I Need to add Could hana system in hana studio.

Hi Experts.
I have installed hana studio in my system. and have created a hana could platform accout , but i can't get user details and host, instance no from could.
How i will get this all details from could and how i will access from hana studio.please help i don't have option to created hana instance in could. please find below screen.
Thanks
Jana

Hi Jana,
You can refer "Using a Trial SAP HANA Instance" Here is the link SAP HANA Cloud Platform
If you use SAP HANA Studio to connect your SAP HANA instance on HCP, you have to use SAP HANA Cloud Platform SDK to open a DB tunnel first. You can download the SDK from SAP Development Tools for Eclipse
Best regards,
Wenjun

Similar Messages

  • Need to add WinXP to system

    I'm currently running Mountain Lion on a 2TB, single partition hard drive.
    I need to add a WinXP partition.
    Mountain Lion's Bootcamp Assistant only supports Win7.
    How can I add a WinXP?
    Thanks
    -Mike
    P.S.
    For those on this site who love a mystery, here's one for you.
    And for those who can solve it, you'll have my eternal gratitude.  :-D
    I've attempted going back to Snow Leopard (which is the OS that came on my system when I bought it from Apple 2 yrs ago.)
    However, when the install process gets to the point where I choose the disk to install SL on, the installer shows an exclamation icon over it and a message in the installer window says "Mac OS X cannot start up from this disk."
    What!?!?  This is my one and only startup disk and am always starting up on it.
    Ideas?

    Thanks Allan and Bob. You've both confirmed my suspicions and helped me decide on a solution.
    Here's my theories:
    1) In order to maximize efficiency, Apple has chosen not to support WinXP in Lion and later Bootcamp solutions. Otherwise, they would have to provide XP drivers for all of the hardware options available in addition to drivers for Win7, perhaps forcing them to supply and maintain several DVDs. I understand this thinking. I'm thinking that this may be why ML Bootcamp Assistant only supports Win7.
    2) I then thought, well, I'll simply add an additional partition to the end of my HD using Disk Utility and install XP on that new partition formatted as FAT32. I'd then insert my XP disk, boot into that disk upon startup using the Option key and then choose this new partition for the install when the XP installer requests that I choose an install partition. The problem I discovered in this situation is that XP cannot see that last partition, precluding me from choosing it as an option for the install (Remember I'm installing onto a partition located at the end of a 2TB drive). Perhaps the XP installer was not built to even detect partitions located at this distance on such a large drive.
    This seems to indicate that Bootcamp Assistant for Snow Leopard must provide some mapping scheme when it partitions these large drives that allows XP to see this distant partition during the install process.
    3) Ok, I then figured, I'll simply run Snow Leopard's Bootcamp Assistant in Mountain Lion and create and install XP that way. Well, it turns out that SL's Bootcamp Assistant gets confused about the partitioned setup in Mountain Lion and issues a message stating "The startup disk cannot be partitioned or restored to a single partition". This seems to indicate that ML has altered the partition information on the HD in a way the confuses SL's understanding of it.
    4) Finally, I attempted to simply re-install SL by inserting the original DVD supplied with my iMac into the drive, rebooting into that DVD upon startup and then installing from this DVD. Well, this produces the result I described in the P.S. in my first post in this thread.
    Well, those are my theories at this point. Any further clarifications or rebuttals?  :-D
    I think I'll try either Allan's or Bob's (or both) solutions next.
    Thanks again.
    -Mike

  • The Configuration Area could not be created (HANA Studio)

    This message is posted in case some else comes across this issue. After installing the SAP Hana Studion, I was continually receiving the following message:
    "The Configuration Area at 'c:\Users\U\.eclipse\org.eclipse.platform_3.5.0_1152700900\configuration' could not be created. Please choose a writable location using the '-configuration' command line option'.
    After trying to mess around with the command line option, I found that I needed to run the Hana Studio as an Administrator. ie, right click on the HANA Studio icon and select 'Run as Administrator' from the context menu.

    If this is a new setup discard existing web application along with site and content database. Recreate the same web application and try provisioning PWA with new databases
    Hrishi Deshpande – Senior Consultant DeltaBahn
    Blog | < |
    LinkedIn
    Please click Mark As Answer; if a post solves your problem or Vote As Helpful if a post has been useful to you.This can be beneficial to other community members reading the thread.

  • The Web application at could not be found. Verify that you have typed the URL correctly. If the URL should be serving existing content, the system administrator may need to add a new request URL mapping to the intended application

    Hi,
    I have created on windows service to fetch sharepoint list ad update the list items.
    when i run this service in sharepoint server(where the sharepoint site is hosted),it is working fine. If i run the same service in another machine(sharepoint installed in this machine also). it is giving the below error
    The Web application at [URL] could not be found. Verify that you have typed the URL correctly. If the URL should be serving existing content, the system administrator may need to add a new request URL mapping to the intended application.
    Code snippet
    SPSite sharepointSite = null;
                SPWeb rootWeb = null;
                try
                    //SPList current = null, previous = null;
                    string colmId = ConfigurationManager.AppSettings[ID_COLM];
                    List<TaskEntity> list = new List<TaskEntity>();
                    sharepointSite = new SPSite(URL);
                    rootWeb = sharepointSite.OpenWeb();
                    SPList current = rootWeb.Lists[ConfigurationManager.AppSettings[OMEGA_REGISTRATION_LIST]];
                    WriteEventLog("current" + current.Items.Count.ToString());
                catch (Exception ex)
                    ExceptionMethod(ex);
                finally
                    sharepointSite = null;
                    rootWeb = null;
    I have pointed .net framework to 3.5 version and target palform as Any CPU. Please suggest me

    Hi mallela1,
    I also had similar issue couple of months back when I was trying to access a remote URL from a Windows service when the site does not exists in the server where service resides.
    You cannot access a remote url (even though it is SharePoint server and also in same network ) from server object model.
    SPSite can look in the current server only. here what is happening is SPSite will look for this in the current server DB and it is not finding this errror.
    So please dont use ServerObject model for accessing remote sites. You can use Client Object model for the code /requirement you have stated above.
    I wasted lot of time in finding a work around to make to work. It did not. So look for other options.
    Regards,
    Nandini

  • How to add system to login using sid adm user in HANA Studio

    Hi,
    I have added SYSTEM user for my TEST system in HANA Studio. Now, I would like to add TEST system but using <sid>adm user.
    It shows "The system cannot be reached. The logon data could not be used. Do you want to add the system anyway?".
    May I know how to add TEST system using <sid>adm user?
    Thank you.
    regards,
    zl

    You need Database user, not operating system user <sid>adm user.

  • I have a macbook 4.1 with osx10.6.8 and just added memory (2gig) so I could sync my new Ipome and Ipad.  and Ipad. Now I'm told I need to upgrade my operating system. The apple store gave me conflicting instructions. Any suggestions? Thanks

    I have a macbook 4.1 with osx10.6.8 and just added memory (2gig) so I could sync my new IPhone and Ipad. Now I'm told at the apple store that I need to upgrade my operationg system. They said they couldn't help and gave me conflicting advice about what to do. Any ideas? Thanks you!

    There are three models of MacBook that comprise the 'macbook 4.1' category, and each of them a little different; however other than 'macbook 4.1' the other thing they have in common is they all are considered Early 2008. Two are white, one black, polycarbonate case, Core2Duo 2.1GHz, 2.4GHz white, 2.4GHz black.
    So if you can determine which one, if any of these, is the model build year and spec you have, that would be handy. Did you tell whoever you spoke to the serial number of your computer, so they'd know by looking up the specs to see what the supported maximum RAM upgrade capacity was, and other minimum requirements to make any upgrade to Mac OS X 10.6.8 at all?
    If you have the serial number you can do a lookup to 'indentify by serial number' online, and use that information to determine if the computer needs even more RAM to take it past the minimum for Snow Leopard 10.6.8 and then get it ready to upgrade (via paid download from App Store, Snow Leopard gets you that far) and see what the next supported OS X full upgrade would be for the hardware limitations on that old MacBook.
    If your MacBook IS a 4.1 build, the highest OS X it could run if it has the 2.4GHz cpu, is Lion 10.7.5. That would be an upgrade from the App store, available to OS X 10.6.8+ computers that access it online. And I kind of doubt how supported a newest iphone etc may be in lion.
    everymac.com has a fair amount of information across many years of Apple computing hardware...
    Here's the three MacBooks that share the 4.1 designation; first shipped with as much as 1GB RAM upgrade and the other two only a 2GB RAM*, (one white/one black color) according to this information...
    • MacBook "Core 2 Duo" 2.1 13" (White-08) 2.1 GHz Core 2 Duo (T8100)   
    • MacBook "Core 2 Duo" 2.4 13" (White-08) 2.4 GHz Core 2 Duo (T8300)  
    • MacBook "Core 2 Duo" 2.4 13" (Black-08) 2.4 GHz Core 2 Duo (T8300)
    ...as seen here: http://www.everymac.com/systems/apple/macbook/index-macbook.html
    *But according to MacTracker (free: download database) http://mactracker.ca
    these MacBooks can use more RAM in aftermarket specs as much as:
    Maximum Memory
    6.0 GB (Actual) 4.0 GB (Apple)
    Memory Slots
    2 - 200-pin PC2-5300 (667MHz) DDR2 SO-DIMM
    To get more information use a service such as this...
    •identify by serial number:
    http://www.powerbookmedic.com/identify-mac-serial.php
    The Apple? store or whoever you talked, to may have been as accurate as they could be without further research. Could be you may have a newer or older MacBook, which would change whatever later OS X it could run past 10.6.8. And to go past Snow Leopard, you need to download the last bits for 10.6.x to be able to go and get any later upgrade. The ones that may let a newest iphone or ipad work with it, are past SL10.6.8
    Anyway, as you further verify the model build year and configuration specifications, report back.
    Good luck & happy computing!

  • I need help, How could I add Aliases to Local Administrator account via terminal commands???

    I need help, How could I add Aliases to Local Administrator account via terminal commands???
    I want to use commands to add alias for existing administrator account remotly by using ARD.
    Thanks.

    Hi,
    a Windows Domain Controller does not have any local user or groups. So you might add the user to the admin group at Domain level.
    B RGDS,
    Gregor
    Edited by: Gregor Gasper on Jan 9, 2009 1:44 PM

  • My HD is almost full. I need to add space. Can I use an external HD to continue using my startup disc as it is?

    My HD is almost full. I need to add space. Can I use an external HD to continue using my startup disc as it is?
    I create music and have run out of space. the message says 'your startup disc is almost full', and i just thought maybe buying an external hard drive and using it as the startup disc or whatever would do the trick. Does anyone know? Thanks!

    External hard drives are relatively inexpensive...see some of those on OWC, www.macsales.com
    You can use a large external drive to provide additional space by simply saving material to that volume instead of the startup disk.  You can also partition the external drive to use part for Time Machine backups, and another partition for extended space.  Or a third partition for a clone of the boot system made by Carbon Copy Cloner or SuperDuper, both free downloads, so should the internal drive have problems you could always boot from the external partition.
    All of that can be done from Disk Utility.
    Keep in mind that Mac OS X gets very unhappy when there is less than 15% of the startup disk space free.

  • Which ports are needed for SAP HANA Studio - HANA DB communication?

    I want to connect SAP HANA Studio to a HANA instance. The HANA instance number is 40.
    The SAP note 1592925 states that the ports 5$$13/5$$14 and 3$$15 should be open to allow communication between the HANA Studio and the HANA database. I even see the instance in the HANA Studio, but I cannot administrate it and the HANA studio gives this general "I don't want you to know what the error actually is" message:
    !ENTRY com.sap.ndb.studio.navigator 4 1 2012-01-16 14:01:40.627
    !MESSAGE [HDB hostname 40 (SYSTEM)] Error on refreshing system
    !SUBENTRY 1 com.sap.ndb.studio.navigator 4 0 2012-01-16 14:01:40.627
    !MESSAGE SAPControl request failed
    !STACK 0
    com.sap.ndb.studio.sapcontrol.SAPControlException: SAPControl request failed
         at com.sap.ndb.studio.sapcontrol.operations.SAPControlOperation.execute(SAPControlOperation.java:118)
         at com.sap.ndb.studio.sapcontrol.SAPControl.getInstanceProperties(SAPControl.java:439)
         at com.sap.ndb.studio.sapcontrol.SAPControl.collectProperties(SAPControl.java:466)
         at com.sap.ndb.studio.sapcontrol.SAPControl.open(SAPControl.java:297)
         at com.sap.ndb.studio.sapcontrol.SAPControlManager.getSAPControl(SAPControlManager.java:108)
         at com.sap.ndb.studio.sapcontrol.SAPControlManager.getSAPControl(SAPControlManager.java:81)
         at com.sap.ndb.studio.sapcontrol.SAPControlManager.needCredentials(SAPControlManager.java:57)
         at com.sap.ndb.studio.navigator.operations.SAPSystemObjectUpdate.executeTrySAPControl(SAPSystemObjectUpdate.java:102)
         at com.sap.ndb.studio.navigator.operations.SAPSystemObjectUpdate.execute(SAPSystemObjectUpdate.java:63)
         at com.sap.ndb.studio.navigator.operations.UpdateSAPSystemOperation.execute(UpdateSAPSystemOperation.java:75)
         at com.sap.ndb.studio.datamodel.controler.DataModelOperation.execute(DataModelOperation.java:67)
         at com.sap.ndb.studio.datamodel.controler.DataModelOperationQueue$DataModelOperationThread.run(DataModelOperationQueue.java:99)
    Caused by: com.sun.xml.internal.messaging.saaj.SOAPExceptionImpl: com.sun.xml.internal.messaging.saaj.SOAPExceptionImpl: Message send failed
         at com.sun.xml.internal.messaging.saaj.client.p2p.HttpSOAPConnection.call(Unknown Source)
         at com.sap.ndb.studio.sapcontrol.operations.SAPControlOperation.execute(SAPControlOperation.java:94)
         ... 11 more
    Caused by: com.sun.xml.internal.messaging.saaj.SOAPExceptionImpl: Message send failed
         at com.sun.xml.internal.messaging.saaj.client.p2p.HttpSOAPConnection.post(Unknown Source)
         ... 13 more
    Caused by: java.net.ConnectException: Connection refused: connect
         at java.net.PlainSocketImpl.socketConnect(Native Method)
         at java.net.PlainSocketImpl.doConnect(Unknown Source)
         at java.net.PlainSocketImpl.connectToAddress(Unknown Source)
         at java.net.PlainSocketImpl.connect(Unknown Source)
         at java.net.SocksSocketImpl.connect(Unknown Source)
         at java.net.Socket.connect(Unknown Source)
         at java.net.Socket.connect(Unknown Source)
         at sun.net.NetworkClient.doConnect(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient.<init>(Unknown Source)
         at sun.net.www.http.HttpClient.New(Unknown Source)
         at sun.net.www.http.HttpClient.New(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.getNewHttpClient(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.plainConnect(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.connect(Unknown Source)
         at sun.net.www.protocol.http.HttpURLConnection.getOutputStream(Unknown Source)
         ... 14 more
    Do I need to open any other ports to make HANA Studio work with HANA DB?
    Regards,
    Mark

    Hi Mark,
    The HANA Studio connects to HANA DB Instance with JDBC on port 3<Instance number>15.
    For your HDB with Instance Number 40, the port would be 34015.
    HANA Studio will automatically assign the JDBC port number when you assign the instance number when you add new system.
    Looking at the error message that you posted:
    !ENTRY com.sap.ndb.studio.navigator 4 1 2012-01-16 14:01:40.627
    !MESSAGE [HDB hostname 40 (SYSTEM)] Error on refreshing system
    It looks like the hostname entry was not entered correctly (you might have entered "hostname" value when adding the system in HANA Studio).
    Here is an example of correct log entry on DCA database instance on hanasvr-01 server with Instance number 00:
    !ENTRY com.sap.ndb.studio.navigator 4 1 2012-01-10 13:55:23.598
    !MESSAGE [DCA hanasvr-01 00 (SYSTEM)]
    You may want to delete and re-add your HDB instance in your HANA Studio.
    Regards,
    Ferry

  • Do I need to add software protectin for moutain Lion 10.8.5

    Do I need to add software protection like norton

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Why need a NLS for Hana?

    Just a thought to ponder on:
    Why do we need IQ or any other system as a NLS for Hana?
    Would it not be more efficient to increase disk capacity by adding a SAN to Hana and storing cold data as columnar tables with a never load into memory option?
    Does this not make for a simpler architecture and lower TCO?

    Hi John
    True, it would be nice if SAP could combine the in-memory capability of
    Hana with the disk based column store capability of IQ.
    Getting clients to commit to buying HANA is tough enough in South
    Africa, but to get them to commit to spending extra for IQ is almost impossible.

  • Cannot add participants - getting system error

    When using Beehive Online, and I click on, "Create Group or Add New Members", I get this message:
    System error. Please re-try your action. If you continue to get this error, please contact the Administrator.
    Could someone help me with this? I need to add 160 team members to this workspace.
    Thanks.
    Roslyn

    Hi Roslyn,
    Could you please send me ([email protected]) a screen shot of the error. I don't think if its got to do anything with Beehive Online, it could be related with SSO (managed by Identity management team), we use it for authentication.
    Thanks,
    Jereen

  • Do I need to add Base Station MAC address to list?

    Hi, If I choose to use MAC address filtering on my Airport Extreme Time Capsule, do I need to add the wireless MAC address of the Base Station to the list of allowed MAC addresses???  I'd feel real bad if I set up a list, didn't include the base station's MAC address and then could never get in to the network again because I, in effect, locked myself out???  I doubt that address needs to be included but I would like some feedback on that.
    Second, does the one MAC address filter list apply to the Guest Network as well if I should choose to turn it on???  If that was the case, I would just turn off MAC address filtering why guests were present.
    thanks..  bob

    If I choose to use MAC address filtering on my Airport Extreme Time Capsule, do I need to add the wireless MAC address of the Base Station to the list of allowed MAC addresses???
    No. Timed Access would be for wireless devices....computers, mobile devices, printer, etc., that are connecting to the Time Capsule. The Time Capsule does not connect to itself in this regard.
    I'd feel real bad if I set up a list, didn't include the base station's MAC address and then could never get in to the network again because I, in effect, locked myself out???
    Sometimes, users lock themselves out by mistake by entering incorrect times for devices to connect, and they often forget that they can connect to the base station using an Ethernet connection and get back in that way.....since Timed Access only applies to devices that connect using wireless.
    does the one MAC address filter list apply to the Guest Network as well if I should choose to turn it on???
    Yes

  • VA01 Sales order - Header-- Accounting tab need to add a field

    Dear All,
    The requirement is,
    1. I need to add a field in Sales order.
    Path for the same is as follows:
    VA01> Goto> Header--> Accounting tab
    2. The field will be a date field that needs to calculate date on.
    a)create a new field. ex - zchdt (chq due date)
    b)when customers enters value in Assignment,
    i.e vbak-zuonr
    after that trigger logic is
    3.vabk-kunnr = knvv-kunnr
    a)sy-date + knvv-kvgr2 (exclude sundays)
    example - 14 sept + 30 days = 14th october
    should populate value - 14th october i.e. field (zchdt)
    4. This activity needs to be triggered before the sales order is saved.
    kindly know whether this is possible or not.
    if possible how & which exit & also with example code.
    if you could give me your contact(cell no).
    Regards,
    Nagendra D.S.
    Mobile - +91 9819899082

    Hi All,
    VA01 Sales order - Header--> Accounting tab need to add a field. field name - zchdt(cheque due date)
    when customer enters value in Assignment i.e zuonr & after that trigger logic is
       1.     vbak-kunnr = knvv-kunnr
       2.     sysdat + knvv-kvgr2 (exclude sundays)
    example - 16 sept + 30days = 16 oct
    in field zchdt value 16 oct as to populate
    Pls help me in the code.
    Regards
    Nagendra

  • Need to add number of days to users end date.

    Hi,
    I have a code where we are adding number of days(30) to current date and then updating user's end date in IDM DB.
    Now we have a requirement where we need to add number of days(30) to existing end date of user instead of adding to current date.
    *public String incrementDate(int daysToAdd)
         // Start date
         log.info("NotifyLastDayOfService::incrementDate(): Enter");
         SimpleDateFormat sdf = new SimpleDateFormat("yyyy-MM-dd 00:00:00");
         Calendar c = Calendar.getInstance();
         c.add(Calendar.DATE, daysToAdd); // number of days to add
         String newDate = sdf.format(c.getTime());
         log.info("NotifyLastDayOfService::incrementDate(): Exit");
         return newDate;
    Have any body implemented this scenario?
    Please suggest.
    Thanks,
    Kalpana.

    Hi Nayan,
    Here is the code:
    System.out.println("----inside increment date method-----");     
              HashMap<String, String> hm = new HashMap<String, String>();
              HashMap<String,Date> modifyMap=new HashMap<String,Date>();
              SimpleDateFormat sdf = new SimpleDateFormat("yyyy-MM-dd 00:00:00");
              tcResultSet usrList = null;
         String enddate = null;
         hm.put("Users.Key",usrKey );
         try {
         usrList = this.usrIntf.findUsers(hm);
         usrList.goToRow(0);
         Date endDate =usrList.getDate("Users.End Date");
         System.out.println("-----users end date-----"+endDate);
         String userEndDate=sdf.format(endDate);
         System.out.println("-----String value of users end date-----"+userEndDate);
         Calendar cal=null;
         System.out.println("-----Calender date-----"+cal);
         cal.setTime(endDate);
         System.out.println("-----end date-----"+endDate);
    cal.add(Calendar.DATE, Integer.parseInt(daysToAdd)); // number of days to add
    Date newEnddate = cal.getTime();
    System.out.println("-----new end date-----"+newEnddate);
    //usrList.setEndDate(Edate);
    modifyMap.put(userEndDate,newEnddate);
    usrIntf.updateUser(usrList, modifyMap);
    System.out.println("updated user's end date in OIM DB");
    //System.out.println("-----updated user's end date in OIM DB-----");
    logger.info("NotifyLastDayOfService::incrementDate(): Exit");
         System.out.println("-----new date-----");
         } catch (tcAPIException e) {
         logger.error("Error in finding end date for user" + e);
         } catch (tcColumnNotFoundException e) {
         logger.error("Error in finding end date for user" + e);
    In th log file, I can see that the code is not executing this line:
    cal.setTime(endDate);
    end date is of type Date and stores users end date from DB. Please help in resolving this issue.
    Thakns,
    Kalpana.

Maybe you are looking for

  • Logic crashes when I click on an audio region

    I bought Logic a few weeks back and just now wanting to start using it in anger, so to speak. When I try and click on an audio sample in the arrange window the whole program crashes. I was trying to drag the region to the start of the track, then dis

  • Change in delivery quantity for batch managed items.

    30.09.2010 Hi friends, We have activated batch management. During delivery after the batch is determined and if i want to change the delivery quantity say for example from 50 to 30 then first i have to go and adjust the quantity in the batches to toa

  • Portal runtime error - for Universal Worklist

    Hi All, We have upgraded SAP Portal from 7.0 to 7.3 Ehp1, after upgrade we faced some issues and have resolved those. Right now some tabs in the portal is working fine whereas Universal Worklist and some tabs are throwing runtime error, where it show

  • Dbms_profiler in connection pooling environment

    Hello, I am looking for some experiences on using dbms_profiler in connection pooling environments ? I have got this working for single user cases but I am not sure how is this going to behave in connection pooling environments ? If you have done suc

  • Result recording in calibration plan

    Dear gurus , I am looking PM module in which I am creating  calibration plan for equipment with inspection lot. Currently I am able to enter one result for inspection lot. now my requirement is to enter no of reading with respect to no  of reference