Has anyone used "PentaSafe VigilEnt Security Agent Lite for BEA WebLogic"?

it has an eval on BEA's web site, see
http://commerce.bea.com/SoftwareProductDetailWLS?SWName=VigilEnt+Security+Ag
ent+Lite&SWVersion=Version+1.0&SWPlatform=Windows+NT+4.0
feedback is appreciated.
thanks.

Send this to:
newsgroups.bea.com / security-group.

Similar Messages

  • Has anyone used reMIDI as a plug-in for GarageBand. I downloaded a trial version of reMIDI, which enables MIDI instruments to be strummed or arpegiated, but can't get it to work in Garageband.  How do I set it up?

    Has anyone used reMIDI as a plug-in for Garageband ('08)? The program allows MIDI instruments to be strummed or arpegiated. I have a trial version, but can't get it to work in Garageband. Wonder how to set it up.
    Thanks, Doctor Mark

    Port Forwarding.....or Port Mapping....as Apple calls it is a difficult and complex configuration method for most users. Because there are so many variables involved in this type of setup, it is not possible to provide a step by step guide that will work for everyone with all devices.
    It is possible that a setup guide exists for the the WD drive and AirPort Extreme, but you will have to go looking for it on the Internet. Even if you find one, it may not be tailored to your specific situation or needs.
    Sometimes, you can do everything right....at least according to someone's article or "how to" guide, and things still will not work correctly.
    In situations like this, when you really don't know what to do, you need to enlist the aid of an IT pro, who will know what to do based on your particular products and unique circumstances. Sometimes....they won't be able to get things working either due to particular circumstances.
    But, before you do this, I would strongly recommend that you use a Static IP address for your Internet connection with your ISP. If you do not have this now, contact them to ask them if they offer this type of connection. Expect to pay more for this type of service, of course.

  • Has anyone used the IC Interactive scripting editor for the Webclient ?

    We originally received the 'Loading %0' message when loading the editor via the IC_MANAGER business role. This was overcome by updating Java (See note 717921).
    However, the editor now seesm to working, I can see two examples as standard, but when I click on them I do not see anything.  I've ifnored this issue and have started to create my own question and answers in preparation for a script.
    However, I have hit a few quirky things while using editor. Am I alone in this, or is this just the way it is.
    I'm using the latest version of CRM 7.
    If anyone's used this script editor I would dearly like to hear from you, especially in avoiding any upcoming nasties that I may hit.
    A perfect example of this kind of problem is in how you create 'Answers'. If I highlight the answer section and click on the 'Create' button I have the options to create the following: Field, Objective script, Question, Action, Button and script, of which none of these are what I want. I can however create a question with an answer section, but of course when it comes to dragging a answer in to the answer box I can't do this as I can't create any answers. Am I missing something?.
    With regards
    Jason

    Hi,
    We are facing similar kind of problem in our scenario "Loading 0%". We have crm7.0, IE6 and JRE 1.5.0 version.
    Kindly help us, which version of JRE do we need to use?
    we reffered notes: 1105843, 717921. However this did not help us.
    Kindly help us.
    Thanks!

  • Has anyone used Apple Maps (on the Mac) for RoadTrip planning?

    I would like to use Apple Maps to plan a road trip, but I don't see a way to drop multiple pins for multiple locations.  for example, I'd like to visit South Dakota, specifically, Custer and DeSmet, but I'd also like to visit Devil's Tower in Wyoming, the petrified forest which is close by, some caves, etc.  I would like to be able to set my starting point and drop some pins for points of interest and then figure out what else is around those points of interest (PINs) such as restaurants, hotels, historical sites, etc.  And finally be able to pull all this together so I can figure out the road trip.
    Has anybody done this and if so would you be willing to share some tips?

    I don't see a way to drop multiple pins for multiple locations
    This can't be done with Maps at this time. The best you can do is amass a set of bookmarks that contain a maximum of one starting point and one ending point with no way to organize them beyond the order in which they were created. (A completely fruitless exercise in my experience.)
    IMO, you're much better off creating maps with Google Maps, saving those maps, then accessing your saved maps through the Google Maps app (in its settings) on your iOS device or via the Web on a Mac. You can also use the Google Maps app in conjunction with the TripAdvisor app and even the OpenTable app to navigate to places to stay and eat anywhere in the country.
    (Don't underestimate the value of paper maps for long road trips like this, either.)

  • Has anyone used Mountain Lion with Time Machine for the WD MyBook Live Duo

    This NAS is working with OSX Lion.  But since I had trouble moving up to Lion with my previous WD NAS drive, I want to make sure that it works.
    Thanks

    Upgraded to Mavericks yesterday.  Seems to have gone well except for one thing.  My computer will not recognized my WD MyBook Live 3T and thus Time Machine will not work with it.  My wife's MacBook Pro is still running 10.6.8 and her computer is still working properly and doing back ups.  Called Western Digital Tech support and Apple Tech Support.  Not much helpl there.  I attempted to download and use the newest sofware (during Mavericks installation I did get a warning that the old WD software was not supported).  However, one of the first steps is getting the software to scan for the backup drive.  No dice.  The computer is not recognizing its existence at all in any place you might look.  So I am stuck and frustrated at this point.  I have plugged and unplugged things.  The MyBook Live is hooked up directly by ethernet cable to an Airport Extreme router.  My computer is hooked up by ethernet cable to the router and my wife's laptop uses the WiFi connection.  Apple Tech suggested a direct hookup to my computer.  My computer still would not recognize it.

  • Has anyone used JAAS with WebLogic?

    Has anyone used JAAS with Weblogic? I was looking at their example, and I have a bunch of questions about it. Here goes:
    Basically the problem is this: the plug-in LoginModule model of JAAS used in WebLogic (with EJB Servers) seems to allow clients to falsely authenticate.
    Let me give you a little background on what brought me to this. You can find the WebLogic JAAS example (to which I refer below) in the pdf: http://e-docs.bea.com/wls/docs61/pdf/security.pdf . (I believe you want pages 64-74) WebLogic, I believe goes about this all wrong. They allow the client to use their own LoginModules, as well as CallBackHandlers. This is dangerous, as it allows them to get a reference (in the module) to the LoginContext's Subject and authenticate themselves (i.e. associate a Principal with the subject). As we know from JAAS, the way AccessController checks permissions is by looking at the Principal in the Subject and seeing if that Principal is granted the permission in the "policy" file (or by checking with the Policy class). What it does NOT do, is see if that Subject
    has the right to hold that Principal. Rather, it assumes the Subject is authenticated.
    So a user who is allowed to use their own Module (as WebLogic's example shows) could do something like:
    //THEIR LOGIN MODULE (SOME CODE CUT-OUT FOR BREVITY)
    public class BasicModule implements LoginModule
    private NameCallback strName;
    private PasswordCallback strPass;
    private CallbackHandler myCB;
    private Subject subj;
             //INITIALIZE THIS MODULE
               public void initialize(Subject subject, CallbackHandler callbackHandler, Map sharedState, Map options)
                      try
                           //SET SUBJECT
                             subj = subject;  //NOTE: THIS GIVES YOU REFERENCE
    TO LOGIN CONTEXT'S SUBJECT
                                                     // AND ALLOWS YOU TO PASS
    IT BACK TO THE LOGIN CONTEXT
                           //SET CALLBACKHANDLERS
                             strName = new NameCallback("Your Name: ");
                             strPass = new PasswordCallback("Password:", false);
                             Callback[] cb = { strName, strPass };
                           //HANDLE THE CALLBACKS
                             callbackHandler.handle(cb);
                      } catch (Exception e) { System.out.println(e); }
         //LOG THE USER IN
           public boolean login() throws LoginException
              //TEST TO SEE IF SUBJECT HOLDS ANYTHING YET
              System.out.println( "PRIOR TO AUTHENTICATION, SUBJECT HOLDS: " +
    subj.getPrincipals().size() + " Principals");
              //SUBJECT AUTHENTICATED - BECAUSE SUBJECT NOW HOLDS THE PRINCIPAL
               MyPrincipal m = new MyPrincipal("Admin");
               subj.getPrincipals().add(m);
               return true;
             public boolean commit() throws LoginException
                   return true;
        }(Sorry for all that code)
    I tested the above code, and it fully associates the Subject (and its principal) with the LoginContext. So my question is, where in the process (and code) can we put the LoginContext and Modules so that a client cannot
    do this? With the above example, there is no Security. (a call to: myLoginContext.getSubject().doAs(...) will work)
    I think the key here is to understand JAAS's plug-in security model to mean:
    (Below are my words)
    The point of JAAS is to allow an application to use different ways of authenticating without changing the application's code, but NOT to allow the user to authenticate however they want.
    In WebLogic's example, they unfortunately seem to have used the latter understanding, i.e. "allow the user to authenticate however they want."
    That, as I think I've shown, is not security. So how do we solve this? We need to put JAAS on the server side (with no direct JAAS client-side), and that includes the LoginModules as well as LoginContext. So for an EJB Server this means that the same internal permission
    checking code can be used regardless of whether a client connects through
    RMI/RMI-IIOP/JEREMIE (etc). It does NOT mean that the client gets to choose
    how they authenticate (except by choosing YOUR set ways).
    Before we even deal with a serialized subject, we need to see how JAAS can
    even be used on the back-end of an RMI (RMI-IIOP/JEREMIE) application.
    I think what needs to be done, is the client needs to have the stubs for our
    LoginModule, LoginContext, CallBackHandler, CallBacks. Then they can put
    their info into those, and everything is handled server-side. So they may
    not even need to send a Subject across anyways (but they may want to as
    well).
    Please let me know if anyone sees this problem too, or if I am just completely
    off track with this one. I think figuring out how to do JAAS as though
    everything were local, and then putting RMI (or whatever) on top is the
    first thing to tackle.

    Send this to:
    newsgroups.bea.com / security-group.

  • HT204387 Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Has anyone used their ip4 or higher with the text messaging sync system in the new ford cars it is call map

    Send this to:
    newsgroups.bea.com / security-group.

  • Has anyone used Malwarebytes or anything similar to protect Mac from virus etc

    Has anyone used Malwarebytes or something similar to scan Mac for virus and other security and effiency problems?

    I should have been more specific, I wasn't given a Mac to keep, I was given a Mac to clean up. I have almost 20 years experience working with personal computers and I've worked on every major OS that's been released during that time (OS/2, every version of Windows since 3.1, Linux, Mac OS, Unix). I no longer work in a shop specifically fixing computers but my family still gives me their computers to look at whenever they have issues. My cousin just gave me her laptop since she was unable to fill out any web forms that would try to verify her e-mail address, plus she kept getting pop ups to run some MacKeeper software. Had this been a computer I received second hand I would have re-installed the OS regardless of the state it was on, but since she needs the files on her computer for school I figured it'd be much easier to run a Mac OS equivalent of Malwarebytes than to backup everything and re-install the OS.
    Unfortunately when you search the internet for a Malwarebytes alternative for Mac OS, the majority of the time you just get posts from people saying "Macs are super secure, don't worry about it you won't get infected", which is a completely useless response for someone whose computer is infected. The rest of the posts responding to people who ARE infected are much like your response "Just re-install the OS" but that doesn't address the underlying issue of what's infecting the computer for those people who can't afford to lose everything. I was eventually able to Google the symptoms of this issue and determine that it was a trojan known as DownLite or VSearch. Once I found where it was located I opened up a terminal, ran sudo su to elevate myself to root, deleted the VSearch folder and files from the terminal, ran ps ax | grep VSearch to find the running application and did a kill -9 [pid] to terminate the app (rather than rebooting.)
    Once that was all done I was able to use Chrome and Safari without all of the popups and hijacks. It took all of 5 minutes once I knew what the underlying issue was but I was really hoping to find a program like Malwarebytes so I could just let it scan the computer and tell me "These applications are malicious..." especially since my cousin installed a lot of stuff I would consider junk on her laptop and I didn't want to delete things that are just harmless junk (since she might use them.) Since I ended up having to do this all manually I'm just hoping there's nothing else lingering on the computer that didn't have visible symptoms.

  • Has anyone used bluetooth hotspot in car for ichat

    Has anyone used ichat on ipad through bluetooth conntection in car?

    You might try the [Approval Workflow Engine (AWE) for HCM 9.0|https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y] red paper. You can find it on Metalink3 at [https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y|https://metalink3.oracle.com/od/faces/secure/km/DocumentDisplay.jspx?id=747740.1&h=Y].

  • Has anyone used infin to assist in troubleshooting ?

    I had a security problem when my firewall was temporarily turned off.  A tech company named "infin" assisted me with the problem and with a printer problem.  Since assisting me, the tech said that the company will no longer be in business.  Has anyone used "infin" for assistance because the tech said his company does a lot of work on Apple products. I am trying to find out more on the company.

    How did you find that company?
    Did you allow them remote access to your computer?
    Did you give them credit card details?
    If you google their name, you'll find several entries. I've never heard of them. And no, I've never used them - nor would I ever. Why deal with an unknown company when I can call Apple tech support or visit a Genius Bar in the Apple store free of charge?

  • Has anyone used a Dell 1908FPb with a MacBook Pro OSX 10.6.8?  What do I need to get/do?  thanks

    Has anyone used a Dell 1908FPb with a MacBook Pro OSX 10.6.8?  What do I need to get/do?  thanks

    Hi 4judy,
    If you are looking to use an external display with your MacBook Pro, you may find the following articles helpful:
    Apple Mini DisplayPort adapters: Frequently asked questions (FAQ)
    http://support.apple.com/kb/ht3382
    OS X: How to use multiple displays with your Mac in Mountain Lion and earlier
    http://support.apple.com/kb/ht5019
    Regards,
    - Brenden

  • Has anyone used Aperture 2.0 with 8800GT?

    Has anyone used Aperture 2.0 with the new 8800GT? I'm about to order a new Mac Pro and wonder if Aperture will get a speed boost with the 8800GT over the HD 2600XT. I've read many times that Aperture is very GPU dependent, but then I've also read, on Barefeats.com for example, that the graphics card really doesn't do that much of a difference after all.
    For me, on my dual 2.0 G5 with 4.5GB and a X800XT, what's been most annoying with Aperture 1.5 has been the slow load times for raw images (15-20MB). But now with the quick preview mode in Aperture 2.0, that really isn't an issue any more.
    Is the 8800GT worth waiting for, or should I just get the Mac Pro now with the HD 2600XT?

    Hi Don
    I'm using Aperture 2.0 with the 8800GT. My system is the new MacPro 8 core 2.8GH with 10GB RAM. I'm shooting Nikon D3 lossless compressed RAW files. Approximately 12-14MB each.
    I do not need to use the quick preview mode. Images open instantaneously,either fit to screen or 100%. All the image adjustments are shown with no time lag. My D2X uncompressed raw files,19MB, display in approximately one second with quick preview turned off.
    I'm no MAC hardware expert so I don't know how much the speed is the result of the 8800GT but I'm just one happy camper.
    Hope this helps
    John Blake

  • Has anyone used the QuickUSB module (Bitswise Systems) to interface to a USB Camera via IMAQ for USB?

    Has anyone used the QuickUSB module made by Bitwise Systems with LabVIEW for image acquisition.   I have a USB camera and I'm trying to use the IMAQ for USB controls to no avail.   Any input is appreciated. 

    Are you using the NI-IMAQ for USB functions or are you calling the QuickUSB libraries from LabVIEW?  Unless the USB camera is DirectShow compliant, then it will not work with the NI-IMAQ for USB driver.  You can use the Code Interface Node in LabVIEW to call external dll's, and it looks like from QuickUSB's website that is the best way to go.  Hope this helps.
    Jason N 

  • Has anyone used Thunderbolt or USB 3.0?

    In the not too distant future I am intending to upgrade from my 2008 24"  2.8GHz iMac.
    The new models appear to have gone down the Thunderbolt route which appears to be not very popular with HDs being few and far between and very expensive.
    USB 3.0 whilst theoretically only half the speed seems to be taking off and reasonably cheap, and appears to be more universally adopted.
    Could Apple have backed the wrong horse on this occasion?
    Sorry, I was just thinking aloud, definitely not speculating.
    So has anyone used Thunderbolt and got anything good or bad to say about it?

    Not personally:
    The german computer-magazine c't tested the Promise Pegasus R6 Thunderbolt and found it speedwise way ahead of USB 3.0 and eSATA.
    As a RAID-Level 0 with 6 x Hitachi HDS721010CLA332 (7.200 U/min, 1TB each) and MBP 13" 2011 OSX 10.6.8:
    Write - 693 MByte/s
    Read - 721 MByte/s
    Read AND Write - 323 MByte/s
    Time Machine -capable and OS X Bootable.
    0.8 Sone when active
    61.6 W active - 48 W when not used.
    Sadly the article is not avaibale other than Printed.
    Stefan

  • Has anyone used Fat Cat Software to merge multiple iPhoto Libraries?

    Has anyone used Fat Cat Software to merge multiple iPhoto Libraries?

    I used it several years ago to merge libraries without problem. I cannot speak to the current version. It goes without saying that you need to have a very good backup before you use that sort of software (if you do).
    Barry

Maybe you are looking for

  • Strange soapUI TimeOut

    Dear, I've a very simple asynchronous scenario: web service -> SAP PO 7.4 -> file. Without a operation mapping in my ICO object, it performs as expected. But when I include the operation mapping, containing a graphical message mapping with only 2 fie

  • Queries on extension points

    1)Using Extension Point, can we modify the Query during report runtime. a. E.g. We have a requirement to dynamically append the WHERE clause based on the BO User. Can we write a function on click of Run button to append the Where condition of the que

  • How do I NAT based on destination port while source port can be ANY

    Goal - I want to forward Internet bound HTTP and HTTPS traffic  to a Proxy via an IPSEC Tunnel - I want to maintain my private IP as it goes accross the IPSEC Tunnel - I also want remaining Internet Traffic to route Normally by NATing to my outside a

  • Asking for sims card on my iPhone?

    asking for sims card on my iPhone?

  • Elements 9 startup problem

    I had to restore my computer and re-installed Elements 9.  When I click the icon I get a Welcome page, not the program. It has an organize block and an Edit block on the left and something about creating an Adobe id to register the software which was