Is there any way to protect multi user Pass words?

As a single user I am saving passwords and protecting them with master pass word.If somebody else is also using Firefox and wants to save his pass words can he save those with different master pass word as a second user?

Create a 2nd Firefox Profile. <br />
http://support.mozilla.com/en-US/kb/Managing+Profiles

Similar Messages

  • Is there any way to create multiple users in a single shot in oracle db

    Can Any one tell me, is there any way to create multiple users in a single shot in oracle database.

    Hello Nunhum,
    I guess this was not my question.. This is not what I m asking.. I know there is not a single sql statement in oracle ,which could create multiusers alike UNIX/LINUX(OS LEVEL), Whatever you have written..is simple creating them one by one.
    What I am expecting is to have PL/SQL statement which could help us in this regard.

  • Is there any way to see the  user name(authorized) to logon IR

    Hi,
    Is there any way to see the user name(authorized) to logon Integration Repository?
    I am getting error while trying this out.
    Can anyone please help me.
    Thanks.

    Hi,
    YES, you can see in SU01 and select the user . ANd check for the Roles assigned to that particular User.
    By seeing the Roles itself we can be able to say the Authorized or not
    Regards
    Seshagiri

  • HT4059 Is there any way to protect an ibook in iPad ?

           I want to protect my ibook document with a password. Is there any way to do that?

    Not so far as I am aware.

  • Is there any way to have multiple user names/accounts on Icloud for families sharing an apple account?

    MY husband just got a iphone 5s last night, I have an iphone 5. We sharean apple ID.  When he backed up to icloud he got all of my pictures and contact numbers. Is there any way to create seperate icloud accounts so when  one of us back up we are only backing up our own data??

    You both need, & should use different Apple ID's for iCloud, iMessage & FaceTime. You both can continue to use the same Apple ID for iTunes content.
    Your husband needs an Apple ID for iMessage, FaceTime & iCloud.
    The Apple ID needs to be a verified email address. Once you have an email address, that can be verified, go here & create the ID:
    https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/wa/createAppleId
    Then on his phone, turn off Contacts, Calendars, etc. for iCloud. You'll be prompted to keep the data or delete it from the phone, then turn off iMessage, FaceTime & delete the iCloud account...Settings>iCloud...scroll down...delete account. Then, setup iCloud using the new Apple ID, turn on iMessage & Facetime.
    This will have no affect on the ID you both share for iTunes content, & you can continue to do so.

  • *****Is there any way to protect against this latest cyber "bug"?

    I just read a newspaper article this morning that announces a major danger of a new computer but to Mac OSX systems.  Does anyone know of a way to protect against this?  I have one iMac, but also have an Apple router in my home.  It is scary to think that a bug can take control of your computer.

    My understanding from posts here and official statements in the public domain is that Apple is working diligently on the issue.
    I fear that we older model/OSX owners may be out of luck with patch help from Apple, as officially Apple does not support older stuff. Fortunately, there are many folks in the WebWideWorld that still care about us old folks - so Google searching " yourCurrentOSversion BASH patch " may help in finding those who have tackled the task of helping old folks across the street.
    When and if you discover such help in the WWW, Caveat Emptor - Buyer Beware... there will surely be nefarious characters looking to exploit this all-too-real fear (not paranoia if they are really after you)
    I follow with vested interest.
    CCC

  • Is there any way changing the priviledge after starting the managed server with the other user

    Hi,
    is there any way to change the user privilege after i have started the managed
    server with one user.....say for example ....i have started one of my Managed
    server as "root" ...but after that i wanted to make this instance work under as
    "inet"
    how do i do this OR is it possible ????
    please advise ....
    sangita

    Thanks again Rob.
    Rob Woollen <[email protected]> wrote:
    >
    >
    sangita wrote:
    Thanks Rob for been so quick in responding.
    I have 3 questions for you:
    Running a server under root is a huge security hole.My Question: 1) what are the probable security issues while runninga server under
    root ?
    are these security issues external(from outside world) or internal(internally
    within a company) ?
    Iam basically curious to know external threats.
    The problem is the root user can do anything. So if someone finds a
    security hole in your server, then they have complete control of your
    system.
    The usual reason people want to do this is so they can bind to a port
    <
    1024. ie they want their web server to listen to 80.My Question: 2) What is the harm in using port 80 for webserver andwhy do the
    people wanted to bind to a port < 1024 ?
    People normally use 80 for web servers because that's the well-known
    port.
    Personally I would not recommend that you go that route. I would
    recommend that you start the server as a very unprivileged user andbind
    it to some port (say 7001).
    Most firewalls support redirecting ports. Your firewall can redirect
    80
    on the external net to 7001 on the internal net. That's the solution
    I
    would recommend.My Question: 3) Suppose iam having a cluster of 2 Managed servers runningon port
    7070. And Iam having a Iplanet server working as a Webserver that basicallyproxies
    requests to this cluster. Then what is the best approach that i shouldfollow
    in this context.....to be honest with you ....i still couldnot understandwhat
    does "binding" the webserver port to a managed server in weblogic mean.
    I would have your firewall redirect 80 to whatever port Iplanet is
    listening on and then have iplanet proxy to WLS.
    Do not run your WLS servers as root.
    -- Rob
    Iam sorry for asking these "silly" questions(in your opinion) ...butiam a bit
    confused.
    thanks, sangita
    Rob Woollen <[email protected]> wrote:
    Running a server under root is a huge security hole.
    The usual reason people want to do this is so they can bind to a port
    <
    1024. ie they want their web server to listen to 80.
    There is a set uid option in WLS where you start the server as root
    and
    then after it binds to the low port, it will switch to another userthat
    you specify.
    Personally I would not recommend that you go that route. I would
    recommend that you start the server as a very unprivileged user andbind
    it to some port (say 7001).
    Most firewalls support redirecting ports. Your firewall can redirect
    80
    on the external net to 7001 on the internal net. That's the solution
    I
    would recommend.
    -- Rob
    sangita wrote:
    <Sure, it's possible to do this, >
    how to do this?
    <but why do you want to do it? >
    Iam not sure why this group (the other group than me) does start theirserver
    as "root"...but somebody from that group asked me about this today.
    I would not recommend that you start WLS as root on your production
    system ever under any cirucmstance.then what is the best approach and what are the pros and cons if westart the
    server as "root" OR as different user ????
    please advise ....
    thanks again.
    Rob Woollen <[email protected]> wrote:
    Sure, it's possible to do this, but why do you want to do it?
    I would not recommend that you start WLS as root on your production
    system ever under any cirucmstance.
    -- Rob
    sangita wrote:
    Hi,
    is there any way to change the user privilege after i have startedthe managed
    server with one user.....say for example ....i have started one
    of
    my Managed
    server as "root" ...but after that i wanted to make this instance
    work
    under as
    "inet"
    how do i do this OR is it possible ????
    please advise ....
    sangita

  • Is there any way to filter the LCCS room console from the list of users?

    I want to be able to hide the user that's logged into the room console from the list of users. Is there any way to identify that user?

    Hi,
    There is no standard way to hide users as such other than using anonymous presence. But the catch is, if you would set any property of change anything from dev console that publishes a message, then you will be noticed.
    The user that logs into the room console is always the owner, may be your client app, you can hide based on your both permission level and name/userID by subclassing Roster. I am just throwing up ideas, but as such there is no standard method for this.
    Whats your use case ? It's an interesting thought though and something we would think about on our side.
    Hope this helps
    Thanks
    Hironmay Basu

  • Is there a way to protect a USB flash drive from virus?

    My daughter's school computer lab is seemingly infected with some PC virus but their school IT folks seem to be unable to clean them and with all the young kids using USB flash drives they brought these viruses home when they plug the flash drive into our home computer but luckily since we are using Mac at home and I have ClamXav installed it detected the virus immediately. So we are kind of safe but I am getting tired of removing this same virus every week using UNIX command in a terminal mode, as it's locked and can only removed using the sudo command (taught by some people). My questions are:
    1. Is there any way to protect a USB flash drive from virus infection (it's a window PC virus)
    2. is there a way or suggestion on how to stop these apart from dis-infecting the whole school computers? The problems are that these young kids are not aware of those viruses in their USB flash drives and their teachers are just too ignorant about it!
    Thanks for any suggestions and help

    I'd still invest in your case into Mac protection against passing along malware.
    Take a look at Intego AV for one for the Mac and for dual-protection.
    http://www.intego.com
    Whatever you are finding is 'dormant' I assume, but that doesn't mean it can't become active or passed along either. And there are some 'man in the middle' spyware and malware, some which target online home banking (some people run their home banking from a virtual OS that is used for that purpose only, I always wished Mac OS X could be run in a VM mode as well).
    The IT folks sound like they need... do their jobs properly and better.
    I don't care how young they are, or the staff's ignorance. Time for education is now.
    Download and install Microsoft Security Essentials in Windows and follow guidelines. And there are tons of FAQs, guidelines and articles on the subject.
    http://www.microsoft.com/Security_Essentials/
    http://www.microsoft.com/security/portal/
    Nearly six months after Apple added a malware blocker to Mac OS X (Snow Leopard), the feature appears to be collecting cobwebs.
    Apple has not added any anti-malware signature updates to the XProtect.plist file that launched with antidotes for OSX.RSPlug.A and OSX.Iservice, two known Trojan horse programs targeting Mac OS X users.
    http://blogs.zdnet.com/security/index.php?cat=20&submit=view

  • Any way to protect changes to our code?

    Hi All.
    There are 2 implementors for the SAP Implementation that we are currently involved in.
    For ease of use of client, both are supposed to follow the same naming convention.
    Now, is there any way we can protect our objects from being changed by other party? For eg, I could think of an authorization group which gives access to only those SAP ID's we want. We can attach such an auth group to programs.
    But is there any way to protect all possible changes - programs, dict objects etc?
    Hope my query is clear.
    Any clues?
    Thanks in adv.

    Hi
    If your developers use own users (and nobody else can use those users), you can insert the flag to protect the editor.
    This flag (is in the attributes of the report) can be removed only by the user setted it.
    Max

  • Is there a way to protect the iCloud control panel access with a password in Windows 7?

    I have MS Outlook sync'd with my iCloud services in my Windows7 office PC (I'm pushing for Macs, but quite there yet, unfortunately!), and I have it password protected so nobody else can access my files. However, the iCloud app in Control Panel doesn't have any password protection so it can be messed with at any moment. Is there any way to protect it, or are there any plans to include this feature in future updates?

    Same here, I use iCloud on an office PC.
    I would like to password protect the access to the iCloud Control Panel. Is there a way to do that? I can either "Sign in" or "Sign Out."
    if I sign out I can't add iCloud calendar to Outlook. If I stay signed in, IT could easily activate my personal iCloud mail.
    Ideally, there should be a checkbox to just add calendar and leave mail, contacts and task out all together.
    Thanks.

  • Any way to set a user's UI Language or Report Locale at Runtime?

    Hi ALL
    I need some guidance. We have a requirement to display a report in either German or English based on the report query result. Is there any way to set a user's UI Language or Report Locale at Runtime? I've read several past blogs and forum posts, but no one seems to have the answer.
    Thank you so much!
    irene

    Here's a workaround if you don't come up with a better answer:
    Function Get-DLSize {
    Param (
    [string]$SourceFile,
    [int]$Timeout=10
    $sb= {
    $clnt = new-object System.Net.WebClient
    $clnt.OpenRead($args[0]) | Out-Null
    [int] $($clnt.ResponseHeaders["Content-Length"]/1mb)
    $clnt.Dispose()
    $PowerShell =
    [PowerShell]::Create().
    AddScript($sb).
    AddArgument($SourceFile)
    ($Timer = New-Object diagnostics.stopwatch).Start()
    $job = $PowerShell.BeginInvoke()
    While ($timer.Elapsed.TotalSeconds -lt $Timeout)
    if ($job.IsCompleted)
    $PowerShell.EndInvoke($job)
    $PowerShell.Dispose()
    Return
    else { Start-Sleep -Milliseconds 500 }
    Write-Warning "Timed out getting $SourceFile"   $PowerShell.EndInvoke($job)
        $PowerShell.Dispose()
    [string](0..33|%{[char][int](46+("686552495351636652556262185355647068516270555358646562655775 0645570").substring(($_*2),2))})-replace " "

  • Is there any way to prevent non-root users from rebooting the system?

    This question seems to be addressed many times on the web, but the problem is that none of the wannabe-howtos work on my system. In particular, this doesn't work and this doesn't work either, because (1) I need to keep policykit installed for udisks and other dependencies to function and (2) renaming (or removing) the file /usr/share/polkit-1/actions/org.freedesktop.login1.policy has (again) no effect on the users' ability to reboot and shut down the system. Even more surprisingly, adding the following to /etc/polkit-1/rules.d/20-disable-shutdown.rules has no effect at all:
    polkit.addRule(function(action, subject) {
    if (
    action.id == "org.freedesktop.login1.power-off" ||
    action.id == "org.freedesktop.login1.reboot" ||
    action.id == "org.freedesktop.login1.suspend" ||
    action.id == "org.freedesktop.upower.suspend" ||
    action.id == "org.freedesktop.login1.hibernate" ||
    action.id == "org.freedesktop.upower.hibernate"
    return polkit.Result.NO;
    As a result, ordinary users (not in the wheel group and with no special permissions) can simply reboot the machine by typing reboot. I remember that a simple polkit rule (as proposed on the Fedora forum) worked fine just a few months ago, but this doesn't work nowadays. The action IDs mentioned there are no longer listed in pkaction, so it's quite obvious that some changes (and bugs) have been introduced since then. I just need to prevent the users from rebooting the machine and to keep policykit installed. Is there any way to do this?

    karol wrote:Do said users have the ability to push the Power or Reset buttons?
    No, they don't.
    But come on, access permissions are a matter of principle rather than a matter of what you can possibly do with a hammer in your hand. That makes your question somewhat irrelevant to this issue. Imagine someone asking: "How can I protect my home directory from access by other users?" You would then probably ask: "Do said users have the ability to pull out the hard drive and mount it on their computer?"
    Even if the users had physical access to the ACPI buttons, rebooting the computer by mistake (via software) would still be much more likely than pressing (or even holding) the ACPI buttons by mistake.
    If I call rm -Rf / as a normal user, nothing should happen to the system in terms of availability to other users. Only my home directory and temporary files would vanish, but that's all. This is what permissions are there for. Similarly, when I type reboot as a normal user (no matter if I'm on SSH, on a local terminal or logged into KDE), it should be possible to simply disallow rebooting.
    The idea that users logged in locally can restart the computer may be fine for laptops under certain conditions, but it is a bad idea in almost all other cases. In a "kiosk" type environment, for example, the ability to reboot and get to the bootloader can be a huge security hole, unless all your disks are encrypted, and a huge "reliability hole" in any case. Suppose you use a desktop as a home server. You want everyone to be able to log in and to connect a USB flash drive (using polkit and udisks). But you simply don't want the machine to be rebooted. Why is such a simple thing so hard to do?
    Last edited by andrej.podzimek (2014-03-10 02:15:35)

  • Is there any way to disable the objects owned by a user?

    Hai every body....My problem is..
    I had created 60 users granting them connect and resource privileges in oracle(8.1.5.0.0).All of the users are working under their logins(users)...Every thing is going fine...But now i wanted to disable the objects owned by those users
    (60 Users) for a period of 2 days,After that i wanted to enable them....Is there any way to disable the objects owned by them with out dropping the users?(The users should be able to work as prevoiusly on the new objects they will create after i disabled the objetcts owned by them previously)?

    hi
    if my understanding is right you want to disable the users for 2 days for any reason let say he is on holiday for 2 days then why dont u lock this user and submit the job for unlock after two days.
    Khurram Siddiqui
    [email protected]

  • Is there any way to password protect a project in aperture 3?

    I have certain projects that I don't want viewable by others that may use my computer.  Is there any way to password protect a certain project or album to restrict access?

    No. You can hide images using the "reject" rating, and you can password protect a Library by putting it on a password-protected sparsebundle.
    A good answer
    A search of this Discussion forum.
    OS X has fast-user switching and a built-in Guest account.  I never allow anyone access to my account.
    To limit a client's view to just his/her Projects, use Aperture's "Favorites" function.  A forum regular -- Shutters33d, iirc -- posted this excellent suggestion just a couple of days ago.
    Message was edited by: Kirby Krieger

Maybe you are looking for

  • Item Master in Oracle Purchasing

    Greetings to All, Im am currently working with a client. Who has the following modules installed. GL-AP-AR-Purchasing-iProcurement. My client would like to me to create an item in Item Master. Then have that item show up in iProcurement. When a user

  • Loud hum when plug in stereo jack to pa

    HP Pavilion dv9740us Notebook PC When i try to plug a stereo jack into the headphone jack to conect it to my PA System I get a loud hum? when I attempt this with any other computer i have no problem just with my HP i get this loud hum. I can plug it

  • Photoshop elements 10 scanned photos

    Can someone tell me why my scanned photos go in fine and I am able to date & tag photos but when I review them later they come up with "searching for missing file" everytime

  • Record dynamic links

    I want to create a  news system, where the table where I will enter data such as title and  text, also save the link to this news. But  after much frustration, still can not do this. I  would record the number of the id field also in the link. How ca

  • Why do I  get message on my Nook "user not activated" when I try to read a borrowed book from the library.

    I get message on my Nook "user not activated" when I try to read a borrowed book from the library. Book is there and I can read on my computer but not the Nook. Can read purchased books on Nook.