Help Needed for Internet Security Driving Test!

Hi I came up with a few basic rules for family and friends
that I put together in order to try to prevent them from
continually installing spyware, toolbars, keyloggers and viruses on
their computers (and as a result, to try to prevent them from
continually calling me and asking for my help and advice when they
did this and things went wrong).
To all intents and purposes the rules worked well - for a
while. I set it up as a simple RTF document and I added this to the
start up folder of Windows XP, so that it started every time the PC
started. However, over time some of them simply learned to ignore
the rules and to close the RTF document as soon as it opened
without paying any attention to it at all - and then they went
about their merry business of installing spyware, keyloggers and
viruses etc. just as they had in the past.
So OK, I have to admit I found this deeply frustrating - but
I also realise that this is the same position that many of us geeks
are in in that on the whole, most average everyday computer users
don't have a clue about Internet security.
Now however things have become a lot more serious for me, as
I have been asked by a local charity to administer a total of 60
machines over 2 different sites - and I have also been asked if I
could provide some form of training with regard to basic personal
Internet security.
With this in mind I came up with the idea of an interactive
CDROM, or Flash based Internet security driving test/tutorial that
basically covers all of the scenarios I touch on in my rules.
This tutorial would cover basic things like, if you got an
email from a representative ex President of an African country
offering you a share in millions of dollars of stolen money, or if
you got an email from your bank asking you to verify your security
details and so on, what would you do? Additionally it would cover
such things as the abundance of viruses that infest many of the
porn sites on the net, the way that many games on the Internet that
are listed as being 'free' (particularly those which are in
executable file format) are often just vehicles for more spyware
and viruses also - and about the dangers of chat lines, of spoof
security warnings on web sites and so on.
I have included my list of rules below which should hopefully
give you an idea of what I'm trying to do. Be warned though, the
wording is deliberately harsh and perhaps a little extreme (and as
a result maybe not entirely 100% accurate) but you must realize
that I am, or was trying to give myself the easiest time possible
and the least possible problems. So you may well find things you
disagree with in it - but overall if someone followed these rules,
they probably would be less likely to run into problems than
someone who did not follow them might.
The thing is however that (as I said) I would like to
formalise these rules somewhat in the format of some kind of
interactive tutorial/web security driving test. Unfortunately I
have no experience with flash - and little knowledge of HTML or
anything like that. I also know that the language for these rules
isn't quite right, in that it probably isn't suitable for a formal
office type environment.
I had in mind that the tutorial would show some realtime
examples of some of the things I have been talking about (which I
assume would only be possible in Flash?) or perhaps rather like a
readers digest multiple choice type thing, with screenshots
depicting the various scenarios in question. (Like a screenshot of
a flash animation on a web page saying 'You have won a prize!!!'
What would you do? a) click on the ad, b, ignore it, or c) phone
all of your family and friends informing them of your good fortune
before doing anything.' etc.
So I was wondering, are there any good hearted charitable
souls out there who might be willing to help out to put a tutorial
like this together?
Again I remind you that it really is for a charity
(specifically the Depaul Trust in the UK, which helps young
vulnerable people find secure accommodation, provides educational
opportunities and helps them to find employment). The requirement
would be that all staff and students pass the Internet security
test before being granted Internet access.
I know this might be time consuming - but again all I can do
is appeal to the sense of kindness and helpfulness of this
community and hope that someone who does have some experience in
these maters might be willing to help.
Alternatively could anyone suggest a simple easy to use
software package that would allow a relative n00b like me to put
together a tutorial like this on my own? Or perhaps it is possible
that some free online tutorial like this already exists?
In any case, any help at all would be appreciated.
PS,
Here are the rules I have that I referred to above.
http://download305.mediafire.com/b6ndmljht1bg/29bbnnbz2uz/internet+rules.rtf

Dennis, when I look at the subject three clips (EI 1250, EI 640, and EI 320, respectively, and in that order) as presented in the camera, I see exactly what I have expected all along -- three different-brightness images that are progressively brighter from the EI 1250 exposure to the EI 320 exposure.   So, am mystified why when I open these images (clips), say, in RAW Viewer, wherein I have thought that I would see the same progressive brightness differences allowing me to experiment with reducing brightness to deal with noise reduction, all three of the images present completely alike in brightness.

Similar Messages

  • Is there a need for internet on iphone while you wan to locate it when you lost your iphone?

    I lost my iphone and I am trying to locate my iphone using the Icloud-Find my iphone, but it shows offline, so I just wanna know if is there  a need for internet service on iphone or it works with the location service only?? Cz it shows offline, help plz

    Maybe the networks have different services, cause here in Afghanistan I had a ROSHAN network simcard in my iphone, it shows your current location on the map if the map is already downloaded in a limited area, but if the map is not downloaded it shows the current location in a blank page even when I turn off the 3G and cellular services.
    That’s what I was using here. Thank you any way.
    Have a good time.

  • Paying double each month for Internet Security Suite?

    I noticed that we are paying twice each month for Internet Security Suite: once as a billed item ($6.99); and again as part of the Backup and Security Bundle ($11.00). It seems this has been going on since about Aug 2013.
    Hence, I dropped the standalone Security Suite. Now, I'd like a a refund for all those overcharges and an explanation as to how (and why) that occurred.
    Thanks in advance.
    Solved!
    Go to Solution.

    Just a friendly reminder, this is a forum where users help other users. It looks like your issue may require a Verizon representative to review your account details. Please visit our Support page for a variety of ways to contact Verizon, including “Ask Verizon,” our virtual chat agent, and customer support phone numbers.

  • Help needed for writing query

    help needed for writing query
    i have the following tables(with data) as mentioned below
    FK*-foregin key (SUBJECTS)
    FK**-foregin key (COMBINATION)
    1)SUBJECTS(table name)     
    SUB_ID(NUMBER) SUB_CODE(VARCHAR2) SUB_NAME (VARCHAR2)
    2           02           Computer Science
    3           03           Physics
    4           04           Chemistry
    5           05           Mathematics
    7           07           Commerce
    8           08           Computer Applications
    9           09           Biology
    2)COMBINATION
    COMB_ID(NUMBER) COMB_NAME(VARCHAR2) SUB_ID1(NUMBER(FK*)) SUB_ID2(NUMBER(FK*)) SUB_ID3(NUMBER(FK*)) SUBJ_ID4(NUMBER(FK*))
    383           S1      9           4           2           3
    384           S2      4           2           5           3
    ---------I actually designed the ABOVE table also like this
    3) a)COMBINATION
    COMB_ID(NUMBER) COMB_NAME(VARCHAR2)
    383           S1
    384           S2
    b)COMBINATION_DET
    COMBDET_ID(NUMBER) COMB_ID(FK**) SUB_ID(FK*)
    1               383          9
    2               383          4
    3               383          2
    4               383          3
    5               384          4
    6               384          2          
    7               384          5
    8               384          3
    Business rule: a combination consists of a maximum of 4 subjects (must contain)
    and the user is less relevant to a COMB_NAME(name of combinations) but user need
    the subjects contained in combinations
    i need the following output
    COMB_ID COMB_NAME SUBJECT1 SUBJECT2      SUBJECT3      SUBJECT4
    383     S1     Biology Chemistry      Computer Science Physics
    384     S2     Chemistry Computer Science Mathematics Physics
    or even this is enough(what i actually needed)
    COMB_ID     subjects
    383           Biology,Chemistry,Computer Science,Physics
    384           Chemistry,Computer Science,Mathematics,Physics
    you can use any of the COMBINATION table(either (2) or (3))
    and i want to know
    1)which design is good in this case
    (i think SUB_ID1,SUB_ID2,SUB_ID3,SUB_ID4 is not a
    good method to link with same table but if 4 subjects only(and must) comes
    detail table is not neccessary )
    now i am achieving the result by program-coding in C# after getting the rows from oracle
    i am using oracle 9i (also ODP.NET)
    i want to know how can i get the result in the stored procedure itsef.
    2)how it could be designed in any other way.
    any help/suggestion is welcome
    thanks for your time --Pradeesh

    Well I forgot the table-alias, here now with:
    SELECT C.COMB_ID
    , C.COMB_NAME
    , (SELECT SUB_NAME
    FROM SUBJECTS
    WHERE SUB_ID = C.SUB_ID1) AS SUBJECT_NAME1
    , (SELECT SUB_NAME
    FROM SUBJECTS
    WHERE SUB_ID = C.SUB_ID2) AS SUBJECT_NAME2
    , (SELECT SUB_NAME
    FROM SUBJECTS
    WHERE SUB_ID = C.SUB_ID3) AS SUBJECT_NAME3
    , (SELECT SUB_NAME
    FROM SUBJECTS
    WHERE SUB_ID = C.SUB_ID4) AS SUBJECT_NAME4
    FROM COMBINATION C;
    As you need exactly 4 subjects, the columns-solution is just fine I would say.

  • Color management help needed for adobe CS5 and Epson printer 1400-Prints coming out too dark with re

    Color management help needed for adobe CS5 and Epson printer 1400-Prints coming out too dark with reddish cast and loss of detail
    System: Windows 7
    Adobe CS5
    Printer: Epson Stylus Photo 1400
    Paper: Inkjet matte presentation paper with slight luster
    Installed latest patch for Adobe CS5
    Epson driver up to date
    After reading solutions online and trying them for my settings for 2 days I am still unable to print what I am seeing on my screen in Adobe CS5. I calibrated my monitor, but am not sure once calibration is saved if I somehow use this setting in Photoshop’s color management.
    The files I am printing are photographs of dogs with lots of detail  I digitally painted with my Wacom tablet in Photoshop CS5 and then printed with Epson Stylus 1400 on inkjet paper 20lb with slight luster.
    My Printed images lose a lot of the detail & come out way to dark with a reddish cast and loss of detail when I used these settings in the printing window:
    Color Handling: Photoshop manages color, Color management -ICM, OFF no color adjustment.
    When I change to these settings in printer window: Color Handling:  Printer manages color.  Color management- Color Controls, 1.8 Gamma and choose Epson Standard it prints lighter, but with reddish cast and very little detail and this is the best setting I have used so far.
    Based on what I have read on line, I think the issue is mainly to do with what controls are set in the Photoshop Color Settings window and the Epson Printer preferences. I have screen images attached of these windows and would appreciate knowing what you recommend I enter for each choice.
    Also I am confused as to what ICM color management system to use with this printer and CS5:
    What is the best ICM to use with PS CS5 & the Epson 1400 printer? Should I use the same ICM for both?
    Do I embed the ICM I choose into the new files I create? 
    Do I view all files in the CS5 workspace in this default ICM?
    Do I set my monitor setting to the same ICM?
    If new file opens in CS5 workspace and it has a different embedded profile than my workspace, do I convert it?
    Do I set my printer, Monitor and PS CS5 color settings to the same ICM?
    Is using the same ICM for all devices what is called a consistent workflow?
    I appreciate any and all advice that can be sent my way on this complicated issue. Thank you in advance for your time and kind help.

    It may be possible to figure out by watching a Dr.Brown video on the subject of color printing. Adobe tv
    I hope this may help...............

  • File missing (file\BCD error code 0Xc0000034 help need for work!

    file missing (file\BCD  error code 0Xc0000034 help need for work!    what can i do?
    have an p 2000 notebook pc

     Hi bobkunkle, welcome to the HP Forums. I understand you cannot boot passed the error you are receiving.
    What is the model or product number of your notebook? What version of Windows is installed?
    Guide to finding your product number
    Which Windows operating system am I running?
    TwoPointOh
    I work on behalf of HP
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    Click the “Kudos, Thumbs Up" on the bottom to say “Thanks” for helping!

  • Help me for change security questions

    plz apple help me for change security questions

    Contact Apple Support to have your security questions reset:
    ACCOUNT SECURITY CONTACT NUMBERS
    Cheers,
    GB

  • Help need for force to signout All session ! how...

    hi
         help need for force to  signout All session !  how ??
    Solved!
    Go to Solution.

    Hi and welcome to the Skype Community,
    To force a signout of all instances your Skype is signed into please change your password: https://support.skype.com/en/faq/FA95/how-do-i-change-my-password
    Follow the latest Skype Community News
    ↓ Did my reply answer your question? Accept it as a solution to help others, Thanks. ↓

  • Does an mac air need any internet/security protection from viruses etc. ?

    I was wondering does the mac need any interent security such as kaspersky or norton installed for protection? or is there already protection from viruses etc on the software installed? Thanks

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.  3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.  The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • E71 - help needed for basic set up questions

    I have just purchased an E71 - a big jump from the last mobile (pre camera era)
    But Im lost on this. I ordered the phone online, so Im not sure where to go to get help and instruction about the phone and how to set it up properly and use it. Mannuals aren't my best option. Im in Australia,.
    Is there a Nokia store where I can go to help with setting it up?
    Does my phone come with a internet security or do I have to purchase it?
    Thanks
    Elven
    Solved!
    Go to Solution.

    Awesome vansharma and kingpin007 - thankyou for your help.
    The PUK was with the mobile operator, so I rang them and after a security check procedure I was able to enter the PUK code and get the phone unlocked. Phew!
    I checked the Security Warning Web Setting (as you said kingpin007), and the web alert was marked to ON already - so no problems there.
    I also registered at Mosh, (the planets must be badly aspected - that took me 12 attempts LOL) and they have one security download NetQin Moble Anti-virus.
     http://mosh.nokia.com/content/61D5A2C3BF97604AE040​050A44301BA2
    I guess I am questioning weather or not the phone comes installed with any antivirus or security safeguards factory installed ... is my phone secure on the web/emailing/downloading etc. if I dont install the NetQin or something similar?
    In the mannual it says this:
    "Important: Your device can only support one antivirus application. Having more than one application with antivirus functioning could affect performance and operation and cause the devise to stop functioning"
    And presently I trialled the free 7 day 'F7' security application that was a standard downloaded to the phone - but it is too costly for me to subscribe to - it has another day before it runs out, so I am thinking I should wait until it expires before considering dowloading any other security application. Does that sound like the right thing to do?
    Well at least Im back to square One with this all ...
    Im sure I'll have more questions as I try to work this all out.
    Thanks for your help so far ..
    Cheers
    Elven
    Message Edited by elven on 25-Mar-2009 11:26 AM
    Message Edited by elven on 25-Mar-2009 11:30 AM

  • Is IDM cc 7.2.8 the plugin/extension thats needed for Internet Download Manager for the Mozilla Browser family? Do i need it if i've removed IDM?

    I had the Internet Download Manager and I also removed it today. I removed and reset a bunch of things cuz my system was hardly working and hardly letting me do anything. I am happy with the downloader i had to begin with but my question is: IDM cc 7.2.8 is an active addon for my sea monkey browser/probably firefox also, but... is IDM cc 7.2.8 the plugin/extension/addon for Internet Download Manager thats needed for Mozilla Browsers.?
    Or is it the Internet Download Manager program itself, in full?
    I would like to know so I can remove it if I dont need it because I already removed the IDM Program earlier today, and am staying with my old downloader.
    I am running out of free space on my system and dont want any extras that arent needed taking up the space thats still available. If I dont need this add-on because I dont have IDM, Please let me know.

    Hello,
    As a user of Internet Download Manager, I can confirm that 'IDM cc 7.2.8' is connected with IDM.
    Therefore, if you have uninstalled Internet Download Manager, you no longer need 'IDM cc 7.28'
    Hope that helps.

  • The newest version of firefox is not compatibal with TrendMicrosystms and it has automatically disabled it. What do I do for internet security now?

    I upgraded to the new Mozilla and now I am having issues with my internet security Trend Microsystem. I am also having some issues with GMail. I wish to go back to the last version of Firefox as I never had any issues with them and their didn't need to be an upgrade. Thank you!

    If you are running one of the Titanium products, try upgrading to the 2014 version. Open the main console, then use the "?" icon in the upper right of the window to open About. Titanium will then check for updates.
    More info: http://esupport.trendmicro.com/solution/en-us/1056556.aspx

  • What Equipment is Needed for CCNP Security Lab

    Hello,
    Im Looking to find out what Devices are needed for a ccnp security home lab. I keep hearing that 2 5510's are a must for labbing. The downside Is the Prices avg $800 each on the low end. I also saw some ppl had an ips in their lab. Im looking to find out what is 100% needed. I alredy have a lab in place used for my ccnp r&s.
    Thanks                  

    I would also say that two ASAs is a must to practice with them. But in my opinion, 2 5505 SecPlus are enough. What are the differences to the 5510? You configure subinterfaces instead of vlan-interfaces. But that's something you know from R/S. And the failover is only stateless, but failover in general also works. Sof if you find these ASAs for less money, take them. IPS is probably the topic where most CCNP Security students are least familar with. So owning a sensor would also help.
    And don't forget that the bigger CCIE-Training vendors have complete labs for rent with all you need for CCNP Sec preparation. That could also save some money.
    Don't stop after you've improved your network! Improve the world by lending money to the working poor:
    http://www.kiva.org/invitedby/karsteni

  • Query help needed for querybuilder to use with lcm cli

    Hi,
    I had set up several queries to run with the lcm cli in order to back up personal folders, inboxes, etc. to lcmbiar files to use as backups.  I have seen a few posts that are similar, but I have a specific question/concern.
    I just recently had to reference one of these back ups only to find it was incomplete.  Does the query used by the lcm cli also only pull the first 1000 rows? Is there a way to change this limit somwhere?
    Also, since when importing this lcmbiar file for something 'generic' like 'all personal folders', pulls in WAY too much stuff, is there a better way to limit this? I am open to suggestions, but it would almost be better if I could create individual lcmbiar output files on a per user basis.  This way, when/if I need to restore someone's personal folder contents, for example, I could find them by username and import just that lcmbiar file, as opposed to all 3000 of our users.  I am not quite sure how to accomplish this...
    Currently, with my limited windows scripting knowledge, I have set up a bat script to run each morning, that creates a 'runtime' properties file from a template, such that the lcmbiar file gets named uniquely for that day and its content.  Then I call the lcm_cli using the proper command.  The query within the properties file is currently very straightforward - select * from CI_INFOOBJECTS WHERE SI_ANCESTOR = 18.
    To do what I want to do...
    1) I'd first need a current list of usernames in a text file, that could be read (?) in and parsed to single out each user (remember we are talking about 3000) - not sure the best way to get this.
    2) Then instead of just updating the the lcmbiar file name with a unique name as I do currently, I would also update the query (which would be different altogether):  SELECT * from CI_INFOOBJECTS where SI_OWNER = '<username>' AND SI_ANCESTOR = 18.
    In theory, that would grab everything owned by that user in their personal folder - right? and write it to its own lcmbiar file to a location I specify.
    I just think chunking something like this is more effective and BO has no built in back up capability that already does this.  We are on BO 4.0 SP7 right now, move to 4.1 SP4 over the summer.
    Any thoughts on this would be much appreciated.
    thanks,
    Missy

    Just wanted to pass along that SAP Support pointed me to KBA 1969259 which had some good example queries in it (they were helping me with a concern I had over the lcmbiar file output, not with query design).  I was able to tweak one of the sample queries in this KBA to give me more of what I was after...
    SELECT TOP 10000 static, relationships, SI_PARENT_FOLDER_CUID, SI_OWNER, SI_PATH FROM CI_INFOOBJECTS,CI_APPOBJECTS,CI_SYSTEMOBJECTS WHERE (DESCENDENTS ("si_name='Folder Hierarchy'","si_name='<username>'"))
    This exports inboxes, personal folders, categories, and roles, which is more than I was after, but still necessary to back up.. so in a way, it is actually better because I have one lcmbiar file per user - contains all their 'personal' objects.
    So between narrowing down my set of users to only those who actually have saved things to their personal folder and now having a query that actually returns what I expect it to return, along with the help below for a job to clean up these excessive amounts of promotion jobs I am now creating... I am all set!
    Hopefully this can help someone else too!
    Thanks,
    missy

  • Help needed for using BASIC authentication through JDBCRealm

    Help needed.
    Hello,
    I am doing a degree project, so far it works fine in my local machine, I need to try it on my virtual hosting (as it is a live server).
    My project requires JDBCRealm, that is BASIC authentication loading access data from mysql database. Normally this setup can be done in Server.xml file, because my Tomcat hosting is a virtual one, I only have permission to access the web.xml file.
    My question is: is it possible to get it done in an alternative way? In web.xml? Some properties file maybe?
    Thank you very much.

    You can set this up for your context using META-INF/context.xml instead of working with server.xml.
    Make a directory called META-INF under your webapp ( it'll be at the same level as WEB-INF ). Under this, add a context.xml with all your context specific configuration including the realm. A sample is below
    <?xml version="1.0" encoding="UTF-8"?>
    <Context path="/myApp" reloadable="true">
        <Realm
            className="org.apache.catalina.realm.JDBCRealm"            
            driverName="com.microsoft.jdbc.sqlserver.SQLServerDriver"         
            connectionURL="jdbc:microsoft:sqlserver://127.0.0.1:1433;DatabaseName=myDB;SelectMethod=Cursor;"
            connectionName="username" connectionPassword="password"
            digest="MD5" userTable="users" userNameCol="userid" userCredCol="userpassword"
            userRoleTable="user_roles" roleNameCol="rolename"
        />
    </Context>Hope this helps.
    People on the forum help others voluntarily, it's not their job.
    Help them help you.
    Learn how to ask questions first: http://faq.javaranch.com/java/HowToAskQuestionsOnJavaRanch
    ----------------------------------------------------------------

Maybe you are looking for

  • How to use the FM named 'CP_EX_PLAN_READ_INTERVAL'

    Hi sirs, Can u please suggest that how can I use FM 'CP_EX_PLAN_READ_INTERVAL' for retriving the relavent data from PLKO and PLPO. I need the example of using this FM. Thanks in advance, Dinesh

  • Iphoto crashes after editing with PhotoshopCS2

    My Iphoto 6.0.5 crashes and closes after I edit a photo via right-click on external editor (with photoshop CS2), when I safe and go back to Iphoto it crashes and closes.

  • How to make a program for backgroung processing used servlet

    how to make a program for backgroung processing used servlet

  • Using DOM4J XPath

    IM going nuts trying to use DOM4J to query something so simple. Here is the input XML file and the code to run the XPath. If I loop through the document using the annoying element and node map thing it works fine and I can get all the nodes. But I wa

  • Packages  compiled with debug info

    Hi, How do we check if a package has been compiled with DEBUG information or not? The package could have been compiled like this: ALTER PACKAGE pk1 COMPILE DEBUG Is there any table that I can check? Thanks in advance. Sanal Krishnan