NSU with security products

Hi
Have had the following message from the Software update team.
regards
Ajak
Dear Updaters,
All posts and comments on this board are read and we use your valuable feedback to help improve our products and services. There are two areas I'd like to cover today:
F-Secure
We have received some reports that the firewall application "F-Secure Internet Security 2005" may prevent Nokia Software Updater from operating properly. There is nothing wrong with either of these applications - just a conflict of interest.
To overcome this conflict, we suggest changing your F-Secure firewall internet security level by the following steps:
1) Start / Programs / F-Secure Internet Security 2005 / Open F-Secure Internet Security 2005
2) Click "Home" button on the left side.
3) Find "Internet Shield" item on the right pane.
4) Click "Change..." link on the same line.
5) Change security level to "Normal" or lower.
6) Click OK, click Close.
Security Code
After updating your device with the Nokia Software Updater, many parameters (including device security code) are reset to default. The default device security code is 12345.
We continue to welcome all feedback on this or any other feature of the Nokia Software Updater.
Regards,
The Nokia Software Updater teamMessage Edited by ajak on 01-Nov-2006
02:38 PM
Message Edited by ajak on 09-Nov-2006
03:53 PM

Hi John,
The HyTrust Appliance has been deployed into a number of customers (including a bank that just purchased the product last month).  HyTrust is different than Altor or Catbird in that it addresses the security and compliance needs at the platform layer for access to the actual VMware ESX hosts and and Cisco Nexus 1000v switches providing access control, policy enforcement, segregation of duties, audit logging, and host hardening.  This is especially important as organizations move their machines into a managed services multi-tenant environment where various groups need to share access to a common platform.
Altor and Catbird focus on guest security making sure the workloads are in compliance with established security policies and standards.  There are a lot of players in this space such as Host Based Intrusion Prevention Systems (HIPS) offerings from TrendMicro, Symantec, and McAfee too.
I b e n
http://communities.vmware.com/people/iben

Similar Messages

  • User signature with security product configuration - Reg.

    Dear Experts,
    We got a requirement in Digital signature. Requirement is whenever result recording, UD for inspection lot, system should access external security product for user signature.
    I would like to know the configurations steps required for the above said from QM point of view.
    Expecting your valuable reply. Thanks in advance.
    Regards,
    Kumar

    You should read the configuration notes in SPRO.  It explains a lot about setting this up.
    In SPRO:
    Cross-Application Components>General Application Functions>Digital Signatures
          Define Basis Settings
          Specify Signature Method for Approval Using Simple Signature
          Signature Strategy
            Define Authorization Groups
            Define Individual Signatures
            Define Signature Strategies
    Read the notes on each item.  Setting up an exteranl verification system is talk about in the section  "Specify Signature Method for Approval Using Simple Signature".
    Good luck!
    FF

  • How to maintaing E-Business suite with latest product levels and bug/securi

    Hi All,
    How to maintaing E-Business suite with latest product levels and bug/security fixes?
    backup strataegies for database and E-BS suite?
    what is mean by gather user requirements?
    Please some one explain briefly...........
    Thanks

    Please post your question in the appropriate forum.
    E-Business Suite
    http://forums.oracle.com/forums/category.jspa?categoryID=3
    Thanks,
    Hussein

  • How to determine which of the Oracle security products have been installed

    Hello!
    I would like to determine whether or not the Oracle security products have been installed for an Oracle database.
    The Oracle security products are:
    * Oracle Database Vault
    * Oracle Audit Vault
    * Oracle Configuration Management
    * Oracle Total Recall
    * Oracle Advanced Security
    * Oracle Data Masking
    * Oracle Label Security
    * Oracle Secure Backup
    * Oracle Database Firewall
    So what I thought is to look at the "DBA_REGISTRY" table which displays information about the components loaded into the database.
    But on the other hand there also is the "V$OPTION" view which lists database options and features.
    Does anybody know, how I could correctly determine whether or not each of the product is installed?
    I guess for "Oracle Database Vault" I should query V$OPTION, but what should I do with the other ones? And in case DBA_REGISTRY would be the right table, how would the comp_ids look like for the products?
    SELECT 'Oracle Database Vault' , nvl( (SELECT VALUE FROM V$OPTION WHERE PARAMETER = 'Oracle Database Vault'),'FALSE') FROM sys.dual
    OR
    SELECT 'Oracle Database Vault' , nvl2( (SELECT 'valueFound' FROM DBA_REGISTRY WHERE comp_id = '??????' AND status NOT IN ('INVALID', 'REMOVING' , 'REMOVED')),'TRUE','FALSE') FROM sys.dual
    Thanks in advance
    Kai

    Hi kai;
    There are some script avaliable on net, first please check them and run it on test server first!
    http://www.google.com.tr/#hl=tr&biw=1259&bih=793&q=installed%2Bproducts%2Boracle&aq=f&aqi=&aql=&oq=&gs_rfai=&fp=71a534c4a5161590
    Secondly you can check oraInventory and also oratab file or you can run runInstaller and can check Installed product tab on installation screen
    Regard
    Helios

  • Minimum Number of registered custom id:s/numbers to be registered for purchasing all F-secure products from network

    How many custom-id:s / custom-numbers etc. customer has to register(minimum)in order to purchase All f-secure products on ALL possible platforms?

    The list of consumer fs-profucts i'm interested in can be found here(all of them,all possible platforms),i quess
    https://www.f-secure.com/fi_FI/web/home_fi/downloads
    from my point of view,the "desired state" would be the possibility to administer these products(licences etc) with single user-id and one customer number (sso-login etc..)
    In the meantime,it's Okey,if you'll try to keep these in minimum..

  • Mexico Digital invoice - SSF without an External security product

    Hi All,
    We are in the process of implementing Digital Invoice for Mexico. I have few queries regarding this.
    1. Can the digital signature be achieved with out any external security product ?
    2. If it is possible, then will it comply with the legal requirements for Mexico.
    I came across a SAP document wherein it was mentioned that "If you are using the user signature as the signature method, you require an external security product that is connected to your SAP system through SSF." Does  it mean that SAP standard SAPSECULIB supports only system signature  and not user signature ?
    Any pointers regarding the digital Signature implementation steps will be appreciated.

    Hi Sri,
    Would you pls check the installation of the security toolkit on your application server?
    Which security product do you use?
    The standard security product is SAPSECULIB (library sapsecu.dll).
    Please check the SSF initialization messages which are contained in each dev_w## developer trace (transaction ST11). When successful, the initializaion messages look like this:
    N  =================================================
    N  === SSF INITIALIZATION:
    N  ===...SSF Security Toolkit name SAPSECULIB .
    N  ===...SSF trace level is 0 .
    N  ===...SSF library is /usr/sap/<SID>/SYS/exe/run/sapsecu.dll .
    N  ===...SSF hash algorithm is SHA1 .
    N  ===...SSF symmetric encryption algorithm is DES-CBC .
    N  ===...sucessfully completed.
    N  =================================================
    General information for SAPSECULIB can be found in SAP note 354819.
    Best regards,
    Christoph
    P.S.: Please reward points for useful information.

  • Reconfigure issues in EPMA with hyperion products(essbase,HFM,Planning)

    Hi All,
    Reconfigure issues in EPMA with hyperion products(essbase,HFM,Planning,calc manager,etc.,)
    I have created new schema for foundation and one more schema for all other hyperion products and try to reconfigure but i unable to configure and all components are not shown in some hyperion products( in workspace in administer im unable to see classic application, in essbase im unable to see all application...).
    as per my understanding im unable to see *"Registerd with shared services"* for each products in the final stages of configure.
    Please try to know that what may be the cause.
    Thanks & Regards,
    Kittu.

    I can't answer the Import profile, though could you expand on
    mrojik-bubik wrote:
    In planning i was not able to import Security and planning units. Can you please help?Are you trying to import access permissions using LCM ?
    If you are importing security into a target application then I believe that the users will need to exist in the tables before you do so.
    I would run the provisionusers.cmd or go into the planning app and go to provision dimension security and click migrate identities.
    Cheers
    John
    http://john-goodwin.blogspot.com/

  • Will my F-Secure security product keep working when I upgrade to Windows 10?

    QuestionWill my F-Secure security product keep working when I upgrade to Windows 10?
    AnswerYes. All supported versions (12.1 or newer) of F-Secure security products are automatically migrated when you upgrade from Windows 7, Windows 8 or Windows 8.1. However, there are two conditions that may result in Windows 10 to remove your F-Secure application:
    If you are upgrading from Windows Vista or earlier to Windows 10, all applications are removed. You will then need to reinstall your F-Secure security product manually after the upgrade.
    If you are upgrading from Windows 7, 8, or 8.1, F-Secure security product might get removed depending if you do not have the supported version of F-Secure installed. You will then need to reinstall your F-Secure security product manually after the upgrade.
    Note: Make sure that you download the latest version of our product when reinstalling the product on Windows 10.

    You will likely find that drivers are not readily available for Windows 10 on HP site. When Windows 8 was released it was a slow process rolling out drivers and many early adopters were not happy. I agree with  -wait for a few months at least. Check your models support page for release of Win 10 drivers also before deciding.

  • What do I do if my F-Secure security product is partially removed when upgrading to Windows 10?

    QuestionWhat do I do if my F-Secure security product does not work after upgrading to Windows 10?
    AnswerOnce you have completed your Windows 10 upgrade, you may experience the following with your F-Secure security product:
    Your F-Secure security product does not start up.
    On your computer, you can't find the F-Secure security product icon in the system tray at the bottom of the screen.
    Your F-Secure security product does not show up in the list of installed apps and features in Settings > Systems > Apps & features.
    If this happens, it means that the Windows 10 upgrade has unfortunately removed some of the F-Secure security software components, and the product fails to start up as it should.
    To get your F-Secure security product working normally again, the F-Secure security product needs to be removed from your computer, and the product reinstalled. To do this:
    Download and run the Uninstallation Tool for Windows. You can download the tool here. The instructions for the Uninstallation Tool for Windows are here.  
    Reinstall the F-Secure security product on your computer. You can download the product from the F-Secure website or from your My SAFE account, depending on your subscription.

    Thanks but the tool only works if you have one working windows installation and it's designed for mult-boot systems.  I don't have a multi-boot system and when the Windows 10 upgrade fails there is no active working Windows install to turn to. The partition gets corrupted and has a "RAW" status until you run chkdsk with gets it back to "NTFS" status but it won't boot.  My only two options at this point is to restore back to an image backup or install Windows 7 all over again. I'm just going to give up on this HP laptop, to me it's just not compatible with running this upgrade, so unless someone else has any other ideas this attempt to upgrade is over. Thanks again

  • Is my Mac Air equipped with security software?

    Just bought a Macbook - Air.  Does it come equipped with security if I want to purchase something on line?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
    For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What security products are suggested for scrubbing rootkits from a Mac? There are good articles on similar repair for PCs and it makes me want to see if I can save this machine. It's in forensic recovery right now so I myself have not done anything yet.

    What security products are suggested for scrubbing rootkits from a Mac? There are good articles on similar repairs for other makes online. I would like to investigate whether a machine can be truly scrubbed or if it's best to retire it. I haven't done anything yet as it is a candidate for more extensive forensic recovery.
    Also, I am not sure if various malicious spoofing and cloaking tricks (making Wi-Fi appear off when it is on, hiding unauthorized sharing/remote access, falsifying System Preferences preference panes, etc.) are resolved by a thorough drive erase or are more similar to APTs?
    Finally, is there any emerging information regarding APT hiding places other than the recovery partition? I have heard mention of the EFI, for example, but it seems unproven and unlikely. Some people have also mentioned the RAM.
    This is an upsetting topic to some people, including me, so I appreciate circumspect, measured responses. Thanks! And don't try to answer all my questions if you really just want to comment or answer one. All thoughts are appreciated.

    Hi, Lincoln,
    A straightforward question. You are correct in recognizing the difference between tentative conclusion and certainty. Here are our main reasons:
    1. Incoming items noted on the console (or console sub logs) and Activity Monitor after defenses are overcome, and which are brought in by an unwelcome remote user, often have a process name and the word "kit." (Bear with me.) We soon observe the process is under attack, from terminal evidence and soon, decreased or lost functionality of the process. The terminal generally reports alteration of specific kernel behaviors. A simple example (that may or may not be accompanied by kernel changes and may simply alter permissions) is modifying Disk Utility such that key uses are unavailable. You can see how an attacker might value disabling partition views, mounting and permission repair. In retrospect, DU might not be a root alteration. I was thinking that its relation to fsck flagged it as a possible ring 0 item. I may need to know core parameters of a good example to pick strong ones.
    2. Incoming folders hidden for possible later use contained bundles of similar root kits, including some not applicable to Macs. From what I have read from reasonably credible sources, root kits are sold and traded both singly and in bundles.
    3. Root kits are a logical next choice for our attackers, as various prior techniques hindered us but did not paralyze us.
    4. One of the most authoritative articles I found was about PCs not Macs. I noted the assertion, undocumented, that an estimated one million computers are infected by root kit manipulations, and underscored that the kits can be used by people with low computer skills.
    5. MacAfee lists root kits (by description, not name) as a top pop five threat prediction in the coming year, though again, the emphasis is on PCs.
    Linc, I am trying to show a spectrum of observations and info that have shaped my thinking. To retrieve better captured evidence requires significant legwork at this time, but it is something I am willing to do if you can be patient. Understand this long attack has been like a natural disaster to us.
    I have not linked a few articles of interest because I forget if that's allowed. If so, I'd be glad to.
    After reviewing this partial answer, you may form another hypothesis. If so, please share it. I am comfortable with my position but not clinging to it.
    Thanks for your interest. Looking forward to your thoughts.
    Oh, yeah: some material is out for analysis, so we should have credible opinions pretty soon. Not positive exactly when.

  • Maintaing EBS with latest product

    Hi All,
    please some one explain me briefly about these questions
    1.Which backup strategies best for database and E-business suite?
    2.How to maintaing E-Business suite with latest product levels and bug/security fixes?

    Hi,
    1.Which backup strategies best for database and E-business suite?Please see old threads for similar discussion.
    Backup
    http://forums.oracle.com/forums/search.jspa?threadID=&q=Backup&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001
    2.How to maintaing E-Business suite with latest product levels and bug/security fixes?Please see these docs.
    Oracle Applications Current Patchset Comparison Utility - patchsets.sh [ID 139684.1]
    Oracle E-Business Suite Releases 11i and 12 Critical Patch Update Knowledge Document (October 2010) [ID 987438.1]
    Oracle E-Business Suite Recommended Performance Patches [ID 244040.1]
    Download the latest/recommended patches from (My Oracle Support > Patches & Updates > Recommended 11i/R12 Patches -- Latest 11i/R12 Packs)
    Thanks,
    Hussein

  • Is there a way to create videos 'fast' with adobe products?

    I am an affiliate marketer. I have produced a video  Inspro Program: personal development planned and achieved - YouTube and I would like to know if there are ways to create videos within maybe 10 minutes with Adobe products. Please suggest a quick method.

    Turnaround times ultimately depend on the skill of the person doing the work just as much as the programs' capabilities. And 10 minutes for editing a video? That's just ridiculous. Importing/ exporting footage or tweaking voice-over audio alone could take longer as could replacing/ re-typing text.
    Mylenium

  • Problem with security in Weblogic 8.1

    Hi, my name is Jesús Chávez Reyes and it is my first time in this forum.
    My problem is related with security in WL 8.1 because I am new in this matter. My problem is :
    I work in change completely the security of an enterprise application that is deployed in WebLogic 8.1 and your security is a based in a RDBMS Custom Realm in Compatibility Security.
    This application is composed by 18 EJB and 4 web applications.
    The objective of this change is:
    1.- Use a external system for authentication (though a web service).
    2.- If is possible: unbind security of WL for in a future deploy the application in other Server(Jboss for example).
    I'm trying to implement security with Acegi and Spring in a one of the four web applications. I deleted all it has to do with security in deploy descriptors and deleted the realm.
    At this point I can login in , using the Web Service of the external application, without difficulty.
    The problem arises when the application makes an instance of the EJB's. This is the way how the application makes the instances of the EJB:
    InitialContext context = new InitialContext( null );
    Object   = context.lookup(name); // name=GroupSessionFacade   (JNDI Name of EJB)
    EJBHome home = (EJBHome) objref;
    +...+
    GroupSessionFacadeHome home = (GroupSessionFacadeHome) objref;
    groupFacade = home.create();
    In this point GroupSessionFacadeHome home = (GroupSessionFacadeHome) objref the application throws ClassCastException. This happens with all EJB.
    The application work fine before of to use Acegi and remove all it has to do with security. I inspect the Object " objref " before and after and this happen:
    BEFORE
    Class Name: control.ejb.GroupSessionFacadek1696tHomeImpl
    SuperClass : weblogic.ejb20.internal.StatelessEJBHome
    Implement : weblogic.ejb20.internal.StatelessEJBHome , control.ejb.GroupSessionFacadeHome
    AFTER
    Class Name: control.ejb.GroupSessionFacadek1696tHomeImpl
    SuperClass : weblogic.ejb20.internal.StatelessEJBHome
    Implement : weblogic.ejb20.internal.StatelessEJBHome
    Here The object no implements the InterfaceHome "control.ejb.GroupSessionFacadeHome" !!!!!!!!!, this is the cause of ClassCastException.
    What is the problem? Is it a security problem? and if so what do I need to remove or add in the application and has no dependence on anything for the security of Web Logic?
    The deploy descriptors are:
    IN THE WEB APPLICATION
    web.xml
    +<ejb-ref>+
    +<description>Reference to the GroupSessionFacade</description>+
    +<ejb-ref-name>ejb/GroupSessionFacade</ejb-ref-name>+
    +<ejb-ref-type>Session</ejb-ref-type>+
    +<home>control.ejb.GroupSessionFacadeHome</home>+
    +<remote>control.ejb.GroupSessionFacade</remote>+
    +</ejb-ref>+
    IN THE EJB
    ejb-jar.xml
    +<?xml version="1.0"?>+
    +<!DOCTYPE ejb-jar PUBLIC '-//Sun Microsystems, Inc.//DTD Enterprise JavaBeans 2.0//EN' 'http://java.sun.com/dtd/ejb-jar20.dtd'>+
    +<ejb-jar>+
    +<enterprise-beans>+
    +<session>+
    +<description>GroupSessionFacade</description>+
    +<ejb-name>GroupSessionFacade</ejb-name>+
    +<home>control.ejb.GroupSessionFacadeHome</home>+
    +<remote>control.ejb.GroupSessionFacade</remote>+
    +<ejb-class>control.ejb.GroupSessionFacadeEJB</ejb-class>+
    +<session-type>Stateless</session-type>+
    +<transaction-type>Container</transaction-type>+
    +<ejb-ref>+
    +<ejb-ref-name>ejb/UserManager</ejb-ref-name>+
    +<ejb-ref-type>Session</ejb-ref-type>+
    +<home>control.ejb.UserManagerHome</home>+
    +<remote>control.ejb.UserManager</remote>+
    +</ejb-ref>+
    +<resource-ref>+
    +....+
    +     </enterprise-beans>+
    +<assembly-descriptor>+
    +<container-transaction>+
    +<method>+
    +<ejb-name>GroupSessionFacade</ejb-name>+
    +<method-name>*</method-name>+
    +</method>+
    +<trans-attribute>NotSupported</trans-attribute>+
    +</container-transaction>+
    +</assembly-descriptor>+
    +</ejb-jar>+
    weblogic-ejb-jar.xml
    +<?xml version="1.0"?>+
    +<!DOCTYPE weblogic-ejb-jar PUBLIC+
    +"-//BEA Systems, Inc.//DTD WebLogic 8.1.0 EJB//EN"+
    +"http://www.bea.com/servers/wls810/dtd/weblogic-ejb-jar.dtd">+
    +<weblogic-ejb-jar>+
    +<weblogic-enterprise-bean>+
    +<ejb-name>GroupSessionFacade</ejb-name>+
    +<transaction-descriptor>+
    +<trans-timeout-seconds>600</trans-timeout-seconds>+
    +</transaction-descriptor>+
    +...+
    +<enable-call-by-reference>True</enable-call-by-reference>+
    +<jndi-name>GroupSessionFacade</jndi-name>+
    +</weblogic-enterprise-bean>+
    +</weblogic-ejb-jar>+

    Hi,
    This is the forum to discuss questions and feedback for Microsoft Visio, I'll move your question to the SSIS forum
    http://social.technet.microsoft.com/Forums/sqlserver/en-US/home?forum=sqlintegrationservices
    The reason why we recommend posting appropriately is you will get the most qualified pool of respondents, and other partners who read the forums regularly can either share their knowledge or learn from your interaction with us. Thank you for your understanding.
    George Zhao
    TechNet Community Support

  • New to Apple products (finally) - can I use my Itunes account with multiple products e.g. Iphone and Ipad?

    New to Apple products (finally) - can I use my Itunes account with multiple products e.g. Iphone and Ipad?

    Oh yes! Apple will be happy for you to buy as many Apple products as you can afford.
    As and when needed, each can be given its own selections of content to sync with.
    tt2

Maybe you are looking for

  • Photo Pop-Up Window Help

    I have a kinda particular question about the way my photos are shown on my site. I am creating a site as an online art gallery and I want each picture to pop-up in it's own window. I have seen tdizzle's question and will try that, but my needs go a l

  • Regarding include in structure definition

    Is there any performance wise difference in using Begin of <struct>, include ztab , End of <struct>. and Begin of <struct>, field1 type ztab-field1, field2 type ztab-field2, End of <struct>. when ztab contains field1 and field2.

  • BO XIR2 Installation

    Did anyone do a new BOXI R2 installation? I wanted to have an idea as to how much time did it take to install BO and have the repository set up? Thanks

  • Why cannot copy routine of shipment be used to transfer delivery data?

    Hi i create new copy routine for shipment to transfer some data of delivery (such as; shipping cond). I would like to use copy routine rather than user exit. Who have the best solution , please tell me. Best Regards, Autsnee P Message was edited by:

  • "Script failed (language is formcalc...)" - "Error: Argument mismatch..."

    Hi there, I temporarily switched from JavaScript to FormCalc just to see what functions were available.  It didn't have what I was looking for, so I did not add any functions, I just browsed, then I switched back to JavaScript.  However, now when I v