Key management protocol
Does java have API for key mangement protocol like Diffie-Hellman key management or its siblings
whats the best hash functioni in java
whats the secured random generator function
thanks in advance
http://java.sun.com/javase/6/docs/technotes/guides/security/index.html
Similar Messages
-
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
WDS: Keys managment with PEAP
Hi
I have to install a WLAN in my company
I have to make 4 Vlan (1 for the wired managment equipments and 3 SSID)
I have 30 1231AP with 12.3 JA version, 4 2950-24XL and 4 PIX 506E (1/vlan)
I have Windows XP SP2 stations, and I want to use the native PEAP option ( without vendors supplicants)
Questions
Does the WDS AP cache the user session key when using WPA/PEAP methods or does it cache keys only with CCKM methods?
If it's not working with WPA/PEAP methods, does it usefull to implement WDS Infrastructure?
Best regards
JulienWDS caches the Master key as used in CCKM authentication for fast re-authentication for roaming clients. As a client roams to new AP, it will re-authenticate with WDS using this Master key & CCKM key authentication protocol.
If clients are not CCKM-capable, the WDS merely passes a session key to the AP. -
ORA-27023: skgfqsbi: media manager protocol error
can some one please tell me what to do regarding this error, and how can i solve it. the result log is stated below...
Recovery Manager: Release 10.2.0.1.0 - Production on Tue Oct 16 15:26:49 2007
Copyright (c) 1982, 2005, Oracle. All rights reserved.
RMAN>
connected to target database: MOT (DBID=2759813257)
using target database control file instead of recovery catalog
RMAN>
echo set on
RMAN> run {
2> allocate channel oem_sbt_backup type 'sbt_tape' format '%U';
3> backup as BACKUPSET current controlfile tag '10162007032648';
4> restore controlfile validate from tag '10162007032648';
5> release channel oem_sbt_backup;
6> }
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of allocate command on oem_sbt_backup channel at 10/16/2007 15:26:50
ORA-19554: error allocating device, device type: SBT_TAPE, device name:
ORA-27023: skgfqsbi: media manager protocol error
ORA-19511: Error received from media manager layer, error text:
sbt__rpc_connect: Internal error - could not connect to obproxyd (Oracle Secure Backup error: 'bad port name specified (OB SBT proxy manager)').
RMAN> allocate channel for maintenance type 'sbt_tape' ;
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of allocate command on ORA_MAINT_SBT_TAPE_1 channel at 10/16/2007 15:26:51
ORA-19554: error allocating device, device type: SBT_TAPE, device name:
ORA-27023: skgfqsbi: media manager protocol error
ORA-19511: Error received from media manager layer, error text:
sbt__rpc_connect: Internal error - could not connect to obproxyd (Oracle Secure Backup error: 'bad port name specified (OB SBT proxy manager)').
RMAN> delete noprompt backuppiece tag '10162007032648';
allocated channel: ORA_DISK_1
channel ORA_DISK_1: sid=125 devtype=DISK
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03002: failure of delete command at 10/16/2007 15:26:51
RMAN-06168: no backup pieces with this tag found: 10162007032648
RMAN> exit;
Recovery Manager complete.can some one please tell me what to do regarding this error, and how can i solve it. the result log is stated below...
Recovery Manager: Release 10.2.0.1.0 - Production on Tue Oct 16 15:26:49 2007
Copyright (c) 1982, 2005, Oracle. All rights reserved.
RMAN>
connected to target database: MOT (DBID=2759813257)
using target database control file instead of recovery catalog
RMAN>
echo set on
RMAN> run {
2> allocate channel oem_sbt_backup type 'sbt_tape' format '%U';
3> backup as BACKUPSET current controlfile tag '10162007032648';
4> restore controlfile validate from tag '10162007032648';
5> release channel oem_sbt_backup;
6> }
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of allocate command on oem_sbt_backup channel at 10/16/2007 15:26:50
ORA-19554: error allocating device, device type: SBT_TAPE, device name:
ORA-27023: skgfqsbi: media manager protocol error
ORA-19511: Error received from media manager layer, error text:
sbt__rpc_connect: Internal error - could not connect to obproxyd (Oracle Secure Backup error: 'bad port name specified (OB SBT proxy manager)').
RMAN> allocate channel for maintenance type 'sbt_tape' ;
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03009: failure of allocate command on ORA_MAINT_SBT_TAPE_1 channel at 10/16/2007 15:26:51
ORA-19554: error allocating device, device type: SBT_TAPE, device name:
ORA-27023: skgfqsbi: media manager protocol error
ORA-19511: Error received from media manager layer, error text:
sbt__rpc_connect: Internal error - could not connect to obproxyd (Oracle Secure Backup error: 'bad port name specified (OB SBT proxy manager)').
RMAN> delete noprompt backuppiece tag '10162007032648';
allocated channel: ORA_DISK_1
channel ORA_DISK_1: sid=125 devtype=DISK
RMAN-00571: ===========================================================
RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS ===============
RMAN-00571: ===========================================================
RMAN-03002: failure of delete command at 10/16/2007 15:26:51
RMAN-06168: no backup pieces with this tag found: 10162007032648
RMAN> exit;
Recovery Manager complete. -
Any best practice for Key Management with Oracle Obfuscation?
Hi,
I was wondering if anyone is aware if there are any best practices regarding key management when using Oracle's DBMS_OBFUSCATION_TOOLKIT? I'm particularly interested in how we can protect the encryption/decryption key that we would use.
Thanks,
JimOracle offers this document, which includes a strategy for what you're after:
http://download-west.oracle.com/docs/cd/B13789_01/network.101/b10773/apdvncrp.htm#1006234
-Chuck -
Does LabVIEW support the SNMP (Simple Network Management Protocol)?
I looked at LabVIEW 2014 online help for some info on SNMP.
A problem was posted in 1996 and updated in 2008.
Does LabVIEW Support the SNMP (Simple Network Management Protocol)?
http://digital.ni.com/public.nsf/allkb/4CD3625A939A77DE852564050047D3BD
This was addressed to LabVIEW version 4.
What version are we up to now?
Version 14?
One solution offered was to get the SNMP VI from Viodia.
Why should I have to spend another $1,000 for a VI from Viodia after spending $5,000 for LabVIEW Professional?
Come on National Instruments, offer up SNMP to go with your professional package.
There seems to be a lot of chatter about SNMP on the forums.
I’m sure a lot of customers would be happy to have an official LabVIEW VI for SNMP.I find it unreasonable to expect that LabVIEW supports out of the box every network protocol that has ever been invented under the sun. You may find SNMP to be the most important protocol on the world but for most programmers it is a niche protocol that they may have heard of but never will happen to come across in their applications. It's in fact pretty low level for a very specific purpose of managing network connected resources.
On the other hand it is not rocket science either so can be implemented by someone with enough determination on top of the native network interface functions in LabVIEW. Is it a lot of work? Yes, you bet! Is it worth 1000 bucks! If you really need it and your own work hours cost anything more than a few cents per hour, most probably too! If you can live with an implementation that is supporting many but not all features of SNMP, the link on LAVAG is a very good and nice one.
Rolf Kalbermatter
CIT Engineering Netherlands
a division of Test & Measurement Solutions -
I am receiving an error when attempting to install a site license copy of Microsoft Office Professional Plus 2010. The enterprise environment that I am in is using a Microsoft Key Management Server for the authentication of all Office 2010 and Windows 7
installations. The error that I receive at the end of the installation is: "Error 25004. The product key you entered cannot be used on this machine. This is most likely due to previous Office 2010 trials being installed. (System error: -1073418209)".
I have never installed a trial of Office 2010, nor did I ever install the beta of Office 2010. I do have a copy of Microsoft Office Projects 2010 installed. Before attempting to install Office 2010, I had Office 2007 installed. I used the Upgrade option
to install 2010, instead of removing 2007 (which apparently I should have done instead) first. I have tried using the Microsoft FixIt tool to remove both Office 2007 AND Office 2010. Neither of those tools has fixed my problem. Office 2010 also does not show
up in my Add/Remove Programs list.
Any ideas on how to fix this? I do not have time to reformat until after the Holiday seasons, and need to have Office working!Hi,
The full error text is as follows: Error 25004: The product key you entered cannot be used on this machine.
This is most likely due to previous Office 2010 trials being installed. (System error: 1073422308)
The key you are currently trying to install with, is an Office Professional Plus Trial key. A machine will allow one Professional Plus Trial key installed on it ever. Meaning you can
install a trial on a machine, used it for some time, uninstall Office. When you go back to the Microsoft website and get a new key, the second installation will be rejected with the above error message.
If this is not the situation, try to completely uninstall all the versions of the Office programs from control panel, and then use the suggestions in this KB
article to uninstall it:
How do I uninstall Office 2003, Office 2007 or Office 2010 suites if I cannot uninstall it from Control Panel?
http://support.microsoft.com/kb/290301
Then, reinstall the Office 2010 program.
Best Regards,
Sally Tang -
Need help with Diffie-Hellman key-exchange protocol
How can i show that the Diffie-Hellman key-exchange protocol is vulnerable to a man-in-themiddle
attack and Devise a protocol using digital signatures which overcomes this vulnerabilityGiven that the error is "Invalid Parameters", you might want to show us how "dhparameters" is being set up on both sides...
Grant -
[new] keychain [ssh-keys manager]
PKGBUILD
pkgname=keychain
pkgver=2.4.2.1
pkgrel=1
pkgdesc="A ssh-keys manager"
url="http://www.gentoo.org/proj/en/keychain/index.xml"
license="GPL"
depends=('bash')
source=(http://dev.gentoo.org/~agriffis/keychain/$pkgname-$pkgver.tar.bz2)
md5sums=('38d851edf4e1fae518d763e835b9dc43')
build() {
cd $startdir/src/$pkgname-$pkgver
mkdir -p $startdir/pkg/usr/bin
install -m0755 keychain $startdir/pkg/usr/bin/keychain
Read my wiki entry to ssh-keys and you know what it's used for
http://wiki.archlinux.org/index.php/using%20SSH-keys
EDIT:
it's in STAGING now so you can get it from thereI only just realized, that the key stays unlocked across a reboot and that even though I set the keychain up to lock after 5 Minutes and on hibernating. This is just broken. What could I have possible done wrong?
-
??? about - Key management/Clear secure boot keys/Key ownership - in BIOS
Hi!
Could anybody explain the options in BIOS
Key management
Clear secure boot keys - Don't clear
Key ownership - HP keys
Waht does mean "keys"... what is this? I don't have any idea...
What will happen if I change it to CLEAR?
Thank you.
P.S. I tried to Google some info but unsuccessfully...Hi,
HP has not published and posted any official documentation pertaining to operating system signature keys.
Review this Microsoft article.
HP DV9700, t9300, Nvidia 8600, 4GB, Crucial C300 128GB SSD
HP Photosmart Premium C309G, HP Photosmart 6520
HP Touchpad, HP Chromebook 11
Custom i7-4770k,Z-87, 8GB, Vertex 3 SSD, Samsung EVO SSD, Corsair HX650,GTX 760
Custom i7-4790k,Z-97, 16GB, Vertex 3 SSD, Plextor M.2 SSD, Samsung EVO SSD, Corsair HX650, GTX 660TI
Windows 7/8 UEFI/Legacy mode, MBR/GPT -
Ssh client with key management
hi,
i search of a ssh client with rsa/dsa key management, and i can't find one
thanks
CNot sure precisely if this is what you're looking for, but Fugu
http://rsug.itd.umich.edu/software/fugu/
seems to be a pretty effective SSH client, with graphical interface.
Does running shh from the Terminal (command line) do what you need? -
Please add SSH, SFTP and SCP in CMD and File Explorer.
Also, allow us to copy to FTP in File Explorer.
Would be nice to have the SSH credentials managed by Windows Credentials Manager.Even with the RHEL firewall completely disabled, it has the same upper limit. SCP between the Solaris systems, with ipfilter running on both systems and both systems on completely different networks, is not a problem. Between Solaris and RHEL, same network but different subnet, RHEL with no firewall running (only while troubleshooting this, don't panic), still a problem. Using PuTTY SFTP from/to any of the systems is fine, even though on different networks. The mtu on the RHEL was the same as the Solaris systems (1500) - changing values on the RHEL increased the upper limit but still hit a ceiling. Only have one RHEL system so I can't see whether RHEL-RHEL transfers are affected, only those between Solaris, PuTTY on Windows, and the one RHEL system.
-
How to create HMAC256 Key from Key Manager (SAP SWIFT Integration Package)
Hi,
I am not sure how to create key HMAC Key. There is 2 input
Key id = .............
Key value = .................
I have tried many times but still having below errors message.
com.sapcons.xi.swift.CryptServiceException: Parameter key Value is invalid
Is there any documentation on this ?
Thank You and Best Regards
HidayatSolved.
Key Value Length must be 32 bytes.
The first 16 digit must be at least 1 number, 1 upper case, 1 lower case.
The seconds 16 digit also the same.
each character cannot repeated more than 7 times per each halft.
There is no documentation about this, i just extract the SCA file and check the program logic. -
Office Standard 2013 Key Management Service host 32-bit or 64-bit version ?
Hello,
I have a 2012 DomainController serving as our KMS host.
I need to activate 2013 Lync 32-bit clients so I will have to install the office 2013 KMS host.
The KMS host download is available in both 32-bit and 64-bit.
Should I download the 64-bit version because the 2012 OS is 64 bit or will I download the 32-bit host since the Office version we use is 32-bit?
BR
Sverre AmundsenHi,
Based on my understanding, I suppose that you want to activate 32-bit version of Lync 2013. Is it right?
If so, you can only install 32-bit version of Office 2013 on your PC. The 32-bit and 64-bit versions of Microsoft Office programs don’t get along, so you can only have one type installed at a time. If you mix 32-bit and 64-bit version installed
on the same PC, you might see some errors.
Reference about why can’t I install both the 32-bit and 64-bit versions of Office 2013:
http://office.microsoft.com/en-001/access-help/why-cant-i-install-both-the-32-bit-and-64-bit-versions-of-office-2013-HA103523746.aspx
By the way, there is an article about choosing 32-bit or 64-bit version of Office.
http://office.microsoft.com/en-001/support/choose-the-32-bit-or-64-bit-version-of-office-HA102840825.aspx
Best regards,
Greta Ge
TechNet Community Support
It's recommended to download and install
Configuration Analyzer Tool (OffCAT), which is developed by Microsoft Support teams. Once the tool is installed, you can run it at any time to scan for hundreds of known issues in Office
programs. -
Cisco Key Integrity Protocol (CKIP) on MacBook Pro with OS X 10.5.5
I'm not able to configure the access to my company wireless network which uses LEAP CKIP security. Is it even possible and if yes how to configure it?
I appreciate any tips and hints very much...I don't believe there's a way to connect using CKIP on Mac OS X, especially as it was just a temporary bridge between WEP and WPA, and even Cisco eventually abandoned it in favor of WPA.
Maybe you are looking for
-
Hi all, I use top of page to print page number for ALV report. When i run my report in backgrond and see the spool, the page is always started from page 2. These does not happen when I use non-ALV report, report prints the header starting from page 1
-
Username with ascii characters
Hello, i'm having and html form and i would like the user in the username field to type ONLY ascii characters. For example, in other fields of the form i would like the user to type his mother language but as far as the username and password fields a
-
Need to Backup all App's and Files to move to a newer powerbook g4
Apple wants me to send in my p.book mostly due to hot spots on the screen. They said they will have to wipe it clean and may wind up just sending me a new p.book. I don't know if they will just send a refurbished p.book that is the exact same model a
-
Can't open RAW in Photoshop CS5?
Can't open RAW-files in Photoshop CS5. It all worked okej in CS3. Now Photoshop tells me it's a disk error "skivfel". Converting to DNG won't help. Desperate!
-
Firefox/Thunderbird Updates - Solaris 10 8/07 (update 4)
Hello, Firefox and TB are bundled in the latest Solaris 10 release (8/07). How does that release handle updates to these packages? Can one manually install Mozilla updates in Sun package format over the bundled software? Or will all FX/TB updates be