Need tips for protection against illegal copying

The company I work for has copyright permissions for about 16GB of service documents.  Right now they're in about 400 linked .pdf documents.  They are on networked storage, and we limit access to that storage using Active Directory.
Some of the documents are huge, and we have some technicians going into the field with wireless devices that can't be used to access the larger documents.  (I have a temporary solution in place that involves Citrix, but we're giving that up and I need another solution).
I could put all the files on 4 DVDs, or I could get the files onto their hard drives....   I'm concerned about them copying the content from either of these locations and "sharing" it.
    - Putting a password on the document won't help - they could just share the password
    - Would using the certificate approach restrict them to using it on the machine that has the certificate?  The certificate can't be copied to another machine, right?
Suggestions appreciated.

Don't know the answer on the certificates, but it sounds reasonable. What concerns me a bit is your concern over the copying and yet they still have access to the smaller files on their machines. Once they load the PDF on there machine to view it, it is stored on their machine. You did not mention that case and am just bringing it up for your consideration. Sounds like it might be a concern under your restrictions.

Similar Messages

  • HT201303 every time i try to write my credit card info to pay for an application, this "Apple Support: Tips for Protecting Your Info" page comes up and I cannot purchase anything. I can just download the free ones. This is really annoying! How do I stop t

    every time i try to type in my credit card info to pay for an application, this "Apple Support: Tips for Protecting Your Info" internet page comes up and I cannot purchase anything. I can just download the free ones. This is really annoying! How do I stop this?

    Contact iTunes Customer Service and request assistance
    Use this Link  >  Apple  Support  iTunes Store  Contact

  • Target client is productive and protected against client copy

    when copy 000 with tran code sccl its give error
    Message no. TA133
    Target client is productive and protected against client copy

    Hi Rahul,
    I mean:
    Execute SCC4.
    Push the "Edit" icon at the top (pencil).
    Double-click the target client.
    At the new screen, change the Client Role (you can select "Test").
    Change the combo "Protection Level" to Level 0.
    Save changes.
    After the Client Copy, you can revert all these changes to the original status.
    Regards,
    JC Llanes.

  • Needs link for JAVA homogenous system copy NW04 & NW04s

    hi
    I am unable to find the document for JAVA homogenous system copy for NW04 and NW04s.
    kindly plz provide the link for it
    its urgent
    thanks
    regards
    Shoeb

    Hi,
    try [http://service.sap.com|http://service.sap.com] -> Relase & Upgrade-Info -> Installation and Upgrade ...-> SAP NetWeaver -> SAP NetWeaver 7.0 -> Installation -> Installation - SAP NetWeaver Systems
    Kind Regards
    David Heidbrink

  • Exchange 2010 - What is best practice for protection against corruption replication?

    My Exchange 2010 SP3 environment includes DAG with offsite passive copy.  DB is backed-up nightly with TSM TDP.  My predecessor also installed DoubleTake software to protect the DB against replication of malware or corruption to the passive MB
    server.  Doubletake updates offsite DB replica every 4-hours.  Understanding that this is ultimately a decision based on my company's risk tolerance, to the end, what is the probability of malware or corruption propagation due to replication? 
    What is industry best practice: do most companies have a 3rd, lagged copy of the DB in the DAG, or are 3rd party solutions such as DoubleTake commonly employed?  Are there other, better (and less expensive) options?

    Correct. If 8 days lagged copy is maintained then daily transaction log files of 8 days are preserved before replaying them to lagged database. This will ensure point-in-time recovery, as you can select log files that you need to replay into the database.
    Logs will get truncated if they have been successfully replayed into database and have expired their lagged time-stamp.
    Each database copy has a checkpoint file (.chk), which keeps track of transaction log files status.
    Command to check the Transaction Logs replay status:
    eseutil /mk <path-of-the-chk-file>  - (stored with the Transaction log files)
    - Sarvesh Goel - Enterprise Messaging Administrator

  • MacOSX 10.4.11 Combo Update (PPC):IMPOSSIBLE; I NEED "TIPS" FOR MY SUICIDE!

    For the last 4 weeks, day after day, i try to update, but it s totaly impossible!
    I have set my IMac 10.4.6 PPC perfectly (energie saving off, automatic update download on, all keys acces open, etc., ...), but even if its seems to work, nothing appenend!!!
    *(?&%&#$?#%*&&?#?#@$!!!
    What's that new Apple mixed-up again...?
    Also, my sofware update history only shows mars 2008 an before history update list !
    Save a life! Help me please.
    PS IF THERE'S ANY ONE WHO CAN GIVE ME TIPS AND RECEPICES FOR MY SICK OF MAC SUICIDE, PLEASE WRITE ME (before october 31 2009 Holloween day...After, it's gone be to late and useless!)
    Sickofmac (french Montreal)

    Just to add to BDAqua's excellent advice:
    There are no guarantees, but following this procedure when installing updates and upgrades on your Mac, or even re-installing them, will go a long way towards avoiding unpleasant after effects and ‘post-update stress disorder’.
    It is also worth noting that it is an extreme rarity for updates to cause upsets to your system, as they have all been extensively beta-tested, but they may well reveal pre-existing ones, particularly those of which you may have been unaware. If you are actually aware of any glitches, make sure they are fixed before proceeding further.
    So before you do anything else:
    If you can, make a full backup first to an external hard disk. Ideally you should always have a bootable clone of your system that enables you to revert to the previous pre-update state.
    Turn off sleep mode for both screen and hard disk.
    Disconnect all peripherals except your keyboard and mouse.
    1. Repair Permissions (in Disk Utility)
    2. Verify the state of your hard disk using Disk Utility. If any faults are reported, restart from your install disk (holding down the C key), go to Disk Utility, and repair your startup disk. Restart again to get back to your startup disk.
    At least you can now be reasonably certain that your system does not contain any obvious faults that might cause an update/upgrade to fail.
    3. Download the correct version of the COMBO update from the Apple download site. If your car runs on gasoline you would not want to fill the tank with diesel, so don’t try to install the PPC updater on an Intel Mac!
    The 10.4.11 Combo Updater for PPC Macs is here: http://support.apple.com/downloads/MacOS_X_10_4_11_Combo_Update__PPC
    And for Intel Macs: http://www.apple.com/downloads/macosx/apple/macosx_updates/macosx10411comboupdat eintel.html
    If you prefer to download updates via Software Update in the Apple menu (which would ensure that the correct version for your Mac was being downloaded), it is not recommended to allow SU to install major (or even minor) updates automatically. Set Software Update to just download the updater without immediately installing it. There is always the possibility that the combined download and install (which can be a lengthy process) might be interrupted by a power outage or your cat walking across the keyboard, and an interrupted install will almost certainly cause havoc. Once it is downloaded, you can install at a time that suits you. You should make a backup copy of the updater on a CD in case you ever need a reinstall.
    Full details about the 10.4.11 update here: http://support.apple.com/kb/TA24901?viewlocale=en_US
    More information on using Software Updater here:
    http://support.apple.com/kb/TA24901?viewlocale=en_US
    Using the Combo updater ensures that all system files changed since the original 10.4.0 are included, and any that may have been missed out or subsequently damaged will be repaired. The Delta updater, although a temptingly smaller download, only takes you from the previous version to the new one, i.e. for example from 10.4.10 to 10.4.11. Software Update will generally download the Delta updater only. The preferable Combo updater needs to be downloaded from Apple's download site.
    Now proceed as follows:
    4. Close all applications.
    5. Unplug all peripherals except your keyboard and mouse.
    6. Install the update/upgrade. Do not under any circumstances interrupt this procedure. Do not do anything else on your computer while it is installing. Be patient.
    7. When it ask for a restart to complete the installation, click restart. This can take longer than normal, there are probably thousands of files to overwrite and place in the correct location. Do nothing while this is going on.
    8. Once your Mac is awake, repair permissions again, and you should be good to go!
    If your Mac seems slightly sluggish or ‘different’, perform a second restart. It can’t hurt and is sometimes efficacious!
    9. Open a few of your most used applications and check that all is OK. In this connection please remember that not all manufacturers of third party applications and plug-ins, add-ons, haxies etc, will have had time to do any necessary rewrites to their software to make them compliant with the latest version of your operating system. Give them a weeks or two while you regularly check their websites for updates. This applies particularly to plug-ins for Safari 3.
    N.B. Do not attempt to install two different updates at the same time as each may have different routines and requirements. Follow the above recommendations for each update in turn.
    Lastly, Apple's own article on the subject of Software Update may also be useful reading:
    http://docs.info.apple.com/article.html?artnum=106695
    If you are updating Safari (or just have):
    Input Managers from third parties can do as much harm as good. They use a security loophole to reach right into your applications' code and change that code as the application starts up. If you have installed an OS update and Safari is crashing, the very first thing to do is clear out your InputManagers folders (both in your own Library and in the top-level /Library), log out and log back in, and try again.
    So, disable all third party add-ons before updating Safari, as they may not have been updated yet for the new version. Add them back one by one. If something goes awry, remove it again and check on the software manufacturer's website for news of an update to match your version of Safari. Remember: Tiger up to 10.4.10 used Safari 2.0.4 or, if you downloaded it, Safari 3.0.3 beta. Safari 10.4.11 used Safari 3.0.4 which was not a beta. If Safari 3.1.2 on 10.4.11 is not the fastest browser you have ever used, then something is wrong!
    Moreover, trying to revert to Safari 3.0.4 (or worse still, version 2) when running 10.4.11 or 10.5 can have repercussions, as Safari 3.1.1 uses a completely different webkit on which other applications like iChat, Mail and Dashboard Widgets etc also rely, and may entail you having to reinstall an earlier operating system.
    Most errors reported here after an update are due to an unrepaired or undetected inherent fault in the system, and/or a third party ad-on. Two such add-on that have been frequently mentioned here for causing such problems are Piclens and Pithhelmet. If you have them, trash them.
    Additional tips on software installation here:
    http://docs.info.apple.com/article.html?artnum=106692
    To reiterate, Input Managers reach right into an application and alter its code. This puts the behavior of the affected application outside the control and responsibility of its developers: a recipe for problems. That's not to say that issues absolutely will ensue as a result of Input Managers, but you, as a user, must decide. If the functionality of a specific Input Manager or set thereof is really important to you, you may well choose to assume the associated risk.
    Again, the advice is to remove all Input Managers from the following directories:
    • /Library/InputManagers
    • ~/Library/InputManagers
    especially prior to system updates (they can always be added back one-by-one later).

  • Rebuilding help- need tips for Capital One Accounts

    Hi- Thank you all for all the wonderful information, you make rebuilding seem so easy and attainable! I never realized all the different versions of scoring, how to do debt validation, get errors removed from my report and where to focus my attention. Just 2 months ago my scores ranged between 556-580, today they range from 600-611 so little improvement over the last couple months. Here is the situation I am in. I have 3 capital one cards, 2 of which are platinums with $500 limits and 1 is the old Orchard Bank card w/$300 limit. These cards are 6-8 years old.  I also have a Fingerhut account w/a $1650 limit, totalling $2950 in credit of which $640 is in use so utilization should be about 22% (making a little more headway on this util each month). I have been 100% ontime w/Fingerhut for the last 2 years. 100% on time w/my auto loan for the last 36 months and almost always on time w/Capital one except for 3 months Sept-Nov in 2014 where I went over my balances and accrued over limit charges that brought my minimum payments up. Technically I was still on time but the $50 a month per card I was giving them wasn't enough for the min payment. I was in a tight situation at the time, they reported those 3 months as late for all 3 cards.   I went years before this  paying 100% on time every month but always carrying a high balance so they never increased my limits earlier even though payment history was good. Now that my utilization is down and its been 8 months since the Capital one dings,  I applied for CLI's on these cards and received letters denying the increases as they said tehse late payments are too recent. I read that a lot of people have success w/CLI's after about 6 months. I've called twice to see if they would good will any of those late payments, I was shot down immediately the first time, the 2nd time I had a  nice woman but she wouldn't budge either, she politely told me she went back and looked at those statements and I was indeed not meeting the minimum payments & the only thing she could do was to mail me hard copies of those statements. I really only have 1 major collection on file thats affecting my score for a little over $1000 w/a CA that I've never heard from via phone or mail yet they are accruing charges each month. It showed up in my file late in 2014 for a card that went delinquent on about 2.5 yrs ago. I haven't decided how to handle this collection just yet, PIF right now is not an option for me so before I figure out how I want to approach this I thought I'd try to make some headway w/Capital one first on my limits andutilization. Does anyone have any recommendations? I've lowered my utilization while still using the cards frequently, just paying down more and paying on time but am getting nowhere on goodwills or CLI's and persistence is not my strong suit. Do you recoomend I wait until I have a full 12 months of on time payments before I try again?  I did prequal for the QS card but am afraid if I submit, I'll only get rejected for the same "recent late payments" that they rejected my CLI requests for even though they are going on 9 months old.... Does anyone have luck w/a new Cap 1 card while not having luck w/CLI's? Should I try for another card, Anybody get accepted for Barclays card w/low 600's score? I only have 4 inquiries on my file right now. 1 is old, should drop off next month, the other 3 were recent  apps for a rental property, no inquiries from credit cards in 2 yrs. Thanks in advance for any advice!!!

    Cam0215 wrote:
    Hi- Thank you all for all the wonderful information, you make rebuilding seem so easy and attainable! I never realized all the different versions of scoring, how to do debt validation, get errors removed from my report and where to focus my attention. Just 2 months ago my scores ranged between 556-580, today they range from 600-611 so little improvement over the last couple months. Here is the situation I am in. I have 3 capital one cards, 2 of which are platinums with $500 limits and 1 is the old Orchard Bank card w/$300 limit. These cards are 6-8 years old.  I also have a Fingerhut account w/a $1650 limit, totalling $2950 in credit of which $640 is in use so utilization should be about 22% (making a little more headway on this util each month). I have been 100% ontime w/Fingerhut for the last 2 years. 100% on time w/my auto loan for the last 36 months and almost always on time w/Capital one except for 3 months Sept-Nov in 2014 where I went over my balances and accrued over limit charges that brought my minimum payments up. Technically I was still on time but the $50 a month per card I was giving them wasn't enough for the min payment. I was in a tight situation at the time, they reported those 3 months as late for all 3 cards.   I went years before this  paying 100% on time every month but always carrying a high balance so they never increased my limits earlier even though payment history was good. Now that my utilization is down and its been 8 months since the Capital one dings,  I applied for CLI's on these cards and received letters denying the increases as they said tehse late payments are too recent. Once you get nine months out from the last late payment on the account (not just a reported 30, but service charge late) they will allow a CLI if your scores are high enough. I read that a lot of people have success w/CLI's after about 6 months. I've called twice to see if they would good will any of those late payments, I was shot down immediately the first time, the 2nd time I had a  nice woman but she wouldn't budge either, she politely told me she went back and looked at those statements and I was indeed not meeting the minimum payments & the only thing she could do was to mail me hard copies of those statements. Yeah, Cap One is pretty strict with their reporting. I really only have 1 major collection on file thats affecting my score for a little over $1000 w/a CA that I've never heard from via phone or mail yet they are accruing charges each month. It showed up in my file late in 2014 for a card that went delinquent on about 2.5 yrs ago. I haven't decided how to handle this collection just yet, PIF right now is not an option for me so before I figure out how I want to approach this I thought I'd try to make some headway w/Capital one first on my limits andutilization. Does anyone have any recommendations? Is the OC also reporting that delinquency? If so are they showing an unpaid balance? With Cap One, they like to see heavy usage, and low reported balances. Keep requesting CLI's online until you get some joy - you just need to get far enough away from those lates. I've lowered my utilization while still using the cards frequently, just paying down more and paying on time but am getting nowhere on goodwills or CLI's and persistence is not my strong suit. Do you recoomend I wait until I have a full 12 months of on time payments before I try again?  I did prequal for the QS card but am afraid if I submit, I'll only get rejected for the same "recent late payments" that they rejected my CLI requests for even though they are going on 9 months old.... Keep trying every month - use the online link for it, don't call them. Don't worry about CLI denials, they won't be held against you in any way. JUst keep plugging away and check the denial reasons. I was getting the same thing all last year until Jan when I sarted getting "score reasons", then they tripled my limits in Feb. Does anyone have luck w/a new Cap 1 card while not having luck w/CLI's? Should I try for another card, Anybody get accepted for Barclays card w/low 600's score? I only have 4 inquiries on my file right now. 1 is old, should drop off next month, the other 3 were recent  apps for a rental property, no inquiries from credit cards in 2 yrs. Thanks in advance for any advice!!! Right now you would only qualify for the "average credit" level Cap One cards, and they are an auto-deny for having two or more cap one accounts already. (its stated in the disclosures), so do not app for any more Cap One cards until scores are in the high 600's - then app for the "excellent credit" cards. Since you have a long history with the cards, you might try Barclays (I was approved for Barclays with 618 TU score), but wait until your last 30 day late is over 12 months old.You're actually doing fine, just need to move out a bit from those lates that occurred last year. You might also call and get them converted to QS/QS1 reward cards.

  • Pacman.conf NEED tips for totally offline install with DVD repository

    OBJECTIVE: after a base install with ARCHBOOT be able to install from DVD repository which contains repo-add database.
    My DVD contains the folder from /var/cache/pacman/pkg.
    ON the DVD I have the folder 'pkg' at the dvd root level and another folder which has my already built packages fro AUR.
    The database called 'custom.db.tar.gz' created with repo-add exists IN the pkg folder on the DVD.
    The built AUR packages are in a seperate folder called '_built' at the dvd's root level as well and they are not included in the repo-add database.
    I am able to mount the dvd, cd to the pkg folder and use  pacman -Ud to install them though this requires that I type in the full name of the package and I get dependence issues and '*.so' type files not found.
    IF I copy all the files from the DVD to the var/cache/pacman/pkg folder I am able to add my local repository to pacman.conf and MUCH more efficient install. I can use pacman -S xorg for example, and I think it finds dependencies even. Can't recall exactly at the moment.
    SO: do I need to alter pacman.conf  cache location line and the other lines?
    Would I change the 2nd and 3rd lines to get max pacman ability when using DVD repository???
    Pointing them to my DVD folder after mounting the dvd
    #RootDir     = /
    #DBPath      = /var/lib/pacman/
    #CacheDir    = /var/cache/pacman/pkg/
    #LogFile     = /var/log/pacman.log
    I really would like to have as much power and flexibility when using the DVD as the repo.
    Can anyone tell me what I should alter in pacman.conf for this.
    I am fine if I have to alter the cache location line temporarily if it will give me additional pacman ability.
    I have read all the wiki stuff for sure though I'm still a bit in the dark and wanted to ask without typing the many many options.
    One big one for me is I don't yet know how to set the SERVER = in pacman.com to look at the mounted DVD and the pkg folder specifically.
    I do mount /dev/sr0  /mnt/cdrom
    So what would I put as the SERVER for this in pacman.conf
    SERVER = /dev/sr0   ?????   or   /dev/cdrom  ????    or /mnt/cdrom I think ????
    dunno!
    AND I really probably DO have to temporarily alter the pacman.conf  cache location line to get pacman to do dependency installs and let me type short lines instead of the full package name.
    THANKS! this one is BIG for me!!!!! :---)
    Last edited by yvonney (2009-06-18 20:27:14)

    COMMENT WRITTEN LAST: I was about to delete a lot of stuff here though thought to just say sorry for not taking the brain-time to slim it. The bold and white boxed part is the main related quest-ion.
    you might find a few useful tools on my site (in my sig), e.g. pkgd if you want to save bandwidth on a LAN --- pbget if you want to easily get PKGBUILDs etc from the AUR and official repos, etc.
    WOW Xyne !!!! thanks.  pbget etc. sound very cool.
    I used yaourt until very recently. Then went ....hmmmm... should learn about manual building and local repo. Where I'm at now is trying to do as much manually as possible. I think I kinda know what packages I want and there will only be some changes from that in the future. There's maybe 20 packages from AUR for me. [PLUS their dependencies]
    Of course: I am doing the repo-add local repositories thing for speed, learning, and as part of my whole 'best practices' growth. Plus it will come in very handy when helping other decide quickly if a barbones mainly wm/ncurses lightweight system is for them.
    You certainly spark a question or two!
    [AUR and dependencies via yaourt affecting my plans to now go manually]
    As these have all ALREADY been installed via yaourt my BIG concern is that I've never found much of a yaourt/cache folder. You see, as you'd know many many times upon installing vai yaourt there's some dependency that may, or I guess, may not be in the standard repos.
    After installing these packages via yaourt do the dependencies go into /var/cache/pacman.pkg and is pacman aware of it when I do a repo-add for thecustom database. If so, then all if fairly cool for my plans. I bet there's a few idiosyncrasies about AUR and dependencies maybe.
    -AUR dependency resolution-
    Using a custom repo will not really work for general use because you would need to manually populate the database with the dependencies anyway.
    I'm fine with manually doing dependencies - though need to know if my yaourt usage ALREADY put the latest dependencies in the pacman cache for AUR unsupported packages AND is there a way with the whole repo-add, local repositry, pacman and aur concpt I'm planning to fine tune to have the dependencies update when I go back to the online repositries? I don't think so based on my usage with yaourt, though can't quite recall.
    As I will be enjoying makepkg building the group of packages I nee to get from AUR for the forseeable future (that are not in the main 3 repos of course)
    I'm still wondering about the inter-relationships. So: I already have installed and/or built the packages for everything I expect to need mostly.   I never became beyone mediocre with yaourt.  and that fine, though I now have to consider that in a new install I DO have the latest AUR built packages, though will there be the right dependencies ALREADY in my /var/cache/pacman/pkg ?
    There's a few things that I'd love to really understand about this. Even if it ends up that dependencies for the AUR packages is always a bit trickier.
    QUESTION: right now I am uable to try custom repo from flash stick as it's read only. I'll be googling this one out and am really looking forward to having a flash stick with ARCHBOOT and I gues ONE repo pkg folder and database on it.
    NOTE: I will put the custom repo above the stock ones in pacman.conf. I just commented out the others as I was doing all this offline.
    I've dumped the dvd as a repo and have switched to a flash stick.  I've extracted the archboot out to a 4 gig flash stick.
    dd if=/root/Desktop/archlinux-2009.05-2-archboot.iso of=/dev/sdb  Its read-only at the moment and no matter what I've tried it stays that way. Maybe I need to use the HPutil on it. It definitely isn't writeable so I won't ponder or note observations here save to say that 'm stumped as to how to get files copied to it.
    And now what may be the way I'd like to work:    Keep my folder for building packages from aur which is /root/aur. Then after doing the fun makepkg --asroot   or even makepg -i as root to install. Though I'll probably after the build THEN just copy the built packages from my /root/aur to /var/cache/pacman/pkg   and install from there as I DO plan to use the online repos.
    I will ALSO copy the file to my USB stick or maybe just sync to it and do a the repo-add thing in   /var/cache/pacman/pkg   and keep the stick as both backup and 'in the ready' reinstaller.
    Um, now  could spend an hour editing down the above!!!
    wondrous thanks!
    Last edited by yvonney (2009-06-19 07:38:25)

  • IMG - Target client is productive and protected against client copy

    I am doing post-installation for Solution Manager 4.0 and encounter the above error.
    From the IMG Solution Manager Basic Settings ... --> Create Client, I created client 020 and the role = customizing.  Protection Level 0 and allow change to  repository and cross-client customizing.  Then, I click on Copy Client, it gave me the above error.
    I could not find any information regarding the correct way to work around it.  I tried to log into client 020 with SAP*/PASS to do manual client copy, but could not login either.
    Anyone ran into this problem?  Please share your successful instructions.
    Thanks.

    Hi Teengh,
    you can only do the client-copy in the target client; in your case in client 020.
    Please have a look in TA scc4 whether the client 020 was really created. If it is existing, then you should be able to log on to the client 020 with sap*/pass (password in lower case). What was the error message after you could not login?
    Best regards,
    Kai

  • Need tips for this approach

    function loadComplete(e:Event):void {
    removeChild(old_mc);
    addChild( DisplayObject(LoaderInfo(e.target).content) );
    //trace(e.currentTarget.content.x);
    //trace(e.currentTarget.content.y);
    //trace(e.currentTarget.content.width);
    //trace(e.currentTarget.content.height);
    //trace(stage.stageWidth);
    //trace(stage.stageHeight);
    //trace works alright, but its only good for once...
    Having main.swf loading object.swf (so for so good).
    now i need to learn an approach how to use this "e.currentTarget.content" (the object.swf that is loaded) for anything i want outside that loadComplete function...
    it would be nice if i could name it and able to use it... (then i could use it to create other functions i want.... but i dont know how ><
    can some1 teach me a good approach to solve my riddle?

    You should be able to just declare a variable outside of the onComplete function and assign it the loaded object when the file loads...
    var loadedSWF:MovieClip;
    function loadComplete(e:Event):void {
         removeChild(old_mc);
         addChild( DisplayObject(LoaderInfo(e.target).content) );
         loadedSWF = MovieClip(e.currentTarget.content);
    function doStuffToSWF(){
          loadedSWF.something....

  • Need help for protection plan

    Hi, I have a 3G 20 gb iPod, and I just purchased the new iPod Video...I still have my 3G iPod, and planning on selling it either to a friend or through eBay, i was wondering since the iPod is under my name is there a way i can change it? so that if someone buys it they can change it to their name? Same question goes to my Protection plan that i have for my iPod, since its all registered under my name, is there a way i can change that?
    Thanks for taking the time to read this,
    -Shervin

    mike987654321 wrote:
    so its pretty much just if the phone just s tops working and what not?
    Like most any other warranty on most any other product, it covers manufacturer defects.

  • Been a Long Time... Need tips for Photo Montage

    Hey guys, hope you're all doing well. I've been popping in and out on the forums busy as a bee mainly editing programs and trying to reach home early to cuddle my now 7 month old daughter! Who by the way is awesome.
    I've got this photo thingi I have to do before the 25th for a wedding surprise. I've got a majority of the photos and would like to do the project in HDV 720p(because I'm bored of doing standard def animations). I've converted the photos to smart objects and resized them to individual 1280x720 Photoshop projects named in relevance to specific events. Been researching effects and uses of stills in photo montages but need a bit more help. I'm almost fully confused as to where I should start. My main trouble I think, for now, is getting properly organized and figuring what dimensions and so I should work with. Help please? Oh, and I have a voice over of the story they want it to tell.

    One thing that can help is interesting transitions - see the animated transitions in this thread:
    http://discussions.apple.com/message.jspa?messageID=1348891#1348891
    Patrick

  • Need tips for iOS development

    i just bought an ipod touch 4g and i want to start developing apps, im reading that i should update my air version, i would like to work in pure as3, no flex, what would be my best choice and what version of air should i use, also is there any documentation site for APIs and iOS stuff for as3?, thanks a lot

    Here's an article on how to overlay AIR 3.0 on CS5.5:
    http://kb2.adobe.com/cps/908/cpsid_90810.html
    It does have the same requirements as AIR 2.6, so no real drawback to doing the overlay.

  • Needs tips for tuning Streams 10g propagation

    I setup bi-directional streams replication in Oracle 10.2.0.3 non-RAC between a pair of Solaris 10 servers on the same subnet with 100 Mbps fiber connection. Setup was done using MAINTAIN_SCHEMAS and it uses queue-to-queue propagation. Everything works well in both databases, but performance bottlenecks occur with propagation. Please advise on tuning options for Streams propagation.
    Example, while importing 100 million rows into the first DB we see the count continually rise in both databases at a ratio of 5:1. That is, the local db grows five times faster than the remote db, so by the time the first database had 20 million rows loaded the second db only received 4 million rows through replication. As time went on the ratio got a bit worse, all the way down to 10:1. Both DBs have a 3 GB SGA and 1 GB pga. The AWR/ADDM reports very good statistics.
    There are 4 capture processes in each db, and I raised the number of apply processes in each db to 6 with no impact detected after the change. All of these apply and capture processes seem to be starved for work. Capture continually goes into the state of "paused for flow control" while waiting for things to propagate out.
    From what I have read in the Oracle Streams documentation, propagation is not parallelized between a given source + destination pair. What options do I have?

    AQ_TM_PROCESSES sure makes life interesting. I agree with the recommendation to completely omit this parameter from your spfile and let Oracle auto-manage it, but that does not mean Streams will always work right. Sometimes flow control will get stuck in the on position, and the way you kick Oracle in the pants is to manually set AQ_TM_PROCESSES to some value and then remove the parameter later to get back to the recommended configuration.
    I have read a few things about creating more propagation jobs. That is, simulate parallelism through multiple jobs because propagation parallelism is not supported. Right now my database only has one schema that owns one dblink to a single remote DB, and there is one propagation job configured for q2q over that link. This was all setup by the Oracle scripts when I ran maintain_schemas to setup replication. I'd like more documentation from Oracle on how else it could be configured or modified to have more propagation jobs to simulate parallelism.
    Another angst ... the Oracle docs suggest when importing large tables to set commit=y so that if the process dies you can re-run the same import command and let Oracle ignore errors about existing rows. Yes, commit=y is great for importing into Streams because things will propagate and apply immediately with lower impact on flow / buffers / undo. But, wow, massive penalty if you follow their advice completely. For example, I killed the import after 3 million rows (6 hours) and restarted it. During the second attempt of importing data each of the 3 million rows generated an error but import kept going. It took 4 days to get past the errors! Recall it only took 6 hours to load the 3 million rows, but it took 96 hours to resume the import and get back to that same point. It would have been much better to truncate the table and let import reload things rather than generate errors.

  • Do we need antivirus for apple products especially the computers?

    do we need antivirus software to our apple gadgets or computers?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • External Hard Drive showing in Disk Utility - but not desktop.

    A little background: Yesterday, I moved my shelf where I have my modem, Airport Extreme, Airport Express and an external HD connected to the extreme to be a wireless HD for all users to access. Everything worked great - no problems whatsoever. Proble

  • Return process for the PO which has done the usage decision with QM

    Hi Guru, We are running below process right now, and stop there, don't know how to return to vendor: PO for external vendor -> Goods purchased physically arrive -> Create a inbound delivery for this PO -> Post the GR with the inbound delivery created

  • Problem About Date Format in Dashboard

    Hi All: I still have problem about date format in dashboard and dashboard prompt. When I use cast(dealdate as date) in dashboard prompt(coloumn formula of deal_date) and filter view(In edit view of filter coloumn formula) Then It converts the date fo

  • How to check the Network Connectivity between two systems.

    Hello Everyone, Please let me know different ways to check the network connectivity between two systems other than ping/traceroute commands. Thank You. Edited by: 835435 on Jan 20, 2012 11:43 AM Edited by: 835435 on Jan 20, 2012 11:44 AM

  • CRM System Object error

    Hi All,         I have created a system in portal to connect to CRM. I have given all required system parameters. Like R/3 details, WAS details, created system aliases and did user mapping also. But when I do Connection Tests for WAS and R/3, both ar