUS/products/mobile/bluetooth-headsets/discovery-925-black and also http://www.engadget.com/2008/01/03/joby-introduces-zivio-bluetooth-headset-with- boom-mic/
    But voice monitoring is not something generally done with bluetooth headsets. These are low power devices and may not have the power for that, and there is also a feed back loop being created due to the small size of these things.

  • Tour de Flex app and plugin crash

    I launch Tour de Flex in Mac OS with latest version of AIR
    installed and I get this error:
    This application requires a version of Adobe AIR which cannot
    be found.
    Please download the latest version of the runtime from
    http://www.adobe.com/go/getair,
    or contact the application author for an updated version.
    Please help!
    Thanks,
    Ben

    Weird - it doesn't require any specific version of AIR.
    Are you guys running AIR 1.1 or 1.5?
    Is it only when launched from Eclipse or standalone or both?
    Greg Wilson
    Adobe
    http://gregsramblings.com

  • Triggers and user activity.

    hi, is it possible to create a trigger that will fire if a row or record is read during a query?
    What I've been told is that triggers can only fire on,
    Update,delete, and insert
    Can anyone out there give me an asnwer to this. thanks.

    I have thought of a way to do this in 8i (although I wouldn't recommend it). My example uses the EMP table from the SCOTT schema.
    Create a table to hold audit info:
    create table emp_audit_trail
      ( empno      number
      , username   varchar2(30)
      , audit_date date ); Create a function to save audit info, note the PRAGMA statement:
    create function audit_emp
      ( p_empno     number )
    return varchar2
    is
      pragma autonomous_transaction;
    begin
      insert into emp_audit_trail
        ( empno
        , username
        , audit_date )
      values
        ( p_empno
        , USER
        , SYSDATE );
      commit;
      return 'Y';
    end; The PRAGMA ensures that the COMMIT is performed in a seperate transaction to the SELECT statement.
    Now create a view over the EMP table:
    create emp_v
    as
    select *
    from   emp
    where  audit_emp(emp_no) = 'Y';If you revoke public access to the EMP table, and ensure that everyone uses EMP_V, all SELECTs will be recorded in the Audit Trail table.

  • Activity Monitor.app won't open

    I have researched this like crazy and nothing has worked.
    I looked in my Console, and there are tons of iMovie errors(?) in there, and then there is one for the Activity Monitor that says:
    dyld: Library not loaded: /System/Library/PrivateFrameworks/GraphKit.framework/Versions/A/GraphKit
    Referenced from: /Applications/Utilities/Activity Monitor.app/Contents/MacOS/Activity Monitor
    Reason: image not found
    I ran 'repair permissions' and shut down the computer, restarted, and the Activity Monitor still will not open.
    I also opened the Terminal and typed in this:
    ls -la /System/Library/PrivateFrameworks/GraphKit.framework/Versions/A/GraphKit
    And it returned this:
    it returns this:
    ls: /System/Library/PrivateFrameworks/GraphKit.framework/Versions/A/GraphKit: No such file or directory
    But, being a new Mac user, I have no idea what this means.
    I have tried everything, with no luck, and I am hoping someone here can help me.
    Thanks bunches! Jules
    iMac   Mac OS X (10.4.8)   Intel Core 2 Duo

    Just for future reference, should someone experience this:
    I used the disk utility and repaired permissions.
    Then I inserted the OS disk and 'updated' the XcodeTools for the system.
    I then restarted the computer, and now I can open the Activity Monitor.
    It had something to do with my installing that X11 dealie a week+ ago I am sure.
    HUGz! Jules

Maybe you are looking for