Howto read javaws log-files / convert them to plain-text?

Hi,
I've recently experimented with webstart's logging capabilities, and it seems to work really well.
However webstart loggs in a xml-format, which is cumbersome to read.
Is there a tool available to convert those xml-files to a format similar to what the Java-Console displays?
Thanks, Clemens

Yes, as long as you're only dragging AW WP to Pages, SS to Numbers & presentation to Keynote. Fortunately, with iWork '08, translated files open with the original name & the new file extension. In Pages 1 & 2 (iWork '05 & '06) the files all opened with "untitled" - not very friendly.
I do believe Yvan has written some AppleScripts to make the process even easier.

Similar Messages

  • Application to read 2 log files from internet

    Hi,
    Anybody could tell me how to develop this project. I'm lack of time. thanks
    You have been asked into a company called Broken Arrow Software as a Senior Software Engineer and Management consultant. You are being paid very handsomely and have been asked to write an application program in Java for parsing a log file.
    � The program will have a standard menu using the AWT only.
    � ALL LAYOUTS MUST USE ONLY THE BORDER-LAYOUT OR GRID-LAYOUT OR A COMBINATION OF BOTH (Any other layouts score zero).
    This application reads two Log files from the internet. The first file contains USA state names and the abbreviation used for that state. This information will be used in displaying totals from another network file and should be stored in an array (or two arrays, or a two dimensional array) in the program. The second file should extract the �Reversed subdomain� section from a Log file (a section is shown later) and store this in an array in the application. This should be processed and only those domains beginning with �us.� should be processed. Each �us.� Has an abbreviated USA state after it (�tx� is an abbreviation for Texas). The abbreviations are sorted and all states are on consecutive lines and each displays a number of accesses for that state. The accesses should be totalled and displayed in the current Frame for each state in the form of Java List components (these do not need to be synchronised so that they all scroll in unison).
    The application will be a Java application with the following menus and MenuItems:
    � Splash screen (10%)
    � Application (20%)
    o Open USA abbreviation file
    o Clear screen
    o Exit
    � File (25%)
    o Open network log file
    o Open locally saved report file
    o Recent report files
    o Save as report file
    � Graph (20%)
    o Plot
    � Help (15%)
    o Help on Application
    o About
    A basic pass for the application will be for a basic implementation of an application with �help� options and some basic implementations of a Splash screen and some basic file and application options. Very high marks will be awarded for processing network files, saving and opening files, very good HCI, application design and error handling, excellent OO design for classes, gorgeous layout and commenting of code and excellent graphing capabilities.
    Error handling dialogs and overall application design (10%)
    Every class must be in a separate file.
    Inheritance should be used for WindowListeners of Frames and Dialogs.
    Up to 10% can also be lost by unprofessional code layout and lack of professional standards. Always adhere to standards taught throughout the module and your time at the University of Northumbria.
    Examples of non-professionalism would include bad indentation, no comments, meaningless variable names, politically incorrect graphics, commented out code, empty .java files, .java files which are not part of the project etc. Remember your application is your livelihood and your company depends on your application standards.
    The splash screen must be a Frame with a Canvas as part of it showing your own logo. Your logo should be individual to you but does not need to win the computing equivalent of the Turner prize. The application should be displayed behind the Splash screen and both should be visible. The application must not be able to be brought to the front and used without the Splash screen being disposed of.
    The application should only enable the �Open USA abbreviation file�, �Open locally saved report file�, �Help� options and �Exit� Menus and MenuItems, when the application starts. On opening a valid USA abbreviation file, then the other Menus and MenuItems should be enabled.
    The abbreviations should be read into an array. These should be used in displaying the totals for the reversed subdomain totals for each USA state. A total for all USA states should be displayed at the bottom of the current Frame, with a suitable Label (this design is your own). This current Frame should display a series of Lists starting with a List of USA state number (1 to n). A List of USA state abbreviation should be next followed by a List of the actual USA state name, followed by a List of the total accesses for that state.
    The report file should be an ASCII file that can be printed out from an ASCII text editor such as DOS edit or Microsoft NotePad.
    The �Open� network files should display a Dialog asking for the http:// address of the file, with �OK� and �Cancel� options. It is helpful if the user can hit �return� instead of clicking on �OK� and �Escape� instead of �cancel�. Error Dialogs should be used to indicate any errors that may occur and the state of the application should be reset to that of before displaying the Dialog.
    When �Save as report file� is chosen a FileDialog box should be used for the user to choose both directory and filename. The file should be able to be saved as a �.rpt� file.
    Open report file should display the report in a Frame; the design of which is your own.
    Plotting the graph should pass a two dimensional array to a Frame with a Canvas. The Canvas should have a Paint method that draws the axis for the graph and any suitable Headings etc. The graph should draw a histogram of totals per USA states. The graph design is your own but you may wish to use Microsoft Excel as a good example of drawing a histogram.
    The �Clear screen� option should clear any data off the current screen.
    The �Exit� option should quit the application but it may be helpful to ask the user if they really want to exit the application.
    Help must be Java code and not linking into HTML. It should display help in a well designed screen. The most basic implementation might use a scrollable TextArea for a basic mark.
    See other software for a good �About� screen. The most basic should display your name, date, version and company.
    � Help should display your help on using the application. As a senior software engineer, the design is your own, based on experience of using applications, as is the opening splash screen. You may use other applications for inspiration only, as these will make up your experience.
    � Your good knowledge gained from HCI units studied should prove invaluable in the interface design and the usability of the application.
    � The design (Screens and classes) and quality and documentation of code throughout the application will be marked. The experience gained from programming 1 and 2 and Object Oriented Programming should prove invaluable throughout the application, as should any GUI units studied.
    The log file can be accessed at:
    http://computing.unn.ac.uk/staff/cgpb2/public_html/log.html

    You would really gain ever so much more from this exercise if you would write a couple of classes, then come back with some specific questions. If you're completely lost, try starting with the GUI first. It's not the best practice, always, but it is easy to visualize.
    On a side note, I wish I'd had assignments even half this intersting when I was in my Java classes...

  • Any software/program that can read audit log files

    Hi,
    Currently i am searching for a program/tools that can read audit log files and format it into a readable format. Anyone know is there any in the market or any open source program?
    Thank You.

    Not sure what you mean by "audit log".
    Anyway. Pete Finnigan's tools page has only one thing that might be what you're looking for - LMON, which runs on BSD, Solaris, Linux. As he's the go-to guy for Oracle security the chances of there being a good free log analyzer tool that he hasn't heard of is slight.
    Cheers, APC

  • Why can't read access log file in real-time? (Oracle Weblogic Server 10.3)

    We can't read access log file in real-time. If access log is rotation to new file so can read access log file but can't read real-time.
    *** Oracle Weblogic Server versions 10 R3

    what's your meaning? try this command "tail -f access.log".
    Threre is a buffer about 8K for WebLogic to write the access info into the log files, so you can't see the access info untill the buffer is full.

  • How read shell log file using DBMS_SCHEDULER

    Hi All,
    I am running a shell script file using DBMS_SCHEDULER and it creates couple of log file. I am trying to run other DBMS_SCHEDULER job2 to read current log file written by job1 display on APEX web page. I am using oracle 10g version. Any suggestions are much appreciated.
    Regards

    james. wrote:
    Thank you Purvesh K. I want to read the log file as soon as I started the my shell script.
    " Just call the Stored program to read the files "
    Can you give me an example of the stored program you mentioned?
    RegardsOracle UTL_File contains example of reading from a UTL_File. (Just in case you are not aware of doing so.)
    What I intended to say was:
    1. You might be having a Job Scheduled/Calling a stored program to create a Log File.
    2. You can directly call the Stored Program (Function/Procedure) that contains the logic to Read the Log File.

  • Query runs every minute from B1 client - read B1 log file

    Hi all,
    We found this query has been run every minute from B1 client. It slows down the system, as we have over 100,000 records in table OCLG - activities. How do we stop this query to be run from B1 client. Also, anyone know what is the number for Duration in B1 log file, does the number mean CPU time? We got Duration=3581 for this query. but it takes about 10-15 seconds to run the same query from SQL 2005 management studio. Any idea?
    Thanks,
    David
    ============================================================================================
    16/02/2010  12:10:42:295830    SQLMessage    Note           ExecDirectInt     C:\Program Files\SAP\SAP Business One\SAP Business One.exe            PID=1972             TID=1920             Duration=3581  Fetched=0
                                                                                    Query     
    SELECT T0.[ClgCode], T0.[Action], T0.[Details], T1.[Name], T0.[Recontact], T0.[BeginTime], T0.[AttendUser] FROM  [dbo].[OCLG] T0   LEFT OUTER  JOIN [dbo].[OCLO] T1  ON  T1.[Code] = T0.[Location]   WHERE T0.[Reminder] = (N'Y' )  AND  T0.[RemSented] = (N'N' )  AND  (T0.[RemDate] < (CONVERT(DATETIME, '20100216', 112) )  OR  (T0.[RemDate] = (CONVERT(DATETIME, '20100216', 112) )  AND  T0.[RemTime] <= (1210 ) ))

    Thanks Paulo,
    I found another two queries that also run every minute on each B1 workstation. What is the measurement for the duration number in the log file, like  Duration=1391?
    David
    ============================================================================================
    17/02/2010  11:32:46:620527    SQLMessage    Note           ExecDirectInt     C:\Program Files\SAP\SAP Business One\SAP Business One.exe     PID=1868     TID=3236     Duration=1391     Fetched=21
                                  Query      SELECT T0.[ClgCode], T0.[AttendUser], T0.[Closed], T0.[Recontact], T0.[endDate], T0.[Action], T0.[BeginTime], T0.[ENDTime], T0.[Duration], T0.[DurType], T0.[Details], T0.[Notes], T0.[personal] FROM [dbo].[OCLG] T0 WHERE (T0.[Recontact] >= CONVERT(DATETIME, '20100215', 112)  AND T0.[Recontact] <= CONVERT(DATETIME, '20100221', 112)  )  AND  T0.[endDate] = T0.[Recontact]  AND  T0.[inactive] = (N'N' )  AND  T0.[BeginTime] IS NOT NULL   AND  T0.[ENDTime] IS NOT NULL   AND  (T0.[Action] = (N'C' )  OR  T0.[Action] = (N'M' )  OR  T0.[Action] = (N'N' ) ) AND  (T0.[AttendUser] = (612 ) )  ORDER BY T0.[Recontact],T0.[BeginTime]
    17/02/2010  11:32:54:917455    SQLMessage    Note           ExecDirectInt     C:\Program Files\SAP\SAP Business One\SAP Business One.exe     PID=1868     TID=3236     Duration=487     Fetched=0
                                  Query      SELECT T0.[ClgCode], T0.[AttendUser], T0.[Closed], T0.[Recontact], T0.[endDate], T0.[Action], T0.[BeginTime], T0.[ENDTime], T0.[Duration], T0.[DurType], T0.[Details], T0.[Notes], T0.[personal] FROM [dbo].[OCLG] T0 WHERE (((T0.[Recontact] >= CONVERT(DATETIME, '20100215', 112)  AND T0.[Recontact] <= CONVERT(DATETIME, '20100221', 112)  )  OR  (T0.[endDate] >= CONVERT(DATETIME, '20100215', 112)  AND T0.[endDate] <= CONVERT(DATETIME, '20100221', 112)  ) ) OR  (T0.[Recontact] < (CONVERT(DATETIME, '20100215', 112) )  AND  T0.[endDate] > (CONVERT(DATETIME, '20100221', 112) ) )) AND  T0.[endDate] <> T0.[Recontact]  AND  T0.[inactive] = (N'N' )  AND  T0.[BeginTime] IS NOT NULL   AND  T0.[ENDTime] IS NOT NULL   AND  (T0.[Action] = (N'C' )  OR  T0.[Action] = (N'M' )  OR  T0.[Action] = (N'N' ) ) AND  (T0.[AttendUser] = (612 ) )  ORDER BY T0.[Recontact],T0.[BeginTime]

  • Flac files, converting them and iTunes compatibility

    I've recently received .flac files but these files have a generic icon (white square) and are not associated with any software in particular. What are they
    and can iTunes do anything with them?

    pitou
    flac is a lossless encoding of sound files. No iTunes can't do anything with them, you'll have to convert them first. Try using Max
    http://sbooth.org/Max/
    it's Open Source.
    Regards
    TD

  • Read bytes in file and print in clear text

    Hi
    I'm using hsql and use cached tables. This results in all data beeing stored in a binary file (Some of the data is stored in plain text though, but encrypted). The binary data starts and ends with ' (singlequote), the format is hexadecimal. How can I read this file and present all data in plain text, there is no need to decrypt the encrypted strings though.
    Example of how the data is stored in the file:
    W@ ` � M 43.6 Torticollis (nacksp��rr) h � X M 50 !Disksjukdom med halsryggssm��rtor � p � M 50.0 *Diskbr��ck i halskotpelaren med myelopati       �                       p       �  0         M 50.1   ,Diskbr��ck i halskotpelaren med radikulopati     X                     h              0      M 50.2   !Annat diskbr��ck i halskotpelaren     �                        p      �  �  X      M 50.3   'Annan diskdegeneration i halskotpelaren     0                          `                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            

    I have some questions..
    This results in
    all data beeing stored in a binary file (Some of the
    data is stored in plain text though, but encrypted).Encrypted text is binary data.
    The binary data starts and ends with ' (singlequote),In your example, where is the '
    the format is hexadecimal. In your example, I cannot see any hexidecimal formatted data.
    Hexidecimal would look like: ABFEFDC8214634896FA8623EDB
    How can I read this fileThe same way you would read any other file.
    and present all data in plain text, there is no need
    to decrypt the encrypted strings though.If you cannot decyrpt the string, it is not going to be in plain text, I fear.
    Do you mean you want to see a binary file as hexidecimal?

  • T500 will not boot from bootable CDs/DVDs, but will read and open files on them

     System: 2 T500s, both manufactured early April 2009, win XP, ATI Radeon 3650 graphics,4GB RAM, latest Lenovo drivers installed..
     Problem:-   Our 2 T500s cannot boot from any windows coded recovery CD -except Lenovo's rescue/recovery discs. Some -but not all- Linux code recovery CDs do boot the T500. Every other kind of CD and DVD such as audio and video works fine in windows XP.
    Here an example of our 2 T500s' failure to recognise bootable CD/DVD discs. All the files and folders on a Paragon Partition Mgr v8.5 Recovery CD can be viewed in windows explorer and files such as jpg, txt and zip can be opened. This CD will not boot the T500, however, it will boot our other -non-Lenovo- computers. The same applies when the media are DVDs with identical content.
    We have tried several different kinds of CD and DVD media to no avail. Burning the media on other computers and using several kinds of burning software does not help, ourT500s refuse to boot from them too.
    The problem seems clear enough, on starup our T500s fail to distinguish between windows coded bootable and ordinary CDs/DVDs -unless they are Lenovo recovery/restore discs.
    A solution would be gratefully received.

    Thank you for your very kind assistance,
    Q: "1. Did you apply the DVD firmware fix here?"
    A. It was` already installed on our 2 T500s. We have also applied just about every driver update from Lenovo.
    Q: "2. Did you try booting from a USB optical drive that you first attached to another system where you could verify that booting from it was possible?"
     A. Yes, many times from a USB CD/DVD drive, it failed too. We burned on that drive too, but the T500s will not boot from those CDs either.
    Q: "3. In this thread the solution was to use another burning program than Roxio..".
     A. We have used the Paragon internal ISO creator/burner, the Roxio burner that was preinstalled wth the T500, BartPE internal ISO/burner ,InfraRecorder and others too. Made ISOs and burned from them, burned CDs directly on the fly etc, all to no avail..
     For some reason, our two T500s' CD/DVD drive controllers or some intermediate software act as if the CD's boot sector is not present. Clearly, something (BIOS, software, unstable hardware, or ? ) is blocking the read or write of the data necessary to boot these CDs. Whatever that 'something' is, it has no effect on burning and booting Lenovo recovery CDs.
    The bizarre part of all this is that a`Lenovo recovery CD burned on the T500 drive WILL BOOT the T500. A Paragon v8.5 recovery CD or BartPE CD burned in one of our non-Lenovo computers will boot ithat and every other computer we have except our T500s.
    PS Thank you for the link to the new version of Roxio, will download and install it.

  • How to read firewall log files

    2 duration 0:03:04
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756946 for YOUB:184.31.212.174/80 to inside:10.10.10.1009/49945 duration 0:00:12 bytes 0 TCP FINs
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756947 for YOUB:184.31.212.174/80 to inside:10.10.10.1009/49946 duration 0:00:12 bytes 0 TCP FINs
    <167>:%ASA-session-7-609002: Teardown local-host YOUB:184.31.212.174 duration 0:00:12
    <167>:%ASA-session-7-609001: Built local-host inside:10.10.10.10
    <166>:%ASA-session-6-302013: Built outbound TCP connection 2756977 for inside:10.10.10.10/21 (10.10.10.10/21) to identity:10.10.10.10/50476 (10.10.10.10/50476)
    <163>:%ASA-sys-3-414001: Failed to save logging buffer to FTP server 10.10.10.10 using filename LOG-2014-02-13-190303.TXT on interface inside: [Device open error]
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756943 for YOUB:46.51.219.164/80 to inside:10.10.10.1009/49943 duration 0:00:12 bytes 0 TCP FINs
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756944 for YOUB:46.51.219.164/80 to inside:10.10.10.1009/49944 duration 0:00:12 bytes 0 TCP FINs
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756949 for YOUB:174.129.247.121/80 to inside:10.10.10.1009/49947 duration 0:00:12 bytes 0 TCP FINs
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756179 for YOUB:50.97.236.98/80 to inside:10.10.10.1009/49692 duration 0:02:23 bytes 8416 TCP FINs
    <167>:%ASA-session-7-609002: Teardown local-host YOUB:50.97.236.98 duration 0:02:23
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756950 for YOUB:174.129.247.121/80 to inside:10.10.10.1009/49948 duration 0:00:12 bytes 0 TCP FINs
    <161>:%ASA-session-1-106021: Deny UDP reverse path check from Testpdf to 10.10.10.10 on interface YOUB
    <167>:%ASA-session-7-710005: UDP request discarded from Testpdf/137 to inside:10.10.10.10/137
    <161>:%ASA-session-1-106021: Deny UDP reverse path check from Testpdf to 10.10.10.10 on interface YOUB
    <167>:%ASA-session-7-710005: UDP request discarded from Testpdf/138 to inside:10.10.10.10/138
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756977 for inside:10.10.10.10/21 to identity:10.10.10.10/50476 duration 0:00:00 bytes 0 TCP Reset-O
    <167>:%ASA-session-7-609002: Teardown local-host inside:10.10.10.10 duration 0:00:00
    <166>:%ASA-session-6-302014: Teardown TCP connection 2754536 for YOUB:74.125.236.65/443 to inside:10.10.10.1046/49751 duration 0:10:05 bytes 187079 TCP FINs
    <166>:%ASA-session-6-302013: Built inbound TCP connection 2756978 for inside:FinalPdf/3893 (FinalPdf/3893) to identity:10.10.10.10/443 (10.10.10.10/443)
    <166>:%ASA-ssl-6-725001: Starting SSL handshake with client inside:FinalPdf/3893 for TLSv1 session.
    <166>:%ASA-ssl-6-725003: SSL client inside:FinalPdf/3893 request to resume previous session.
    <166>:%ASA-ssl-6-725002: Device completed SSL handshake with client inside:FinalPdf/3893
    <165>:%ASA-config-5-111007: Begin configuration: FinalPdf reading from http [POST]
    <165>:%ASA-config-5-111008: User 'cisco' executed the 'logging ftp-server 10.10.10.10 firwall/ vml vml' command.
    <166>:%ASA-session-6-302014: Teardown TCP connection 2756978 for inside:FinalPdf/3893 to identity:10.10.10.10/443 duration 0:00:00 bytes 255 TCP Reset-O
    <166>:%ASA-session-6-106015: Deny TCP (no connection) from FinalPdf/3893 to 10.10.10.10/443 flags FIN ACK  on interface inside
    <167>:%ASA-session-7-710005: TCP request discarded from FinalPdf/3893 to inside:10.10.10.10/443
    <166>:%ASA-ssl-6-725007: SSL session with client inside:FinalPdf/3893 terminated.
    <166>:%ASA-session-6-305011: Built dynamic TCP translation from inside:10.10.10.1010/50758 to YOUB:10.10.10.10/38671
    <166>:%ASA-session-6-302013: Built outbound TCP connection 2756979 for YOUB:65.182.162.190/80 (65.182.162.190/80) to inside:10.10.10.1010/50758 (10.10.10.10/38671)
    <166>:%ASA-session-6-305012: Teardown dynamic TCP translation from inside:192.168.2.37/52012 to YOUB:10.10.10.10/52872 duration 0:02:00
    <166>:%ASA-session-6-305011: Built dynamic TCP translation from inside:10.10.10.1010/50759 to YOUB:10.10.10.10/49081

    Thanks lcfc,
    While I did try googling the subjects, I didn't find those articles, so thanks.
    I seem to be finding a lot of information, just not the right information : )
    I'm still unsure about the way the .local subnet works, or if IRC introduces new vulnerabilities...although I'm not running any scripts of any kind. For instance, if I'm connected to an IRC server, will that "MyComputer.local" server be vulnerable?
    This may seem trivial, but I'm just not sure how it works.
    Power Mac G5/PPC   Mac OS X (10.3.9)  

  • Patch fails, howto read the .rej file

    kerberos5.m4.patchfile
    diff -NaurwB nfs-utils-1.1.2.orig/aclocal/kerberos5.m4 nfs-utils-1.1.2/aclocal/kerberos5.m4
    --- nfs-utils-1.1.2.orig/aclocal/kerberos5.m4 2008-03-14 16:46:29.000000000 +0100
    +++ nfs-utils-1.1.2/aclocal/kerberos5.m4 2008-06-12 17:13:51.000000000 +0200
    @@ -1,112 +1,48 @@
    -dnl Checks for Kerberos
    -dnl NOTE: while we intend to do generic gss-api, currently we
    -dnl have a requirement to get an initial Kerberos machine
    -dnl credential. Thus, the requirement for Kerberos.
    -dnl The Kerberos gssapi library will be dynamically loaded?
    AC_DEFUN([AC_KERBEROS_V5],[
    + K5CONFIG="krb5-config"
    AC_MSG_CHECKING(for Kerberos v5)
    - AC_ARG_WITH(krb5,
    - [AC_HELP_STRING([--with-krb5=DIR], [use Kerberos v5 installation in DIR])],
    + AC_ARG_WITH(krb5-config,
    + [AC_HELP_STRING([--with-krb5-config=PATH], [Full Path to krb5-config.])],
    [ case "$withval" in
    yes|no)
    - krb5_with=""
    + K5CONFIG="krb5-config"
    - krb5_with="$withval"
    + K5CONFIG="$withval"
    esac ]
    - for dir in $krb5_with /usr /usr/kerberos /usr/local /usr/local/krb5 \
    - /usr/krb5 /usr/heimdal /usr/local/heimdal /usr/athena ; do
    - dnl This ugly hack brought on by the split installation of
    - dnl MIT Kerberos on Fedora Core 1
    - K5CONFIG=""
    - if test -f $dir/bin/krb5-config; then
    - K5CONFIG=$dir/bin/krb5-config
    - elif test -f "/usr/kerberos/bin/krb5-config"; then
    - K5CONFIG="/usr/kerberos/bin/krb5-config"
    - elif test -f "/usr/lib/mit/bin/krb5-config"; then
    - K5CONFIG="/usr/lib/mit/bin/krb5-config"
    - fi
    if test "$K5CONFIG" != ""; then
    KRBCFLAGS=`$K5CONFIG --cflags`
    KRBLIBS=`$K5CONFIG --libs gssapi`
    - K5VERS=`$K5CONFIG --version | head -n 1 | awk '{split($(4),v,"."); if (v@<:@"3"@:>@ == "") v@<:@"3"@:>@ = "0"; print v@<:@"1"@:>@v@<:@"2"@:>@v@<:@"3"@:>@ }'`
    - AC_DEFINE_UNQUOTED(KRB5_VERSION, $K5VERS, [Define this as the Kerberos version number])
    - if test -f $dir/include/gssapi/gssapi_krb5.h -a \
    - \( -f $dir/lib/libgssapi_krb5.a -o \
    - -f $dir/lib64/libgssapi_krb5.a -o \
    - -f $dir/lib64/libgssapi_krb5.so -o \
    - -f $dir/lib/libgssapi_krb5.so \) ; then
    + if $K5CONFIG --version | grep -q -e heimdal; then
    + K5VERS=`$K5CONFIG --version | head -n 1 | cut -f2 -d ' ' | tr -d '.'`
    + AC_DEFINE(HAVE_HEIMDAL, 1, [Define this if you have Heimdal Kerberos libraries])
    + gssapi_lib=gssapi
    + KRBIMPL="heimdal"
    + elif $K5CONFIG --version | grep -q -e mit; then
    + K5VERS=`$K5CONFIG --version | head -n 1 | cut -f4 -d ' ' | tr -d '.'`
    AC_DEFINE(HAVE_KRB5, 1, [Define this if you have MIT Kerberos libraries])
    - KRBDIR="$dir"
    - dnl If we are using MIT K5 1.3.1 and before, we *MUST* use the
    - dnl private function (gss_krb5_ccache_name) to get correct
    - dnl behavior of changing the ccache used by gssapi.
    - dnl Starting in 1.3.2, we *DO NOT* want to use
    - dnl gss_krb5_ccache_name, instead we want to set KRB5CCNAME
    - dnl to get gssapi to use a different ccache
    if test $K5VERS -le 131; then
    AC_DEFINE(USE_GSS_KRB5_CCACHE_NAME, 1, [Define this if the private function, gss_krb5_cache_name, must be used to tell the Kerberos library which credentials cache to use. Otherwise, this is done by setting the KRB5CCNAME environment variable])
    fi
    gssapi_lib=gssapi_krb5
    - break
    - dnl The following ugly hack brought on by the split installation
    - dnl of Heimdal Kerberos on SuSe
    - elif test \( -f $dir/include/heim_err.h -o\
    - -f $dir/include/heimdal/heim_err.h \) -a \
    - -f $dir/lib/libroken.a; then
    - AC_DEFINE(HAVE_HEIMDAL, 1, [Define this if you have Heimdal Kerberos libraries])
    - KRBDIR="$dir"
    kerberos5.m4
    dnl Checks for Kerberos
    dnl NOTE: while we intend to do generic gss-api, currently we
    dnl have a requirement to get an initial Kerberos machine
    dnl credential. Thus, the requirement for Kerberos.
    dnl The Kerberos gssapi library will be dynamically loaded?
    AC_DEFUN([AC_KERBEROS_V5],[
    AC_MSG_CHECKING(for Kerberos v5)
    AC_ARG_WITH(krb5,
    [AC_HELP_STRING([--with-krb5=DIR], [use Kerberos v5 installation in DIR])],
    [ case "$withval" in
    yes|no)
    krb5_with=""
    krb5_with="$withval"
    esac ]
    for dir in $krb5_with /usr /usr/kerberos /usr/local /usr/local/krb5 \
    /usr/krb5 /usr/heimdal /usr/local/heimdal /usr/athena ; do
    dnl This ugly hack brought on by the split installation of
    dnl MIT Kerberos on Fedora Core 1
    K5CONFIG=""
    if test -f $dir/bin/krb5-config; then
    K5CONFIG=$dir/bin/krb5-config
    elif test -f "/usr/kerberos/bin/krb5-config"; then
    K5CONFIG="/usr/kerberos/bin/krb5-config"
    elif test -f "/usr/lib/mit/bin/krb5-config"; then
    K5CONFIG="/usr/lib/mit/bin/krb5-config"
    fi
    if test "$K5CONFIG" != ""; then
    KRBCFLAGS=`$K5CONFIG --cflags`
    KRBLIBS=`$K5CONFIG --libs gssapi`
    K5VERS=`$K5CONFIG --version | head -n 1 | awk '{split($(4),v,"."); if (v@<:@"3"@:>@ == "") v@<:@"3"@:>@ = "0"; print v@<:@"1"@:>@v@<:@"2"@:>@v@<:@"3"@:>@ }'`
    AC_DEFINE_UNQUOTED(KRB5_VERSION, $K5VERS, [Define this as the Kerberos version number])
    if test -f $dir/include/gssapi/gssapi_krb5.h -a \
    \( -f $dir/lib/libgssapi_krb5.a -o \
    -f $dir/lib64/libgssapi_krb5.a -o \
    -f $dir/lib64/libgssapi_krb5.so -o \
    -f $dir/lib/libgssapi_krb5.so \) ; then
    AC_DEFINE(HAVE_KRB5, 1, [Define this if you have MIT Kerberos libraries])
    KRBDIR="$dir"
    dnl If we are using MIT K5 1.3.1 and before, we *MUST* use the
    dnl private function (gss_krb5_ccache_name) to get correct
    dnl behavior of changing the ccache used by gssapi.
    dnl Starting in 1.3.2, we *DO NOT* want to use
    dnl gss_krb5_ccache_name, instead we want to set KRB5CCNAME
    dnl to get gssapi to use a different ccache
    if test $K5VERS -le 131; then
    AC_DEFINE(USE_GSS_KRB5_CCACHE_NAME, 1, [Define this if the private function, gss_krb5_cache_name, must be used to tell the Kerberos library which credentials cache to use. Otherwise, this is done by setting the KRB5CCNAME environment variable])
    fi
    gssapi_lib=gssapi_krb5
    break
    kerberos4.m4.rej
    *** 1,112 ****
    - dnl Checks for Kerberos
    - dnl NOTE: while we intend to do generic gss-api, currently we
    - dnl have a requirement to get an initial Kerberos machine
    - dnl credential. Thus, the requirement for Kerberos.
    - dnl The Kerberos gssapi library will be dynamically loaded?
    AC_DEFUN([AC_KERBEROS_V5],[
    AC_MSG_CHECKING(for Kerberos v5)
    - AC_ARG_WITH(krb5,
    - [AC_HELP_STRING([--with-krb5=DIR], [use Kerberos v5 installation in DIR])],
    [ case "$withval" in
    yes|no)
    - krb5_with=""
    - krb5_with="$withval"
    esac ]
    - for dir in $krb5_with /usr /usr/kerberos /usr/local /usr/local/krb5 \
    - /usr/krb5 /usr/heimdal /usr/local/heimdal /usr/athena ; do
    - dnl This ugly hack brought on by the split installation of
    - dnl MIT Kerberos on Fedora Core 1
    - K5CONFIG=""
    - if test -f $dir/bin/krb5-config; then
    - K5CONFIG=$dir/bin/krb5-config
    - elif test -f "/usr/kerberos/bin/krb5-config"; then
    - K5CONFIG="/usr/kerberos/bin/krb5-config"
    - elif test -f "/usr/lib/mit/bin/krb5-config"; then
    - K5CONFIG="/usr/lib/mit/bin/krb5-config"
    - fi
    if test "$K5CONFIG" != ""; then
    KRBCFLAGS=`$K5CONFIG --cflags`
    KRBLIBS=`$K5CONFIG --libs gssapi`
    - K5VERS=`$K5CONFIG --version | head -n 1 | awk '{split($(4),v,"."); if (v@<:@"3"@:>@ == "") v@<:@"3"@:>@ = "0"; print v@<:@"1"@:>@v@<:@"2"@:>@v@<:@"3"@:>@ }'`
    - AC_DEFINE_UNQUOTED(KRB5_VERSION, $K5VERS, [Define this as the Kerberos version number])
    - if test -f $dir/include/gssapi/gssapi_krb5.h -a \
    - \( -f $dir/lib/libgssapi_krb5.a -o \
    - -f $dir/lib64/libgssapi_krb5.a -o \
    - -f $dir/lib64/libgssapi_krb5.so -o \
    - -f $dir/lib/libgssapi_krb5.so \) ; then
    AC_DEFINE(HAVE_KRB5, 1, [Define this if you have MIT Kerberos libraries])
    - KRBDIR="$dir"
    - dnl If we are using MIT K5 1.3.1 and before, we *MUST* use the
    - dnl private function (gss_krb5_ccache_name) to get correct
    - dnl behavior of changing the ccache used by gssapi.
    - dnl Starting in 1.3.2, we *DO NOT* want to use
    - dnl gss_krb5_ccache_name, instead we want to set KRB5CCNAME
    - dnl to get gssapi to use a different ccache
    if test $K5VERS -le 131; then
    AC_DEFINE(USE_GSS_KRB5_CCACHE_NAME, 1, [Define this if the private function, gss_krb5_cache_name, must be used to tell the Kerberos library which credentials cache to use. Otherwise, this is done by setting the KRB5CCNAME environment variable])
    fi
    gssapi_lib=gssapi_krb5
    - break
    - dnl The following ugly hack brought on by the split installation

    >>The file is read partially and my mapping throws an error.
    Thats the normal behaviour of XI,if you get a partial file,you will get a error message.
    There are several work arounds for this,first of all have a script independant of XI which is running on FTP server,this script will keep on checking for modifications in file and once the file is completely written,it will rename the file to some other extension(for e.g .dat) and XI file adapter will only pick .dat file,this will make sure that only complete files are picked up.
    Second option is to have a tag all the way in the end of XML which says EOF(of any other character),in your mesage mappin create the root node of target only if this last tag is EOF.Since in incomplete file you will not have this last tag,message processing will stop.
    Thanx
    Aamir

  • Converting Unicode to plain text

    Hi,
    Is there anyway i can get the string "Internationalization" from I�t�rn�ti�n�liz�ti�n?

    You could decompose it using one of the Unicode normalizations:
    http://java.sun.com/javase/6/docs/api/java/text/Normalizer.html
    and then go through the result and remove all of the combining characters.

  • How do I save e-mail content on my MacBook Air,so I may print them as plain text?

    How do I save e-mail content on my MacBook Air, so I may ptint the content as plain text?

    10.7 Lion
    http://support.apple.com/kb/PH4858
    10.8 Mountain Lion
    http://support.apple.com/kb/PH11746

  • Weblogic server log files !! can i read them through HTTP using browser ?

    hi all
    i wonder if i can configure weblogic server or use a utility to read my log files in application,i need something like log file browsing in oracle webcenter content .
    any advise ?
    thanks
    Edited by: hsweiss on Jul 18, 2012 9:28 AM

    Hi,
    I believe you can read log files using admin console. Go to Diagnostic--> logs and select the server which logs you want to see.
    Regards,
    Shashi

  • How to read Skype connection logs (.log files in /...

    Hi all,
    A funny problem but really important - please help!
    I set up logging to find out causes of some tech problems occuring during my calls, as it described here: https://support.skype.com/en/faq/FA12321/how-do-i-create-log-files
    So, I get now /Logs folder with .log files.
    But they are not text files and I don't know what this format is and what tool can read them(
    Skype tech support doesn't know as well. Please help, who knows, how to read these .log files?
    Thanks!
    ps my OS is Ubuntu Linux

    It's somewhat odd that the Skype tech support staffer you spoke with doesn't know what to do with the logs, as the instructions you posted say to place them in a ZIP file and sent it to them. Since the log files I observed start with 'BLOGBEGIN,' there must be software to parse the file. Also...you never described the tech problems during calls which prompted you to enable logging; and if Skype Support suggested it (which seems doubtful, given they didn't know what to do with the files). Perhaps you can provide a description of the issue?

Maybe you are looking for

  • Session keep Alive when EBS is integrated with OIF acting as SP

    We have an E-Business Suite R12(12.1.3) Application which is integrated with Oracle Access Manager 11.1.1.5. For authentication the Oracle Access Manager delegates the authentication request to Oracle Identity Federation acting as a Service Provider

  • Static methods vs instant methods

    hi to all abap gurus thanks in advance all of the objects in the class can acess its its static attributes . and if u change the static attribute in an  object the change is visible in all other objects in the calsssss. can u pls expain this and tell

  • Installed windows service pack and now can't see igoogle content

    I recently installed a service pack for Office 32bit on my Sony Vaio. Now I cannot see any of my page content on Igoogle, or certain features on Ebay. I checked my popup filter, and even turned it off, and that didn't help.

  • Scripting in xMII

    hi, Any one tell me about scripting in xMII. i have plast database with two tables like order(columns-order level,orderid,name of the order),product(productlevel,orderid,defactives).please tell me how i would be use this tables at Scripting

  • Why is imovie always so slow?!!

    why is my iMovie 09 always so slow? it takes forEVER to upload! i tried uploading it to iTunes but it said 2 hours remaining. after two hour it skipped back to 2 hours remaining and then went up very fast. then error 05 or something popped up and it