How to determine that the user/ pernr is comp cord?

Hi,
In tcode pa30 i see there is Comp Cord field. so these are the HR persons right which use the three digits numbers.
So my question is how to determine that the user/ pernr is comp cord?
I want to create the fm and pass user id as import and want to find out where this user is belongs to comp coordinator or not.
i do see some entry in the T526 table but not sure, how it work.
Regards
Ali

hi ali,
SACHX is the field you are looking for ..
regards
Manthan Raja

Similar Messages

  • How to verify that the user has changed table row data before db update

    Hi all,
    Iam using Oracle ADF with EJBs.
    I have a single selection table that displays rows of data returned from a function of my data control.
    The columns of my table are editable so that the user can change the data. The user selects a row, changes the data in one or more columns of the row and saves the data by means of a submit button. The code in the submit button, identifies the row of the corresponding iterator that the user clicked on and updates the data in the database (using the 'mergeEntity' function of the EntityManager)
    Before saving the data, I want to put some logic to check whether the user has actually changed some data to avoid unnecessary updates in the database . But for this I need a technique to detect that the user has indeed changed some data in the table row.
    One technique I have been using so far was to isolate the iterator row of the table and then query the corresponding row in the database table and compare their values.
    Except from dummy, this technique is not efficient if the table contains many rows.
    Moreover, in my case I have observed that on successive updates on the same row , the query on the database returns the new values (user changed values) and not the actual values contained in the database table. This means that when the user updates an iterator row the cached data affect also the results of the SELECT statement from the actual database table!!! Isn't this strange ?
    Can somebody propose me a neat method to detect when the user has changed the the data of an iterator row ?

    Hey Alan,
    The below solution seems overly complicated to me and can not be implemented without a custom screen and/or the use of JavaScript. Also, if your main concern is that a user may accidentally loose all their data because they closed the browser window or the session times out before they hit the save button then this solution does not help you.
    There are a couple of simpler approaches you can take here:
    # If the use of JavaScript is permissible you can hook into the windows 'onUnload' event, and pop-up a message box which gives the user the opportunity to cancel closing the window and save their case if they haven't already.
    # Implement an autosave feature by hooking into one of events provided by web determinations. A simple (but rather naive) way of doing this would be to hook into the OnRenderScreenEvent and call save on the interview session every time the event fires. This guarantees that all the data the user has submitted will aways automatically be saved, thereby removing the need to make sure the user manually saves their data before closing the browser.
    Automatically making Web Determinations close a browser window has to be done using JavaScript. However, doing so means that a) it won't work for people who turn off JavaScript, which is commonly done for accessibility reasons b) you'll likely run afoul of the browser's security mechanism (they generally won't let you close a window that you didn't open and some really don't like you doing that at all).
    Thanks,
    Kristy

  • How to determine that the Delivery Block in SO is removed manually

    Hi,
    Is there any way to determine if the delivery block is removed manually? Because initially on VA01 we are defaulting the delivery block. Then in VA02, if the user removed the delivery block then save, then goes back to VA02 again, in this, I need to determine that the delivery block was removed manullay.
    Regards,
    Mawi

    Hi,
    You can check out in environment->changes ..you can determine the manual changes made to the order...
    Thanks,
    Shailaja Ainala.

  • How to know that the user pressed the refresh button??

    hi there..
    how can i no that the user has pressed the browser "Refrsh" button so that i can respond with the appropriate action????
    thanx..

    Well, you can't know if refresh was pressed vs. hitting enter in the location bar to trigger a refresh. There isn't any simple way to know, though. Some kind of page hit counter or something, maybe.

  • How to determine that the Mapped User Id has the active r/3 account?

    Hi Experts,
    I have a requirement to determine the whether the mapped user ID in portal has active  or inactive user account in R/3.
    For example:
    We have implemented SSO between WAS & backed R/3. Now the user has the active poratl account but the R/3 account is inactive or locked due to some reason. Now in this situation when user logs in and hit the application then the screen display's the 500 internal server error which is not understood by the client. The requirement is to display the custom message instead of 500 internal server error inorder to direct the user that his account is inactive or locked in R/3.
    I have to handle this within the WDinit method of the Componenet controller which will stop the processing if incase the above is true and display the appropiate Error Message.
    Hope I am clear in statement above.
    Looking for your prompt reply.
    Thanks
    Shobhit Taggar

    Hi
    import com.sap.security.api.IUserAccount;
    See this link
    http://www.sdn.sap.com/irj/scn/index;jsessionid=(J2EE3417300)ID1438221150DB00601362742208939333End?rid=/library/uuid/40d562b7-1405-2a10-dfa3-b03148a9bd19&overridelayout=true
    Kind Regards,
    Mukesh.

  • Async tcp client and server. How can I determine that the client or the server is no longer available?

    Hello. I would like to write async tcp client and server. I wrote this code but a have a problem, when I call the disconnect method on client or stop method on server. I can't identify that the client or the server is no longer connected.
    I thought I will get an exception if the client or the server is not available but this is not happening.
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    How can I determine that the client or the server is no longer available?
    Server
    public class Server
    private readonly Dictionary<IPEndPoint, TcpClient> clients = new Dictionary<IPEndPoint, TcpClient>();
    private readonly List<CancellationTokenSource> cancellationTokens = new List<CancellationTokenSource>();
    private TcpListener tcpListener;
    private bool isStarted;
    public event Action<string> NewMessage;
    public async Task Start(int port)
    this.tcpListener = TcpListener.Create(port);
    this.tcpListener.Start();
    this.isStarted = true;
    while (this.isStarted)
    var tcpClient = await this.tcpListener.AcceptTcpClientAsync();
    var cts = new CancellationTokenSource();
    this.cancellationTokens.Add(cts);
    await Task.Factory.StartNew(() => this.Process(cts.Token, tcpClient), cts.Token, TaskCreationOptions.LongRunning, TaskScheduler.Default);
    public void Stop()
    this.isStarted = false;
    foreach (var cancellationTokenSource in this.cancellationTokens)
    cancellationTokenSource.Cancel();
    foreach (var tcpClient in this.clients.Values)
    tcpClient.GetStream().Close();
    tcpClient.Close();
    this.clients.Clear();
    public async Task SendMessage(string message, IPEndPoint endPoint)
    try
    var tcpClient = this.clients[endPoint];
    await this.Send(tcpClient.GetStream(), Encoding.ASCII.GetBytes(message));
    catch (Exception exception)
    private async Task Process(CancellationToken cancellationToken, TcpClient tcpClient)
    try
    var stream = tcpClient.GetStream();
    this.clients.Add((IPEndPoint)tcpClient.Client.RemoteEndPoint, tcpClient);
    while (!cancellationToken.IsCancellationRequested)
    var data = await this.Receive(stream);
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    private async Task Send(NetworkStream stream, byte[] buf)
    await stream.WriteAsync(BitConverter.GetBytes(buf.Length), 0, 4);
    await stream.WriteAsync(buf, 0, buf.Length);
    private async Task<byte[]> Receive(NetworkStream stream)
    var lengthBytes = new byte[4];
    await stream.ReadAsync(lengthBytes, 0, 4);
    var length = BitConverter.ToInt32(lengthBytes, 0);
    var buf = new byte[length];
    await stream.ReadAsync(buf, 0, buf.Length);
    return buf;
    Client
    public class Client
    private TcpClient tcpClient;
    private NetworkStream stream;
    public event Action<string> NewMessage;
    public async void Connect(string host, int port)
    try
    this.tcpClient = new TcpClient();
    await this.tcpClient.ConnectAsync(host, port);
    this.stream = this.tcpClient.GetStream();
    this.Process();
    catch (Exception exception)
    public void Disconnect()
    try
    this.stream.Close();
    this.tcpClient.Close();
    catch (Exception exception)
    public async void SendMessage(string message)
    try
    await this.Send(Encoding.ASCII.GetBytes(message));
    catch (Exception exception)
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    private async Task Send(byte[] buf)
    await this.stream.WriteAsync(BitConverter.GetBytes(buf.Length), 0, 4);
    await this.stream.WriteAsync(buf, 0, buf.Length);
    private async Task<byte[]> Receive()
    var lengthBytes = new byte[4];
    await this.stream.ReadAsync(lengthBytes, 0, 4);
    var length = BitConverter.ToInt32(lengthBytes, 0);
    var buf = new byte[length];
    await this.stream.ReadAsync(buf, 0, buf.Length);
    return buf;

    Hi,
    Have you debug these two applications? Does it go into the catch exception block when you close the client or the server?
    According to my test, it will throw an exception when the client or the server is closed, just log the exception message in the catch block and then you'll get it:
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.Invoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    Console.WriteLine(exception.Message);
    Unable to read data from the transport connection: An existing   connection was forcibly closed by the remote host.
    By the way, I don't know what the SafeInvoke method is, it may be an extension method, right? I used Invoke instead to test it.
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • How do i create a form in live cycle E4 that i can save as a PDF that the user cannot save over?

    How do i create a form in live cycle E4 that i can save as a PDF that the user cannot save over?

    You can't. If the file is made read-only via the file system, the user will prompted to save as a new file if they attempt to save.

  • How can I know the name of the file that the user has currently open ?

    Hello
    I'm developing a module for x3dv.
    http://hiperia3d.blogspot.com/search/label/X3DV%20Module%20For%20Netbeans
    I am going to add a button to open the files when I click it.
    I just need to know how can I know the name of the file that the user has currently open in the editor. What variable holds it in Netbeans?
    Thank you
    Jordi

    If you are using the JFileChooser to open the document, I would create another class with this included:
    //initiate class variables
    private File f;
    //create JFileChooser
    JFileChooser fc = new JFileChooser();
    fc.setMultiSelectionEnabled(false);
    fc.setFileSelectionMode(JFileChooser.FILES_ONLY)
    //set the chooser to initialise File f with the file selected
    int status = fc.showOpenDialog(null);
    if (status == JFileChooser.APPROVE_OPTION)
         f = fc.getSelectedFile();
    public File getFile()
         return f;
    }

  • How to customize SAPlogon so that the user cannot enter transaction code?

    I use PFCG to create a role which limit the choices of menu.  I create a user and set the role to the user.
    I would like to disable or hide the COmmand Field so that the user cannot enter transaction code directly.
    Is it possible to do so?
    If yes, would anyone show me how?
    Any discussion is welcome.

    anyway you are going to restrict the user authorization vai role, insted of going throught the whole tree to execute the tcode there is shotcut as command line. here you can save much more time for the user insted going through the tree always. there is no harm for the system if you keep the command line option. What and why you think it should be disabled?
    Cheers,
    -Sunil

  • How can i change the user that open the rfc connection (sm58) from R/3?

    Hi all,
    i'd like to know how can i customize the user 'connecting' R/3 and BW, i mean: when i launch a data extraction a fixed user creates the rfc connection to BW (and i can see it from tcode sm58 in r/3), i need to use a different username so that it will come be more easy for me to reorganize the rfc queue in case of errors (we are doing some testing), it's possible to do something like this or everyone has to share the same user r/3 side?
    I hope i've been clear...
    thanks for the help
    S.

    Hi...
    Its recommended that only one user executes the RFC because you must manage the authorizations for remote execution only with few users....in case on error you can send the user as a parameter of the RFC  and you can buid the error message with this parameter and identify the user of execution...
    I hope this helps you
    Regards

  • How do you lock a PDF file so that the user cannot create or delete bookmarks?

    How do you lock a PDF file so that the user cannot create or delete bookmarks?
    Thanks!

    There's no way to lock bookmarks specifically, but if you you can apply a
    security policy to prevent editing the PDF in general.

  • I'm using "window.open()" to show one Calendar in a popup window. I can see that the popup is re-sizable. How can I prevent the user from re-sizing the popup?

    I'm using "window.open()" to show one Calendar in a popup window. I can see that the popup is re-sizable. How can I prevent the user from re-sizing the popup? I have tried "resizable=yes|no|1|0" and that seems to be not working.

    You can't prevent users from resizing a pop-up.
    *https://developer.mozilla.org/en-US/docs/Web/API/window.open

  • How to pass the value that the user clicks on

    I have a bunch of files that i am displaying. If the user clicks on a file I am taking to another page. I want to capture
    the value that the user clicks on as that's the file name.
    I am displaying the list of files in a loop and have a href to the next page.
    the setAttributes and getAttributes do not work as they capture only the last value in the loop.
    Any suggestions what I should use?

    The standard approach is to send a request parameter with the click.
    You are showing the filenames as hyperlinks?
    Then you just have to make the link
    <a href="fileDetails.jsp?fileId=<%= currentFile.getFileId() %>">currentFile.getFileName()</a>You can then use request.getParameter("fileId") to find which link was clicked.
    Cheers,
    evnafets

  • Storing information that the user shouldn't be able to access?

    Hello all,
    I'm not sure if this is the appropriate place to post this but feel free to move this post to a better spot if its in the wrong place. Hope you guys can help me I have a program that requires the user to register such as entering a cd-key and other information that proves that the software was purchased. At this point that information is stored in a file where the program later reads from that file to determine wether or not it is indeed unlocked and available for the user to use. Using this method I found that the user could simply copy the entire folder where the program is located including the file that tells the program that it is registered, to another computer. This allows the user to simply copy it to endless computers without ever registering it again. I can see this being posted online somewhere and there goes my program off to everybody for free :(
    What i'm asking is do you guys have any suggestions on how I can make sure the files containing registration information don't get read or copied by the user? So far here are my theories:
    1. Make a file with a name that doesn't seem associated with my program and put that file in a location that isn't easily found.
    *2.* Require the user to activate the software online. Keep track of how many times the specific cd-key has been registered online and limit it to three installations. This would be my preferable method because if a cd-key was given out to say 10 people it wouldn't matter because that cd-key can only be registered 3 times online. However I have no idea how to let a java program write data to an online source yet I know how to read from an online source. (As a side question if anyone could point me to some tutorial where I could learn about writing data to online sources that would be great) If you've ever used Adobe Photoshop CS3 it would hopefully be kind of like their registration method. I don't know if that is possible with Java, though so far it seems anything is possible with Java :)
    Any suggestions would be great. Thanks :)

    I just realized I am not playing fair, if I am going to ask you what yours does i should have said what mine did.
    So, my software that netted me $25,000 basically was an inventory helper for factories that do fabrication. Basically I was in school and working construction as a forman (was my grandpas company and I had grown up around it) full time. I realized that most of the workers under me were very talented at building things, but sucked at basic logical things like going to the scrap pile and finding the board just barely longer than the one you need to cut instead of just grabbing a new board and generating more scrap that means more waste and less profit. After trying to pound this concept into the guys over and over "Your christmass bonuses depend on how little waste we have guys, c'mon" (but with lots more swearing, cause it was construction after all), I realized that this was probably a problem lots of fabrication buisnesses struggled with. So I wrote a program that used a touch screen and a printer that printed on sticker labels (both commercial off the shelf items). When inventory was delivered someone printed up stickers for all the inventory that had a unique tracking number and it's current dimensions written on it. Didn't matter if it was steel, fabric, wood, plastic, or whatever. When someone needed something they went to the touch screen and navigated to the category (type) of material they wanted and then entered the dimensions they needed. The program automatically figured out which exact peice they should grab to use and if they should expect the scrap to be entered back in as a usable length. If it did expect scrap it kept track until the person came back with the new dimensions of the scrap and a new sticker was printed. If scrap was expected but not generated eventually management was notified. Management also got to see who was using what peices, and exactly what kind of inventory they had on hand.
    I got a lot more than $25,000 from the three companies, but I also had to buy computer, touch screens, label printers, pay taxes, get buisness license, pay fees, maintain a second phoneline for "buisness calls", and all sorts of other things that ended up making my pay actually banked for work done about $25,000.
    I sold it to three different companies in the area I lived along with a 3 year contract to fix it whenever broken and the option for them to get new features added at minimul cost. That was 15 years ago now. Of three three one company paid me a little more after the three years ended to get the code ( they wanted to extend the maintenence and service contract but I was moving). One went out of buisness before the three years ended, and the third couldn't convince their employees to use it and ended up giving up on it.
    My game that got me $200 was just a simple side scroller, back when those where popular. I used the $200 to buy an RC car, and released two "updates" with some of the better feature ideas people sent me with their donation (was mail, long before paypal).
    JSG

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

Maybe you are looking for

  • Flash Player für LG   47 LM 660 s

    Hallo, da ich Euer System der Forensuche nicht verstehe trage ich hier mal meine Frage ein. Englisch kann ich nicht, somit möge man mir verzeihen aber vielleich gibt jemand bei Adobe der Deutsch versteht. Also ich hab mir vor kurzem einen  LG   47 LM

  • Knowing issues with atv3  and Yosemite gm incl iTunes 12 beta

    so as I wiite in the headline I have som problems to connect my media library With iTunes a tv always says:unable to connect to your media library  it is also impossible to connect to the library from any other device (iPad or iPhone)  i checkt it wi

  • Audio playback stuttering/skipping randomly itunes 10.1 mac 10.6.5

    Having issues with playback on my mac since installing 10.1. It seems to glitch a track randomly and skips a second of song or something. 7% of my CPU is in use and ive got nearly 4gig of ram free. itunes library is about 32 gig bit its never been an

  • Is it possible to lock individual folders in snow leopard?

    can we lock each folder and set different passwords to them in snow leopard? - i have been searching the system and still cant seem to get it to work - there is an option for "lock" in the get info section, but when i hit the action preference on the

  • Will The Sims 3 run on my mac

    This is my Mac Spec. Processor  2.4 GHz Intel Core 2 Duo Memory  2 GB 1067 MHz DDR3 Graphics  NVIDIA GeForce 320M 256 MB Software  Mac OS X Lion 10.7.3 (11D50b) I want to buy The Sims 3 and i'm just wondering if it will fit. The Sims requires 2GB of