Login modification Tracking

Hi,
     In my environment One application user had Read access in a database, but all of sudden the access is revoked. I don't know how it happened. Other than me no one has Admin access in the server.. Is there any way to track when the
change happened?

-- Try this code....
DECLARE @FileName
VARCHAR(MAX) 
SELECT @FileName
= SUBSTRING(path,
0, LEN(path)-CHARINDEX('\',
REVERSE(path))+1) +
'\Log.trc' 
FROM sys.traces  
WHERE is_default
= 1; 
SELECT  
     o.name,  
     o.OBJECT_ID, 
     o.create_date,
     gt.NTUserName, 
     gt.HostName, 
     gt.SPID, 
     gt.DatabaseName, 
     gt.TEXTData
FROM sys.fn_trace_gettable(
@FileName,
DEFAULT ) AS
gt 
JOIN tempdb.sys.objects
AS o  
     ON gt.ObjectID
= o.OBJECT_ID 
WHERE gt.DatabaseID
= 2
  AND gt.EventClass
= 46 -- (Object:Created Event from sys.trace_events) 
  AND o.create_date
>= DATEADD(ms, -100,
gt.StartTime)  
  AND o.create_date <=
DATEADD(ms,
100, gt.StartTime)
Raju Rasagounder Sr MSSQL DBA

Similar Messages

  • ACS 5.1 login snmp tracking

    Hello sirs,
    Could you please answer a little question.
    Is it possible to track failed login attempts to ACS instances  (both on CLI and web GUI) by snmp?
    Unfortunately i haven't found such option in
    Monitoring and Reports >
    Alarms >
    Thresholds >

    I've figured out how to monitor failed attempts via syslog. However there is another trouble. We've many servers in a distributed deployment. Syslog set to global on all servers through our primary server (syslog writes to the syslog server and log collector). Log collector placed on the secondary server. Syslog server receives log messages about administrator logins  to the primary server, but it hasn't received any messages from another servers in deployment. I've changed settings on the primary server and it seem's that on secondary servers this setting was changed automatically (according to GUI). What can be source of problem? All related ports on fw's are open.
    And there is another issue. Is that possible to monitor CLI login attempts through syslog?
    I've found only this messages in catalog:
    10006     INFO     Administrator Authentication and Authorization     AAC     Administrator authentication failed
    33103     INFO     Internal Operations Diagnostics     CLI     User login to ACS configuration mode failed
    51000     NOTICE     Administrative and Operational Audit     Administrator-Login     Administrator authentication failed
    Sorry for my poor English.

  • Customer login session tracking questions

    Hi,
    I work for a research support group at a university. We have a mixed platform environment. The nature of the services we provide requires that we bill for time spent on out compute devices.
    There are a couple of questions in this posting. The fundamental one though is -- for 10.4 and higher Macs running on Intel and non-Intel hardware what is the "best" solution to track login sessions for our customers? A session has to include the concepts of logging in and out from the console or remote (ssh) access to the machine(s).
    I am interested in Apple native and third party or open source solutions. I need to track/log that customer-X logged in to machine-M at dateTime-T and logged out at dateTime-T'. I also need to know if the machine was (re)booted or had some other action occur that would impact a customer login session.
    So the main question is, are there existing customer session tracking solutions?
    I have an existing home grown (non-Intel) solution that works well on non-Intel macs and other *nix boxes. It is a daemon that reads accumulated, rotated wtmp files and then "hangs" on the current wtmp file waiting for and processing session records as they arrive.
    This worked like a champ until we installed our first Intel Mac. I re-compiled the C code that uses the utmp.h include files and structs to get at the info but it silently fails. I received some advice on changing my make file and am currently using:
    # Mac OS
    CC = gcc -Wall -g
    CFLAGS = -I/usr/include/mysql -isysroot \
    /Developer/SDKs/MacOSX10.4u.sdk -arch ppc -arch i386 \
    -framework CoreServices
    LDFLAGS = -L/usr/lib/mysql -lmysqlclient -lz \
    -Wl,-syslibroot,/Developer/SDKs/MacOSX10.4u.sdk \
    -arch ppc -arch i386
    PLATFORM = osx
    wtmp_parser: wtmp_parser.c
    ${CC} ${CFLAGS} -o $@ $? ${LDFLAGS}
    /bin/mv $@ $@.${PLATFORM}
    Again, this compiles without error but silently fails. I don't know anything about compiling on any Macs, much less these new ones. Ideas are greatly appreciated.
    Lastly, I have started reworking the whole setup and may move it all to perl. Here I can read the wtmp files easily using unpack() even on the Intel Macs. I can daemonize the thing but I'm stumbling a bit on one issue.
    I have noticed in the past that there can be a sort of race condition during the wtmp rotation on some machines where the active wtmp gets rotated but the old logging still writes one or two records to the rotated file before switching to the new one. I was starting to look into a programmatic solution for this when I looked at the rotated wtmp files on this one machine and I see file dates of:
    Dec 5 15:29 wtmp
    Oct 1 01:47 wtmp.0.gz
    Aug 29 16:05 wtmp.1.gz
    Aug 1 05:29 wtmp.2.gz
    Jul 31 18:26 wtmp.3.gz
    May 31 2007 wtmp.4.gz
    Okee... I know there is a /etc/monthly script that should be doing the rotation but it looks like it is not doing what I expect. It seems that it is not rotating all the existing files correctly. Ideas?

    I am done. Sorry for bothering

  • I have lost the ability to log into find my iPhone using my daughters iTunes login to track her while she's driving

    I have lost the ability to track my daughters phone using her log in for find my iPhone since updat

    Does she have her own iCloud account?  You can have more than one iCloud account installed on a device, and some users install a secondary iCloud account which is common to others in the family to allow "Find My iPhone" to be used from one account while keeping separate iCloud contacts, mail, etc.
    But with iOS 7 although you can still have multiple iCloud accounts installed, only the "primary" iCloud account supports "Find my iPhone".  So if her iCloud account is the primary, you can no longer track her from your iCloud account.  Is that what happened in your case?

  • How to view history of data after enableing the Change Tracking

    Hi All,
    I have enabled the track changes using MDM Console. But now I unabled to view the last values of the fields which were updated. I also could not find any option in MDM Data Manager to view the last values of the fields. Please help me to view the track changes/history of data.
    I appreciate your prompt response
    Shahid Nadeem

    Hi
    The steps are clearly detailed in a blog by
    Change Tracking in MDM
    Bala Subbaiah Gorla
    Business Card
    Company: Wipro Limited
    Posted on Sep. 08, 2006 09:40 AM in Master Data Management (MDM)
    You can look at the blog or I can email you the document .
    Here are some of the tips from the blog
    Hope this will solve your problem.
    Change Tracking is a feature in SAP MDM, Using which we can track history of table records for the repositories. There are three are options, Track Adds, is track new field value when a record added. Track Modifies, track old and new values when the field is modified. Track Deletes, tacks old-field value when a record is deleted. In addition, for each type of change you can track, the setting of the root node of the Tables and Fields hierarchy determines the default setting for new tables added to the MDM repository. Similarly, for normal tables, the setting for each table node determines the default setting for new fields added to the table. Finally, the setting for each field node determines the actual setting for the field
    Step I>>Activate Change Tracking.
    Navigate the Selected repository,
    (your repository)>Admin>Change Tracking.
    Click on Change Tracking, you will get Change Tracking Setting screen. Then choose the level of tracking root node of Table and Fields. In addition, there are three type tracking. That are Track Adds>>this option tracks new field value when a record is added, Track Modifies >> this option tracks old and new values when the field is modified, and Track Deletes >> this option tracks old field value when a record is deleted
    Step III>>Logon to MS SQL Server
    Start>Programs>Microsofr SQL Server-->Enterprise Manager,See the screen shot below for SQL Server logon.
    You will get the SQL Server Enterprise Manager. See the screen below. Select the Database for the respective Repository (BP3_Customer_Workshop). For the each repository, there are two databases XXXX_m000 and XXXX_z000.
    There are two databases CustomerWorkshop_M000 and CustomerWorkshop_Z000
    Select the table A2i_CM_History under the CustomerWorkshop_Z000 and select query as below screen.
    Choose/select the fields that you want execute the report/show.
    You can find the record, which I (the user name 'mdmg') have edited at 9/6/2006 11:44:39, as seen below screen
    Thanks
    Prashanta
    PS :  Pls reward helpful answer

  • McAfee EEMAC Login pass through

    Our Security team at my company wants to install McAfee's Endpoint Encryption on our Mac laptops. Our Macs are bound into AD and end users login with a user ID and password.
    McAfee's Endpoint Encryption login modifies the boot process so that the user logs into McAfee first (AD user ID and password) and then gets to the Mac login screen. I'm wondering if anyone else has a similar configuration, but has developed a login hook to pass through the McAfee user authentication to the Mac's login so the end user only has to login one time.
    Any advice is appreciated... thanks!

    Two problems with trying that:
    a) Not an available option If Iopen the control panel I see eight options: System & Security, Neytwork & Internet, Harware & Sound, Program, User Accounts and Family Safety, Appearance and Personalization, Clock, Language, and Region, and Ease of Access. No "Change Bionmetric Settings".
    This Winodws 7 Pro 64 bit
    b) I could have done more on introduction but didn't see the need. While these little computers aren't THAT familiar to me I am retired from decades in the cypher mines in the world of large mainframes. So Iknow SOMETHING about the problem. When Windows is booting up it will start a number of tasks (services) ending with the one that will prodiuce the log in screen. Or in this case, two such routines, one first dsplaying the fingerprint log in screen, then, after a few seconds,  running another routine that brings up the normal password sign in screen. At least, that's what happens wen it doesn't "stall" .
    I am asking if anybody can tell me how I turn off the first. It isn't clear that turing off the device that this first routine is trying to access wouldn't make things even worse (unclear that disabling thdevice would remove the routine from the liust of things Windows does when coming up -- perhaps the "stall" is even relted to it not getting a "ready" response form the fingerprint reader).
    I am new to Windows7. If still under Windows XP I know there is something that I run that brings up the "things to do while starting up" where you can check or uncheck things (I'd have to find my notes to give more details) but I don't know what that would be under Windows 7 nor, if I got there, the name of the "fingerprint log in" routine to uncheck nor the name of the routine to check that devices without a fingerprint reader would use.
    PROBLEM STILL OPEN

  • Custom field in Create Bid Invitation..

    Hi,
       I have to add a custome field in the 'Create Bid Invitation - Find bid invitation - Extended Search screen. has anyone done this same scenario.
    john.

    hi,
    I dont think you can add custom field at the item overview level.
    There is nothing in standard for CUF in item overview.
    CUF are available in Header/item basic data, accounting and search screens, but nothing in item overview.
    The only workaround which i can see is to modify the HTML page in the Internet Service .
    You can try to use some standard field which stores the information you want to display (instead oc creating a custom field).e.g.If you want to display the Product CAtegory in addition to its description on the item overview screen(Table control),then you will have to find out the std field which stores the Prod category value.
    If the standard populates that field  with the info you require you'll not have to populate it yourself: so check it.
    Be careful to add this column as the last column in the Table control, as the template refers to column numbers for existing data.
    Then change the template  in order to manage the field display in the different cases (selection and display).
    DO NOT COPY STANDARD PROGRAM, or you will loose modification tracking during upgrade or SP applications.
    Be careful. The same HTML templates of the Internet Service are (shared) used for all the users. So be very sure in making changes to the standard HTML template and publishing those changes. Incase of shortdumps here, you need to go through each line in the Service to see the cause of the error(which might be as silly as missing a comma, bracket, period after a line). SAP dump analysis is not much help here.
    BR,
    Disha.
    Pls reward  points for useful answers.

  • Whitelist Helpdesk User

    Hey,
    From the interface a user with the permission of "Helpdesk User", is there a way to allow them to add a blocked email to the users whitelist? If we hand out helpdesk user logins to our customer support team, and a subscriber calls in with a request about some blocked mail, the helpdesk user can login and release the message, but that doesn't help the sub for future requests. There needs to be a way for the helpdesk user to add that email to the whitelist as an option. Is there anything like the currently or coming down the road?
    Matt

    I understand that through the end user quarantine, the user can add it to the Safe or Black lists. But having the option for a helpdesk user to login and track messages, but then tell a customer that they need to login and whitelist the email address becomes a burden. There should or needs to be a way for the helpdesk user to add an email to a users whitelist or blacklist when looking through the quarantine. This can easily be done using the quarantine search of a helpdesk user and having the option to whitelist or blacklist a message when it is found through the advanced search. You have the full message, sender, to, etc to do such a function. Any hopes in getting this added into the interface? Maybe a nice needed API to help do this?
    Matt

  • Re: How do I keep an application from being started morethan once?

    Here are some quick ideas. None of them should be too hard to implement,
    although each has some drawbacks.
    1. Have a login server track who is logged on, and if there is already a
    logon for a given user or a given machine, then deny the application
    startup. The nice thing about this is that a user will not be able to have
    multiple logins even by going to another machine. Then again, this may not
    be so nice, and you also get a possible single point of failure on the
    login server for which you will have to prepare.
    2. Drop to the operating system, and get a list of processes for the client
    machine. If the name of one of them matches the name of application that
    is being run, then deny startup. This avoids a network hit, but requires
    some OS specific code. Also, a clever user could change the name of an
    executable to get around this. Note that a user could have another login
    on another machine.
    3. Write to a file on the local machine. You can hide the file in some
    suitable place, and can also scramble some information so that a user
    cannot get around having this file present by reading from the file at
    startup and then writing to it. Based on the state of your application,
    the file will have some scrambled information indicating if an instance of
    an application can be started. If you retain the write lock (i.e. do not
    close) the file for the duration of the application, you increase your
    security at the risk of a confused user if the application gets terminated
    without releasing the lock. Depending on the OS where the client will run,
    this could be an issue. If you like this option, perform some experiments
    first on all configurations of an example client machine to determine the
    behavior. Again, this only works to prevent an extra login on a single
    machine, not system wide.
    If you are not concerned about your users hacking around too much and don't
    care about a login on another machine, I would opt for some version of
    number 3. Otherwise, I would venture number 1.
    Regards
    CSB
    At 07:47 AM 2/18/98 -0500, Martin G Nystrom wrote:
    A user can launch an application, then launch it again. How do we make it so
    that the user can only run one instance of the application?
    Martin Nystrom
    Eli Lilly and Company
    ([email protected])
    Curtis Bragdon, Senior Consultant, Forte Software
    [email protected]
    Voice Mail: (510) 986-3807
    Paging: (888) 687-6723
    "I've seen dozens of triggering towns." - Richard Hugo

    Yet another quick and dirty solution is to use local ExternalConnections.
    This is a single instance per machine solution.
    Example is attached.
    (See attached file: TestOne.pex)
    [email protected] on 02/18/98 10:01:07 PM
    Please respond to [email protected]
    To: [email protected]
    cc: [email protected]
    Subject: Re: How do I keep an application from being started more than
    once?
    Martin,
    there are two ways to read your question
    (a) no more than one instance of an application per machine
    (b) no more than one instance of an application per "user"
    now if a user has only one machine, and your system has "userids" and you
    only want
    one active "session" per "user" then the distinction is irrelevant.
    However, many systems
    let people share logins, so a token based thing enforcing one login will be
    problematic.
    The downside of #1 approach suggested by Curtis happens when a machine gets
    hosed without "logging" the user off the security system, then they can't
    get in until their ticket expires or a sysadmin gets involved. Should be
    manageable, however. But this enforces one application
    instance per user, unless you check both for the presence of an active
    token for that user as well as the presence of a token tied to that
    particular node name. Otherwise there is nothing to prevent the same user
    from launching the app again and logging in as a different user. This is
    definitely the best approach of the bunch, and can be adapted for either
    (a) or (b).
    Suggestion # 2 won't work unless the application is built as a compiled
    client,
    since the process name will be 'ftexec' and not the "name" of the
    application. And it doesn't
    prevent a user from launching the app from a different machine (or people
    sharing logins). So again it depends on what you are trying to achieve.
    #3 also only prevents multiple instances per machine, not necessarily by
    user. Of course
    most people don't have multiple machines. The point is that you may be
    trying to
    prevent your users from sharing logins. In which case the file thing won't
    do it.
    Some other ideas:
    1. You could, however, enforce one application per machine using the
    installed partition agent's ExecutingPartition instrument name. As long as
    the user doesn't run the app in a different environment, you can have the
    app check at startup time if there is another
    ActivePartition running under the same InstalledPartition name.
    (ActivePartitions are child agents
    of InstalledPartitions).
    2. use the ObjectLocationManager and bind a simple object into the naming
    system using a naming scheme such as
    /MyApplication/MyNode or
    /MyApplication/MyUserId
    the presence of either one would indicate that another instance of that
    application is running on either that machine or that user. Of course
    these have to be cleaned out, and subject to similar downside as
    alternative #1. So you'd essentially be using the forte naming system as a
    distributed lock manager (ouch).
    3. Have the application remove the shortcut to launch it upon startup, and
    recreate it when it is finished, or move it to a hidden place. There it
    is - the worst idea I've ever come up with. Don't
    do this!
    Regards,
    John
    From: Curtis Bragdon <[email protected]>
    Date: Wed, 18 Feb 1998 16:36:58 -0500
    Subject: Re: How do I keep an application from being started more than
    once?
    Here are some quick ideas. None of them should be too hard to implement,
    although each has some drawbacks.
    1. Have a login server track who is logged on, and if there is already a
    logon for a given user or a given machine, then deny the application
    startup. The nice thing about this is that a user will not be able to have
    multiple logins even by going to another machine. Then again, this may not
    be so nice, and you also get a possible single point of failure on the
    login server for which you will have to prepare.
    2. Drop to the operating system, and get a list of processes for the client
    machine. If the name of one of them matches the name of application that
    is being run, then deny startup. This avoids a network hit, but requires
    some OS specific code. Also, a clever user could change the name of an
    executable to get around this. Note that a user could have another login
    on another machine.
    3. Write to a file on the local machine. You can hide the file in some
    suitable place, and can also scramble some information so that a user
    cannot get around having this file present by reading from the file at
    startup and then writing to it. Based on the state of your application,
    the file will have some scrambled information indicating if an instance of
    an application can be started. If you retain the write lock (i.e. do not
    close) the file for the duration of the application, you increase your
    security at the risk of a confused user if the application gets terminated
    without releasing the lock. Depending on the OS where the client will run,
    this could be an issue. If you like this option, perform some experiments
    first on all configurations of an example client machine to determine the
    behavior. Again, this only works to prevent an extra login on a single
    machine, not system wide.
    If you are not concerned about your users hacking around too much and don't
    care about a login on another machine, I would opt for some version of
    number 3. Otherwise, I would venture number 1.
    Regards
    CSB
    At 07:47 AM 2/18/98 -0500, Martin G Nystrom wrote:
    A user can launch an application, then launch it again. How do we make itso
    that the user can only run one instance of the application?
    Martin Nystrom
    Eli Lilly and Company
    ([email protected])
    Curtis Bragdon, Senior Consultant, Forte Software
    [email protected]
    Voice Mail: (510) 986-3807
    Paging: (888) 687-6723
    "I've seen dozens of triggering towns." - Richard Hugo
    John Jamison
    Vice President of Technology
    Sage IT Partners, Inc.
    415 392 7243 x 306
    [email protected]

  • Workflow - Checkout records for Record update

    Hello,
    I am creating a Record maintenance workflow which will be triggered automatically for "Record Updates". In the start step of the workflow, I am checking out the record and in the stop step, I am checking in the record. When the user updates a record and saves it, MDM is saving the record and launching the workflow which checks out the record. Is there a way to check out the record before the record is saved and still have the workflow trigger automatically? Is this something that can be done in SAP MDM or a product limitation??
    Thanks.

    Hi,
    No we Cannot check out the records before it saved.
    However we can trace the changes made in the records using Change Tracking Table .The Change Tracking table is an MDM system table with a predefined set of fields, and records that are not directly visible in either the MDM Console or the MDM Client. Each record is created automatically by MDM when the value of any field that you are tracking is changed, providing an audit log of changes within the system.
    For each change, MDM records the date, the time, the user who made the change, the old value, and the new value.
    The change tracking settings for the tables and fields are displayed in a hierarchy in the Name column in a grid within the Change Tracking Detail pane, as shown in the figure below. Each normal table is represented by an internal node and each of its fields by a leaf node. For each field, you can specify whether to track changes of the following types by selecting from the radio button grid control in the corresponding column:
    ·        Track Adds
    – track new field value when a record is added
    ·        Track Modifies
    – track old and new values when the field is modified
    ·        Track Deletes
    – track old field value when a record is deleted
    For each type of change you can track, the setting of the root node of the Tables and Fields hierarchy determines the default setting for new tables added to the MDM repository. Similarly, for normal tables, the setting for each table node determines the default setting for new fields added to the table. Finally, the setting for each field node determines the actual setting for the field.
    The list of fields includes the following virtual fields:
    §         Field in the main table, which you can use to track changes to the attribute values of a taxonomy lookup field
    §         in a taxonomy table, which you can use to track the following:
    ·         The addition of new attributes
    ·         The deletion of existing attributes
    ·         Changes to the attribute name
    You can only change the settings for the Change Tracking table for an MDM repository that is mounted and unloaded.
    You can change all the tables and fields to the same setting as a group by changing the default setting of the root node.
    You can change all the fields of a table to the same setting as a group by changing the default setting of the table node.
    I hope this helps u.
    Regards
    Nisha

  • [solved] Questions about pacman -Qk and -Qkk output.

    I was looking through the pacman manual today to see if there was anything I could add to a some Arch maintenance scripts I've been working on and came across -Qk which, among other things, lists missing files. I ran pacman -Qk in terminal and found a few package installations were missing files. I reinstalled them manually check again and the files were no longer missing. The first package I saw that was missing a file was gnome-command-center for instance.
    So I really have two questions.
    1) Is it normal for packages to have missing files?
    2) Is it a good idea to reinstall these packages to replace the missing files.
    I then ran pacman -Qkk, and got even more disturbing information such as modification time mismatches and size mismatches.
    $ pacman -Qkk |grep warning
    warning: avahi: /etc/avahi/avahi-daemon.conf (Modification time mismatch)
    warning: avahi: /etc/avahi/hosts (Modification time mismatch)
    warning: avahi: /etc/avahi/services/sftp-ssh.service (Modification time mismatch)
    warning: avahi: /etc/avahi/services/ssh.service (Modification time mismatch)
    warning: avahi: /usr/lib/avahi/service-types.db (Modification time mismatch)
    warning: avahi: /usr/share/avahi/service-types (Modification time mismatch)
    warning: bash: /etc/bash.bash_logout (Modification time mismatch)
    warning: bash: /etc/bash.bashrc (Modification time mismatch)
    warning: bash: /etc/skel/.bash_logout (Modification time mismatch)
    warning: bash: /etc/skel/.bash_profile (Modification time mismatch)
    warning: bash: /etc/skel/.bashrc (Modification time mismatch)
    warning: bluez: /etc/bluetooth/main.conf (Modification time mismatch)
    warning: bluez: /etc/dbus-1/system.d/bluetooth.conf (Modification time mismatch)
    warning: ca-certificates-java: /etc/default/cacerts (Modification time mismatch)
    warning: cdrtools: /etc/default/cdrecord (Modification time mismatch)
    warning: cdrtools: /etc/default/rscsi (Modification time mismatch)
    warning: chromium: /etc/chromium/default (Modification time mismatch)
    warning: chromium: /etc/chromium/default (Size mismatch)
    warning: colord: /var/lib/colord (UID mismatch)
    warning: colord: /var/lib/colord (GID mismatch)
    warning: dhcpcd: /etc/dhcpcd.conf (Modification time mismatch)
    warning: e2fsprogs: /etc/mke2fs.conf (Modification time mismatch)
    warning: filesystem: /etc/crypttab (Modification time mismatch)
    warning: filesystem: /etc/fstab (Modification time mismatch)
    warning: filesystem: /etc/fstab (Size mismatch)
    warning: filesystem: /etc/group (Modification time mismatch)
    warning: filesystem: /etc/group (Size mismatch)
    warning: filesystem: /etc/gshadow (Permissions mismatch)
    warning: filesystem: /etc/gshadow (Modification time mismatch)
    warning: filesystem: /etc/gshadow (Size mismatch)
    warning: filesystem: /etc/host.conf (Modification time mismatch)
    warning: filesystem: /etc/hosts (Modification time mismatch)
    warning: filesystem: /etc/issue (Modification time mismatch)
    warning: filesystem: /etc/ld.so.conf (Modification time mismatch)
    warning: filesystem: /etc/motd (Modification time mismatch)
    warning: filesystem: /etc/mtab (Modification time mismatch)
    warning: filesystem: /etc/mtab (Symlink path mismatch)
    warning: filesystem: /etc/nsswitch.conf (Modification time mismatch)
    warning: filesystem: /etc/passwd (Modification time mismatch)
    warning: filesystem: /etc/passwd (Size mismatch)
    warning: filesystem: /etc/profile (Modification time mismatch)
    warning: filesystem: /etc/resolv.conf (Modification time mismatch)
    warning: filesystem: /etc/resolv.conf (Size mismatch)
    warning: filesystem: /etc/securetty (Modification time mismatch)
    warning: filesystem: /etc/shadow (Permissions mismatch)
    warning: filesystem: /etc/shadow (Modification time mismatch)
    warning: filesystem: /etc/shadow (Size mismatch)
    warning: filesystem: /etc/shells (Modification time mismatch)
    warning: flashplugin: /etc/adobe/mms.cfg (Modification time mismatch)
    warning: flashplugin: /etc/adobe/mms.cfg (Size mismatch)
    warning: glibc: /etc/locale.gen (Modification time mismatch)
    warning: glibc: /etc/locale.gen (Size mismatch)
    warning: gnome-control-center: /usr/share/polkit-1/rules.d/gnome-control-center.rules (Permission denied)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/GnoMenu (Modification time mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/GnoMenu (Size mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/GnoMenu.conf (Modification time mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/GnoMenu.conf (Size mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/auto-load.conf (Permissions mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/auto-load.conf (Modification time mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/auto-load.conf (Size mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/icon (Modification time mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/icon (Size mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/preview (Permissions mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/preview (Modification time mismatch)
    warning: gnomenu: /usr/share/cairo-dock/plug-ins/Dbus/third-party/GnoMenu/preview (Size mismatch)
    warning: grub: /boot/grub/grub.cfg (Permissions mismatch)
    warning: grub: /boot/grub/grub.cfg (Modification time mismatch)
    warning: grub: /boot/grub/grub.cfg (Size mismatch)
    warning: iproute2: /etc/iproute2/ematch_map (Modification time mismatch)
    warning: iproute2: /etc/iproute2/rt_dsfield (Modification time mismatch)
    warning: iproute2: /etc/iproute2/rt_protos (Modification time mismatch)
    warning: iproute2: /etc/iproute2/rt_realms (Modification time mismatch)
    warning: iproute2: /etc/iproute2/rt_scopes (Modification time mismatch)
    warning: iproute2: /etc/iproute2/rt_tables (Modification time mismatch)
    warning: jack: /etc/security/limits.d/99-audio.conf (Modification time mismatch)
    warning: java-common: /etc/profile.d/jre.csh (Modification time mismatch)
    warning: java-common: /etc/profile.d/jre.sh (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/calendars.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/content-types.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/flavormap.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/fontconfig.bfc (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/fontconfig.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/logging.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/net.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/psfont.properties.ja (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/psfontj2d.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/sound.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/tz.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/amd64/jvm.cfg (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/images/cursors/cursors.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/management/jmxremote.access (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/management/jmxremote.password (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/management/management.properties (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/management/snmp.acl (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/security/java.policy (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/security/java.security (Modification time mismatch)
    warning: jre7-openjdk-headless: /etc/java-7-openjdk/security/nss.cfg (Modification time mismatch)
    warning: krb5: /etc/krb5.conf (Modification time mismatch)
    warning: krb5: /var/lib/krb5kdc/kdc.conf (Modification time mismatch)
    warning: libcups: /etc/cups/client.conf (Modification time mismatch)
    warning: libirman: /etc/irman.conf (Modification time mismatch)
    warning: libnl: /etc/libnl/classid (Modification time mismatch)
    warning: libnl: /etc/libnl/pktloc (Modification time mismatch)
    warning: libreoffice-still-common: /etc/libreoffice/bootstraprc (Modification time mismatch)
    warning: libreoffice-still-common: /etc/libreoffice/psprint.conf (Modification time mismatch)
    warning: libreoffice-still-common: /etc/libreoffice/sofficerc (Modification time mismatch)
    warning: libreoffice-still-common: /etc/profile.d/libreoffice-still-common.csh (Modification time mismatch)
    warning: libreoffice-still-common: /etc/profile.d/libreoffice-still-common.sh (Modification time mismatch)
    warning: linux: /etc/mkinitcpio.d/linux.preset (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.alias (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.alias (Size mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.alias.bin (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.alias.bin (Size mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.builtin.bin (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.dep (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.dep (Size mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.dep.bin (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.dep.bin (Size mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.devname (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.softdep (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.symbols (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.symbols (Size mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.symbols.bin (Modification time mismatch)
    warning: linux: /usr/lib/modules/3.16.2-1-ARCH/modules.symbols.bin (Size mismatch)
    warning: lirc-utils: /etc/lirc/lirc_options.conf (Modification time mismatch)
    warning: lirc-utils: /etc/lirc/lircd.conf (Modification time mismatch)
    warning: lirc-utils: /etc/lirc/lircmd.conf (Modification time mismatch)
    warning: lvm2: /etc/lvm/lvm.conf (Modification time mismatch)
    warning: mdadm: /etc/mdadm.conf (Modification time mismatch)
    warning: mime-types: /etc/mime.types (Modification time mismatch)
    warning: mkinitcpio: /etc/mkinitcpio.conf (Modification time mismatch)
    warning: mkinitcpio: /etc/mkinitcpio.conf (Size mismatch)
    warning: mplayer: /etc/mplayer/codecs.conf (Modification time mismatch)
    warning: mplayer: /etc/mplayer/input.conf (Modification time mismatch)
    warning: nano: /etc/nanorc (Modification time mismatch)
    warning: networkmanager: /etc/NetworkManager/NetworkManager.conf (Modification time mismatch)
    warning: openresolv: /etc/resolvconf.conf (Modification time mismatch)
    warning: openssl: /etc/ssl/openssl.cnf (Modification time mismatch)
    warning: pacman: /etc/makepkg.conf (Modification time mismatch)
    warning: pacman: /etc/makepkg.conf (Size mismatch)
    warning: pacman: /etc/pacman.conf (Modification time mismatch)
    warning: pacman: /etc/pacman.conf (Size mismatch)
    warning: pacman-mirrorlist: /etc/pacman.d/mirrorlist (UID mismatch)
    warning: pacman-mirrorlist: /etc/pacman.d/mirrorlist (GID mismatch)
    warning: pacman-mirrorlist: /etc/pacman.d/mirrorlist (Modification time mismatch)
    warning: pacman-mirrorlist: /etc/pacman.d/mirrorlist (Size mismatch)
    warning: pam: /etc/environment (Modification time mismatch)
    warning: pam: /etc/default/passwd (Modification time mismatch)
    warning: pam: /etc/security/access.conf (Modification time mismatch)
    warning: pam: /etc/security/group.conf (Modification time mismatch)
    warning: pam: /etc/security/limits.conf (Modification time mismatch)
    warning: pam: /etc/security/namespace.conf (Modification time mismatch)
    warning: pam: /etc/security/namespace.init (Modification time mismatch)
    warning: pam: /etc/security/pam_env.conf (Modification time mismatch)
    warning: pam: /etc/security/time.conf (Modification time mismatch)
    warning: polkit: /etc/polkit-1/rules.d/50-default.rules (Permission denied)
    warning: pulseaudio-alsa: /etc/asound.conf (Modification time mismatch)
    warning: rhash: /etc/rhashrc (Modification time mismatch)
    warning: rhash: /etc/rhashrc (Size mismatch)
    warning: rsync: /etc/rsyncd.conf (Modification time mismatch)
    warning: rsync: /etc/xinetd.d/rsync (Modification time mismatch)
    warning: samba: /etc/conf.d/samba (Modification time mismatch)
    warning: samba: /etc/logrotate.d/samba (Modification time mismatch)
    warning: samba: /etc/pam.d/samba (Modification time mismatch)
    warning: sudo: /etc/sudoers (Modification time mismatch)
    warning: sudo: /etc/sudoers (Size mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.hostname1.conf (Modification time mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.locale1.conf (Modification time mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.login1.conf (Modification time mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.machine1.conf (Modification time mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.systemd1.conf (Modification time mismatch)
    warning: systemd: /etc/dbus-1/system.d/org.freedesktop.timedate1.conf (Modification time mismatch)
    warning: systemd: /etc/pam.d/systemd-user (Modification time mismatch)
    warning: systemd: /etc/systemd/bootchart.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/coredump.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/journald.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/logind.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/resolved.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/system.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/timesyncd.conf (Modification time mismatch)
    warning: systemd: /etc/systemd/timesyncd.conf (Size mismatch)
    warning: systemd: /etc/systemd/user.conf (Modification time mismatch)
    warning: systemd: /etc/udev/udev.conf (Modification time mismatch)
    warning: systemd: /var/log/journal/remote (GID mismatch)
    warning: texlive-core: /etc/texmf/web2c/updmap.cfg (Modification time mismatch)
    warning: texlive-core: /etc/texmf/web2c/updmap.cfg (Size mismatch)
    warning: util-linux: /etc/pam.d/chfn (Modification time mismatch)
    warning: util-linux: /etc/pam.d/chsh (Modification time mismatch)
    warning: util-linux: /etc/pam.d/login (Modification time mismatch)
    warning: util-linux: /etc/pam.d/su (Modification time mismatch)
    warning: util-linux: /etc/pam.d/su-l (Modification time mismatch)
    warning: vim-runtime: /etc/vimrc (Modification time mismatch)
    warning: vlc: /usr/lib/vlc/plugins/plugins.dat (Modification time mismatch)
    warning: vlc: /usr/lib/vlc/plugins/plugins.dat (Size mismatch)
    warning: xorg-xinit: /etc/X11/xinit/xinitrc (Modification time mismatch)
    warning: xorg-xinit: /etc/X11/xinit/xserverrc (Modification time mismatch)
    warning: xorg-xinit: /etc/skel/.xinitrc (Modification time mismatch)
    warning: xorg-xinit: /etc/skel/.xsession (Modification time mismatch)
    warning: xorg-xinit: /etc/skel/.xsession (Size mismatch)
    warning: yaourt: /etc/yaourtrc (Modification time mismatch)
    I'm assuming all of those are bad. "Warning" rarely sounds friendly, though for those files I've modified myself, such as passwd, shadow, and group, its okay. I assume I can fix msot of these by running # pacman -S {package}?
    Last edited by nstgc (2014-09-14 01:26:04)

     Awk processes the output from pacman, splits it using [white]space[⁣s] as delimiter and prints only first field $1, which is the package name. Those reoccur if several files are involved, so just to be sure, I also used awks sort, maybe that could be skipped or alternatively sort command outside awk used instead. This sorted output gets fed into uniq, which outputs only unique strings coming from input. And that leaves you with the package list.
    Edit: I think those are whitespaces actually, which if I recall correctly include space.
    Edit2: So this might be better and certainly a little faster:
    pacman -S $(pacman -Qkq | awk '{print $1}' | uniq)
    # And this should be even faster, since the output pacman
    # delivers seems to be sorted anyway. Should you parse
    # something else, use my first suggestion instead.
    pacman -Qkq | awk 'BEGIN{ y=0; }; {x=$1; if (x == y){ next; }; print $1; y=x;}'
    Edit3: Out of curiosity I tested different methods measuring execution time with a input file consisting out of 1443 lines from pacman -Qkkq. Here are the results and the bottom is the test script.
    Sun 14 Sep 15:14:26 CEST 2014, Generating input file
    Sun 14 Sep 15:15:22 CEST 2014, Loops: 10
    0 : /tmp/awk-adv.log
    0.01 : /tmp/awk-sort.log
    0 : /tmp/awk-sort-outside.log
    0.002 : /tmp/awk-uniq.log
    Seconds: 0
    Sun 14 Sep 15:15:22 CEST 2014, Loops: 20
    0.001 : /tmp/awk-adv.log
    0.0095 : /tmp/awk-sort.log
    0.0005 : /tmp/awk-sort-outside.log
    0 : /tmp/awk-uniq.log
    Seconds: 1
    Sun 14 Sep 15:15:23 CEST 2014, Loops: 50
    0 : /tmp/awk-adv.log
    0.0096 : /tmp/awk-sort.log
    0.0002 : /tmp/awk-sort-outside.log
    0 : /tmp/awk-uniq.log
    Seconds: 2
    Sun 14 Sep 15:15:25 CEST 2014, Loops: 100
    0.0003 : /tmp/awk-adv.log
    0.0092 : /tmp/awk-sort.log
    0 : /tmp/awk-sort-outside.log
    0.0003 : /tmp/awk-uniq.log
    Seconds: 5
    Sun 14 Sep 15:15:30 CEST 2014, Loops: 200
    0.00045 : /tmp/awk-adv.log
    0.00955 : /tmp/awk-sort.log
    0.0001 : /tmp/awk-sort-outside.log
    0.0006 : /tmp/awk-uniq.log
    Seconds: 8
    Sun 14 Sep 15:15:38 CEST 2014, Loops: 500
    0.00042 : /tmp/awk-adv.log
    0.0094 : /tmp/awk-sort.log
    0.0004 : /tmp/awk-sort-outside.log
    0.00026 : /tmp/awk-uniq.log
    Seconds: 21
    Sun 14 Sep 15:15:59 CEST 2014, Loops: 1000
    0.00034 : /tmp/awk-adv.log
    0.00942 : /tmp/awk-sort.log
    0.00042 : /tmp/awk-sort-outside.log
    0.00025 : /tmp/awk-uniq.log
    Seconds: 42
    Sun 14 Sep 15:16:41 CEST 2014, Loops: 2000
    0.00038 : /tmp/awk-adv.log
    0.009355 : /tmp/awk-sort.log
    0.000285 : /tmp/awk-sort-outside.log
    0.00042 : /tmp/awk-uniq.log
    Seconds: 83
    Sun 14 Sep 15:18:04 CEST 2014, Loops: 5000
    0.000388 : /tmp/awk-adv.log
    0.009274 : /tmp/awk-sort.log
    0.00034 : /tmp/awk-sort-outside.log
    0.000366 : /tmp/awk-uniq.log
    Seconds: 208
    Sun 14 Sep 15:21:32 CEST 2014, Loops: 10000
    0.00036 : /tmp/awk-adv.log
    0.009286 : /tmp/awk-sort.log
    0.000346 : /tmp/awk-sort-outside.log
    0.000358 : /tmp/awk-uniq.log
    Seconds: 419
    Sun 14 Sep 15:28:31 CEST 2014, Loops: 20000
    0.00029 : /tmp/awk-adv.log
    0.009115 : /tmp/awk-sort.log
    0.0002725 : /tmp/awk-sort-outside.log
    0.000299 : /tmp/awk-uniq.log
    Seconds: 828
    Sun 14 Sep 15:42:19 CEST 2014, Loops: 50000
    0.0003174 : /tmp/awk-adv.log
    0.0093014 : /tmp/awk-sort.log
    0.0002422 : /tmp/awk-sort-outside.log
    0.000292 : /tmp/awk-uniq.log
    Seconds: 2171
     The awk internal sorting is the slowest method, but it seems it initializes longer, since there appears to be a constant difference between internal and external sorting. Uniq fed by awk is faster with smaller loops, but gets slower if repeated more often, yet overall remain fastest with the unique function I used within awk. It appears the more lines the input has, the slower uniq in comparison uniq in awk gets. Here is the testing script:
    #!/bin/bash
    LOOPS=('10' '20' '50' '100' '200' '500' '1000' '2000' '5000' '10000' '20000' '50000');
    rm /tmp/results*.log
    echo $(date), Generating input file;
    pacman -Qkkq > /tmp/input.txt
    for LOOP in ${LOOPS[@]}; do
    START=$(date +%s);
    echo $(date), Loops: $LOOP;
    for i in $(seq $LOOP); do env TIME='%e:%U:%S' time awk '{print $1 | "sort" }' /tmp/input.txt | uniq; done 2>&1 >/dev/null | grep : > /tmp/awk-sort.log
    for i in $(seq $LOOP); do env TIME='%e:%U:%S' time awk '{print $1}' /tmp/input.txt | sort | uniq; done 2>&1 >/dev/null | grep : > /tmp/awk-sort-outside.log
    for i in $(seq $LOOP); do env TIME='%e:%U:%S' time awk '{print $1}' /tmp/input.txt | uniq; done 2>&1 >/dev/null | grep : > /tmp/awk-uniq.log
    for i in $(seq $LOOP); do env TIME='%e:%U:%S' time awk 'BEGIN{ y=0; }; {x=$1; if (x == y){ next; }; print $1; y=x;}' /tmp/input.txt; done 2>&1 >/dev/null | grep : > /tmp/awk-adv.log
    for FILE in /tmp/awk-*.log; do awk 'BEGIN{x=0; y=0; FS=":"}; {x++; y=y+$1;}; END{print "\t"y/x"\t:\t"FILENAME;}' "$FILE"; done | sort >> /tmp/results-sorted.log
    for FILE in /tmp/awk-*.log; do awk 'BEGIN{x=0; y=0; FS=":"}; {x++; y=y+$1;}; END{print "\t"y/x"\t:\t"FILENAME;}' "$FILE"; done | tee -a /tmp/results.log
    END=$(date +%s);
    DIFF=$(( $END - $START ));
    echo Seconds: $DIFF;
    done | tee /tmp/awk.log
    Last edited by emeres (2014-09-14 14:38:18)

  • Google Analytics reporting "hidden" file

    If anyone is using Google Analytics, have you come across the
    reporting of a page that doesn't exist?
    For example, the Google report shows
    http://www.domainname.com/customer_serv_MMtmp42a801b0/customer_service.php
    I've used a separate FTP program to login and track down the
    file and it just doesn't exist, as well as the normal DW FTP
    connection.
    Would appreciate any thoughts or suggestions.
    TIA
    SC

    hello, palemoon's support forums are here: http://forum.palemoon.org/

  • Contact me jf u good buyer(YM: jack4share . am sell cc,cvv,cvv2 maill pass

    contact me jf u good buyer(YM: jack4share . am sell cc,cvv,cvv2 maill pass smtp pp login dump track 1 2 ..............)but pls not contact or buzz any jf u want free or spam because am only here for business and never play any
    Hello All Buyer!<<<<<<<<<<<<<<<-im a hacker has been big seller very prestige.
    -i had worked with alot banks on the world by my software
    -When you contact me I need your trust , I only work with reliable buyers.
    -i have sell : - cc,cvv,cvv2( us uk ca au eu inter ..)fresh,good,hight balance and very strong with good price
    - fresh cards dumps(101,201),track1-2,valid-fresh and good working
    -i have agent cc,cvv here.(if u buy over 50cc).I will sell ==>>>good price
    -i have exchange : WU <<<=====>>> LR
    - please contact me by my id or my mail : Yahoo Messenger: jack4share

  • WiFi sometimes, some locations

    No problem connecting to WiFi at home or at work or the Apple Store. At our club, though,the iPad doesn't connect. iPhone4 does, PCs do connect. My iPad does not connect but other iPads do.
    Here is the only discernible difference: I have software version 3.2.2 while the other 2 iPads we tested were running 3.2.0 and 3.2.1.
    Finally got the club to create a new network as a test. The unusable network has one name and the newly created network has 3 names. But both networks are using the same hardware with no other software or login modifications.

    Hi and welcome.....
    Try restoring your wi fi to factory settings.
    Tap Settings on your Home screen then tap General / Reset / Reset Network Settings.
    Restart your iPad and see if that helps.....
    Carolyn

  • A MacBook Air was reported stolen From a room at my hotel that belong to a guest. I request a apple Id and password from the guest in order to track it though iCloud, when I login into the account the MacBook was not their, however I saw other device. A f

    A MacBook Air was reported stolen
    From a room at my hotel that belong to a guest. I request a apple Id and password from the guest in order to track it though iCloud, when I login into the account the MacBook was not their, however I saw other device. A few days has past then the MacBook appear. How does that happened, please explain?

    For a stolen Macbook to appear in iCloud - the person who stole it must turn it on.
    You can't track something that's turned off.

Maybe you are looking for

  • Using 2 different ipods on one computer

    Can someone please help, i have a color ipod set up on my computer, and my friend brought over a original ipod (the same as mine but with no color) and we are trying to put songs on her ipod and mine but for some reason the computer will not recogniz

  • Make the 'ASSIGNMENT FIELD' of particular financial Doc type non-editable

    Hi Experts, We have an done an Z development, where we are populating critical data in the 'ASSIGNMENT FIELD OF gl account' of a newly created  financial document type (ZD).This document is created through BAPI. Now our requirment is to make this 'As

  • Odd iMac sleep issues

    I first noticed the issues a couple of weeks ago - mid-2007 iMac, running SL. The iMac will sleep fine if I use the command in the apple menu or the power button. But it won't sleep automatically as suggested in the Energy Saving preference pane. If

  • Rendering Question

    I have a Sony HD video camera. Nothing special just a nice pro-sumer camera. Whenever I capture the video I can view it just fine in the viewer but when I bring it to my timeline after I have made my in and out points my computer wants me to render t

  • Migration toolkit for RAIMA database to ORACLE database

    We have to migrate a RAIMA database (version 4.5) to an Oracle8i (8.1.7.0.0)database. I found a migration toolkit on the OTN WebSite at the following adress: http://otn.oracle.com/tech/migration/toolkits/content.html the one I can get there, has been