Help Me Catch a Thief!!

I am trying to import video from a DVD from a security camera system. We experienced a robbery and we need to check out the footage to determine who the People are. So heres my situation:
I have been provided with a DVD with the robbery footage.
If I open it in DVD player it works fine but I need a way to be able to export screen shots.I tried doing a export in Toast 7 to.dv but it was unsucessfull.
Final Cut will bring in the VOB file - but it is only 20 seconds of the 20 minutes of video. Where is the other 20 minutes? How can I view them.?
The only other VOB is just the menu.
The .BUP and the .IFO are not able to be opened with final cut.
So I have 2 requests:
1. i need a way to view the entire video in final cut.
2. Once it is there is there someway that i can get it to automatically create stills from a selected area of the clips?
( I can always try to do screen shots from the DVD player, but it will certainly be more painful.

You could also get an analog to digital converter. Plug a dvd player into this and you can send it via firewire to your computer. In your log and capture settings, set the device control to "non-controllable device" and you can capture all of the video just like you would any other clip.
To make stills just find the frame you want to make a still of and go to File>export. Under format select still image. You can select what type of still to save it as under the options tab.

Similar Messages

  • To Catch a Thief, which version is this?

    I was wondering if To Catch a Thief on the itunes store is the deluxe edition DVD version or the old 2002 DVD version because if it is the newer DVD, it will have stereo audio and a remastered picture. I know that this is probably an impossible question to answer but if it is the new version it would be worth purchasing for me since I have 15 dollars left over on my gift card and I have nothing else to get except for this.

    You are running Leopard!
    Start by checking if you can run Snow Leopard:
    Requirements for OS X 10.6 'Snow Leopard'
    http://support.apple.com/kb/SP575
    The OS 10.6 Snow Leopard install DVD is available for $19.99 from the Apple Store:
    http://store.apple.com/us/product/MC573/mac-os-x-106-snow-leopard
    and in the UK:
    http://store.apple.com/uk/product/MC573/mac-os-x-106-snow-leopard
    but nobody knows for how long it will be available.
    When you have installed it, run Software Update to download and install the latest updates for Snow Leopard.
    You should now see the App Store icon, and you now need to set up your account:
    http://support.apple.com/kb/HT4479
    To use iCloud you have to upgrade at least to Lion, but some functions are only available in Mountain Lion:
    http://support.apple.com/kb/HT4759
    You can also purchase the code to use to download Lion (Lion requires an Intel-based Mac with a Core 2 Duo, i3, i5, i7 or Xeon processor and 2GB of RAM, running the latest version of Snow Leopard), or you can purchase Mountain Lion from the App Store - if you can run that:
    http://www.apple.com/osx/specs/

  • Help to catch the output of a Transaction

    Hi,
    I have this issue and need help, I have a program lets say "ZPROGRAM", this programs calls a RFC "ZFUNC" this function must be able to send the parameters to execute a SAP standard transaction for example MB51, the function must send the plant number, storage location, and material number, then this RFC must catch the output of the report into an internal table so that i can work with the output in "ZPROGRAM", in other words what I see on screen as result of MB51 I need it in an internal table so that I can manupulate the data.
    I hope someone could tell me how to accomplish this.
    Thanks in advice.

    Hi,
       Pls try
        DATA list_tab TYPE TABLE OF abaplist.
        DATA vlist  LIKE  table of LISTZEILE WITH HEADER LINE.
        submit RM07DOCS
          with XXX
          EXPORTING LIST TO MEMORY
          and return .
          CALL FUNCTION 'LIST_FROM_MEMORY'
            TABLES
              listobject = list_tab
            EXCEPTIONS
              not_found  = 1
              OTHERS     = 2.
       CALL FUNCTION 'LIST_TO_ASCI'
          EXPORTING
            list_index         = -1
          TABLES
            listasci           = vlist
            listobject         =list_tab
          EXCEPTIONS
            empty_list         = 1
            list_index_invalid = 2
            OTHERS             = 3.
    Regards,
    Pole
    Edited by: Pole li on Jul 17, 2008 3:57 AM

  • Help me catch my hacker...please!

    Hi. I have an old Mac Pro 1,1 (2007 I believe), OSX 10.7.5 that has been hacked. I have read some of the questions here so I'll try to include all the necessary info. some of the things that have happened are that a new admin user account is on my computer where I have never created any other account and was using my admin account solely which I now know is not smart. I see the new account at the login screen although it tries to look like it is my account, same icon, but it thankfully can't shut down or restart the computer. I am the sole user of my computer and no one else has access to it physically. also, I can no longer throw anything into the trash. Everything just gets moved somewhere as I can see this from the dialog box that pops up. Also, I have to enter a password just to throw anything away(!), but the trash bin always remains empty so nothing ever makes it there but is obviously going elsewhere. The other thing is all my files are now locked and password protected which of course I didn't do. So, hopefully this all shows my computer has indeed been hacked. In fact, I do know who has done this and he's hacked my iphone as well. He currently lives in another country and when I did wipe my phone and enable location services I started getting ads for the nearest major city of that country where he lives and he is the only person I know who lives in that country. I have other info too as to how I know who it is but won't go into it here. He is some guy I used to know who somehow thinks I'm responsible for him losing his job which is completely preposterous. I know he's gone after my finances but thus far has not been able to access them. My email, which I never check on my home computer or phone anymore, will even on my home computer keep trying to connect to paypal. When I've logged into AppleID on my phone to download apps he has changed my AppleID password & security questions but I was fortunately able to change it and get back into it. He put security questions I would never use like asking something about dates and I never remember dates.
    Anyway, I really need to catch this guy as I have info that he has done this to others as well. I know I could just wipe my machine but that is not something I want to do. While my mac tech guy is normally great he doesn't even believe a mac can have a virus and wants to debate that so for him to believe my computer could have been hacked is impossible so he wouldn't help me. I have contacted a couple other techs I know but one was PC-oriented and the other who does some work on macs said he didn't have enough mac experience when I told him the litany of things happening on my computer and phone. So, I am turning to the good people of this forum to help me do this myself as I know you guys are great from past experience with minor computer issues.
    What I've done so far, mostly from reading these forums: I ran EtreCheck and the only thing that came up looking off was a version of Adobe Flash Player I downloaded that EtreCheck says was a mismatch in their red type. I believe that is how the hacker got his software on my computer. I made visible all the users/accounts and nothing looked funny but a lot of this stuff is greek to me as I have never used the Terminal before. I did find a root user and so disabled that. I have looked through all the Processes, and ran that 5-step terminal thing you guys recommend here that shows preferences & launch agents, etc. and looked and looked but see nothing off. I unfortunately had my computer rather wide open before and so now have done all the normal user things to tighten my security and have Little Snitch and Avast Security on my computer. Oh, I did find the Genio-L bug through MacScan and deleted that. My computer had been running at a crawl but is now faster. Also, I had read something about hackers getting access through Bluetooth and saw besides my keyboard and mouse (my modem is wired so I don't have WiFi) some third item listed. I deleted it as it looked suspicious with very little info on it compared to my other devices. (I forgot to take a screenshot of it.) I have also made all files visible through the Terminal. I was looking around in the Private/Etc files but I don't really know what i'm looking at. Also, I found 3 applications that were loading automatically on login so I deleted them: Adobe Resource Synchronizer, Optimism Agent (Optimism software I have) and FontExplorer.
    Anyway, I would love recommendations for how to find this hacking software which I'm assuming can be found through the Terminal. I did try to use Deeper but when I tried to get it to show all the IP addresses for the users on the login page it had an applescript error come up. It said:
    FSPathMakeRef (/System/Library/CoreServices/HelpViewer.app) failed with error -43. (1)
    i'm sure this guy probably has some pretty sophisticated hacking software, which I understand can even be parental control software. I have reason to believe he has put a keylogger on my computer. So, if there is a way to catch this guy please, please give me some tips but do explain everything really simply & step by step as I know nothing about using the Terminal despite the few things I've done. I was reading under the ssh and it says something about -x being used to disable keyloggers from forwarding info. I do seem to have the applicaton X11 on my computer which I never noticed before. There was also something under ssh about ~# which can list all forwarded connections. Of course I don't know how or where to do these things but if you guys think it would help then I'd totally appreciate directions on how to do these things.
    Sorry for writing an essay but I may not be able to get back to this computer for 3-4 days so wanted to give plenty of info for the questions you guys usually ask. Thanks in advance for any and all help!

    I went ahead and repaired the permissions and the disk itself didn't need any repairs. I still really don't want to wipe my HD, and haven't yet, because I want to catch this guy. can you guys give me a code to enter into the Terminal to show all hidden admin users? I tried something I found on these forums to unhide all 500users but i'm not sure if it was for Lion. (btw, the descriptions for this forum are off. i have a silver tower, it's definitely a mac pro 1,1 and am running Lion 10.7.5) anyway, the terminal said in response:
    sudo: /private/etc/sudoers is mode 0446, should be 0440.
    this response was before I repaired the permissions.
    to address Kurt's question of why i'm convinced I have a hacker I didn't share everything in my OP partly because it was already so long and party because some info I don't feel comfortable sharing online. suffice it to say I have solid knowledge that I've been hacked. I was 99.9% sure of who it was and when the location-based ad on my iphone came up for the country this person currently lives in I knew I was right. think of it like this, if you knew one person who lived in Latvia and suspected he was for sure the person who hacked your computer/phone because you know he's done it to others you know, and suddenly your phone in the US starts getting ads for the nearest major city to where the person lives in Latvia, right after you enabled location-based ads, you'd be pretty sure you suspect the right person. as to how I know this is for sure a hacking I am not comfortable going into on a public forum. suffice it to say, I know without a shadow of a doubt. obviously, the fact that I have an additional admin account on my computer when I live alone and no one, and I mean no one, has physical access to my computer is quite a good indicator.
    just earlier today I had additional problems on my iphone 4. (in the last week I've reset the settings several times whenever I have like one or two bars for my connection which is definitely not normal. resetting the settings seems to be really helping the connection.) this morning I was reading on safari (on the NPR site) and suddenly my phone goes black and the same screen I see when my phone is resetting shows up (all-black screen with white horizontal progress bar). something was being reset so I immediately tried to turn off the phone and it wouldn't turn off, but it did not let the progress bar continue with whatever was happening as long as I held the power button down. then after awhile of doing this, the screen suddenly went back to my usual NPR page. I immediately turned off my phone and will reset it when I turn it back on.
    so, my question is how protect my phone? I have erased it previously, but don't want to do that again as I can't risk logging into Apple ID on it again, to download apps, as last time I did that my Apple ID password & security question as got changed and I had a hard time getting back into it. what I have done so far is to use a password, set a restrictions password and I have turned off most locations settings and limited ad tracking. when this all started awhile ago the app I use the most, a newspaper, suddenly popped up with a survey that it tried to force me to click on and take. there was no option not to take the survey and the website address it showed ended in .xyz as if that is a real legitimate site. what I did was close the app and delete it as I knew this had nothing to do with this major newspaper app. it was directly after that that the location-based ad in this guy's country started coming up. so, how the heck can I keep this guy off my phone now? I still want to catch him and am hoping I can somehow do that either on my computer or phone. no one should be allowed to do this to another person. it's been a nightmare. again thanks for any and all help.

  • Help try catch

    im experiment trying to make a calculator applet and have the usual:
    plus
    minus
    multiply
    divide
    etc
    which i have enclosed the action to these buttons in a try catch to ensure data is entered and it is correct. I have also 4 special buttons that i want to add but dont need any data to be entered so i have placed them outside the {} of the try catch but when i click on buttons it seems they are still being caught in the try catch
    any help would be most appricated

    Well,
    Its very difficult to say why your unguarded code is behaving like the guarded section as if it is inside try block.
    better post ur code along with your query, it will help analyze the problem better.
    Kind Regards
    Rahul Bajaj

  • HT1267 I had one iphone stolen so I bought a new one now I want to load Find Iphone so I can catch the thief next time. How do I do this?

    I had my Iphone stolen so I went bought another one and want to load Find Iphone but don't know how.  Can you help me?

    iCloud: Set up Find My iPhone

  • 10.3.9 - Will upgrading to 10.4 help me catch up with the rest of the world

    I have a 1.25 gHz, 17" iMac running 10.3.9 with 512 MB of RAM.
    My problem is that the world seems to be moving away from me.
    More and more websites say my Flash version is too old for them; YouTube tells me my browser is no longer supported to name but two of the problems I now face. As far as I know I have the latest version of everything (Flash, browser etc.) that will run on 10.3.9.
    I gather the latest OS my Mac can run is 10.4.11. Assuming I can track down a copy cheap, will installing it resolve some of these type of issues?
    The thing is, I'm a bit anxious about upgrades generally. From my modest experience, I've found that every time you do it you fix one bug and introduce six more which then starts you on a costly spiral of software purchases and hours and hours of setup headaches and learning curves in order to get you back where you started. I've spent a long time getting my system working in harmony with my various external devices and if it were down to me I'd just leave it alone. But sadly the world won't let me.
    I realise this is a policy thing from the software industry, but for folk like me for whom cash is tight it's frustrating. I'm happy to live without new features - I just don't want to lose old ones.
    So will upgrading make any difference at all to my issues or should I stay put?
    Any thoughts or advice gratefully received.

    Here's the spec page on your iMac. http://www.everymac.com/systems/apple/imac/stats/imac1.25_17fp.html It's capable of running Tiger 10.4 or Leopard 10.5.
    Here's the Tiger & Leopard requirements.
    *OS X 10.4 Tiger Requirements*
    http://docs.info.apple.com/article.html?artnum=301341
    *Mac OS X 10.5 Leopard installation system requirements*
    http://support.apple.com/kb/TA24950
    Either OS will run on 512MB RAM, but would run better with 1GB RAM. Tiger will probably be OK for another year or so, then you may begin to have the same problems you are experiencing with Panther. I made the Panther to Tiger upgrade on a G4 desktop & G3 laptop without problems.
    Tiger & Leopard install DVDs are in short supply and are no longer available at the Apple Store *but may be available for $129 by calling Apple Phone Sales @ 1-800-MY-APPLE (1-800-692-7753)*. For other sources for Tiger, do a Google search for MA453Z/A (10.4.6), MA190Z/A (10.4.3) and M9639Z/A (10.4) . Also look on eBay. Be sure & buy a retail version (black with silver X) and not a model specific version (gray) (See Can I use another Mac's system restore disc on my Mac? ).
    Also check these web stores: http://www.lacomputercompany.com/cgi-bin/rpcart/index.cgi?command=dispitem&type= sku&sku=19521 http://www.allmac.com/shop/index.php?cPath=5_10003
    Possible Alternative if you are currently using Panther 10.3 – Do a Google search for Tiger 10.4 Upgrade DVD . It will upgrade your 10.3 to 10.4, but it doesn’t contain the full retail Tiger installer. Should be cheaper than the retail Tiger install DVD.
    After you install the base 10.4.x, update to the final Tiger version 10.4.11. Here's the link for the 10.4.11 combo update http://support.apple.com/kb/TA24901?viewlocale=en_US
    Look at this link Mac OS X v10.4 Tiger Installing Software Support Page
    http://www.apple.com/support/tiger/install/
    You can also download the Tiger Installation and Setup Guide
    http://manuals.info.apple.com/en/TigerInstall_SetupGuide.pdf
    Installing Mac OS X 10.5 Leopard
    http://support.apple.com/kb/HT1544
    Mac OS X 10.5 Leopard Installation and Setup Guide
    http://manuals.info.apple.com/en/leopard_install-setup.pdf
    When you upgrade the OS, do it via Archive & Install. See About the Archive and Install feature http://support.apple.com/kb/HT1710
    Be sure to select Preserve Users & Settings. Also, repair permissions before and after the install.
     Cheers, Tom

  • Please help me to find my iPad and iPhone 5C. I lost all of them last night. I set up icloud for my devices but i can't find them because they were not connect to the Internet. Please guide me other ways to find my "best friends".

    Dear Apple,
    Please help me to find my iPad Air 2 64 GB and iPhone 5C 8GB. They're in IOS 8.0 maybe...I lost all of them last night. I set up icloud for my devices but i can't find them because they were not connect to the Internet. Please guide me other ways to find my "best friends". They're very important to me. Many important files for my job in here and it has sentimental value to me. My boyfriend gave it for me so i don't want to lose them. And because i just lost my iPad Air last 3 month, and now i just bought iPad Air 2 two months ago. I'm so sad and lost. I want to catch the thief to the police so bad because they keep my bag and many other important things. I can not do anything without them. Please help me and contact me via my email or my phone. Thank you very much. Hope to receive your answer soon.

    Hey there thaovy309,
    Welcome to Apple Support Communities.
    The linked article below provides a lot of great information and suggestions that should address your concerns about your data and finding your lost or stolen iPhone 5c and iPad Air 2.
    If your iPhone, iPad, or iPod touch is lost or stolen - Apple Support
    Take care,
    -Jason

  • How can I open help file (HTML or .chm) from Java Web Start (new to JAVA)

    Hi All,
    Im trying to open the help file of my application.
    When trying to access the help file from the GUI (pressing F1 for launching the help file), I'm geting the an error, something like:
    "Can't show help URL: jar:file:C:\Documents and Settings\%USER%\Application Data\Sun\Java\Deployment\javaws\cache\http\Dlocalhost\P7001\DMwebstart\RMjar-name!/com/resources/helpFiles/MyHelpFile.html"
    It seems that the file which is packed in a jar, was downloaded to the Java Web Start cache directory:
    C:\Documents and Settings\%USER%\Application Data\Sun\Java\Deployment\javaws\cache\http\Dlocalhost\P7001\DMwebstart
    The code which is activated when launching the help file is:
    try
                ResourceBundle resourceBundle = DoubleResourceBundle.getBundle("Resource", "ResourceImpl");
                RuntimeUtil.launchFile(new File(resourceBundle.getString("help.file")));
            } catch (IOException e)
                // TODO Auto-generated catch block
                e.printStackTrace();
            }where the property "help.file" is in some property file in the resource bundle named "Resource", and looks like this :
    help.file="com/trax/docs/help/global/MyHelpFile.html"
    The function "RuntimeUtil.launchFile" knows how to launch any file in its default application, and indeed it does launches the html, when giving it an absolute path to the file on my PC, as "C:\Helpfiles\MyHelpFile.html" as such:
    RuntimeUtil.launchFile("C:\Helpfiles\MyHelpFile.html");My question is :
    The application is going to be deployed on a Customer PC. How can I access the html file from the code, with a relative path and not its absolute path on the customer pc, which I can't know?
    I found these restrictions regarding web start:
    (copied from "http://rachel.sourceforge.net/"):
    *Rule 1: Java Archives only. No loose files.* All your resources have to be packaged in Java Archives (jar) if you want to have
    them delivered to the user's machine and kept up-to-date automatically by Java Web Start.
    *Rule 2: No file paths.* You can't use absolute or relative file paths to locate your
    jars holding your resources (e.g. <code>jar:file:///c:/java/jws/.cache/resources.jar</code>).
    Absolute file paths won't work because you never know where Java Web Start
    will put your jar on the user's machine. Relative file paths won't work because Java Web Start
    mangles the names of your jars (e.g. <code>venus.jar</code> becomes <code>RMvenus.jar</code>)
    and every JNLP client implementation has the right to mangle your names
    in a different way and you, therefore, can't predict the name with
    which your jar will be rechristend and end up on the user's machine in
    the application cache.Seems complex or impossible, to perform a simple task like opening a file.
    Please advise (I'm new to Java and Web Start).
    BTW, I'm working with IntelliJ IDEA 5.0.
    Thanks,
    Zedik.
    {font:Tahoma}{size:26pt}
    {size}{font}

    the follwing method i have used to open html file ...
    so to access html file i am shipping resources folder with jar file ..
    private void openHtmlPages(String pageName) {
         String cmd[] = new String[2];
         String browser = null;
         File file = null;
         if(System.getProperty("os.name").indexOf("Linux")>-1) {
              file = new File("/usr/bin/mozilla");
              if(!file.exists() ) {
              }else     {
                   browser = "mozilla";
         }else {
              browser = "<path of iexplore>";
         cmd[0] = browser;
         File files = new File("");
         String metaData = "/resources/Help/Files/"+pageName+".html"; // folder inside jar file
         java.net.URL url = this.getClass().getResource(metaData);
         String fileName = url.getFile();
         fileName = fileName.replaceAll("file:/","");
         fileName = fileName.replaceAll("%2520"," ");
         fileName = fileName.replaceAll("%20"," ");
         fileName = fileName.replaceAll("jarfilename.jar!"," ").trim();
         cmd[1] = fileName;     
         try{
              Process p = Runtime.getRuntime().exec(cmd);
         }catch(java.io.IOException io){
                   //Ignore
    can anyone give me the solution..???
    Regards
    Ganesan S

  • How to catch exception in JSP????

    how to catch exception in JSP?
    I use JDeveloper 3.1
    I use connection with database .
    When I insert record in database
    when have duplicate of primary key
    how to catch this exception and
    back to previous page?
    I trying with folowing:
    <jsp:useBean id="RowEditor" class="oracle.jbo.html.databeans.EditCurrentRecord" scope="request">
    <% try {
    RowEditor.setUseJS(true);
    RowEditor.initialize(pageContext, "package2_Package2Module.Drzavi1View");
    RowEditor.setSubmitText("Save");
    RowEditor.setTargetUrl("Drzavi1View_SubmitInsertForm.jsp");
    RowEditor.createNewRow();
    RowEditor.setReleaseApplicationResources(true);
    RowEditor.render();
    catch(Exception e) {
    %>
    <script>
    alert("primary key duplication");
    history.back();
    </script>
    <% } %>
    but i't not working
    please help me

    i catch exceptions as you do, i don't have any problem...
    are you throwing the exception from your bean?
    actually i don't catch an Exception, but an SQLException...
    but it works... here is my code...
         try
    myclass.addElement(); // this is an insert into Oracle
    catch( DataBaseFailException e ) /// an exception that i throws inside after i receive an SQLException
              session.setAttribute("gMessage","e.getMessage()); // error code

  • Catch Weight Management Activation Dilemma

    Hello experts,
    We're looking into activating Catch Weight Management in our development client or a sandbox client. We have read the documentation available, but we have found what seems to be either a "contradiction" in the documentation, or a "misunderstanding" on our side. It is probably just a misunderstanding on our side, so we would appreciate some clarification on this.
    The following link says that:  Note that this activation affects all clients and that you cannot reverse the characterization of the ERP system as SAP CWM.
    Activation of SAP Catch Weight Management - SAP Catch Weight Management - SAP Library
    This other link says that: Before you can use SAP Catch Weight Management (SAP CWM), you must activate SAP CWM at client level.
    Activating SAP Catch Weight Management - SAP Catch Weight Management - SAP Library
    The questions is: Can we activate CWM in our development client or a sandbox client without affecting the other clients (QA and Production)?
    This is a big irreversible change, that's why we need proper clarification before we make a change.

    Hi Oscar,
    When you activate CWM, it will strip your ERP of some reports, t-codes, and functionality.
    You choose on material level if material is standard or CWManaged.
    To answer your question, it is implemented on Client level, and you assign the indicator for CWM on material level. You need to maintain CWM view.
    In addition please read SAP Note 886761. It tells you what major changes/retrictions are implemented after CWM activation.
    Also, if you are using RF devices in WM, and you want to process CWM materials through RF too, you will need to implement this - SAP note 738159 : Catch Weight with Radio Frequency.
    It isn't that easy to do that, but after implementing the changes, you will have screens for CWM on your RF devices.
    Otherwise, you would always get an error that you need to enter the qty in parallel unit of measure...
    Please read this thoroughly, it will help you catch up wth CWM
    http://fmis.minfin.bg/help/EN/50/f4383fdb800804e10000000a114084/frameset.htm
    Regards,
    Mihailo

  • Why can a thief turn off an iPad when it is in lost mode?

    So My I pad mini with cellular was stolen from my house.  Silly me I did not have it pass code locked in the home.  But as soon as I noticed it was stolen I put it in lost mode.  The thief did not connect it to a network.  Then about 2 weeks later they connected it to a network I am guessing they took it out of airplane mode and the cellular connected.  So It went into lost lock down mode.  Great.......But what good does that do me when all they have to do is turn off the iPad????? and then I can not track it anymore.  I mean come on What is the purpose of leaving the power button active when it is in lost mode?  All that does it make it so no one can use the iPad and I can not catch the thief.  Another great option for this would that it would also send a GPX file that I could get and then find out who has my iPad.  That movement file would give lots of info like was the person moving when they turned it on i.e. in their car driving down a street and then turned it off or was it at one location for 20 minutes then they turned it off.  Again what good is a lost mode that all you need to get around is a power button.... High tech....I would like you to meet low tech......

    I wouldn't suggest going to get it yourself. You could find yourself in a situation you cannot get out of and could get hurt. Second, as stated before, it is more for misplaced or lost devices, not stolen devices. Many police agencies do not feel they have probable cause, just from your statement on a map location to justify attempts to recover the device. There have been many posts from others who have had devices stolen where the police will not confront someone based on that map location. I understand you are impacted by the theft, but this is what we have insurance for. To protect your content, from now on I suggest you put a passcode on the device. I hope you have changed all of the passwords for accounts you had on the device, since all of your content and data was accessible to the thief.

  • Help with Runtime class and timeout of Process

    Hi,
    Question regarding using Runtime class, and yes I have looked at the javadocs, but I am still confused and frustrated.
    Here is part of my code.
    Process p;
    Runtime runtime = Runtime.getRuntime();
    p = runtime.exec("rsh localhost ls");
    if you are not familiar with rsh all it does is remote shell into the computer localhost and executes the command ls.
    Now, I dont have rsh running on my computer so it will hang at that line for about 40 sec and eventually time out on its own. Is there anyway I can specify a timeout argument like there is for the ping command? Like if there is no response from localhost after 3 sec, then just kill the process?
    I looked at the Runtime javadoc and Process javadoc and the closest thing I could come to with is something to do with envp (environment parameters), but I dont know what that is.
    Thanks guys.

    You can't timeout the "runtime.exec("rsh localhost ls");" call but if you execute the call in a seperate thread you can "timeout" and continue executing on the original thread (while letting the "runtime" thread to timeout on its own).
    Check the following class that I created for cases like this:
    abstract public class TimeoutHelper implements Runnable
        private Throwable error;
        private boolean running = true;
        private Object retValue;
        protected String name;
        private long waitTime;
        private Thread thread;
         * Creates a new helper. Use {@link #start} to run the code.
         * @param name A name that will be used in the helper thread name
         * @param waitTime The time (in msec) to wait before timeout.
        public TimeoutHelper(String name, long waitTime)
            this.name = name;
            this.waitTime = waitTime;
        public Object start() throws Throwable
            return asyncExecute();
        abstract protected Object execute() throws Throwable;
        private synchronized Object asyncExecute() throws Throwable
            createThread().start();
            if (running)
                try
                    wait(waitTime);
                    if (running)
                        // Timeout!!
                        abortThread();
                        throw new TimeOutException("Timeout for: " + name);
                catch (InterruptedException ie)
                    // Ignore
            if (error != null)
                throw error;
            return retValue;
        private void abortThread()
            if (thread != null)
                thread.interrupt();
        protected Thread createThread()
            thread = new Thread(this, name);
            return thread;
        public void run()
            try
                retValue = execute();
            catch (Throwable th)
                error = th;
            synchronized (this)
                running = false;
                notifyAll();
    }You use the class by extending it and implementing "execute". For example:
            TimeoutHelper helper = new TimeoutHelper("Runner", 5000)
                protected Object execute() throws Throwable
                    Runtime runtime = Runtime.getRuntime();
                    return runtime.exec("rsh localhost ls");
            try
                Process p = (Process)helper.start();
            catch (TimeOutException e)
                // Handle timeout here
            catch (Exception e)
                // Handle other errors here.
            }

  • Need help setting up a Finite State Machine in BlueJ

    Hey all, I joined these forums to hopefully help me catch up with my Java skills. I haven't programmed in Java for almost a year, and the class I'm in now does little for review so I'm rusty to say the least. The assignment we were given recently is to create a Finite State Machine resembling a gumball machine. This are basically the requirements given:
    The operation of the gumball machine is simple. It takes a quarter to get a gumball dispensed. The customer needs to deposit a quarter and turn the crank, and a gumball will be dispensed if the machine contains one or more gumballs.
    Design steps:
    There are a number of states: No_Quarter, Has_Quarter, Gumball_Sold, Out_of_Gumballs
    Create an instance variable to hold the current state and define values for each of the states.
    All the actions that can happen in the system are: insert_quarter, ejects_quarter, turns_crank, dispense_gumball, and refill_gumballs. The action dispense_gumball is an internal action the machine invokes when it reaches the Gumball_Sold state.
    Create a class that acts as the state machine. For each action, create a method that uses conditional statements to determine what behavior is appropriate in each state.
    Write a test program to test the GumballMachine class. You consider not just normal operations i.e. insert a quarter, turn the crank; but also operations such as insert a quarter, eject the quarter, turn the crank. Or what if you turn the crank twice after insert one quarter. Or what if you insert two quarters in a row.
    Now trust me, I'm not asking for someone to come here with a hunk of code and say, ok use this, and it's done. What I'm here for is hopefully someone can walk me through the right thought process of how to implement the states, and where/how to include the actions to go along with the states. We're to use BlueJ to write the code, and I'm still pretty unfamiliar with its arrow system that tells Test Programs to use the linked class(es).
    Thanks for any help in advance, and for what it's worth, speedy responses are especially appreciated!

    Did you upload everything to your server?  Did you perform the compatibility check?
    FormCaptcha’s requirements:
    PHP 4.0 or later.
    GD Library for PHP, version 2.0 or greater (it's installed on most web servers but it may not be enabled).
    The page that processes the form must have .PHP extension.
    Tip: If you want to be sure that your web server supports this captcha tool, then you can download and test our free captcha compatibility check. This is a script that checks if your web server can generate captcha images and perform the captcha validation.
    Nancy O.
    Alt-Web Design & Publishing
    Web | Graphics | Print | Media  Specialists 
    http://alt-web.com/

  • It sould be Illegal for a company to store cookies about any credit information with out a secure reistered site.

    I really need a new IP address. My whole info I believe has been compromised. I have so much going on with my e-mail address that I can't change it because of job applications, gov. contacts, family contacts, my whole life was put in this IP and e-mail through yahoo that I will literally be dead in the water without help. They hacks are so crafty they have been calling my cell phone to get a voice recognition recorded. I get calls from a place asking if I'm some African guy. THIS IS TERRORISM! I'm being attacked. Some one is trying to say they are me, I try and not take it personal but I AM. They are mocking my character and my ability to be crafty. They picked the wrong guy. "What if" I had members in my family that worked for the Government and needed my safety to be SAFE for theirs? Please Mozilla get down to the bottom of this for me. Tell me I have an over active Imagination, so I can laugh at myself. If not tell me other wise, I WILL cooperate to catch this thief. Let us lay a trap. They are blocked from this screen, I have a green lock on it in the corner. That is, if my suspicions are right. Thank You.
    Sincerely, A concerned customer.

    Do not fear, there are some ways to prevent further information from being taken when using Firefox and Thunderbird. However, please be cautious, this will not prevent social engineering or social hacking as you are experiencing with the phone calls. Please take legal action if needed.
    So please carefully review the security warnings [http://www.mozilla.org/en-US/firefox/28.0/releasenotes/]
    [http://mzl.la/LGo15N Security and passwords settings]
    *For cookies please open up the Firefox and go to History > Clear Cache and select clear everything
    * Run virus scans for malware, sniffers or adware.
    You can try these free programs to scan for malware, which work with your existing antivirus software:
    * [http://www.microsoft.com/security/scanner/default.aspx Microsoft Safety Scanner]
    * [http://www.malwarebytes.org/products/malwarebytes_free/ MalwareBytes' Anti-Malware]
    * [http://support.kaspersky.com/faq/?qid=208283363 TDSSKiller - AntiRootkit Utility]
    * [http://www.surfright.nl/en/hitmanpro/ Hitman Pro]
    * [http://www.eset.com/us/online-scanner/ ESET Online Scanner]
    [http://windows.microsoft.com/MSE Microsoft Security Essentials] is a good permanent antivirus for Windows 7/Vista/XP if you don't already have one.
    *ALSO, change your passwords frequently.
    *If you would like a new ip, it is really easy: [http://www.wikihow.com/Acquire-a-New-IP-Address]
    *Update all of your extensions and drivers. (this is not necessary but may improve the performance of your browser)
    * And last, but not least try [https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/ ad blocker plus] and scan every page and block unneeded scripts.
    If you need help with any of this, let us know! PM me if needed.

Maybe you are looking for