How do I know if a control is visible?

I have a form with many items in it that is in a Panel that
scrolls vertically.
How can I tell if the form item in focus is actually visible to
the user.
For example, the form item may be off screen in the user
scrolled down a bit. I need to be able to detect this.
Any ideas?

You can probably come up with some logic involving the
current position of the scroll bar and calculate the relative
position of the field within the form based on its total height
verticleScrollPosition/Panel.height ~
field.y/form.height

Similar Messages

  • HT201798 how can i know my IP address if i forgot my remote control

    how can i know my IP address if i forgot my remote control

    Your post somehow found its way to a little-viewed forum for an long-obsolete Apple productivity program. I have asked the Hosts to move you to a more active and appropriate forum for your product.

  • How do I know if my MBP will benefit from heatsink paste reapplication?

    Dear Mac Users
    I know the theme of hot MacBook Pro's has been done to death, but I would like to add my two pennyworth with respect to the specific question: How do I know if my MBP will benefit from reapplication of the heatsink compound? I have trawled numerous very long threads here and not found a satisfactory answer. The reapplication of the heatsink paste is a bit of a schlep and not without some risk of breaking it, so it would be good to know if the benefit is worth the risk.
    One common question is: "Are my MBP temperatures unusual?". A useful mac temperature database can be found at the following link:
    http://www.intelmactemp.com/list
    Consulting this list should set some parameter space for many users - there does seem to be considerable variability - suggesting highly variable quality of heat sink paste application by Apple. In my particular case I have an early 2011 MBP (i7, quad core, 2.2GHz). This certainly ran very hot. I even had a burn on my thigh from it, which took a while to heal. I know, they are notebooks, not laptops, but still . . . . To put very hot into perspective, the CPU was sitting at over 60C at idle, and whole case would be hot to the touch, such that resting your hands on it was uncomfortable. And yes, the computer was idling, there were no rogue processes chewing up cycles. At full load, the CPU would run at 90C and the whole thing would get very hot. I avoided running major projects or rendering jobs on it to preserve it from heat fatigue - the warranty is now up.
    My first attempt at reducing the temperatures, was to clean it. The clue was in the USB/Firewire etc ports. All were very fluffy, which suggested that there was a lot of crud in the heatsink fins. Fixing this was simple; adopt anti-static precautions; remove the back panel; blow air into the exhaust vents at the base of the screen. Numerous large fluff bunnies popped out of the fans and elsewhere. Alternatively, you can unscrew the two fans and partially lift them out (without removing the power cables to the motherboard). Major fluff on the heatsink fins can then be tweezered out, prior to blowing it through, to ensure all debris is removed. I did this subsequently on my Core 2 Duo MBP. After defluffing the idle i7 CPU temperatures dropped from 60C to 43C, but perhaps of more importance was that the whole case was much cooler and the keyboard temperature was close to ambient - much nicer to use.
    So that fixed the major heat problem. However, the question remained, would I see any further improvements by stripping the thing down and reapplying the heatsink paste? What I was looking for in this forum was a rule of thumb based on temperature measurements to help me make an informed decision on whether to strip the thing down. As my machine was out of warranty, I wasn't worried about voiding that. Also, where I am there is zero support (Africa), so Genius Bar or similar was not an option. But jiggering a 14month (very expensive) laptop was not something I wanted to do for thrills. The data in many of the posts did not provide any answers. In the end I made some measurements and decided to do the fix. The step by step instructions I followed were very clear and can be found for many Macs/models at:
    http://www.ifixit.com/Device/Mac
    This guide made life a lot less stressful, as pulling a connector the wrong way could trash the motherboard, and those connectors are so very tiny and fragile. It is very important to take it slow and follow each step to the letter (and not skip steps inadvertently). My before and after heatsink paste fix temperature data are shown below. The idle temps are improved, while the full load temps look like a marginal improvement. However, CPU temperature is not the only story. Certainly after the fix, the whole case is generally cooler, so the heat extraction system is working better. Also, the CPU before and after temps are quite similar at full load, but that assumes the CPU is running at the same power. I do not know enough about the i7 architecture to say if the before speed was being limited by heat, while in the after case the turbo-boost was able to run out to the maximum. Unfortunately, I didn't do any CPU performance tests. So, based on temperatures alone, it looks like a marginal improvement, but it is certainly making a difference to case temperatures.
    Note all temperatures were measured at an ambient temperature of 20C on a flat, hard surface using Marcel Bresink's Temperature Monitor. Fan speed was measured using the Fan Control software - set to allow firmware control at idle.
    Apple original heat sink paste - big dollop of grey crud and lots of extrusion at the sides.
    Idle
    CPU 43C
    GPU 38C
    Heat Sink 2 36C
    Heat Sink 3 35C
    Fan Speeds 2000rpm
    Full Load (all cores maxed with a Boinc Distributed Computing Project (Rosetta - the project, not the Apple technology).
    CPU 89C
    GPU 57C
    Heat Sink 2 52C
    Heat Sink 3 49C
    Fan Speeds 6200rpm
    Arctic Silver heat sink paste
    Idle
    CPU 38C
    GPU 34C
    Heat Sink 2 33C
    Heat Sink 3 32C
    Fan Speeds 2000rpm
    Full Load
    CPU 86C
    GPU 59C
    Heat Sink 2 50C
    Heat Sink 3 50C
    Fan Speeds 6200rpm
    Back to my original question: How do I know if my MBP will benefit from reapplication of the heatsink compound? I think temperatures alone will not give a good answer - mainly because the CPU probably has variable output - due to turbo boost. One thing I did notice is that the temperature response of the CPU when it gets switched to full load, does vary according to the quality of the heatsink paste. With the original Apple paste, when I switched the CPU to full load (from idle) the temperature of the CPU went up to its maximum almost instantaneously and stayed at that level ie the graph of temperature vs time was a step function. This suggests that the CPU may be controlling the temperature by throttling itself. Otherwise, as the heatsink warmed up, the CPU should also rise in temperature - mine stayed bang on 90C and fluctuated only by a degree either side.  After application of heat sink paste, the CPU has a much larger effective thermal mass and consequently heats up much more slowly. Turning the CPU up to maximum from idle resulted in the temperature climbing to a maximum over about 3-4s. After peaking at around 92C it dropped back as the fans kicked in, to around 86C.
    So perhaps one way of assessing the quality of your heatsink paste is to ramp the CPU to maximum from idle and look at the shape of the temperature profile. A step function suggests a lousy job and benefit may be had from reapplication. A more gently sloping profile, followed by a dip due to the fans kicking in, may suggest you are in good shape. Obviously, this presupposes that your Mac temperatures are not insanely hot to start with (i.e. high 90sC+). In which case, if defluffing doesn't do the job, then new heatsink paste is almost certainly required.
    Regards, BB

    I'm sorry but this is too funny to pass up. 

  • How I can know if a user has the permission to read a file or not ?

    Hello,
    I have other question :
    How I can know if a user has the permission to read a file or not ?
    Smaine
    ThanK's

    I don't think common operating systems have an easy way to do that check.
    If you have a limited number of files, implement access control yourself, instead of using operating system permissions. E.g. write a configuration file that contains:
    # Syntax: "filename": "list of users who can access that file"
    somefile.txt: fred, alice, bob
    somedir/anotherfile.txt: bob, joe
    Read in the configuration file and check against it when a file is being requested.

  • Built-in iSight - how do you know for sure it is off?

    I have a new iMac with built-in iSight. I have been checking into security software for my iMac and came across the program called Undercover by Orbicule. One of the functions of that program is that is utilizes the built-in iSight camera to take pictures of the room/person who potentially stole your computer. So that caused me to wonder how do I know for sure my built-in iSight camera is turned off and not accessible by some program outside of my control? I know the green light comes on if I use it in iMovie or something like that, but how do I know it isn't being hacked and used without my knowledge?

    Black electrical tape.

  • How to change the size of control´s prompt?

    No matter the size of data to be displayed in the view suface prompt, the controls have the same size.
    Does anyone here know how to change the size of control in surface prompt?

    HI,
    In order to change the size of a radio button... one way you may consider is to Customise the Radio Button.
    Place a Radio Button (RB) on the FP of a VI, Right-Click the RB > Advanced > Customise...
    Click the Mode Button (most Left button) for Edit Mode
    Right-click the radio button (the round image) now, you will see a list of actions i.e. Copy to clipboard, import picture ...You will see Four images under the 'Picture Item', those are the images that you will need to replace.
    Prepare Four Images of the similar but larger expected size
    *** Copy the 1st new image to clipboard. Back to the Picture Item and select 1st image. Then, select Import Picture (to replace the existing image)
    Repeat *** for all four images.
    Once done, change the mode back to original. Save the *.ctl
    You are now ready to use the customised radio button!
    Quick sample attached (sorry for the poor images created )
    Ian F
    Since LabVIEW 5.1... 7.1.1... 2009, 2010
    依恩与LabVIEW
    LVVILIB.blogspot.com
    Attachments:
    IFK_RButton_Large.ctl ‏11 KB

  • How do I know if an app uses password encryption?

    Hi,
    With all the apps in the App Store, how do I know what kind of security they use?  Will it be in the T's and C's before accepting the app?  I do try to read those, but I've missed this.  Here's the reason for my question.
    A few months ago I downloaded an App called ATT Call International which offered a lower rate for international calls.  I used it a few times, it bills to a credit card.  This morning I tried to use it and I didn't remember my password.  I was emailed a new password which I copied and pasted into the browser but it still wouldn't let me in.  I called the support number for the ATT app and the agent asked me what I wanted my new password to be.  That was odd, but I made up a temp password to work with her and we got me signed on.  I immediately went in to change my password but the app wouldn't let me.
    I called back, got the same woman who told me that even if I do change my password, it's not encrypted so she can see it.
    Really?  And this is an ATT app?  She tells me that this is an ATT app but it's supported by a third party.
    So, I asked her to delete my account but I'm feeling VERY EXPOSED to think that in some database somewhere they have my credit card information and with an unencrypted password on my account. There is no delete option for me to delete it myself.
    What questions do I need to ask before I download?

    Eddie,
    To see what apps are "running" in the background, double click the HOME button (it's the round one at the bottom of the phone's front... not being sarcastic here, had to look at the manual myself just to be sure!). To me it's the coolest looking if done from one of the icon (desktop?) pages, as the dock will slide up and get grayed out, but i've done it from within open apps, it works but not nearly as neat looking to me! Anyhow, if you have a bunch open, you'll have to scroll them sideways to see all of them, plus there are ipod controls and a screen lock all the way to the left. To actually close out an app, press and hold one of them until they start shaking, like when you want to delete an app from your phone, the difference is there will be a "-" instead of an "x" on the icon and when you touch the icon it will disappear and stop "running".
    I put "running" in quotes, because from what i've read, some of the apps aren't really running, iOS4 has actually saved it's place in the app that you left off, but i'm pretty sure the gps type apps ARE working, using up precious memory and battery life.
    HTH
    John

  • How do I know if I have a virus on my iMac?

    Today when I was browsing in safari, some ads popped up, and I thought maybe that could be a sign I got a virus. sorry for my ignorance about all these virus stuff
    So, how can I know if a have a virus?
    im using an iMac mid-2011, os x yosemite

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*genieo\* \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB ' com.adobe.fpsaud com.apple.AirPortBaseStationAgent com.apple.installer.osmessagetracing ' ' 1274181950 464843899 1233118628 ' 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' s/[0-9A-Za-z._]+@[0-9A-Za-z.]+\.[0-9A-Za-z]{2,4}/EMAIL/g;/\/Shared/!s/(\/Users\/)[^ /]+/\1USER/g;s/[-0-9A-Fa-f]{22,}/UUID/g;' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { split("'"${p[41]}"'",b);for(i in b) print b[i];if(n<10) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { split("'"${p[41]}"'",b);for(i in b) print b[i]".plist";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { split("'"${p[41]}"'",b);split("'"${p[42]}"'",c);for(i in b) print b[i]".plist\t"c[i];if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|(Bo|PO).+ sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' s/^ ?n...://p;s/^ ?p...:/-'$'\t''/p;' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" ' BEGIN{FS="= "} /Path/{print $2} ' ' /^ *$/d;s/^ */   /;' '/\./p' '/\.appex\/Contents\/Info\.plist$/p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test osascript\ -e );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' "'tell app \"System Events\" to get properties of login items'|tr , \\\n" 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|corru|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:|suhel| VALI|ver-r|xpma' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cght] ! -name .?\* ! -name \*ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '/S*/*/Ca*/*xpc* >&- ||echo No' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,Ex}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,In{p,ter},iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,mach_i*/*,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t {/S*/,/,}L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" 'L*/P*/com.ap*.p*.ext*.*.*t -exec '"${c1[14]}"' :displayOrder" {} \;' );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery safariexts Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents XPC\ cache Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors appexes );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0() { [[ "$v" ]]&&sed -E "$s"<<<"$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v"|sed -E "$s";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "${s[63]}"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 35 49 61 51;D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;B3 4 0 65;A3 14 6 32 0;B4 0 16 11;A1 4 50 64;B7 16;C3 52;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D23 14 1 62 42;D12 34 43 53 44;D12 22 20 32 25;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 37 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • Security flaw update - how do you know if your iPad and iMac are compromised/hacked?

    Can anyone explain how one might know if their iPad or iMac running Mountain Lion has been Hacked.
    I always use my wifi at home which is locked.
    On my iPad,
    messages popped up two days ago that the password for my apple    me.com account was wrong. When I tried to rectify that, I ended up with Apple freezing the account.  I checked the software and it says it is up to date.
    On my iMac
    On Friday and Saturday, messages intermittently popped up about certificates for one of my email accounts on their outbound server (GoDaddy but not Time Warner). On Saturday, I installed the latest update, but I am still getting the certificate message for the GoDaddy email,
    Does this mean I was already hacked?
    Is there anything else I should do? 
    Thank you.

    Sounds like your Apple ID may have been hacked. If it gets hacked, it's entirely possible for the hacker to take control away from you entirely, by changing the password, recovery e-mail and security questions, or even enabling two-factor authentication. If they have done the latter, you'll never see your Apple ID again, as Apple absolutely will not assist in recovering an account that has had two-factor authentication enabled.
    Since you're unable to log in at this point, you'll need to contact Apple. However, keep in mind that they may not be able to help you. There's very little proof that you own an Apple ID other than the information that the hacker could have changed by now. Still, Apple is the only one who can help with this.
    Regarding the GoDaddy e-mail certificate, that's harder to say anything about. You'll probably want to contact GoDaddy support about that one. It's likely to be an issue on their end - perhaps an expired certificate, or a certificate that was compromised and has now been revoked, or a simple configuration issue.
    None of this is likely to be related to malware.

  • How do i know if my photos are in my icloud?

    My iPhone took a little swim in the ocean yesterday and will not turn on.  How do i know if i have backed up my photos in the cloud?  Thank you!

    If you enabled iCloud backup on your phone in Settings>iCloud, you phone would back up to iCloud every day as long as it's connected to wifi and your charger and the screen is locked.  If you aren't backing up to iCloud, your phone would be backed up to your computer every time you synced it with iTunes.  You can check by opening itunes on your computer and going to Preferences>Devices and checking on the Backups list.
    You would have to be signed into your iCloud account on your computer to check if your phone was backed up to iCloud.  This explains how to sign into your account on your computer: http://www.apple.com/icloud/setup/ (requires Vista SP2 or higher on a PC or OS X Lion or higher on a Mac).  If you can do this, you can then click Manage on the iCloud control panel for Windows on a PC or in System Preferences>iCloud on a Mac to see whether you have an iCloud backup or not.

  • How do I know if my database is ASM

    I have Windows XP + 10g 10.2.0.1.0
    How do I know if my database is ASM?
    Thanks in advance.

    How do I know if my database is ASM?There is not such term "my database is ASM".But your database can be use ASM diskgroup.It means ASM instance was mounted some disk groups then your database files like control/data and online logs can be locate this diskgroups.For example if you query from SELECT NAME FROM V$DATAFILE then you can get as +DGR1/datafile/<datafile name>* there DGR1 is diskgroup and it mean is database use ASM instance.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

  • HT4906 how do i know what iphoto i have installed on my computer?

    i am trying to get icloud to work but it wont work with uploading my photos for some reason and it says i have to have OS 10.7.3 or higher which i do and i hve to have iPhoto 9 or something???? how do i know whats installed on my computer already?

    The following is for this Apple document: iCloud: Photo Stream FAQ
    What do I need to use Photo Stream?
    To use Photo Stream, including Shared Photo Streams, you need an iCloud account, compatible devices, and up-to-date software:
    iPhone, iPad, or iPod touch with iOS 6.0 or later
    Mac with OS X Mountain Lion v10.8.2 or later and iPhoto 9.4 or Aperture 3.4 or later
    PC with Windows 8, Windows 7, or Windows Vista (Service Pack 2) and the iCloud Control Panel 2.1 or later for Windows
    Apple TV (2nd generation) with Software Update 5.1 or later
    You can still use Photo Stream without Shared Photo Streams if your devices meet these requirements:
    iPhone, iPad, or iPod touch with iOS 5.1 or later
    Mac with OS X Lion v10.7.5 or later and iPhoto 9.2.2 or Aperture 3.2.3 or later
    PC with Windows 7 or Windows Vista (Service Pack 2) and the iCloud Control Panel v2.0 or later for Windows
    Apple TV (2nd generation) with Software Update 5.0 or later
    OT

  • How can i know what SubVI is on SubPanel?

    How can i know what SubVI is on SubPanel?
    In the main of my application i have three subpanels that open many different SubVI, i need to know what reference of subvi is actually open
    what could be the best way to do it?
    thanks,
    Andres

    I'm not aware of a way of directly getting the VI reference from the subpanel control after a VI has been inserted into it. Seems like an oversight to me if it's not there. This means you will either have to create a mechanism for saving the reference that's currently open at the time that you invoke the "Insert VI" method, or you can use a roundabout means like getting the run state of a VI or reading an indicator's value, as mentioned in this thread.

  • ...how to use BATCHMAN transaction in Controlling?

    ...how to use BATCHMAN transaction in Controlling?...
    need to upload statistical keyfigure values from an Excel file, but do not know which should be the header row on Excel file.
    thank you.

    To access the Transfer of External Data function (transaction BATCHMAN), choose:
    Accounting ® Real Estate Management ® Controlling ® Actual Postings ® Transfer of External Data.
    For further information please check the following link:
    http://help.sap.com/saphelp_erp2005/helpdata/en/32/e7ee431feb6d45957a83e0179cbbff/frameset.htm
    regards,
    Lily

  • How does oracle know the databse is inconsistent and needs recovery?

    Hello,
    How does Oracle know that the datafiles are inconsistent and db needs recovery when rebuilding the db off of the online/hot backups? Whereas, it doesn’t ask for recovery when rebuilding the database from cold backup (I understand that, for cold backup, database is shutdown immediate and hence the db is consistent). In both scenarios, a new control file is created (that means it won’t have SCN) and only datafile header will have the SCN. What’s that piece of info that oracle check to know if the database is consistent or inconsistent during the backup restore and recovery and where that info resides?
    Thank you for any hints and answers.
    Jay

    Oracle uses the datafiles to identify if they are consistent. If the datafiles backup was taken when the database was OPEN, they are marked as "fuzzy" in the header. Also, likely, the Checkpoint SCNs may be different if tablespace checkpoints (e.g. by ALTER TABLESPACE BEGIN BACKUP) are at different points in time.
    If the backup was a cold backup with the database shutdown normal/immediate, the headers are marked appropriately.
    When you run CREATE CONTROLFILE, it has to read the datafiles because the controlfile, itself, has no SCN and LogSequenceNumbers information.
    Hemant K Chitale

Maybe you are looking for