How to disable AES CBC encryption on ASA 5545

Hi ,
In our environment  having ASA 5545 ( IOS Ver 9.1) Firewall and In there AES 256 CBC cipher encryption is enabled for SSH user access.
we need to disable CBC cipher encryption and enable the CTR Cipher encryption for SSH users.
Kindly help me for the same .
Thanks,
Dheeraj

AES256-ctr was just added in ASA software version 9.1(2). I don't believe the ssh encryption type is configurable in the ASA ssh server. You need to specify it in the client - I did verify it will connect when yo do that (see output below).
SSL encyption ciphers can be specified to exclude the weak ciphersuites.
# sh ssh session det
SSH Session ID          : 1
 Client IP              : <deleted>
 Username               : <deleted>
 SSH Version            : 2.0
 State                  : SessionStarted
 Inbound Statistics
  Encryption            : aes256-ctr
  HMAC                  : sha1
  Bytes Received        : 1824
 Outbound Statistics
  Encryption            : aes256-ctr
  HMAC                  : sha1
  Bytes Transmitted     : 5632
 Rekey Information
  Time Remaining (sec)  : 3277
  Data Remaining (bytes): 996142580
  Last Rekey            : 07:12:38.807 UTC Tue May 20 2014
  Data-Based Rekeys     : 0
  Time-Based Rekeys     : 0

Similar Messages

  • How to create SecretKey for AES 128 Encryption based on user's password??

    I have written a below program to encrypt a file with AES 128 algorithm. This code works fine. It does encrypt and decrypt file successfully..
    Here in this code I am generating SecretKey in the main() method with the use of key generator. But can anybody please tell me how can I generate SecretKey based on user's password?
    Thanks in Advance,
    Jenish
    import java.io.InputStream;
    import java.io.OutputStream;
    import java.io.FileInputStream;
    import java.io.FileOutputStream;
    import java.io.ObjectOutputStream;
    import java.io.ObjectInputStream;
    import javax.crypto.Cipher;
    import javax.crypto.SecretKey;
    import javax.crypto.spec.IvParameterSpec;
    import javax.crypto.CipherInputStream;
    import javax.crypto.CipherOutputStream;
    import javax.crypto.KeyGenerator;
    import java.security.spec.AlgorithmParameterSpec;
    public class AESEncrypter
         Cipher ecipher;
         Cipher dcipher;
         public AESEncrypter(SecretKey key)
              // Create an 8-byte initialization vector
              byte[] iv = new byte[]
                   0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09,0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f
              AlgorithmParameterSpec paramSpec = new IvParameterSpec(iv);
              try
                   ecipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
                   dcipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
                   // CBC requires an initialization vector
                   ecipher.init(Cipher.ENCRYPT_MODE, key, paramSpec);
                   dcipher.init(Cipher.DECRYPT_MODE, key, paramSpec);
              catch (Exception e)
                   e.printStackTrace();
         // Buffer used to transport the bytes from one stream to another
         byte[] buf = new byte[1024];
         public void encrypt(InputStream in, OutputStream out)
              try
                   // Bytes written to out will be encrypted
                   out = new CipherOutputStream(out, ecipher);
                   // Read in the cleartext bytes and write to out to encrypt
                   int numRead = 0;
                   while ((numRead = in.read(buf)) >= 0)
                        out.write(buf, 0, numRead);
                   out.close();
              catch (java.io.IOException e)
         public void decrypt(InputStream in, OutputStream out)
              try
                   // Bytes read from in will be decrypted
                   in = new CipherInputStream(in, dcipher);
                   // Read in the decrypted bytes and write the cleartext to out
                   int numRead = 0;
                   while ((numRead = in.read(buf)) >= 0)
                        out.write(buf, 0, numRead);
                   out.close();
              catch (java.io.IOException e)
         public static void main(String args[])
              try
                   // Generate a temporary key. In practice, you would save this key.
                   // See also e464 Encrypting with DES Using a Pass Phrase.
                   KeyGenerator     kgen     =     KeyGenerator.getInstance("AES");
                   kgen.init(128);
                   SecretKey key               =     kgen.generateKey();
                   // Create encrypter/decrypter class
                   AESEncrypter encrypter = new AESEncrypter(key);
                   // Encrypt
                   encrypter.encrypt(new FileInputStream("E:\\keeper.txt"),new FileOutputStream("E:\\Encrypted.txt"));
                   // Decrypt
                   encrypter.decrypt(new FileInputStream("E:\\keeper.txt"),new FileOutputStream("E:\\Decrypted.txt"));
              catch (Exception e)
                   e.printStackTrace();
    }

    sabre150 wrote:
    [PKCS12|http://www.rsa.com/rsalabs/node.asp?id=2138]
    [PKCS5|http://www.rsa.com/rsalabs/node.asp?id=2127] , no?
    In Java, you can use the [Password-based encryption PBE Cipher classes|http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#PBEEx] . I think you'll need the bouncycastle provider to get AES-based PBE ciphers.

  • OpenSSL bf-cbc encrypted Keyfile HOOK for LUKS

    I modified the this HOOK that maxim_ posted here. That dose not work.
    https://bbs.archlinux.org/viewtopic.php … 05#p947805
    This one uses Blowfish in CBC mode instead of AES-256.
    The password is hashed 1000 times with Whirlpool.
    gen-cryptkey adds a a Salt to the encrypted keyfile
    https://github.com/tdwyer/bfkeyfile
    /lib/initcpio/hooks
    #!/usr/bin/ash
    run_hook ()
    local encfile decfile iteration attempts prompt badpassword dev arg1 arg2 retcode password passwordHash
    if [ "x${bfkf}" != "x" ]; then
    encfile="/enc_keyfile.bin"
    decfile="/crypto_keyfile.bin"
    iteration=1000
    attempts=5
    prompt="Enter password: "
    badpassword="Password incorrect"
    dev="$(echo "${bfkf}" | cut -d: -f1)"
    arg1="$(echo "${bfkf}" | cut -d: -f2)"
    arg2="$(echo "${bfkf}" | cut -d: -f3)"
    if poll_device "${dev}" "${rootdelay}"; then
    case "${arg1}" in
    *[!0-9]*)
    mkdir /mntkey
    mount -r -t "${arg1}" "${dev}" /mntkey
    dd if="/mntkey/${arg2}" of="${encfile}" >/dev/null 2>&1
    umount /mntkey
    rm -rf /mntkey
    dd if="${dev}" of="${encfile}" bs=1 skip="${arg1}" count="${arg2}" >/dev/null 2>&1
    esac
    fi
    if [ -f "${encfile}" ]; then
    while true; do
    read -rsp "${prompt}" password
    i=0
    while [ ${i} -lt ${iteration} ]; do
    password=`echo -n "${password}" | openssl dgst -whirlpool -hex 2> /dev/null | cut -d ' ' -f 2`
    i=$(( ${i} + 1 ))
    done
    openssl bf-cbc -pass pass:"${password}" -d -in "${encfile}" -out "${decfile}" >/dev/null 2>&1
    retcode="$?"
    if [ "${retcode}" != "0" ]; then
    echo -e "\n${badpassword}\n"
    attempts=$(( ${attempts} - 1 ))
    [ "${attempts}" == "0" ] && echo "Keyfile could not be decrypted" && break
    else
    break
    fi
    done
    rm -f "${encfile}"
    else
    echo "Encrypted keyfile could not be opened. Reverting to 'encrypt' hook."
    fi
    fi
    /lib/initcpio/install
    #!/bin/bash
    build() {
    add_binary /usr/bin/openssl
    add_runscript
    help ()
    cat<<HELPEOF
    This hook allows for an openssl (bf-cbc) encrypted keyfile for LUKS.
    It relies on standard 'encrypt' hook providing decrypted '/crypto_keyfile.bin' for it.
    You must use gen-cryptkey create the encrypted enc_keyfile.bin
    The password is hashed with Whirlpool 1000 times
    Then your password Hash is used to encrypt the keyfile
    mkinitcpio.conf:
    MODULES: add ext4 vfat or whatever the type of filesystem the keyfile is on
    HOOKS=" ... bfkf encrypt ... filesystems ..."
    Kernel Parameters:
    There is no need for cryptkey=
    Two options are supported:
    1) Using a file on the device:
    bfkf=<device>:<fs-type>:<path>
    2) Reading raw data from the block device:
    bfkf=<device>:<offset>:<size>
    Example: /etc/default/grub
    GRUB_CMDLINE_LINUX="bfkf=/dev/sdb1:ext4:/keyfile.bin cryptdevice=/dev/sda2:root"
    HELPEOF
    # vim: set ft=sh ts=4 sw=4 et:
    /usr/bin/gen-cryptkey
    #!/bin/bash
    # GPLv3
    # Thomas Dwyer
    # tomd.tel
    iteration=1000
    create_msg='Create: gen-cryptkey create'
    decrypt_msg='Decrypt: gen-cryptkey decrypt PATH_TO_KEYFILE'
    main () {
    action=$1
    if [ -z $action ]; then
    echo -e "Usage:\n$create_msg\n$decrypt_msg"
    elif [ $action == "create" ]; then
    crypt
    elif [ $action == "decrypt" ]; then
    if [ -z $2 ]; then
    echo -e "Usage:\n$create_msg\n$decrypt_msg"
    else
    decrypt $2
    fi
    else
    echo -e "Usage:\n$create_msg\n$decrypt_msg"
    fi
    exit 0
    crypt () {
    encfile="enc_keyfile.bin"
    echo "$encfile encrypted keyfile will be created"
    echo ''
    read -rsp "Enter password: " password
    password1=`echo -n "$password" | openssl dgst -whirlpool -hex | cut -d ' ' -f 2`
    echo ''
    read -rsp "Enter password Again: " verify
    password2=`echo -n "$verify" | openssl dgst -whirlpool -hex | cut -d ' ' -f 2`
    if [[ "$password1" == "$password2" ]]; then
    for (( i=1; i<=$iteration; i++ )); do
    password=`echo -n "$password" | openssl dgst -whirlpool -hex | cut -d ' ' -f 2`
    done
    dd if=/dev/urandom bs=1k count=256 | openssl bf-cbc -pass pass:"${password}" -salt -out "${encfile}"
    else
    echo "Passwords did not match"
    fi
    decrypt () {
    encfile=$1
    decfile="crypto_keyfile.bin"
    echo "$encfile Will be decrypted to crypto_keyfile.bin"
    echo ''
    read -rsp "Enter password: " password
    for (( i=1; i<=$iteration; i++ )); do
    password=`echo -n "$password" | openssl dgst -whirlpool -hex | cut -d ' ' -f 2`
    done
    openssl bf-cbc -pass pass:"${password}" -d -in "${encfile}" -out "${decfile}"
    main $@
    Last edited by hunterthomson (2013-01-01 00:01:20)

    Well, it is working now, so feel free to use it.
    If you do use it, make darn sure to keep "at least" 3 backups of the keyfile on 3 different devices.
    You will also want to leave your passphrase enabled until you are sure the keyfile is working as it should.
    However, I am not going to use this anymore and will no longer be working on it. I will subscribe to this thread and answer any questions. I don't really see a whole lot of added security in this, and it would be kind of a pain to use a keyfile in a Live CD/USB. I think it is good enough to make use of the --iter-time flag when using luksFormat or luksAddKey.  It was a fun ride learning how to write this hook for initcpio
    Note: Anyone who wants to write a hook should install busybox and symlink /usr/local/bin/ash to it for testing the HOOK script. The HOOKS use busybox ash not 'sh' nor 'bash', and ash is strange. If your HOOK script has an error you will get a kernel panic.
    Last edited by hunterthomson (2012-12-31 23:57:24)

  • How can I open McAfee encrypted (EEFF) PDF files with Adobe Reader?

    How can I open McAfee encrypted (EEFF) PDF files with Adobe Reader?  Get error "There was an error opening this document. Access denied".  Disabling Protected Mode in Reader doesn’t always work.
    McAfee: https://kc.mcafee.com/corporate/index?page=content&id=KB74299&actp=search&viewlocale=en_US &searchid=1240943327683

    If Reader ISN'T in the list of prpgrams to open with, click "Browse"
    In the "Browse window" go to C/Program files [or Program Files (x86)]/Adobe/Reader 11/Reader
    Select "AcroRd32.exe" and click "Open"
    Make sure "Always use the selected program to open this kind of file" is checked and click "OK".

  • WPA2 network authentication with AES Data Encryption

    I have tried unsuccessfully to connect with my university's network....they are running WPA2 with AES data encryption....authentication is Protected EAP (PEAP). Any ideas of the iPhone can connect to something like this?

    You've confirmed my suspicion. We use WPA2-Personal with AES Encryption as well and I just discovered after having bought my iPhone last night, that it will not connect. And yet every other WiFi device I own, including two Windows computers have no issue connecting to the same Access Point. Obviously the issue is with the iPhone and now I'll have to contact Apple to learn how the intend to resolve it.

  • How to disable backup password

    how to disable backup password knowing that the box under backup (encrypt local backup) is not aailable to unmark

    Well, you can't, if that's the case. The requirement to encrypt your backup can be enforced by setting up an Exchange account on your phone, if you have such.

  • How to disable product update on Cisco AnyConnect mobility client

    Hallo,
    Do you anybody know how to disable/turn off "Checking for product update" during _every_ connecting Cisco Anyconnect Secure Mobility Client (VPN) to remote sites?
    I found it may by possible on the ASA side, but I need to disable it on the client (computer). I can see that checking is NOT during connecting to my company site, but when connecting to ANY OTHER site everytime is new version checked. It takes some time ... and I need to switch between VPN often.
    Thank you for your help!
    Regards, Ondrej

    You should be able to do this in the AnyConnect local policy. Just add (or edit, if you already have a local policy file) the following to the local policy file:
    <!--?xml version="1.0" encoding="UTF-8"?-->
    <anyconnectlocalpolicy acversion="2.4.140" xmlns="http://schemas.xmlsoap.org/encoding/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemalocation="http://schemas.xmlsoap.org/encoding/ AnyConnectLocalPolicy.xsd">
    <BypassDownloader>true</BypassDownloader>
    </AnyConnectLocalPolicy>
    The local policy file can be found here:
    Windows Vista/7/8: C:\ProgramData\Cisco\Cisco AnyConnect Secure Mobility Client\AnyConnectLocalPolicy.xml
    Linux/Mac: /opt/cisco/anyconnect/AnyConnectLocalPolicy.xml
    See the Enabling FIPS and Additional Security in the Local Policy section of the Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 3.1 for more details.

  • SaaS Sharepoint, ADFS claims and internal AD-CA: How to disable CRL check in Sharepoint?

    Hi all,
    We have an external SaaS provider with a Sharepoint 2010 server. In our AD, there is an ADFS server providing ADFS claims to Sharepoint and thus giving SSO functionality. For the ADFS service and its token-signing and encrypting, there is one certificate
    drawn from an internal AD Enterprise CA server.
    The problem is that, when the company user opens the Sharepoint URL, it is extreamly slow to open, however it does eventualy open. The SaaS provider has indicated its an issue with the CRL checking. I know on other Microsoft products there are ways to disable
    CRL checking but haven't found such information for sharepoint.
    We have provided the CRL files and the provider has added these and for as long as they are valid things work as expected. However the CRL then expires and we are back to square one.
    Can anyone help?
    I have found this question has been asked before here:
    https://social.technet.microsoft.com/Forums/sharepoint/en-US/431bae5c-c502-4723-9de7-663abd46658e/saas-sharepoint-adfs-claims-and-internal-adca-how-to-disable-crl-check-in-sharepoint?forum=sharepointgeneralprevious
    Unfortunately the answer doesn't satisfy my situation. Also not sure I agree that self signed certificates should be used and it's quite a topic for debate in ADFS circles... However in my situation we don't have the option to change ADFS to use self signed
    certificates as the ADFS service is in use with 12+ other service providers all who have no issue using the Token Signing Certificate even though they cant access the CRL either.
    Thanks for your help,
    James

    Hi,
    As I understand, you want to disable CRL check in SharePoint.
    There are four workarounds:
    1. Give your servers an outbound Internet connection
    2. Edit the hosts file at “%SYSTEMROOT%\\System32\\drivers\\etc\\hosts” to fool the CRL check into thinking your local machine is crl.microsoft.com by pointing it at 127.0.0.1 (localhost).
    3. Edit the registry to disable CRL checking by setting the State DWORD to 146944 decimal (SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\WinTrust\\Trust Providers\\Software Publishing for both HKEY_USERS\\.DEFAULT and HKEY_CURRENT_USER) PowerShell.
    4. Edit the machine.configs and disable it there.
    The article gives you the details about the four workaround.
    More reference:
    http://basementjack.com/uncategorized/powershell-script-to-disable-certificate-revocation-list-crl/
    https://kb4sp.wordpress.com/2013/10/08/certificate-revocation-list-disable-check/
    Best regards,
    Sara Fan

  • Is Weblogic 11g supports for Kerberos AES/RC4 Encryption on Windows 2008 R2

    Is Weblogic 11g supports for Kerberos AES/RC4 Encryption on Windows 2008 R2?
    Thanks,

    DES is disabled by default on 2008, could this DC be a Windows 2003?  If so then this would be the expected encyption.
    The following is the list of the encryption available for each Windows system
    Windows 2000,  XP,Windows Server 2003:     
    DES, RC4          
             Vista
    , Windows Server 2008:      DES, RC4,AES          
             Windows 7 and  Windows Server  2008 R2:     DES(disabled by default), RC4,AES
    From:
    http://blogs.msdn.com/b/openspecification/archive/2010/11/17/encryption-type-selection-in-kerberos-exchanges.aspx
    Paul Bergson
    MVP - Directory Services
    MCITP: Enterprise Administrator
    MCTS, MCT, MCSE, MCSA, Security, BS CSci
    2012, 2008, Vista, 2003, 2000 (Early Achiever), NT4
    Twitter @pbbergs http://blogs.dirteam.com/blogs/paulbergson
    Please no e-mails, any questions should be posted in the NewsGroup.
    This posting is provided AS IS with no warranties, and confers no rights.

  • Crypt::cbc encrypt / decrypt using javax.crypto

    I am having a bit of a time encrypting with crypt::cbc and decrypting with java. To get to the point, here is my code, perl first, java 2nd - I have tried to keep things very simple.
    #!/usr/local/bin/perl -w
    use strict;
    use Crypt::CBC 2.30;
    die "Need to specify a file" if(!(my $infile = shift));
    my $key = q(nvA9s$233eOrlQG4);
    my $iv = q(0123456701234567);
    my $bufsize = 16384;
    my $cipher = Crypt::CBC->new({
              'key'          => $key,
              'iv'          => $iv,
              'header'     => 'none',
              'cipher'     => 'Rijndael',
              'keysize'     => '16',     #forced - default is 32 bytes
              'padding'     => 'standard',     #PKCS5
              'blocksize'     => '16',
              'literal_key'     => '1',          #do not MD5 hash key
    open (FORIG,"$infile")|| die "can't open file: $!";
    open (FCRYPT,">$infile.crypt")|| die "can't open file: $!";
    $cipher->start('encrypting');
    while(my $readsize = sysread(FORIG, my $buf, $bufsize)) {
         print FCRYPT $cipher->crypt($buf);
    print FCRYPT $cipher->finish();
    close FCRYPT;
    close FORIG;
    now the java:
    // i have elided the import stmts for brevity
    public class AESEncrypter {
         Cipher ecipher;
         Cipher dcipher;
         byte [] buf = new byte[1024];
         public AESEncrypter() {
              String strKey = "nvA9s$233eOrlQG4";
              byte[] keyBytes = null;
              try {
                   keyBytes = strKey.getBytes("UTF-8");
              } catch(java.io.UnsupportedEncodingException ex) {
                   ex.printStackTrace();
              byte[] iv = new byte[] { 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7 };
              IvParameterSpec ivSpec = new IvParameterSpec(iv);
              try {
                   ecipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
                   dcipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
              } catch (NoSuchAlgorithmException e) {
                   e.printStackTrace();
              } catch (NoSuchPaddingException e) {
                   e.printStackTrace();
              try {
                   SecretKeySpec key = new SecretKeySpec(keyBytes, "AES");
                   ecipher.init(Cipher.ENCRYPT_MODE, key, ivSpec);
                   dcipher.init(Cipher.DECRYPT_MODE, key, ivSpec);
              } catch (InvalidKeyException e1) {
                   e1.printStackTrace();
              } catch (InvalidAlgorithmParameterException e1) {
                   e1.printStackTrace();
         public void encrypt(InputStream in, OutputStream out) {
              try {
                   out = new CipherOutputStream(out, ecipher);
                   int numRead = 0;
                   while((numRead = in.read(buf)) >= 0) {
                        out.write(buf, 0, numRead);
                   out.close();
              } catch(java.io.IOException e) {
                   e.printStackTrace();
         public void decrypt(InputStream in, OutputStream out) {
              try {
                   out = new CipherOutputStream(out, dcipher);
                   int numRead = 0;
                   while((numRead = in.read(buf)) >= 0) {
                        out.write(buf, 0, numRead);
                   out.close();
              } catch(java.io.IOException e) {
                   e.printStackTrace();
         public static void main(String args[]) {
              if(args.length != 1) {
                   System.out.println("Usage: java AESEncrypter filename");
                   System.exit(0);
              AESEncrypter encrypter = new AESEncrypter();
              try {
         //          encrypter.encrypt(new FileInputStream(args[0]), new FileOutputStream("Java_encrypted.txt"));
                   encrypter.decrypt(new FileInputStream(args[0]), new FileOutputStream("Java_decrypted.txt"));
              } catch (java.io.FileNotFoundException ex) {
                   ex.printStackTrace();
    so with file named whoop.txt containing the following contents:
    whoop
    whoop
    whoop
    whoop
    I do:
    $>./encrypt.pl whoop.txt
    and get the resulting file whoop.txt.crypt. then I do
    $>java AESEncrypter whoop.txt.crypt
    and get the resulting file Java_decrypted.txt. when I do a hex dump of this file:
    $>dump.pl Java_decrypted.txt
    i get the following
    /0 /1 /2 /3 /4 /5 /6 /7 /8 /9 /A /B /C /D /E /F 0123456789ABCDEF
    0000 : 47 58 5F 5F 40 3A 47 58 5F 5F 40 3A 47 58 5F 5F GX__@:GX__@:GX__
    0010 : 70 0A 77 68 6F 6F 70 0A p.whoop.
    I have tried to ensure that everything matches between the perl and java code, however I am obviously missing something. Thanks in advance for any ideas!
    Gregg

    i have hardcoded the IV in perl as:
    my $iv = q(0123456701234567);
    and in the .java file as:
    byte[] iv = new byte[] { 0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7 };
    IvParameterSpec ivSpec = new IvParameterSpec(iv)
    Are these not compatible?
    thanks - gh

  • How to disable parent window while popup window is coming

    Hi,
    I am working on Oracle Applications 11i.
    I am able to get the popup window using the Java script in the controller.
    Please see the below code for the reference.
    String pubOrderId = pageContext.getParameter("orderId");
    StringBuffer l_buffer = new StringBuffer();
    StringBuffer l_buffer1 = new StringBuffer();
    l_buffer.append("javascript:mywin = openWindow(top, '");
    l_buffer1.append("/jct/oracle/apps/xxpwc/entry/webui/AddAttachmentPG");
    l_buffer1.append("&retainAM=Y");
    l_buffer1.append("&pubOrderId="+pubOrderId);
    String url = "/OA_HTML/OA.jsp?page="+l_buffer1.toString();
    OAUrl popupUrl = new OAUrl(url, OAWebBeanConstants.ADD_BREAD_CRUMB_SAVE );
    String strUrl = popupUrl.createURL(pageContext);
    l_buffer.append(strUrl.toString());
    l_buffer.append("', 'lovWindow', {width:750, height:550},false,'dialog',null);");
    pageContext.putJavaScriptFunction("SomeName",l_buffer.toString());
    But here the problem is, even though popup window is there, i am able to do the actions on the parent page.
    So how to disable the parent page, while getting the popup window.
    Thanks in advance.
    Thanks
    Naga

    Hi,
    You can use javaScript for disabling parent window as well.
    Refer below link for the same:
    http://www.codeproject.com/Questions/393481/Parent-window-not-disabling-when-pop-up-appears-vi
    --Sushant                                                                                                                                                                                                                                                                                                                                                                                                                                           

  • How to Disable "Auto Align" in [System Pref.] - [Display] - [Arrangement]

    Does anyone know How to Disable "Auto Align" in [System Preferences] -> [Display] -> [Arrangement]?
    It always want to align the two screens from the top when they are lined up close together and I need them to be aligned from the bottom. Since the resolution heights are so close together (1080 & 1050) it does not allow one to align side by side from the bottom as it prioritizes top alignment.
    I guess I'm looking for a script to disable this feature.

    Anyone got any ideas?

  • How to disable the "turn page" event triggered by the scroll/swipe function?

    The problem is as follows.
    The default behaviour of Acrobat Reader (both stand alone and browser plug-in) is to allow scrolling/swiping with the mouse wheel/trackpad. This is useful when the pdf's page length is greater than the screen's own length, because you can read the pdf with no need to distract your attention from the text to the scrollbar button. However, the same scroll/swipe function turns into a usability problem when the pdf is embedded in a html page and the pdf's page length is smaller than the browser's length. In this case, the scroll/swipe turns the page, distracting your attention from the text to the unintended behaviour of the browser. What happens is that you are so used to scrolling/swiping that you did it unintentionally in the pdf's caption area. You really did not want to turn pages in the pdf. Furthermore, if the pdf takes the whole html page, being a website, the scroll/swipe function flips the website pages in ways that neither the reader nor the writer had ever intended. Hence the question. How to disable, in this case, the "turn page" event triggered by the scroll/swipe function? A JavaScript should do, but the SDK documents did not help so far...
    Message was edited by: 41457173
    Message was edited by: 41457173

    ... or release a patch for the API,
    ... or suggest an alternative route to achieve the intended result.

  • [Forum FAQ] How to disable Microsoft account default sign-in behavior when accessing Microsoft website on Windows 8.1

    Scenario
    By default it will sign in with current Microsoft account, if a user accesses Microsoft website (www.live.com, www.bing.com, etc.) with Microsoft account on Windows 8.1. This article describes how to disable this default sigh-in behavior if you want to use
    different Microsoft accounts every time. 
    Method
    To disable this default sign-in behavior, we can deny current Microsoft Account read permission of MicrosoftAccountTokenProvider.dll, please follow the following steps:
    Run Command Prompt with elevated permissions.
    Run the following command to take ownership of MicrosoftAccountTokenProvider.dll:
      takeown /f C:\Windows\SysWOW64\MicrosoftAccountTokenProvider.dll
    Run the following command to deny the read permission of the Microsoft:                                
     icacls C:\Windows\SysWOW64\MicrosoftAccountTokenProvider.dll /deny
    [email protected]:r                                                                                                                
    Note: Please replace your current Microsoft Account with the example
    [email protected]
    Change the owner of this file back to TrustedInstaller:
    Right-click MicrosoftAccountTokenProvider.dll under
    C:\Windows\SysWOW64\, choose Properties. Under
    Security tab, click Advanced.
    Click Change, in the box Enter the object name to select, type
    NT Service\TrustedInstaller.
    Click OK.
    Note: This operation would take some hours to work.
    Apply to:
    Windows 8.1
    Please click to vote if the post helps you. This can be beneficial to other community members reading the thread.

    Error: System cannot find the specified path
    I am getting this eroor
    Parashuram Singade www.distinctnotion.com

  • How do I open an encrypted flash drive from windows

    How do I open an encrypted flash drive from windows?

    How was the flash drive encrypted, that is, with what system or software?

Maybe you are looking for

  • Is it too much to ask that my scanner WORK?

    OK, I have an Epson StylusPhoto RX680...older all-in-one, but one that both Epson and Apple insist has proper SL drivers written for it... Yeah, sure. Not for my new iMac 3.06 it don't. Whether directly connected via USB, or networked through my MacP

  • Using Acrobat PDFMaker Bookmark Options

    I am using Windows (7 64-bit) and Word 2007 (SP2 MSO). I am using Acrobat 9 Pro (9.4.1) to convert a Word document to PDF. The bookmarks created in the PDF document are for all Word Heading styles (H1, H2, H3, H4, H5). However, on the Bookmarks tab o

  • Which wireless mouse is compatible with my 2007 MacBook?

    Which wireless mouse is compatible with my 2007 MacBook?

  • How to save controls value in labview

    hi i want to know how to save the controls value in PC. means if i assign 5  digital value to a control it should remain there even i restarts my PC. Solved! Go to Solution.

  • Pages for iPad is buggy, after few minutes edits become erratic

    I have an iPad 1 with iOS5 and pages. I like pages as a word processor, but since the iOS5 upgrade and subsequent pages upgrade, it is buggy as ****. Has anyone else run into this? I've been waiting patiently, figuring Apple devs would protect their