Onedrive integration in WD NAS firmware

My onedrive capacity is 10 TB and i like to witness a nice integration in the NAS portal to backup/ synchronize my data automatically whenever i add a file in the WD NAS system.
meanwhile; I move my data manually copy and paste them into onedrive.

SOLVED!! and I want to share the solution which worked for me with everybody here. Ultimately I had to install nettalk 2.2 on my NAS as described here: http://mybookworld.wikidot.com/netatalk2-2-on-whitelight . A nice description on how to do that can be found here: http://forums.macrumors.com/showthread.php?t=1102423 .
One last remark: When asked about the "DHX2 login process", I opted to install the original version, so I can confirm this one works too.

Similar Messages

  • Reposting: Unable to Update Integrated Management Module (IMM) firmware

    This post was originally posted on IBM’s developerWorks public forum (https://www.ibm.com/developerworks/community/forums/html/topic?id=0e1070ab-fbdc-4aa0-b9ea-3f9e391759...  The following is a summary of the post issue and the response.
    Issue:
    I'm using the UpdateXpress System Pack Installer to update the Integrated Management Module (IMM) firmware on my System X server (model 7915) running Windows Server 2012 R2 Server Core.
    When I run the command to install the update (ibm_utl_uxspi_9.51_winsrvr_32-64.exe up -l "\\server\share" -m 7915) and it gets to the point where it is ready to install the IMM firmware update, it fails with the message "Unable to ping through IMM" and then references a log file.  According to the log file, the system is trying to ping "169.254.95.118" which is not the pre configured static IP address on the IMM interface.
    I am able to remotely ping the static IP that I've configured and I'm able to log into the IMM web interface. Everything appears to be working correctly with the IMM, except that this UpdateXpress installer is not picking up the configured IMM’s static address.
    Solution:
    The UpdateXpress System Pack installer does not use the Integrated Management Module (IMM)'s interface and it will try to contact the card via the USB-LAN interface via the OS. The 169 address is the DHCP address assigned by the OS to the USB-LAN card (you should see it in a list of interfaces). When you run the installer from the OS, it will search for the card via the USB-LAN and if it's blocked it will fail.  Any security restrictions on that interface or a firewall running on it will block it.
    Since you can login to the card itself, you can always just upload the IMM firmware package (.exe or .bin) to the card directly via its own Firmware Update function.  This option is on the left about halfway down the menu. All you need to do is to give it the file path to where the package is located and follow the prompts for the upload and update.
    Or, you can remove the static IP you assigned and set it back to DHCP.  Typically the installer will find the interface, enable it as needed, and then an IP address will get assigned automatically.

    Hi Lawrence,
    Sorry for the delay, i was Out of station. Also, one info i have to share with you, there is an another server with same version (7.5.7601)
    and is getting FEP updates without any fail.
    I haven't rebooted the server because it is critical server, so i have applied the remaining and here is the logs.
    =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
    2014-03-02 21:57:00:057
    Triggering AU detection through DetectNow API
    2014-03-02 21:57:00:057
    Can not perform non-interactive scan if AU is interactive-only
    2014-03-02 22:01:14:641
    WARNING: GetConfig failure, error = 0x80244019, soap client error = 10, soap error code = 0, HTTP status code = 404
    2014-03-02 22:01:14:641
    WARNING: PTError: 0x80244019
    2014-03-02 22:01:14:641
    WARNING: GetConfig_WithRecovery failed: 0x80244019
    2014-03-02 22:01:14:641
    WARNING: RefreshConfig failed: 0x80244019
    2014-03-02 22:01:14:641
    WARNING: RefreshPTState failed: 0x80244019
    2014-03-02 22:01:14:641
    WARNING: PTError: 0x80244019
    2014-03-02 22:01:14:641
    WARNING: Reporter failed to upload events with hr = 80244019.
    2014-03-02 22:26:16:148
    WARNING: GetConfig failure, error = 0x80244019, soap client error = 10, soap error code = 0, HTTP status code = 404
    2014-03-02 22:26:16:148
    WARNING: PTError: 0x80244019
    2014-03-02 22:26:16:148
    WARNING: GetConfig_WithRecovery failed: 0x80244019
    2014-03-02 22:26:16:148
    WARNING: RefreshConfig failed: 0x80244019
    2014-03-02 22:26:16:148
    WARNING: RefreshPTState failed: 0x80244019
    2014-03-02 22:26:16:148
    WARNING: PTError: 0x80244019
    2014-03-02 22:26:16:148
    WARNING: Reporter failed to upload events with hr = 80244019.
    =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
    Jay :)

  • Office 365 (Word) Onedrive integration on a Mac

    Friends, I have recently started using a Mac computer. I've been trying to understand how does the integration of  Office 365 (Word)  and Onedrive work on a Mac, yet had no success so far. These is the problem:
    When using Office 365 (Word) on a Windows computer, whenever I wanted to open or save a file I was asked if I wanted to open or save it locally or on my Onedrive folders. The integration of Word and Onedrive on a Mac seems very poor, unless I am missing something here. On a Mac it seems that once I start Word, if I want to open a Onedrive file I have to go out of the application to do it. I have to go to the Onedrive folder where my file is located and then open it, which will result on Word opening it. Is there any way to, just as in a Windows environment, open and save files to Onedrive without having to leave Word?
    Hope someone can help me here.

    The solution is very simple.
    You have to install Microsoft OneDrive from the Mac AppStore. It synchronizes your OneDrive folders to the Mac. Afterwards, you usually find a OneDrive folder in your Home folder. From there, you can access all files as usual. If you change any file, it will be synchronized in both ways (Mac to OneDrive, OneDrive to Mac).
    I use this on a daily basis and have no problems with it.
    Have a nice day!

  • Buffalo's NAS firmware updated for Lion mac OS X 10.7

    New firmware available for Buffalo's NAS to be Lion compatible
    Time machine support to come (only thing still not working)
    here is the link to choose your NAS, then download Mac Intel text and driver files for installation.
    Exemple : Concerning my
    Buffalo Linkstation Duo 2To (France) model is "LS-WXL" it's here  :
    Text file to be read    / 3 Ko / July 25th, 2011
    Last Firmware (1.52) / 254,16 Mo / July 25th, 2011
    Don't forget to re-activate DHCAST128 before updating :
    see my post in french here for a step by step tutorial (to re-activate DHCAST128 it's at the very end of post).

    OK I found a free and easy solution.
    Since a lot of people report they are able to access their NAS using apps other than the Finder itself, I decided to look for a free Lion-compatible File Manager to use instead of Finder.
    I have found muCommander ( http://www.mucommander.com/ ) and indeed it works fine. All I did was click on the button highlighted bellow, go to "bonjour services" and select my NAS. It prompted me for my username and password and voilá, it works fine.
    I keep Finder for everyday use and just load muCommander when I want to access the NAS. At least now I don't have to start my WinXP VM anymore just to access it.
    Hope it helps you.

  • SharePoint w/ OneDrive Integration - Content Rules Question

    I have set up and configured SharePoint 2013's "Content Rules". I have also tested it, and it is functioning properly. However, I am having an issue (obviously!).
    If I am in the web interface of SharePoint 2013, logged into my site, and I upload a file using the "Upload" button, the file is uploaded and sorted 100% perfectly.
    If I use OneDrive, however, (mind you, the Drop-off library IS sync'd and that is where I am uploading the docs) the file shows up in the Drop-off library and just "sits there". The Content rules are never applied or ran. 
    Why!?
    If I can get some assistance or recommendations, I would greatly appreciate it!
    Thank you

    Hi anitsirK06,
    Based on my tests, using "Upload one document" dialog of "Drop Off Library" directly to upload one document will trigger the router rule immediately.
    When I sync the document from OneDrive to "Drop Off Library", it will trigger the router rule only when I run the timer job "Content Organizer Processing" for this particular web applicaiton, so you can set the proper schedule interval for this
    particular web application timer job for solving this issue.
    Thanks
    Daniel Yang
    TechNet Community Support

  • SharePoint with OneDrive for Business

    Hi, I'm looking for some clarification on how OneDrive works with SharePoint. The person who set up SharePoint is no longer with the company and we do not have expertise on this subject.
    We have three SharePoint 2013 servers - a database server, a web server, and a Web Apps server.
    OneDrive for Business integration works fine. However, I am now trying to upload some 20+ GB at a time but keep getting the error "there is not enough space on SharePoint. You need an additional x GB to copy these files".
    I've checked all the servers and I have sufficient free space on them - storage is presented to vSphere from the SAN.
    My question is: how exactly does the data get to its final destination on the database server? Does it go through a C: drive on one of those servers and that's why I'm getting the error message? Is there a specific service I can check to see if it's running
    to pinpoint the location of the OneDrive integration?
    Thanks in advance.

    Did you check for quotas on the MySite Site Collection? By default, I believe it is 100MB. Also, no one file can be greater than 2GB. This is a SharePoint limit.
    Trevor Seward
    Follow or contact me at...
    &nbsp&nbsp
    This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs.

  • Microsoft Calendar integration.

      [Well, these are some of my ideas, and some of them are more than simple ''feature parity'', having M.S.N. Weather- and OneDrive-integration will set it apart from most other popular services, though Google+ Hangouts already offers Google Drive-integration, so users shall just find this a welcome feature (especially since the Google Drive integration is one of my favourite features on Google+ Hangouts).]

    Hi Shirin,
    Thanks for your reply, but we have the integration setup, and the mail is send as a attached, my problem is that the the start time for the course in not correct booked in outlook.
    it seems like there is a diffence between the SAP time sone and the outlook time zone.
    any suggestions.
    Regards, Lars

  • Creative Zen Sleek and the Now Playing-part of the firmw

    Hi,
    this week I got my Creative Zen Sleek. I'm very satisfied, except for one thing - the Now Playing-part of the firmware (the list with all the songs queued up). In the old Nomad Jukebox Zen firmware, the list was divided by artist or album name. On the Zen Sleek, however, the list is just going on without even showing which songs belonging to which album etc.
    This is really annoying me - would it be possible to fix this, or at least consider the possibility for this to be integrated in the next firmware upgrade?
    Sincerely
    Hein Haraldson Berg

    & Putting the X-Fi into Recovery Mode and selecting clean up seemed to fix the problem, but it does still come up randomly.
    The clean up puts the player menus back to their defaults though... any chance that in a future fix for the player, this wouldn't occur?

  • Time Machine no longer opening after upgrade to 10.7

    Hello All,
    Quite a classic question, judging from the volume of posts regarding this topic, but could not find a step by step solution, so help would be very appreciated.
    I am backing up my data using Time Machine on a Netgear ReadyNAS Duo.
    It worked just fine as long as my Mac Pro was running 10.6.
    While the backups still seem to happen when launched by Time Machine, i have lost the ability to open Time Machine (and get to the Star Wars interface to restaure older versions of some files) since I upgraded to 10.7.5
    Time Machine works just fine for another Mac under 10.6 connected to the same Netgear NAS via the same home Ethernet switch.
    I have checked that the NAS firmware is up to date (RAIDiator 4.1.12 is installed). I can see the NAS on the Netgear Frontview interface and on the finder. I can see the sparsebundle created on the NAS from the Finder.
    Netgear support is unsure what to do as this looks in a way more an issue with Lion rather than a Netgear issue (it works fine with the mac running 10.6)
    Any suggestion would be appreciated, I know i could always delete the non-functionning sparsebundle and try again, but that seems a bit drastic and deleting sparsebundles is not quite straightforward.

    That's why I mentioned both. Sometimes installers muck up low-level settings.

  • Continous mDNSPlatformTCPConnect ("Permission denied") errors. What does this mean? What should I do to resolve this?

    MB Air (1.8GHz); MacOS 10.9.2
    In the System Log I see frequent and, at times, continuous (up to several per second) entries like the following:
    4/16/14 9:00:13.936 AM mDNSResponder[73]: ERROR: mDNSPlatformTCPConnect - connect failed: socket 63: Error 13 (Permission denied) length 16
    While I can't point to any specific system issues that result from this, I do have the following (perhaps related, perhaps unrelated) problems:
    1. Over time, memory pressure gradually increases until, every few days, I need to re-boot. I'm not accustomed to having to perform "maintenance boots" under MacOS. (For example, my Mac Mini, also running Mavericks, runs for weeks/months without needing to re-boot; it's my household media server, running iTunes but that's about it.) Feels like a memory leak to me.
    2. TimeMachine is unpredictable for me. When I have TimeMachine enabled, it will do incremental backups for up to a day or so, then the machine ends up in what looks like a run loop, with apps (such as Mail) in a "not responding" state. Can't reliably force-quit those apps at that time - pretty much have to hard-boot the machine and restart. (Note that I'm using a QNAP NAS disk array; has worked fine in the past, pre Mavericks; I'm running latest/greatest NAS firmware.)
    At any rate, any insights regarding the DNS error (what it means; what triggers it; whether I should care; if so, what I should do to quell it; etc.) deeply appreciated.
    Doug Engfer

    May I ask why you want me to remove the AV software?
    Because it's the likely cause of your problem, and even if it isn't, it's worse than useless.
    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Research has shown that most successful attacks are "zero-day"—that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security makes you more vulnerable.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize by the file name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need any software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's seldom a reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may be useful if an ill-informed network administrator says you must run some kind of "anti-virus" application.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining Bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Do you have to upgrade to Windows 8.1 or is this a squeeze chute with no option?

    I have finally got my computer to operate without any problems and all my programs work fine, the last time I upgraded to Windows 8.1 I had all kind of issues. So my question is; do you have to upgrade to Windows 8.1 or is this a squeeze chute with no option? Right now I can decide if I want to use Skydrive or not but with Windows 8.1 with Onedrive it automaticlly loads my pictures and documents with out my knowledge and I have to go sreaching to see where they went. Remember I am old and want to do it my way. Pavilion p6 2378, with Windows 8, 64bit.
    This question was solved.
    View Solution.

    You are not obliged to update to 8.1 but it is beneficial as it is more stable.  With 8.1 you will be eligible to get the free Windows 10 upgrade when it comes out at the end of the year.
    As far as Onedive goes you can disable the uploading of your files by changing the settings, also see this:
    http://www.eightforums.com/tutorials/29426-onedrive-integration-windows-8-1-enable-disable.html
    Please mark my post as SOLVED if it has resolved your problem. It helps others with similar situations.

  • Bug - Where to Submit?

    MY WRTG54 (Version 6) is trying to Masquerade DCC connections for IRC, even though I do not wish for it do so, and there doesn't seem to be any way to stop it (even for the host set as DMZ).
    An example:
    Typing the command "//quote PRIVMSG $me : $+ $chr(01) $+ DCC CHAT chat $longip(192.168.1.4) 80 $+ $chr(01) $+ $crlf,"
    I attempt to connect to a local webserver. The output is echoed in my IRC client's status bar:
    "-> Server: PRIVMSG daryl : DCC CHAT chat 3232235780 80
    When looking at what transpired through a packet capture utility (Wireshark), this is what is seen.
    However, when the packet comes back through to my client from the IRC server, it looks like this.
    The IP address for the DCC has clearly been mangled, along with the port number. I certainly did not wish for this to happen. It is very annoying, especially when I want to use DCC chats to 'telnet' out, or when I want to specify custom source ports for DCC chats and sends.
    This did not occur before upgrading the device from default firmware.
    I would like to know if there will be (or could be) a fix without reverting to old firmware. Most likely, I will be purchasing an access point from a different company (anecdote: in the short term, I will be using the WRT54G as an AP, uplinking it to a switch with a Linux router on it - I only bought the WRT54G because it was cheaper than the WAP54G [or, actually, the USR device I wanted]), because I've had pretty bad experiences with this device. It does not seem to be well suited for more technical users, though, strangely, I've used several versions of the BEFSR41 wired device to much success in the past. From that experience, I would have expected more.
    As an aside, will loopback support ever be integrated into the official firmware? You can clearly see from the packet capture that the SYN was black-holed.
    (also, and slightly reaching, is there ANY chance for IPv6-in-4 passthrough? ever?)

    You can e-mail it to [email protected]

  • Unable to integrate SimpleImpl example into split-level directory structure

    I am trying to integrate the SimpleImpl web service example into my weblogic server 9.1 application, but I am at a dead end.
    Here is what I have so far.
    A WSDL that is visible at a path of http://<host>:<port>/simple/SimpleService?WSDL
    A JWS_WebService.jsp that loads and appears to retrieve the WSDL.
    The simpleImpl example is a sub-deployment of module-type 'wsee' inside an app-deployment of module-type 'ear'.
    I did not put the library-ref (generated by jwsc) from the weblogic-application.xml in my ear's weblogic-application.xml.
    When I go to the JWS_WebService.jsp in my web app (another sub-deployment in my ear). I submit the example query and get the following error. Has anyone seen this before?
    sayHello() returned:
    java.rmi.RemoteException: SOAPFaultException - FaultCode [{http://schemas.xmlsoap.org/soap/envelope/}Client.Authentication] FaultString [Access Denied to operation sayHello] FaultActor [null] Detail [weblogic.wsee.util.AccessException: Access Denied to operation sayHello
         at weblogic.wsee.security.AuthorizationHandler.handleRequest(AuthorizationHandler.java:78)
         at weblogic.wsee.handler.HandlerIterator.handleRequest(HandlerIterator.java:127)
         at weblogic.wsee.ws.dispatch.server.ServerDispatcher.dispatch(ServerDispatcher.java:84)
         at weblogic.wsee.ws.WsSkel.invoke(WsSkel.java:60)
         at weblogic.wsee.server.servlet.SoapProcessor.handlePost(SoapProcessor.java:66)
         at weblogic.wsee.server.servlet.SoapProcessor.process(SoapProcessor.java:44)
         at weblogic.wsee.server.servlet.BaseWSServlet$AuthorizedInvoke.run(BaseWSServlet.java:124)
         at weblogic.wsee.server.servlet.BaseWSServlet.service(BaseWSServlet.java:53)
         at javax.servlet.http.HttpServlet.service(HttpServlet.java:856)
         at weblogic.servlet.internal.StubSecurityHelper$ServletServiceAction.run(StubSecurityHelper.java:225)
         at weblogic.servlet.internal.StubSecurityHelper.invokeServlet(StubSecurityHelper.java:127)
         at weblogic.servlet.internal.ServletStubImpl.execute(ServletStubImpl.java:272)
         at weblogic.servlet.internal.ServletStubImpl.execute(ServletStubImpl.java:165)
         at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:3153)
         at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
         at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:121)
         at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:1973)
         at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:1880)
         at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1310)
         at weblogic.work.ExecuteThread.execute(ExecuteThread.java:207)
         at weblogic.work.ExecuteThread.run(ExecuteThread.java:179)
    Thanks,
    Robb                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

    I confirm : everyone on the planet is getting the same issue : from windows 8.1 to a NAS : doesn't copy without message, just creates silently the first folder and leave it empty.
    every other combination works : from windows 7 to the same NAS, windows 8.1 to an USB key, everything works.
    for your information, a NAS is a standalone device, not a computer, you can only manage it remotely.
    so just stop asking about details about the error message, there isn't any.
    this is not something you can fix by making settings or reading KB. you have to make the test yourself if you don't believe your customers, and once you'll understand that this is a serious bug, you have to escalate to the development teams to alter the
    windows 8 code to make it work almost as well as a windows 7 can.
    pardon me if i speak hardly, but i've just made a dozen of internet searches, and the whole platet seems to be aware of this issue, you are the only one who ignores it or ask an unrelated question. on another hand, your are the ony ones that can fix it.
    Don't try to incriminate the NAS firmware as you were able to deal with it in windows 7.
    if you need more info, just make an internet search with the following terms :
    "windows 8.1" when copying on a "network drive" nas

  • Mount_webdav: Error Code -8060 occur, if i want to open the share in my finder window

    Hello,
    since the update from 10.6 to 10.7.1 i cant use some webdav shares anymore.
    Every time when i mount our webdav share and open it afterwards in a Finder window the error
    The operation can't be completed:
    An unexpected error occurred (error code -8060)
    does anyone know something about this or a similar problem?
    best regards,
    martin

    Hello,
    Last night I upgraded my NAS firmware (Netgear Stora) and now I have exactly the same problem.
    The Admin account Finder locks when trying to mount the AFP share. If I force unmount (sudo umount -f ...) then I see the same Finder error message code 8060. Any other account (and any other Mac) mounts the same share OK.
    Strangely, manually mounting the share via Terminal works perfectly. So does SMB mounting via the Finder.
    I've tried deleting all Finder and AppleShareClient preferences, with no effect.
    For some reason the Finder in the admin account can't complete the mount (permissions maybe?).
    Regards,
    Mick

  • S60 (3rd) N82 Web Browsing - unable to view embedd...

    Nokia N8 (68.01)
    V30.0.019
    23-07-08
    RM-313
    If I use the default Nokia browser and go to a web page on the BBC website which has an embedded flash video to watch, then the embedded video screen goes black for a second, then White with a "Flash" placeholder in the bottom of the screen. I CANNOT watch ANY such video content from the BBC website.
    for example, go to the BBC.CO.UK/FOOTBALL page, and click on any of the video clips there.
    Using a PC, and "Right-Clicking" on the actual embedded video player  it tells me it is the BBC Media Player V2.10.7938.7967.
    What have I tried ?   well,
    I have allowed all cookies and clkeared cache down repeatedly - no difference.
    I have installed the latest Flash Lite from Adobe - no difference.
    I have tried Opera Mini - no difference
    I have tried my GF's brand new 5800 - and it at least gets the black screen with the spinning circle progress bar thingy.......but still no video.
    I CAN watch BBC iPlayer videos OK using the iPlayer application, butt his problem with the vidoe clips is driving me insane and would be ecstatic if someone could help with this issue.....please....
    thanks in advance,
    Hurley4Prez
    Solved!
    Go to Solution.

    Although it is integrated into the phone firmware, it is not developed by Nokia, so they can't influence when it gets updated. Whether Windows Mobile is any more up to date is something you'd have to check with its fanbase.

Maybe you are looking for