How to stop rendering a report?

I am building reports using MS Visual Studio, and in the Preview tab I have the Refresh button and a button with a X to stop a report while rendering.
However, when I deploy the report to the reporting server and I run it from the application the X button is not there, and users would find it useful sometimes to be able to stop long running reports. Is this a configuration change? How I can I do it?
Thanks.

Hi
As mentioned above, you can schedule your reports to be sent to certain email addresses at a specific time.
Please refer to the BusinessObjects Documentation to know how to do this from [here|http://help.sap.com/businessobject/product_guides/boexir2/en/xir2_bip_Admin_en.pdf]
Hope this helps!!!
Regards
Sourashree

Similar Messages

  • How to stop the "minority report" type of personalized ads triggered by one's google search and appearing in the firefox browser?

    Please advise how to stop the "minority report" type of personalized advertising apparently triggered by one's google search and appearing in the firefox browser.
    == This happened ==
    Every time Firefox opened
    == a few months ago

    If another uses the computer with their own user account, everything
    is kept separate in each users folder. Only if someone used your account
    would that be an issue.
    Sometimes a problem with Firefox may be a result of malware installed on your computer, that you may not be aware of.
    You can try these free programs to scan for malware, which work with your existing antivirus software:
    * [http://www.microsoft.com/security/scanner/default.aspx Microsoft Safety Scanner]
    * [http://www.malwarebytes.org/products/malwarebytes_free/ MalwareBytes' Anti-Malware]
    * [http://support.kaspersky.com/viruses/disinfection/5350 Anti-Rootkit Utility - TDSSKiller]
    * [http://general-changelog-team.fr/en/downloads/viewdownload/20-outils-de-xplode/2-adwcleaner AdwCleaner] (for more info, see this [http://www.bleepingcomputer.com/download/adwcleaner/ alternate AdwCleaner download page])
    * [http://www.surfright.nl/en/hitmanpro/ Hitman Pro]
    * [http://www.eset.com/us/online-scanner/ ESET Online Scanner]
    [http://windows.microsoft.com/MSE Microsoft Security Essentials] is a good permanent antivirus for Windows 7/Vista/XP if you don't already have one.
    Further information can be found in the [[Troubleshoot Firefox issues caused by malware]] article.
    Did this fix your problems? Please report back to us!

  • How to stop a running report in BI Publisher?

    Is there a way to stop a running report/sql in BI Publisher from BI Publisher itself?  ( killing it in database by DBA is one way)
    Thanks
    Ashish

    Yes that is the only option which we can stop a running report in BI Publisher
    I suspect you'll need to ask your DBA to kill the session.
    However, if you have DBA privileges yourself, you can do this by a few methods, some of which are described here:
    http://www.oracle-base.com/articles/misc/KillingOracleSessions.php
    Mark if helps,
    Thanks,

  • How to stop a manual report while it is running

    Occasionally we have an issue with 1-2 of our reports taking a long time to run. This could be a result of a few different causes but nonetheless, we would like to know if it is possible to stop a manually run report from running after it has been submitted by the user to run.
    I can go into View Scheduled Jobs in the Reporting menu and view the current jobs and it will show me the report that is taking too long to run. However, it does not give me the option to stop the report from that menu.
    Is there anywhere in OBIEE that this can be done? Simply closing or logging out of the session does not stop the report from continuing to run.
    Thanks.

    Create a security group in the RPD and define under permissions the query limits that you want. The request will be killed automatically by the BI server when the query limits are breached.

  • Premiere Elements 12 has stopped rendering, how do I reactivate.

    Premiere elements 12 has stopped rendering my work. How do I reactivate the feature?

    GautamBahl
    Where are you getting your information on
    Try to recreate the preferences for premiere elements
    and using the following path to do that.
    For windows C:\Users\Usename\AppData\Roaming\Adobe\Premiere Elements 12.0
    You are the second one today who seems to be off the path. Either that, or you know of a new approach to "resetting the preference for premiere elements" using the the Logs Folder and Trace Dalabase.txt file in the 12.0 folder in the Premiere Elements 12.0 Folder.
    The path that I find is
    C:\Users\Owner\AppData\Roaming\Adobe\Premiere Elements\12.0
    and in the 12.0 Folder is the following
    Windows 7, 8, or 8.1 64 bit
    Here you have the Adobe Premiere Elements Prefs file that you can delete. And, if that does not work, you can delete the whole Premiere Elements Folder in which the 12.0 Folder exists.
    The Adobe Folder in the above path also contains a Premiere Elements 12.0 Folder which contains a 12 Folder. This particular 12 Folder contents look like this
    Even Adobe documentation seem to acknowledge the way to the "preferences" that we are.
    http://helpx.adobe.com/photoshop-elements/kb/preference-file-locations-photoshop-elements. html#main_Premiere_Elements_preferences_
    even though the document cites an earlier version than 12.
    But, I have actually looked at the computer files for Premiere Elements 4 through 12 and see what I am reporting. Have you checked these computer files first hand?
    If I am misinterpreting what you and the other person today are posting here, please accept my apologizes but explain the rationale behind your approach.
    Thank you.
    ATR

  • How to stop the report from Web!

    hi,all!
    Now I can start a report from Web with schedule parameter!Can you tell me how to stop the report via the Web server?Or tell me with which patameter.Thank a lot.

    hello,
    there is a CGI/Servlet command called killjob which you pass the job-id of the job you want to kill.
    regards,
    the oracle reports team --pw                                                                                                                                                                                                                                                                                                           

  • PFRD 11.1.1.4 - How to stop the In-process Reports Server

    I'm running an "out-of-the-box" PFRD 11.1.1.4 installation in Windows XP SP3.
    According with documentation:
    http://docs.oracle.com/cd/E17904_01/bi.1111/b32121/pbr_strt006.htm#BEHDJFHD
    To directly start or stop the in-process Reports Server using a URL, enter the following in your Web browser:
    http://machine_name:port/reports/rwservlet/startserver
    http://machine_name:port/reports/rwservlet/stopserver
    startserver works.
    stopserver returns:
    REP-50171 : Authentication failed.
    Tried
    http://machine_name:port/reports/rwservlet/stopserver?authid=weblogic/passwd
    same error.
    Commented the line:
    <!--security class="oracle.reports.server.RWJAZNSecurity" id="rwJaznSec"/-->
    in rwserver.conf.
    Same error.
    The only uncomented elements in "rwservlet.properties" (original configuration) are
    <server>rep_wls_reports_pfurtado-lap_asinst_1</server>
    <singlesignon>no</singlesignon>
    <inprocess>yes</inprocess>
    Did any of you managed to stop "in-process" reports server using the reports servlet?
    What credentials did you use?
    Thanks & Best Regards
    Paulo

    Thanks RZ!
    The line you mentioned was already as you described.
    According with the documentation:
    [Starting and Stopping Reports Server|http://docs.oracle.com/cd/E17904_01/bi.1111/b32121/pbr_strt001.htm#i1005629]
    If Reports Server is running as an in-process server through the Reports Servlet, issue the following URL:
    http://your_host_name:port_number/reports/rwservlet/stopserver?authid=admin user/admin password
    Note:
    authid is Reports Server's administration user name and password. In Oracle Reports 11g Release 1 (11.1.1), the default security is based on standards-based Java EE security model through Oracle Platform Security Services. For a non-secure Reports Server, this user is defined in the identifier element.
    I added the identifier element to rwserver.conf and restarted WLS_REPORTS, but after this the in-process reports server failed to start with the usual generic exception.
    I finally found the missing step in:
    How To Secure Showjobs Web Command In A Non Secured Reports Server In Oracle Report 11g? (Doc ID 1242614.1)
    The thing is that the identifier element has to be placed in the right location inside rwserver.conf:
    The needed change is:
    FROM
    <queue maxQueueSize="1000"/>
    <pluginParam name="mailServer" value="%MAILSERVER_NAME%"/>
    TO
    <queue maxQueueSize="1000"/>
    <identifier encrypted="no">....type here your user/password....</identifier>
    <pluginParam name="mailServer" value="%MAILSERVER_NAME%"/>
    So although using the default non-secure reports server, the identifier element has to be present in rwserver.conf for rwservlet/stopserver to work as described above.
    Otherwise the needed authentication will fail as described.
    Regards
    Paulo

  • How to change Rendering Extension in sql server Reporting Services based on User Permissions

    Hi,
    I want to provide SQL server reporting services rendering extension based on user Access.
    For Example
    User1 can have options of Rendering to EXCEL and PDF
    User2 can have a option of CSV
    i read one article which is useful for report basis rendering extension changes. but i want to give user basis rendering options.
    http://www.mssqltips.com/sqlservertip/3569/how-to-change-rendering-extensions-in-sql-server-reporting-services/?utm_source=dailynewsletter&utm_medium=email&utm_content=headline&utm_campaign=20150406
    Thanks in advance.
    GVRSPK VENI

    You can use a data driven subscription for that
    Maintain a table with rendering extension information for various users ie their AD user login. Then setup a data driven subscription based on table values
    You will be creating a dataset with query for retrieving userid as well as rendering extensions and then just set the value as Get value from database for  render Format and To properties 
    For more details refer
    http://beyondrelational.com/modules/2/blogs/101/posts/13460/ssrs-60-steps-to-implement-a-data-driven-subscription.aspx
    Please Mark This As Answer if it solved your issue
    Please Vote This As Helpful if it helps to solve your issue
    Visakh
    My Wiki User Page
    My MSDN Page
    My Personal Blog
    My Facebook Page

  • SSRS Report queries begin running slowly, have to stop and start report server to restore performance

    We have had a production issue crop up twice now where reports begin running slowly seemingly at random.  
    When this happens we can see from running SQL Profiler that the report queries are taking an extremely long time to execute.  The same queries when run directly in management studio run quickly.  
    Initially I suspected parameter sniffing, and tried using OPTION (RECOMPILE) in the reports, as well as clearing out the particular query from the plan cache and running the SQL in SSMS to try and get a better plan etc but no amount of jiggery pokery by
    me could get the queries to run any faster.
    The really weird thing - is that stopping and starting the report server via the reporting services configuration manager instantly cures the problem.  
    I'd really love to know - why this might be?  Is it something to do with the report server closing and re-opening its connections to the database? That's the only sort of thing I can think of...any ideas? Anyone? Any suggestions would be much appreciated.
    LucasF

    Hi LucasF,
    In your scenario, usually we can monitor the execution log in Report Database. If you run below query, you can get the results how long the report takes to render (TimeRendering), how long to process the report(TimeProcessing) and how long to retrieve data
    from Database(TimeData). You can check the starttime and endtime to know the total time for executing a report.
    SELECT TOP1000 *FROM[ReportServer].[dbo].[ExecutionLog2]
    More details information, please reference to similar thread below:
    Steps for troubleshooting a slow SSRS 2014 server
    Troubleshooting Reports: Report Performance
    In SQL Server Reporting Services, a job will be created by SQL Server Agent if any of the following processes is underway:
    query execution on a remote or local database server
    report processing
    report rendering
    To cancel a job that is running on the report server, we can cancel the job directly or reduce the report execution time-out value in the SQL Server Management Studio and then will stop query execution. Please refer to the steps below:
    Open SQL Server Management Studio, and connect to "Reporting Services".
    Under the Report Server node, right-click on the "Jobs" folder and select "Refresh". Then, right-click on "Jobs" again and click "Cancel All Jobs".
    Right-click on the Report Server node and open the "Server Properties" dialog.
    Click the "Execution" option, and set the "Limit report execution to the following number of seconds:" to a much smaller number. After this issue is resolved, this configuration should revert to the previous state.  
    Reference:
    Managing a Running Process
    Setting Time-out Values for Report and Shared Dataset Processing
    In addition, we can also use the KILL Transact-SQL statement to terminate a normal connection by terminating the transactions that are associated with the specified session ID. For the details information, you can refer to:
    KILL (Transact-SQL)
    If you still have any problem, please feel free to ask.
    Regards,
    Vicky Liu
    Vicky Liu
    TechNet Community Support

  • 1.5 Stops Rendering Unexpectedly

    I assume this is a memory problem. A timeline will stop rendering at some point without warning or any real predictability, writing only a portion of video to disk. I've searched PREFERENCES for some way to massage how Premiere Pro handles its memory use, but no luck. Is this something I must do in Windows instead? Any hints will be deeply appreciated!

    Read Harm on drive setup http://forums.adobe.com/thread/662972?tstart=0
    Work through all of the steps (ideas) listed at http://ppro.wikia.com/wiki/Troubleshooting
    If your problem isn't fixed after you follow all of the steps, report back with ALL OF THE DETAILS asked for in the FINALLY section, the questions at the end of the troubleshooting link... most especially the codec used... see Question 1

  • AE stops rendering

    Dear Forum Users,
    I am using AE CS5. My problem is that AE stops rendering always at exactly the same point (3.8 GB of raw uncompressed .avi). Does anone have a clue how to fix it? I have 147 GB of free space on the HD, so space could not be a problem.
    Thank you.
    Pal

    DITTO.
    I've had this occasional problem over the last 7 years working in AE. It usually only happens when you REALLY need to get a render out for a client I call them "Skanky Frames".  I don't know why they happen.  You PURGE Disk cache and memory then you use the SECRET MENU to purge every few frames during render but no avail.
    Today's Skanky Frame consisted of two shape layers which were somehow corrupting the render which was exiting far before it finished but it wasn't crashing or reporting the happy sound.  I even tried apssing it to Media Encoder but I GOT THE SHEEP SOUND!  Which I kinda find funny.
    So I matched the last frame of the render with the timeline then went forward one frame to find the Skanky Frame.  I always usually blame Optical Flares or FORM so was very suprised when it was two Shape layers which were causing the problem.
    • Luckily! A black frame appeared at the error so the solution today was to go through and mute each active layer until I found the culprits and then pre-composing them worked, for some weird reason that I shall never know. 
    • Previously it was camera error: so we made a new camera and null and pasted the move data on to the new one. That worked. 
    • Also video file that was a nasty AVI which I had missed.  Transcoded to ProResLT and it worked again, too.
    I just heard the HappySound.  Thanks for the good help here, peeps.

  • HT201303 Random Apple id password resets - how to stop this?

    A couple of months ago I started getting emails from Apple titled "How to reset your Apple Id password" and then more worryingly "Your Apple Id password has been reset".  This happened several times over the next few days and I know this was not done by accident from me or my family because it was happening during the night UK time.  I reported to Apple support and they were no help, in fact they deactivated my account until I told them to reactivate it again!
    To me it seems like someone (or some system) is triggering the password reset online when trying to access my account.
    After reporting it to Apple it stopped for a couple of months - now it started again!  Several random resets during the night and day when I know no-one could be doing this from one of my devices.
    Has this happened to anyone else?  Any good ideas how to stop it?  Any way to disable email authentication on the password reset and restrict to only the personal data questions?

    Hi marky_mark_uk,
    Two-step verification might be a good idea for you if you're seeing a lot of password reset issues you did not initiate:
    Apple ID: Frequently asked questions about two-step verification for Apple ID
    http://support.apple.com/kb/ht5570
    Cheers!
    - Ari

  • How to stop the spinning wheel?

    How to stop the spinning wheel?

    Back up your documents and everything else important to you, not that there is any reason to believe your hard disk may be failing, but the symptoms you describe may presage an impending disk failure, and you should have backups anyway.
    Boot OS X Recovery by holding ⌘ and r (two fingers) while you start your Mac. At the Mac OS X Utilities screen, select Disk Utility. Select your startup volume (usually named "Macintosh HD") and click the Repair Disk button. Describe any errors it reports in red.
    When it finishes restart your Mac and test again for operation. If it's still not behaving as you expect it should, please post the results of EtreCheck in accordance with the following instructions:
    Apple Support Communities contributor etresoft wrote a very useful app to quickly gather certain system information that may help point to a cause of this problem. Go to his website, download and run EtreCheck:
    http://www.etresoft.com/etrecheck
    Etrecheck will be in your Downloads folder. Open it from there. You may see the following dialog box:
    Click Open - etresoft contributes to this forum frequently and can be considered a trustworthy developer.
    It will take a moment to run as it collects its data.
    Copy and paste its output in a reply.
    Do not be concerned about anything that says "Problem" or "failed".
    EtreCheck was designed to remove any personal information (such as your computer's name and serial numbers) but if you see anything that looks like an email address or any other personal information that should not be divulged to others, please delete or obscure that information when you post the reply.
    When you are finished with EtreCheck, quit the program. It occupies very little space, and you can keep it or drag it to the Trash as you wish.

  • How to stop spooling and get error or status of the statement

    Hi All,
    I am using the bellow in .sql file to generate a spool file which is called from a shell script.
    The issue is whn i kill the job the .csv file is still generated and doesnt thow any error.
    Could any one please let me know how to stop spooling if the script end in between or catch the status of the error and email if spooling stops in between.
    Please help. Thanks
    below is used in .sql
    set feedback off
    set term off
    set trimspool on
    set pagesize 0
    exec dbms_output.disable
    exec dbms_output.enable(40000)
    set linesize 2000;
    set long 2000;
    WHENEVER SQLERROR EXIT 1 ROLLBACK
    whenever oserror exit 1 rollback
    alter session set global_names=false;
    spool  $HOME/data/abc.csv
    select statement;
    spool off;
    exit
    sql is called from this script:
    #!/bin/ksh
    status=`sqlplus -s / @$HOME/sql/extract/abc.sql `
    status1=$?
    if [ $status1 -ne 0 ]
      then
    mailx  -s "Fatal - Error in Extraction process "  [email protected]
    fi ____________________________________
    Edited by: user11942774 on 1 Mar, 2012 4:07 AM

    Hi, dczay, and welcome to the Community,
    Sign in to your Skype account via the Skype website; the link to Sign In appears at the upper right corner of the website page.
    Cancel the subscription.
    Please contact Skype Customer Service to explain the situation and to request a refund.
    (The blue type is actually a link to the instruction related to contacting Skype Customer Service and how to request a refund.)
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • I believe that i have malware on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? please help. :-).

    i believe that i have malware (possible highjack of safari browser) on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? i have symnatic endpoint and, after scanning, it reveals nothing. please help. :-).

    are locked user files or that have incorrect permission a bad thing?
    Yes.
    why am i removing symantec?
    Short answer: Because it's worse than useless and worse than the imaginary "viruses" you're afraid of would be if they really existed. For the long answer, see below.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • Enhancement on MIRO

    HI Experts, I need a tax report which should show Invoice No, Inv. Date, Material, Invoice Value, Tax amount.  If a invoice contains multiple line items, it should show them in seperate lines eventhough Invoice No. is same. In MIRO tax amount is ente

  • Why we call adaptive RFC in webdynpro java..

    Hi, I want to know why we call adaptive RFC connection in webdynpro java whenever we import new rfc in our  java web dynpro project.  why name  ADAPTIVE RFC  is used if we  make any structure changes in the model which we imported in web dynpro proje

  • FSG showing Account description instead of value and description

    Hi , I am getting rows without Account Values in an FSG that I created - it has 27 columns. I had specifically created a row order with Value and Description for the Account Segment with all other segments having width zero. When I run this FSG I onl

  • Viewing players from album on iPod??

    Hello, Can anyone tell me how to get the musician album information such as player instrumentation viewable on my iPod? Currently, I have to put that info in the Comments sections of iTunes but it won't show up on my iPod. (Sorta like having notes or

  • Exit button - Opens a new Window

    Portal experts, We are facing some problem with exit button in the standard iViews like Bank, personal data. When we click on the exit button, it is opening a new window rather than coming out of the iView. I searched for sap notes, didnt find anythi