Minimum DB2 resources needed for a WL ConnectionPool to DB2 on UNIX?

I posted this same message to the DB2 group as well....
I want to create a ConnectionPool to a DB2 database using the Weblogic
App Server v6.1 running on UNIX/Solaris 8. The DB2 database that I'd
like to connect to resides on a separate server(on Windows 2K Server)
elsewhere on our network.
What is the bare minimum required to install on the Unix machine to
support this client connection?
To configure the LIGHTEST posible setup on the UNIX machine, do I:
Install the "DB2 Run-Time Client"?
OR
Install the "DB2 Connect for Unix"?
OR
Neither?
After one of these is installed, do I: (again, what is the minimum
required?)
Do I need to create an instance? (with associated users & groups)
OR
Do I need to configure an Administration Server?
OR
BOTH?
OR
Neither?
I know I need to include the db2driver.zip and the db2home/lib in WL's
environment variables within the Weblogic App Server. Anything else?
I have found the following settings on the web to configure the
ConnectionPool but I'm unsure of a couple values:
URL:          jdbc:db2:???? (not sure what to put here)
CLASSNAME:      COM.ibm.db2.jdbc.app.DB2Driver
PROPS:          (what are the Required (minimum) props for a connection?)
user,pwd,server(?)

If you use the DB2 driver from Data Direct, it is a type 4 driver. You only need 3 jar files
(the type 2 driver from IBM installs about 60Meg of data on your drive).
"Stephen Felts" <[email protected]> wrote in message news:[email protected]...
Using IBM's drivers, you install the DB2 Runtime Clients V8.1 (multiple languages).
Then you can follow the documentation from WLS 8.1 (even if running 6.1, except
ignore the sentence about using the JDBC Connection Pool Assistant, which is new
in 8.1b - you will need to type everything in yourself).
The documentation has a sample excerpt from the config.xml.
See http://e-docs.bea.com/wls/docs81/jdbc/thirdparty.html#1096721.
The documentation also mentions using the Client Configuration Assistant.
Using the DB2 command line processor, you need to enter something like
catalog tcpip node <nodename> remote <servername> server <port_number>
catalog database <databasename> as <aliasname> at node <nodename>
"Bobb" <[email protected]> wrote in message news:[email protected]...
I posted this same message to the DB2 group as well....
I want to create a ConnectionPool to a DB2 database using the Weblogic
App Server v6.1 running on UNIX/Solaris 8. The DB2 database that I'd
like to connect to resides on a separate server(on Windows 2K Server)
elsewhere on our network.
What is the bare minimum required to install on the Unix machine to
support this client connection?
To configure the LIGHTEST posible setup on the UNIX machine, do I:
Install the "DB2 Run-Time Client"?
OR
Install the "DB2 Connect for Unix"?
OR
Neither?
After one of these is installed, do I: (again, what is the minimum
required?)
Do I need to create an instance? (with associated users & groups)
OR
Do I need to configure an Administration Server?
OR
BOTH?
OR
Neither?
I know I need to include the db2driver.zip and the db2home/lib in WL's
environment variables within the Weblogic App Server. Anything else?
I have found the following settings on the web to configure the
ConnectionPool but I'm unsure of a couple values:
URL: jdbc:db2:???? (not sure what to put here)
CLASSNAME: COM.ibm.db2.jdbc.app.DB2Driver
PROPS: (what are the Required (minimum) props for a connection?)
user,pwd,server(?)

Similar Messages

  • Estimating Security Resources Needed for Support Organization

    Hi Gurus,
    As our implementation winds down, I've been tasked with the pleasure of defining the security resource requirements needed for the future state support organization.
    Some high level details of the environment:
    -ECC 6.0, SCM SNC 7.1, BI, XI/PI; expected to be approximately 10 instances in stable environment between DEV, Q, Prod
    -10000 users
    -100 business roles; 1000 single roles
    -Custom security for one area that will require incremental additions of sales group/sales office across the BI, SNC and ECC systems in the roles (not too often)
    -90 day password reset enforcement
    -Manual access request forms
    -Use of SPM and RAR
    I've done some searches and found a fair amount of forum postings, but I'm seeing all types of different responses.  While I understand it can vary, I am curious if any of you have (from your experience) developed a helpful equation that can help us deteremine whether 2, 3 or 10 resources are needed.
    Please let me know if there is any more context I can provide.  If you are aware of another thread that already discusses this, please let me know.  Thanks in advance.
    Sincerely,
    Chris

    Depending on your frequency of role changes, user changes I would expect a team of 3 (2 reasonably strong + 1 admin) to be able to comfortably manage that landscape with some capacity for performing additional project support work & holiday cover.
    If you have low complexity/change then there is no reason why 1 or 2 people would not be able to cover the admin side once the solution is mature.
    Unfortunately no equation for it but based on what I see clients operating effectively over the last few years.  Automation (position based assignment, use of CUP etc) can help reduce the administrative workload.
    If you have metrics for expected user and role changes (difficult to come up with at the end of an implementation) then you can be more scientific about it.  There are many variables that have a material impact on the support requirements.
    All the consultancies & out sourcers have models that they use for this.  Usually I find them to be a bit generous on the resource side as they have to provide contingency for the unknown stuff.  One of my clients has out sourced some admin tasks and the out sourcing firm applied their metrics to it and fell quite short due to the complexity of it.  This isn't a criticism of those firms, rather that even these companies who do this stuff for a living can miss many things.

  • Minimum Database Priviledes needed for Database Connection

    What are the minimum DB Privileges I will need to do the following in JDev:
    1 - Brows tables and packages via the Application Resources - Connections - Database view?
    2 - Generate Business Components from Tables? (Query for Tables returns no values, or errors.)
    I'm using JDev 11.1.1.1.0. connecting to an Oracle 10g database.
    I can connect successfully but can't get table/view lists in the above scenarios.
    I can query tables directly (select * from.....) via the SQL_Worksheet form and I receive context help (e.g. on table names).
    Other connections to a local XE database works fine (CONNECT and RESOURCE privileges).

    RACHUZ wrote:
    Thank you Sir.
    I cannot complete the process due to the following error .
    C:\Users\user>sqlplus
    SQL*Plus: Release 11.2.0.1.0 Production on Sat Jul 13 11:45:55 2013
    Copyright (c) 1982, 2010, Oracle.  All rights reserved.
    Enter user-name: /as sysdba
    ERROR:
    ORA-28056: Writing audit records to Windows Event Log failed
    ORA-28056: Writing audit records to Windows Event Log failed
    What do those error messages suggest to you?
    Maybe your disk full.
    Maybe the Windows Event Log  (how did I come up with that name?) needs to be flushed/truncated.
    I leave the details as an exercise for the student.

  • Resource needed for using  1 variable in 2 classes

    can anyone point me to a good resource on calling/using variables in another class? the problem i am facing is that i am using a for loop that has the string []splitresult variable used, i want to use this in another class aswell and dont no how,
    i really need a resource, preferably from the java turoials as they are easier to understsnd for me?
    thank you for that

    class MyClassA {
      int myVar = 3;
      public int getMyVar() {
         return this.myVar;
      public int setMyVar( int var ) {
        this.myVar = var;
    class MyClassB {
      public static void main ( String[] args ) {
         MyClassA myClassA = new MyClassA();
         int y = myClassA.getMyVar();
         myClassA.setMyVar( 44 );
         int z = myClassA.getMyVar();
         // if myVar was public you could do this, but this is NOT recommended, unless you have a good reason:
         int x = myClassA.myVar;
    }Edited by: ajmasx on Mar 15, 2008 10:08 AM

  • Minimum pulse width needed for gating the counter

    Hi,
         I have TTL pulses of 20 nanosecond width coming out from the two detectors at random times. I want to count the number of coincidence pulses.I am trying this with NI PCI 6259 M series card, by giving one signal to the gate of the counter and other as a source of the counter (Single Point (On-Demand) Edge Counting with Pause Trigger). When both source and gate are high then it should give the coincidence count.Can anyone suggest  
    1) Whether this is possible to gate the counter with 20 nanosecond width pulse?
    2) If above thing is possible is this the right way for looking coincidence counts?
    Any help regarding this is highly appreciated. 
                                                                                                                                                                                                                                             Regards
                                                                                                                                                                                                                                              surya
    Research student

    I'm sorry I could figure out what was the problem.
    And I also find the minimum output pulse width on the catalog (12.5nsec).
    Thanks,
    Kaoru

  • External services po for resources need information till ML81N, MIRO etc.

    hi all,
    Looking for external services po for resources need information till ML81N, MIRO.
    Even  HR personnal number PA 30, CAT2, CATM  required for smooth flow.
    Internally for this HR tcodes WBS element Activity number is also involved.
    Thanks in advance for mm dudes for replys.
    Regards,
    Parameshwar.

    Hi,
    I hope as per your requirement , you have to develop some custom (Z) report or using SAP query. All the requested data are available in Std.SAP tables, you have to fetch it as per your requirement.
    You can check the std.report - ME2S for planned/actual Comparison
    Thanks & Regards,

  • Minimum Files needed for bare bones XP Install?`

    Hello
    I'm new here having recently bought my first MBP. Does anyone know the minimum files needed for a custom (lite) XP Pro install using BootCamp?
    All I want to run is DV-Rack plus maybe 1 or 2 other programs but I don't want to waste space on my 200gb HD. I do't even want to install MS Office because I like iWorks better.
    Thanks
    Allen

    My recommendation is nothing short of 12GB. For your purposes, that you indicated in your post, 12GB should be fine. Please also consider any future uses that you may have for Windows XP. I have seen several times, on this forum, where a user sets the partition too low and then wishes to increase the size and it cannot be done unless Boot Camp and Windows is re-installed from scratch.
    If you can afford the disk space then I would even recommend 32GB and that would allow you to have some space left for future programs if any.
    Axel F.

  • Minimum Fields that Need to be Populated for  Delivery Note

    Does anyone have a list of bare minimum fields that need to be populated when uploading a Delivery Note from another 3rd party system (e.g. a shipping system) to SAP Business One?
    Thanks.
    Kushal Dutta.

    Hi Dhruv:
    Thank you for your answer - that was helpful. Please note that I had originally posted this in SDK, and no one answered for over a week. I got an immediate reply back from you once I posted it in the Integration forum - sorry about that.
    I have a related question though.
    When I am posting the Delivery Note back to B1, I had expected B1 to generate the DocNum. However, it gives me an error if I do not populate the DocNum field. I have to put a value there, however, it appears to me that B1 is ignoring the value that I put and is generating a new DocNum. I am happy with that, however, need to know two things:
    a) Is there a specific value that I should populate the DocNum field wth before sending the XML to B1, or just any random number will do?
    b) How do I control which Sales Order the Doclivery Note gets posted against?
    Thank you.
    Kushal Dutta.

  • LabView "Guru" needed for the summer (4 month project) Kalamazoo, MI

    LabView "Guru" needed for the summer (4 month project)
    I am looking to hire a LabView "Guru" for a summer project in Kalamazoo, MI that will last 4 months.  Specifically, the ideal person will have the following:
    LabView expert with a minimum of 7-15 years of experience working with LabView (currently using version 6.1).
    80% of the job will be dissecting and interpreting mature LabView code and then re-engineering it to be used for testing.
    Printed Circuit Board experience a plus.
    4 year degree (BSEE preferred, but expertise in LabView takes priority over degree)
    The pay will be $60/hr and you can plan on overtime of at least 10 hrs each week that will be paid at $90/hr. 
    Please call 616-855-4600 if you need more information and email a "word" copy of your resume to [email protected]

    Sounds like Parker-Abex (LabVIEW 6.1 part)
    Putnam
    Certified LabVIEW Developer
    Senior Test Engineer
    Currently using LV 6.1-LabVIEW 2012, RT8.5
    LabVIEW Champion

  • Hyper-V Resource Pools for Memory and CPU

    Hi all,
    I'm trying to understand the concepts and details of resource pools in Hyper-V in Windows Server 2012. It seems as if there is almost no documentation on all that. Perhaps somebody can support me here, maybe I've not seen some docs yet.
    So far, I learned that resource pools in their current implementation serve mainly for metering purposes. You can create pools per tenant and then group VM resources into those pools to facilitate resource metering per tenant. That is, you enable metering
    once per pool and get all the data necessary to bill that one customer for all their resources (without metering individual VMs). Is that correct?
    Furthermore, it seems to me that an ethernet pool goes one step further by providing an abstraction level for virtual switches. As far as I've understood you can add multiple vSwitches to a pool and then connect a VM to the pool. Hyper-V then decides which
    actual switch to use. This may be handy in a multi-host environment if vSwitches on different hosts use different names although they connect to the same network. Is that correct?
    So - talking about actually managing that stuff I've learned how to create a pool and how to add VHD locations and virtual switches to a pool. Enabling resource metering for a pool then collects usage data from all the resources inside that pool.
    But now: I can create a pool for memory and a pool for CPU. But I cannot add resources to those. Neither can I add a complete VM to a pool. Now I'm launching a VM that belongs to a customer whose resources I'm metering. How will Hyper-V know that it's
    supposed to collect data on CPU and memory usage for that VM?
    Am I missing something here? Or is pool-based metering only good for ethernet and VHD resources, and CPU and memory still need to be metered per VM?
    Thanks for clarification,
    Nils
    Nils Kaczenski
    MVP Directory Services
    Hannover, Germany

    Thank you for the links. I already knew those, and unfortunately they are not matching my question. Two of them are about Windows Server 2008/R2, and one only lists a WMI interface. What I'm after is a new feature in Windows Server 2012, and I need conceptional
    information.
    Thanks for the research anyway. I appreciate that a lot!
    In the meantime I've gotten quite far in my own research. See my entry above of January 7th. Some additions:
    In Windows Server 2012, Hyper-V resource pools are mainly for metering purposes. You cannot compare them to resource pools in VMware.
    A resource pool in Hyper-V (2012) facilitates resource metering and billing for VM usage especially in hosting scenarios. You can either measure resource usage for single VMs, or you can group existing resources (such as CPU power, RAM, virtual hard disk
    storage, Ethernet traffic) into pools. Those pools will mostly be assigned to one customer each. That way you can bill the customer for their resource usage in a given time period by just querying the customer's pool.
    Metering only collects aggregated data with one value per resource (i.e. overall CPU usage, maximum VHD storage, summed Ethernet traffic and so on). You can control the time period by explicitly resetting the counter at any given time (a day, a week, a
    month or what you like).
    There is no detailed data. The aggregate values serve as a basis for billing, not as monitoring data. If you need detailed monitoring data use Performance Monitor.
    There is currently only one type of resource pool that adds an abstraction layer to a virtualization farm, and that is the Ethernet type. You can use that type for metering, but you can also use it to group a number of virtual switches (that connect to
    the same network segment) and then a VM connected to that pool will automatically use an appropriate virtual switch from the pool. You need no longer worry about virtual switch names across multiple hosts as long as all equivalent virtual switches are
    added to the pool.
    While you can manage two types of pool resources in the GUI (VHD pools and Ethernet pools) you should only manage resource pools via PowerShell. Only there will you be able to control what happens. And only PowerShell provides a means to start, stop, and
    reset metering and query metering data.
    The process to use resource pools in Hyper-V (2012) in short:
    First create a new pool via PowerShell (New-VMResourcePool). (In case of a VHD pool you must specify the VHD storage paths to add to the pool in the moment you create the pool.)
    In case of an Ethernet pool add existing virtual switches to the pool (Add-VMSwitch).
    Reconfigure existing VMs that you want to measure so that they use resources from the pool. The PowerShell
    Set-VM* commands accept a parameter -ResourcePoolName to do that. Example:
    Set-VMMemory -VMName APP-02 -ResourcePoolName MyPool1
    Start measuring with Enable-VMResourceMetering.
    Query collected data as often as you need with Measure-VMResourcePool.
    Note that you should specify the pool resource type in the command to get reliable data (see my post above, Jan 7th).
    When a metering period (such as a week or a month) has passed, reset the counter to zero with
    Reset-VMResourceMetering.
    Hope that helps. I consider this the answer to my own question. ;)
    Here's some links I collected:
    http://itproctology.blogspot.ca/2012/12/hyper-v-resource-pool-introduction.html
    http://www.ms4u.info/2012/12/configure-ethernet-resource-pool-in.html
    http://blogs.technet.com/b/virtualization/archive/2012/08/16/introduction-to-resource-metering.aspx
    http://social.technet.microsoft.com/Forums/en-US/winserverhyperv/thread/1ce4e2b2-8fdd-4f16-8ab6-e1e1da6d07e3
    Best wishes, Nils
    Nils Kaczenski
    MVP Directory Services
    Hannover, Germany

  • Need for multiple ASM disk groups on a SAN with RAID5??

    Hello all,
    I've successfully installed clusterware, and ASM on a 5 node system. I'm trying to use asmca (11Gr2 on RHEL5)....to configure the disk groups.
    I have a SAN, which actually was previously used for a 10G ASM RAC setup...so, reusing the candidate volumes that ASM has found.
    I had noticed on the previous incarnation....that several disk groups had been created, for example:
    ASMCMD> ls
    DATADG/
    INDEXDG/
    LOGDG1/
    LOGDG2/
    LOGDG3/
    LOGDG4/
    RECOVERYDG/
    Now....this is all on a SAN....which basically has two pools of drives set up each in a RAID5 configuration. Pool 1 contains ASM volumes named ASM1 - ASM32. Each of these logical volumes is about 65 GB.
    Pool #2...has ASM33 - ASM48 volumes....each of which is about 16GB in size.
    I used ASM33 from pool#2...by itself to contain my cluster voting disk and OCR.
    My question is....with this type setup...would doing so many disk groups as listed above really do any good for performance? I was thinking with all of this on a SAN, which logical volumes on top of a couple sets of RAID5 disks...the divisions on the disk group level with external redundancy would do anything?
    I was thinking of starting with about half of the ASM1-ASM31 'disks'...to create one large DATADG disk group, which would house all of the database instances data, indexes....etc. I'd keep the remaining large candidate disks as needed for later growth.
    I was going to start with the pool of the smaller disks (except the 1 already dedicated to cluster needs) to basically serve as a decently sized RECOVERYDG...to house logs, flashback area...etc. It appears this pool is separate from pool #1...so, possibly some speed benefits there.
    But really...is there any need to separate the diskgroups, based on a SAN with two pools of RAID5 logical volumes?
    If so, can someone give me some ideas why...links on this info...etc.
    Thank you in advance,
    cayenne

    The best practice is to use 2 disk groups, one for data and the other for the flash/fast recovery area. There really is no need to have a disk group for each type of file, in fact the more disks in a disk group (to a point I've seen) the better for performance and space management. However, there are times when multiple disk groups are appropriate (not saying this is one of them only FYI), such as backup/recovery and life cycle management. Typically you will still get benefit from double stripping, i.e. having a SAN with RAID groups presenting multiple LUNs to ASM, and then having ASM use those LUNs in disk groups. I saw this in my own testing. Start off with a minimum of 4 LUNs per disk group, and add in pairs as this will provide optimal performance (at least it did in my testing). You should also have a set of standard LUN sizes to present to ASM so things are consistent across your enterprise, the sizing is typically done based on your database size. For example:
    300GB LUN: database > 10TB
    150GB LUN: database 1TB to 10 TB
    50GB LUN: database < 1TB
    As databases grow beyond the threshold the larger LUNs are swapped in and the previous ones are swapped out. With thin provisioning it is a little different since you only need to resize the ASM LUNs. I'd also recommend having at least 2 of each standard sized LUNs ready to go in case you need space in an emergency. Even with capacity management you never know when something just consumes space too quickly.
    ASM is all about space savings, performance, and management :-).
    Hope this helps.

  • What settings do I need for high quality web video?

    I've created a video via animoto.com for my website. The video resolution they recommend for web is 432 x 240 @ 15 fps. I used this and it's not as crystal clear as I'd like. Still looks pixelated a bit and I'd like a higher def version. So I downloaded the hi res version (864 x 480 @ 24 fps). This looks great but takes forever to load due to buffering. Then the video stops every few seconds. I understand this res is not meant for web.
    What is the resolution I need for best quality & fast loading? I've seen great videos on the web before that loaded very quickly. This is what I'm looking for. I have Quicktime Pro for Mac and can pretty much save in any formats & resolutions. So what's recommended?
    Thanks!

    Hi
    There are some important things.
    • Set down burn speed to x1. In iDVD08 You can do this in preferences.
    • Use high quality media. I only use Verbatim
    • Use right type of DVDs. I only use DVD-R (Single Layer)
    • Best quality - I use Pro-encoding Quality.
    • IMPORTANT: Secure a minimum of 25Gb free space on Your internal (start-up) hard disk
    • Use a CD/DVD cleaning disk from time to time
    • Don't burn more than three DVD at a time then let Your DVD-burner rest in 15 minutes to cool down.
    Good Luck
    Yours Bengt W

  • Is an anti-virus needed for a new macbook pro?

    Is an anti-virus needed for a new macbook pro with retina display?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Security Right 'Resource' id for 'User Impersonation For Seller' right

    Hi,
    Can someone tell me whats the RESOURCE id for security right 'User Impersonation For Seller'?
    I need this to populate the workbook. None of the standard roles have this in E-Sourcing 5.1, so the standard workbook doesnt contain this right.
    Manually this right can be set in the security profile in drop down 'Users and sercurity'.
    Thanks & Regards,
    Srivatsan

    Hi
    RESOURCE ID for security right "user impersonation" is usermgmt.impersonation
    Regards
    Mudit Saini

  • Flex Developer Resource Needed.

    My company, located in Scottsdale, AZ purchased IBM Elixir and we have an immediate need for a Flex developer resource who can assist us in our .NET application integration with this product. If you are a seasoned Flex developer familiar with Elixir or can refer me to a resource, please email me at: [email protected]
    Thanks

    Please refrain from discussing job opportunities on this
    forum. There is a mailing list specifically for this topic. Do an
    internet search for "flex jobs".

Maybe you are looking for

  • Help with opening a .PDF in browser (firefox) - have Adobe Acrobat 9 Pro Extender installed

    Hi all, I have Adobe Acrobat 9 ProExtender installed, whenever I go to my firefox options and change the .PDF setting to (USE ADOBE ACROBAT (in firefox)) setting, i get a screen which is whited out, and a message from Adobe Acrobat with a question ma

  • VARRAY colletion type retirval from java , Wrong data ???? retrieved.

    Hi all, I am trying to retirve VARRAY collection type created in oracle from Java. It gives the wrong results as below: ********Fetch Starts....******** ********Row 1 : Array is of type MY_UID.STRING_VARRAY Array is of length 2 index 0 = ??? index 1

  • Performance Problems with Excel Client

    Hello all, We installed BPC 7.5 SP7 NW on our customeru2019s system and experience massive performance problems on our local clients in combination with Excel and MS Office in general. u2022When opening u201CMaintain Dimension Membersu201D it takes s

  • Auto update stats disabled for a user Database in Sql server

    While trying to improve the performance of few queries, we found via execution plan that there were lot of Index/Clustered index seeks. Therefore: First thing we did, was to check our Re-indexing and update stats job which runs weekly for this user D

  • The authorization don't "stick" to my computer.

    I bought some music from iStore for the first time for some weeks ago and I haven't been able to play it on the computer from which I bought them from. It seems like the authorisation of this computer don't "stick" nomatter what I do. This is what ha