Freelance writer needs database software to organize, manage contact lists

Hello, and thank you in advance for helping me solve my problem--
I am a freelance writer in need of a better way of organizing my contact lists. I currently have two major lists to manage.
The first is a simple list of business, medical, and educational contacts I use regularly in my research and writing.
The second is a list of business people that need to be contacted in a nine month rotation to be featured in a publication I write for. I would like the software to help me keep track of whose turn it is to be featured, as well as their contact information.
While I could probably use AppleWorks for this function, I have found this program to be PAINFULLY slow. I also have Microsoft Entourage, but I don't want to mingle these lists together, or with my address book in Entourage.
And, naturally, I don't want to spend a fortune.
Thoughts?

I also have Microsoft Entourage, but I don't want to mingle these lists together, or with my address book in Entourage.
If Entourage will do what you want, just set up another account on your iBook (System Preferences>Accounts) just for your writing and use your existing account (and Entourage) for personal use. The Microsoft User Accounts will be completely seperate.
John

Similar Messages

  • I don't have my phone anymore and need to get access to my contact list. Is there a way to get into my backed up info from the PC I'm using right now?

    I don't have my phone anymore and need to get access to my contact list. Is there a way to get into my backed up info from the PC I'm using right now?

    You can use another iPhone (or iPad) to restore it too, or you can login to www.icloud.com (assumng you weer using iCloud) and export your contacts from there.

  • HT2486 Managing contact list pictures

    How can I change a picture to an entire group of people in my contact list not doing it one-by-one?
    I have people listed by organization, and inserted a logo saved image. If company logo changes, then I have to go trough each one changing the picture, which is not what I wanted to do.
    Any one has an option?

    Can you sync it to a Gmail account, and then work with it in Gmail Contacts on the laptop?

  • Remove Deteled Databases from SQL Server Management Studio List

    Hi,
        I am using SQL Server Express 2008 Management Studio & in the databases list are some databases that are non existent (have been deleted in Windows Explorer). How do I remove them as trying to delete when logging in using Windows authentication
    fails?
    Thanks
    Paul.
    Paul Wainwright

    Hi pr_wainwright,
    I’m writing to follow up with you on this post. Was the problem resolved after performing our action plan steps? According to your description and error message, we need to verify if your windows login account has sysadmin permission. The error 3701 occurs
    when you use an account to execute the script who has not grant the permission about modifying database properties and creating database. I do a test, when the SQL Server Service is stop, I delete the data and log file of database from Windows Explorer, then
    restart the service again, and connect to the SQL Server instance via windows login account which is sysadmin role. In SSMS list, you can right click the database and choose “ delete” option. Or you also use the drop statement by using master database first.
    and two ways can all run well.
    Regards,
    Sofiya Li
    If you have any feedback on our support, please click here.
    Sofiya Li
    TechNet Community Support

  • Need bapi for vendor contact list

    Hi all
    I need a bapi to get vendor contact list. I already have bapi for getting customer contact list, bapi_customer_getcontactlist.
    Please help in this regard.
    Thanks in Advance
    Rakesh

    Hi,
    same problem here: I need a BAPI that lists all contacts for a vendor. BAPI_VENDOR_GETDETAIL does NOT return the contact list and there is no BAPI_VENDOR_GETCONTACTLIST.
    Any hint?
    Walter

  • Managed Metadata (Failed to read from or write to database. Refresh and try again. If the problem persists, please contact the administrator)

    When creating a new site column of the managed meta data type in SharePoint2010, and you select "customize your term set", you are presented with one of the following errors:
    - This operation cannot be completed. The term store may be unavailable.
    - Failed to read from or write to database. Refresh and try again. If the problem persists, please contact the administrator

    Hi,
    I have been facing the same issue, however managed to resolve it.
    This is due to the uncommitted statements. From Powershell try running the following script
    #Connect to Central Admin, Replace the url with the environment specific URL
    $taxonomySite = get-SPSite http://centraladmin:40000
    #Connect to Term Store in the Managed Metadata Service Application, Ensure you put the right Metadate service application name
    $taxonomySession = Get-SPTaxonomySession -site $taxonomySite
    $termStore = $taxonomySession.TermStores["Managed Metadata Service"]
    write-host "Connection made with term store -"$termStore.Name
    #Connect to the Group and Term Set
    $termStore.RollbackAll()
    Hope it would help

  • Need filename of main Organizer database  -PSE13 on a mac

    need filename of main Organizer database  -PSE13 on a mac

    galsal5 a écrit:
    need filename of main Organizer database  -PSE13 on a mac
    Valid for both Mac and Win:
    - the catalog location is to be found from the menu Help/System Info.
    - the catalog is the whole folder, not a single file
    - the main database is called 'catalog.pse13db'. It's a sqlite database engine. The second sqlite database is the thumbnail cache : thumb.5.cache.

  • Need advice for starting a Managed Cloud Service for Small Businesses

    I hope this is in the right forum.  I have done a lot of research and searching but havent found anything that specifically answers, in total, what I am wanting to accomplish.  I live in a small town and want to start a Managed Cloud Services for
    small to small-medium business in my area (2-30 users for each business).  I want to market this to have businesses replace their in-house server(s) to virtual ones I would host in a local Data Center with my own equipment that I would maintain.  I
    am just starting off so I don't have any clients I do this for currently, but I get asked about this frequently.  I want to run a 2012 R2 Domain Controller and a Hyper-V 2012 R2 server.  The virtual servers I will host are going to be for AD, RDS,
    FTP, and files.  Software examples that people are going to be using these virtual servers for are Quickbooks, Sage Accounting, Remote Desktop or RemoteApp, custom CRM or small database software, Office 2013, etc.  No Exchange currently but will
    probably configure something for that in the future (maybe run 1-3 virtually for now if someone asks, but will only do it if the user base is fairly small ~under 10 users).  I only have 1 static IP to work with over a 100Mbps connection up and down.
    For hardware, I am figuring something along the lines of this:
    (1) 1U, single CPU w/2-4 cores, 8GB, 2x73GB SAS 10k RAID 1, Dual PSU, running Windows Server 2012 R2
    Domain Controller
    (1) 2U, 2x 8-core Xeon ~2.6Ghz, 80GB RAM, 8x600GB SAS 15k in Raid 10 for Storage (VHDX files, etc), RAID 1 small Basic drives (or USB stick) for OS, Dual PSU, Quad GB Nic which I can use for load balancing/teaming, Hyper-V
    2012 R2
    Hyper-V Virtual Server
    (1) GB Unmanaged Network Switch & (1) Cisco 5510 Firewall
    Most of my questions are about the best way to configure this.  I am planning on managing my Hyper-V from the physical Domain Controller server.  Each virtual server will have RDS & (possibly) AD services on a single server.
    1) I want to replicate the physical Domain Controller.  Should I get another server or just virtualize the replica in Hyper-V?  I understand that if the Hyper-V goes down, so does my DC replica.
    2) Should I use my Domain Controller to manage ALL users on each virtual Server, by creating separate Organizational Units for each business?
    3) Should I setup my domain controller with Hyper-V management and then each Virtual Server I setup be a separate domain (Ex. mydomain.local, business1.local, business2.local, etc)?  Each one has no connection to any
    other, completely seperate.  Or should I do subdomains (business1.mydomain.local).
    4) What I have read is that Subdomains are a pain to manage with user rights, etc.  I want to keep each server complete separated from one another over a network connection, I suppose the VLan through Hyper-V options
    do this?  I dont want wondering users to stumble upon another businesses files (I know they would probably be prompted with a login for that business/domain).
    5) For each virtual server, I want to create and have an HTTP subdomain point to that server from my domain name. (Ex: business1.mydomain.com, business2.mydomain.com, etc.)  I want them to be able to have access to
    only their RemoteApps or be able to type that address in their Remote Desktop program as the host name.  This would be for viewing the RemoteApp login page and RemoteApps for that business over HTTP/S through a browser.
    6) If I do not have separate DC's in each virtual and my main DC manages each one, is their a way to connect up each companies RemoteApps using a single site that only shows what they are assigned to based upon their login?
    (Ex. http://login.mydomain.com which then shows that user what they are assigned on their own virtual server)
    7) Since each business will use the same ports for RemoteApp (443) & RDC (3389 unless I change it), how would I setup the subdomains to point to their correct server and not overlap for mess with any of the other servers
    since its all over 1 static WAN IP for all servers.  Thats why I figured setting up IIS subdomains would solve this.
    8) For backups or Hyper-V replication, is it better to have software that backs up the ENTIRE Hyper-V server (Acronis Advanced Backup for Hyper-V) as well as replication or just backups?  Or should I do separate file
    backup on each virtual with a replica?  Can a replica be a slower server since its just a backup? (Ex. 1x 8 core, 80GB, 8x600GB 10k SAS)
    9) For the servers that will be using FTP, can I again rely on the subdomains to determine which server to connect to on port 21 without changing each FTP servers ports?  I just want each business/person to type in
    the subdomain for their business and it connect up to their assigned FTP directory over port 21.
    10) If the physical DC manages DNS for all Virtual servers, can I forward sub domain requests to the proper virtual server so they connect to the correct RemoteApp screen etc.  Again all I have is 1 IP.
    I hope all of these questions make sense.  I just want every business to be independent of each other on the Hyper-V, each on their own virtual server, all without changing default ports on each server, each server running RDS, (possibly) AD, (a few) FTP,
    and all over a common single WAN IP.  Hoping subdomains (possibly managed through IIS on the physical DC) will redirect users to their appropriate virtual server.

    If you really want to run your own multi-tenant service provider cloud, Microsoft has defined the whole setup needed.
    They call it Infrastructure as a Service Product Line Architecture.  You can find the full documentation here -
    http://blogs.technet.com/b/yuridiogenes/archive/2014/04/17/infrastructure-as-a-service-product-line-architecture.aspx
    There are several different ways of configuring and installing it.  Here is a document I authored that provides step-by-step instructions for deploying into a Cisco UCS and EMC VSPEX environment -
    http://www.cisco.com/c/dam/en/us/td/docs/unified_computing/ucs/UCS_CVDs/ucs_mspc_fasttrack40_phase1.pdf
    This document contains the basic infrastructure required to manage a private cloud.  I will soon be publishing a document to add the Windows Azure Pack components onto the above configuration.  That is what would more easily provide a multi-tenant
    experience with a Azure look and feel.  It is not Azure, but the Azure pack is a series of applications, some of which came from Azure, the provides Azure-like capabilities only in a service provider type of environment.
    Whether you use my document or not (which has actually corrected errors found in the Microsoft documentation), you should take a look at it to see what it takes to put something like this up, if you are really serious about it.  It is not a small undertaking. 
    It requires a lot of moving pieces to be coordinated.  Yes, my document is designed to scale to a large environment, but you need the components that are there.  No need re-inventing the wheel.  Microsoft's documentation is based on a lot of
    real hands on experience of their consulting organization that has been doing this for customers for years.  This one is also know as Fast Track 4.  I've done 2 (2008 R2) and 3 (2012), also and it just keeps getting more complicated based on customer
    demands and expectations.
    Good luck!
    . : | : . : | : . tim

  • Organization Management Interview Questions and Answers  Extremely Urgent

    Hi,
    Please let me know Organization Management Interview Questions and Answers. MOST MOST URGENT
    Please do not post Link or website name and detail response will be highly appreciated.
    Very Respectfully,
    Sameer.
    SAP HR .

    Hi there,
    Pl. find herewith the answers of the questions posted on the forum.
    1. What are plan versions used for?
    Ans : Plan versions are scenarios in which you can create organizational plans.
    •     In the plan version which you have flagged as the active plan version, you create your current valid organizational plan. This is also the integration plan version which will be used if integration with Personnel Administration is active.
    •     You use additional plan versions to create additional organizational plans as planning scenarios.
    As a rule, a plan version contains one organizational structure, that is, one root organizational unit. It is, however, possible to create more than one root organizational unit, that is more than one organizational structure in a plan version.
    For more information on creating plan versions, see the Implementation Guide (IMG), under Personnel Management  Global Settings in Personnel Management  Plan Version Maintenance.
    2. What are the basic object types?
    Ans. An organization object type has an attribute that refers to an object of the organization management (position, job, user, and so on). The organization object type is linked to a business object type.
    Example
    The business object type BUS1001 (material) has the organization object type T024L (laboratory) as the attribute that on the other hand has an object of the organization management as the attribute. Thus, a specific material is linked with particular employees using an assigned laboratory.
    3. What is the difference between a job and a position?
    Ans. Job is not a concrete, it is General holding various task to perform which is generic.(Eg: Manager, General Manager, Executive).
    Positions are related to persons and Position is concrete and specific which are occupied by Persons. (Eg: Manager - HR, GM – HR, Executive - HR).
    4. What is the difference between an organizational unit and a work centre?
    Ans. Work Centre : A work center is an organizational unit that represents a suitably-equipped zone where assigned operations can be performed. A zone is a physical location in a site dedicated to a specific function. 
    Organization Unit : Organizational object (object key O) used to form the basis of an organizational plan. Organizational units are functional units in an enterprise. According to how tasks are divided up within an enterprise, these can be departments, groups or project teams, for example.
    Organizational units differ from other units in an enterprise such as personnel areas, company codes, business areas etc. These are used to depict structures (administration or accounting) in the corresponding components.
    5. Where can you maintain relationships between objects?
    Ans. Infotype 1001 that defines the Relationships between different objects.
    There are many types of possible relationships between different objects. Each individual relationship is actually a subtype or category of the Relationships infotype.
    Certain relationships can only be assigned to certain objects. That means that when you create relationship infotype records, you must select a relationship that is suitable for the two objects involved. For example, a relationship between two organizational units might not make any sense for a work center and a job.
    6. What are the main areas of the Organization and Staffing user interfaces?
    Ans. You use the user interface in the Organization and Staffing or Organization and Staffing (Workflow) view to create, display and edit organizational plans.
    The user interface is divided into various areas, each of it which fulfills specific functions.
    Search Area
    Selection Area
    Overview Area
    Details Area
    Together, the search area and the selection area make up the Object Manager.
    7. What is Expert Mode used for?
    Ans. interface is used to create Org structure. Using Infotypes we can create Objects in Expert mode and we have to use different transactions to create various types of objects.  If the company needs to create a huge structure, we will use Simple maintenance, because it is user friendly that is it is easy to create a structure, the system automatically relationship between the objects.
    8. Can you create cost centers in Expert Mode?
    Ans. Probably not. You create cost center assignments to assign a cost center to an organizational unit, or position.
    When you create a cost center assignment, the system creates a relationship record between the organizational unit or position and the cost center. (This is relationship A/B 011.) No assignment percentage record can be entered.
    9. Can you assign people to jobs in Expert Mode?
    10. Can you use the organizational structure to create a matrix organization?
    Ans. By depicting your organizational units and the hierarchical or matrix relationships between them, you model the organizational structure of your enterprise.
    This organizational structure is the basis for the creation of an organizational plan, as every position in your enterprise is assigned to an organizational unit. This defines the reporting structure.
    11. In general structure maintenance, is it possible to represent the legal entity of organizational units?
    12. What is the Object Infotype (1000) used for?
    Ans. Infotype that determines the existence of an organizational object.
    As soon as you have created an object using this infotype, you can determine additional object characteristics and relationships to other objects using other infotypes.
    To create new objects you must:
    •     Define a validity period for the object
    •     Provide an abbreviation to represent the object
    •     Provide a brief description of the object
    The validity period you apply to the object automatically limits the validity of any infotype records you append to the object. The validity periods for appended infotype records cannot exceed that of the Object infotype.
    The abbreviation assigned to an object in the system renders it easily identifiable. It is helpful to use easily recognizable abbreviations.
    You can change abbreviations and descriptions at a later time by editing object infotype records. However, you cannot change an object’s validity period in this manner. This must be done using the Delimit function.
    You can also delete the objects you create. However, if you delete an object the system erases all record of the object from the database. You should only delete objects if they are not valid at all (for example, if you create an object accidentally)
    13. What is the Relationships Infotype (1001) used for?
    Ans. Infotype that defines the Relationships between different objects.
    You indicate that a employee or user holds a position by creating a relationship infotype record between the position and the employee or user. Relationships between various organizational units form the organizational structure in your enterprise. You identify the tasks that the holder of a position must perform by creating relationship infotype records between individual tasks and a position.
    Creating and editing relationship infotype records is an essential part of setting up information in the Organizational Management component. Without relationships, all you have are isolated pieces of information.
    You must decide the types of relationship record you require for your organizational structure.
    If you work in Infotype Maintenance, you must create relationship records manually. However, if you work in Simple Maintenance and Structural Graphics, the system creates certain relationships automatically.
    14. Which status can Infotypes in the Organizational Management component have?
    Ans. Once you have created the basic framework of your organizational plan in Simple Maintenance, you can create and maintain all infotypes allowed for individual objects in your organizational plan. These can be the basic object types of Organizational Management – organizational unit, position, work center and task. You can also maintain object types, which do not belong to Organizational Management.
    15. What is an evaluation path?
    Ans. An evaluation path describes a chain of relationships that exists between individual organizational objects in the organizational plan.
    Evaluation paths are used in connection with the definition of roles and views.
    The evaluation path O-S-P describes the relationship chain Organizational unit > Position > Employee.
    Evaluation paths are used to select other objects from one particular organizational object. The system evaluates the organizational plan along the evaluation path.
    Starting from an organizational unit, evaluation path O-S-P is used to establish all persons who belong to this organizational unit or subordinate organizational units via their positions.
    16. What is Managers Desktop used for?
    Ans. Manager's Desktop assists in the performance of administrative and organizational management tasks. In addition to functions in Personnel Management, Manager's Desktop also covers other application components like Controlling, where it supports manual planning or the information system for cost centers.
    17. Is it possible to set up new evaluation paths in Customizing?
    Ans. You can use the evaluation paths available or define your own. Before creating new evaluation paths, check the evaluation paths available as standard.
    18. Which situations require new evaluation paths?
    Ans. When using an evaluation path in a view, you should consider the following:
    Define the evaluation path in such a manner that the relationship chain always starts from a user (object type US in Organizational Management) and ends at an organizational unit, a position or a user.
    When defining the evaluation path, use the Skip indicator in order not to overload the result of the evaluation.
    19. How do you set up integration between Personnel Administration and Organizational Management?
    Ans. Integration between the Organizational Management and Personnel Administration components enables you to,
    Use data from one component in the other
    Keep data in the two components consistent
    Basically its relationship between person and position.
    Objects in the integration plan version in the Organizational Management component must also be contained in the following Personnel Administration tables:
    Tables                    Objects
    T528B and T528T     Positions
    T513S and T513     Jobs
    T527X                    Organizational units
    If integration is active and you create or delete these objects in Organizational Management transactions, the system also creates or deletes the corresponding entries automatically in the tables mentioned above. Entries that were created automatically are indicated by a "P". You cannot change or delete them manually. Entries you create manually cannot have the "P" indicator (the entry cannot be maintained manually).
    You can transfer either the long or the short texts of Organizational Management objects to the Personnel Administration tables. You do this in the Implementation Guide under Organizational Management -> Integration -> Integration with Personnel Administration -> Set Up Integration with Personnel Administration. If you change these control entries at a later date, you must also change the relevant table texts. To do that you use the report RHINTE10 (Prepare Integration (OM with PA)).
    When you activate integration for the first time, you must ensure that the Personnel Administration and the Organizational Management databases are consistent. To do this, you use the reports:
    •        RHINTE00 (Adopt organizational assignment  (PA to PD))
    •        RHINTE10 (Prepare Integration (PD to PA))
    •        RHINTE20 (Check Program Integration PA - PD)
    •        RHINTE30 (Create Batch Input Folder for Infotype 0001)
    The following table entries are also required:
    •        PLOGI PRELI in Customizing for Organizational Management (under Set Up Integration with Personnel Administration). This entry defines the standard position number.
    •        INTE in table T77FC
    •        INTE_PS, INTE_OSP, INTEBACK, INTECHEK and INTEGRAT in Customizing under Global Settings ® Maintain Evaluation Paths.
    These table entries are included in the SAP standard system. You must not change them.
    Since integration enables you to create relationships between persons and positions (A/B 008), you may be required to include appropriate entries to control the validation of these relationships. You make the necessary settings for this check in Customizing under Global Settings ® Maintain Relationships.
    Sincerely,
    Devang Nandha
    "Together, Transform Business Process by leveraging Information Technology to Grow and Excel in Business".

  • How to report database performance to upper management?

    Hello all. 
    I am looking for a way to report database performance to upper management.  I'll start by giving you an overview of our team structure. I manage a team of various roles: Level 2 support specialists, configuration managers, and DBAs - we are dubbed the
    "Production Support Team".  I report directly to the VP of Software Development who oversees the Design, DEV, and QA, team managers.  This means that our team, Production Support, can be considered a peer team of Design, DEV, and QA. 
    The manager of each team compiles metrics from their team members and reviews them on a weekly basis to ensure we are headed in the right direction.  We then take our metrics, and distill them down into a few key metrics that we then report to the VP
    of Software Development.  Those metrics are easy tom compile for the L2 support roles (number of tickets escalated, number closed, etc.).  However, I've been struggling with how to report DBA performance for a long time.  Every time I start
    to compile numbers, I end up with tons of things that are great for a DBA, but don't mean much to upper management.  Does anyone have any suggestions.  Surely I'm not the only person that has had this issue?
    I'd be happy to provide more info if needed.  Thanks!
    Clint

    are you using an RTF template ?
    in the RTF template you need to use this syntax for the HTML enabled field
    <?html2fo:MOSC_COMMENTS?>
    instead of <?MOSC_COMMENTS?>

  • O i need antivirus software if i am going to download office 365 onto my new imac?

    Do i need antivirus software if i am going to download office 365 onto my new imac?

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Research has shown that most successful attacks are "zero-day"—that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security makes you more vulnerable.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize by the file name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to know that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may be useful if it satisfies an ill-informed network administrator who says you must run some kind of "anti-virus" application.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Can anyone recommend any database software

    Hi,
    I am looking to obtain database software that can offer the same sort of features as MS Access, can anyone recommend any software? i am just starting up my own business and need to create something to store customer information etc.
    Thanks

    Unlike MacGunt, I have used Bento and love it. With the little bit of work I did at IBM using M$ Access, I found Bento to be head and shoulders above it. Access always seemed kludgy to me at best whereas Bento is an honest to goodness database manager.
    Seeing as how I retired now I don't have any business usage for it but I do it find it very useful for the club work I need to do.
    Two features I like are the templates which cover a broad range of database usage. I would think that one of those would be able to help you get started with your business needs. The other is the app which allows me to have the Bento database on my iPhone.
    Allan

  • I installed a new SSD drive in my computer and now Adobe Creative Suite Web Premium says I don't have a license. I have license. It was very expensive. I am disabled now, and I need this software working.

    I installed a new SSD drive in my computer and now Adobe Creative Suite Web Premium says I don't have a license. I have license. It was very expensive. I am disabled now, and I need this software working. Adobe Acrobat has been a primary tool for accommodating memory problems after a brain injury. (A car ran me down while I was out getting exercise.) I installed the SSD because I needed my management of PDF files to run faster. I called tech support for help when the software first stopped working, but they needed me to give them a number from my original disks. Because of my disability, I've been having someone come in to clean, and the shelves where I kept my software packages were cleared. I've been hunting for them ever since, but I can't look for them myself for very long at a time. Today I finally found them, but now I can't seem to contact tech support. What happened? I don't want to delete my old files because I need the setup to remain unchanged, because I don't do well with changes. I think all I should need is to have someone located the license file on drive E: and move it to wherever it is needed on the SSD drive, but I don't know what to look for.

    Tech support is not normally available on weekends.  You should contact them as soon as the weekend passes and pick up where you left off with them.

  • Installation error message for Oracle Database software for version 10g

    Would someone be able to advise why I keep getting the following error message whilst installing Oracle trial Database software for version 10g Release 2 Standard Edition, Standard Edition One, and Enterprise Edition? Link listed below : -
    http://www.oracle.com/technology/software/products/database/oracle10g/index.html
    Error message "Cannot create directory"C:\oracle\product\10.2.0\db_7\cfgtoollogs\dbca\projemp"
    Below is the 12 steps that I go through, please advise what I'm doing wrong : -
    1. (Operations) default is Create a database
    2. (Database templetes) default is general purpose
    3. (Database Identification) projemp.local for Global database name & projemp for SID
    4. (Management options) default is "Configure the database with Enterprise manager, also the options button has been clicked for "Use database control for database management"
    5. (Database Credentials) the options button has been clicked for "Use the same password for all accounts" so I've set up a new password, was that correct?
    6. (Storage options) the options button is clicked for "File System - use the file system for database storage.
    7. (Database file locations) the options button is clicked for "Use database file locations for template" Is this option correct? Other options are Use common location for all database files or use Oracle-managed files?
    8. (Recovery configuration) the options button is clicked for "Specify flash recovery area
    9. (Database content) nothing has been selected, the only option is "Sample schemas" should that be clicked?
    10. (Initialization parameters) the options button is clicked for "Typical- allocate memory as a % of the total physical memory
    11. (Database storage) no options available
    12. (Creation options) the options button has been selected for "Create Database"
    Click finish
    I then get a screen stating General purpose, click OK then I get the following error message as stated at the start of this e-mail ""Cannot create directory"C:\oracle\product\10.2.0\db_7\cfgtoollogs\dbca\projemp".
    Regards
    Phil

    855880 wrote:
    I have been trying to install the "Oracle Database software for version 10g Release 2 Standard Edition, Standard Edition One, and Enterprise Edition" about six times with no success.Do you realize you just mentioned 3 different and distinct products? So which one are you installing?
    >
    I've gone through my courses instructions as listed above (1-12) and end up with the following error message"C:\oracle\product\10.2.0\db_7\cfgtoollogs\dbca\projemp".What course?
    >
    I've removed the software from my computer using control panel, programs & features then uninstall once but the other five times the software hasn't been listed. Whilst the Oracle was on my task bar I was able to install using Start > Programs > Oracle - HOME-NAME > Database Administration > Database Configuration Assistant.No you didn't. Database Configuration Assistant does not remove software. It can remove a database. As I mentioned before, there is a difference between the software and the objects that software manages. Deleting an Excel spreadsheet is not the same as deleting Microsoft Office. Deleting an Oracle database with Database configuration assistant is not the same as removing the Oracle software.
    >
    Now that oracle is not on my task bar I've unzipped the link below, clicked on db, Disk1, setup, changed the Database password (is that correct?) install and I get the following error message "Check complete. The overall result of this check is: Failed<<<<<
    Problem: The install has detected that the primary IP address of the system is DHCP-assigned.
    Recommendation: Oracle supports installations on systems with DHCP-assigned IP addresses;
    However, before you can do this, you must configure the Microsoft LoopBack Adaptor to be the primary network adapter on the system. See the installation Guide for more details on installing the software on systems configured with DHCP."
    So what did you do with the above error message? Did you follow up on what it said? Did you read the very fine Installation Guide that comes with the software? Did you read the section on networking considerations where it discussed DHCP assigned addresses and installing the loopback adapter?
    http://www.oracle.com/technology/software/products/database/oracle10g/index.html
    Ok, that link takes us to the download page, which does not shed any light at all on your problems
    I'm using Windows Vista Home Premium, 32 bit operating system, and my computer is saying I have 142 GB free space.
    If you read the installation manual that came with the downloaded software, you'd have seen in the prerequisites that Home editions of Windows are NOT listed as supported platforms, whereas Business, Enterprise, and Ultimate editions specifically ARE listed as supportd.
    Hope this is some help.And
    I'm not to clever on computers so would you be able to advise how I get to the command window to issue the SET command please?
    Also I've no idea what OS user I am, I'm taking an on-line Oracle course and been advised to install "Oracle Database software for version 10g Release 2 Standard Edition, Standard Edition One, and Enterprise Edition"
    How do I find out if I'm part of an Administrator, ORA_DBA group ?
    Can you walk me through how to create the directory from command line please?Ok, given the above statements from you, I'm not even sure where to begin. I don't want to be cruel, but this self-admitted lack of even the most rudimentary knowledge by someone attempting to learn about Oracle is truly astounding. What course are you taking? Why are you taking this course?

  • Query Database - Write to Database

    I am querying a SQL DB which has 10 results in total with 15 fields each. The run book will filter out 2 eventually based on some rules.
    Once all the activities are complete as per the runbook, I want to write back to the database as 'Complete' under Field called Status
    The write works, however it creates a new item completely. I want to update the existing request
    Regards, Vik Singh "If this thread answered your question, please click on "Mark as Answer"

    So if I understand correctly you are querying a database and based on the response you do some activities and then you want to update the records you queried in order to indicate that the activities have been completed?
    If you just want to update the existing records then I would probably just do an Update query based on the primary-key of the record you queried using the "Query Database" activity instead of the "Write to Database" (which always writes
    a new record).
    Something like: Update [Table Name] set Status = 'Completed' where PrimaryKey = 'xxx'
    You will probably need to cut up the Query Result from your first query first in order to get the Primary Key.
    Usually I do this by reading Published Data "Full Line as String Seperated by ;" with a PowerShell Script (Run .NET Activity).
    For example:
    $Query = <Full Line as String >   //Published Data from the Query activity
    $All_Records = $Query.Split(";") //this creates an array where every record is a column from the query result
    $PrimaryKey = $All_Records[0]  (if the primarykey is found in the first record of the array of course)
    Then use that $PrimaryKey value in your new query.

Maybe you are looking for

  • Convert contents of a formatted excel cell to HTML format

    Hi All, Background: I am writing a script that uploads some test cases written in excel into Quality Center. For those who are familiar with the QC Excel Addin, this script would do a pretty similar job except for reducing the steps involved. I'm usi

  • Apache 2.0.35 httpd.conf issue with Win2k WLS 6.1sp2 Cluster

    Hi,           Anybody has a Win2K Apache 2.0.35 httpd.conf that works           with a WLS 6.1sp2 Cluster?           I am getting errors like           "..Cannot load D:/Apache2.0.35/Apache2/modules/mod_wl_20.so into server: The           specified p

  • How to check in my db have db-link and table name also

    Is there any query which shows table information which could be access through db-link.

  • How do I resolve duplicate contacts

    How do I resolve duplicate contacts in Address Book? I've used the Look for duplicates feature, but nothing shows up and there are clearly duplicates in my address book. I am using iCloud. Though didn't connect my desktop until recently. My iPhone an

  • Why won't the App Store on my iPod touch stay open?

    Every time I open the App Store on my iPod it closes. It will stay open for a minute at the most. It won't ever stay open. :/ I don't know what to do.