Performance vs. Security

I am a high school Media Tech teacher with a CS4 lab.  Each computer has  2G Ram/ 50G HD and yet producing our 5-7 minutes announcements each morning has become a major pain.  The computer freezes OFTEN.  I monitor the students closely (ok I'm pretty much sitting next to them as they edit these days) and cannot tell that they are doing anything out of the ordinary.   I highly suspect our technology gestapo of installing some type of security program that is not compatible with the CS4.  (It did take them more than 2 months to realize the computer had to have a local profile in order to work)
Any thoughts or suggestions?
Thanks!

Is the "50G HD" a typo? Even with just Windows XP and PrPro on the system, a lot has to be fit onto one HDD and such a small one, at that. Plus, you have PrPro and Windows trying to read/write to the same disc at once. This could be especially troubling, if there is some IT snooper program working, plus say Windows Indexing.
Now, you are networked, so maybe you've found a way to keep all Assets, Scratch Disks, Exports, etc. on a networked drive. Still, with the way that PrPro hates networks, I'd be surprised if there were not problems along the way.
I know that Harm has some networking, but think that he mainly uses his NAS for Asset storage and system backups.
If his idea of the administrator's rights does not pay off, maybe get the IT person to sit in on a session. I know that educational budgets are tight and each class fights for every $, but maybe IT could help you get just a bit more for your students.
Good luck, and let us know how it goes. We see a lot of educational users of PrPro here, but most of us have stand-alone editing machines and do not have to fight multiple users and networks.
Hunt

Similar Messages

  • Is there a way to view Flash videos on my iMac without downloading Adobe Flash Player? I'm concerned about performance and security with Flash Player.

    Is there a way to view Flash videos on my iMac without downloading Adobe Flash Player? I'm concerned about performance and security with Adobe Flash Player.

    If the video is only available in a format that requires Flash player : then no.
    However, a great many can also be viewed in an HTML5 version, in which case http://hoyois.github.io/safariextensions/clicktoplugin/ or similar can be set up so that Flash never runs unless you specifically choose it to.

  • SQL Performance and Security

    Help needed here please. I am new to this concept and i am working on a tutorial based on SQL performance and security. I have worked my head round this but now i am stuck.
    Here is the questions:
    1. Analyse possible performance problems, and suggest solutions for each of the following transactions against the database
    a) A manager of a project needs to inspect total planned and actual hours spent on a project broken down by activity.
    e.g     
    Project: xxxxxxxxxxxxxx
    Activity Code          planned     actual (to date)
         1          20          25
         2          30          30
         3          40          24
    Total               300          200
    Note that actual time spent on an activity must be calculated from the WORK UNIT table.
    b)On several lists (e.g. list or combo boxes) in the on-line system it is necessary to identify completed, current, or future projects.
    2. Security: Justify and implement solutions at the server that meet the following security requirements
    (i)Only members of the Corporate Strategy Department (which is an organisation unit) should be able to enter, update and delete data in the project table. All users should be able to read this information.
    (ii)Employees should only be able to read information from the project table (excluding the budget) for projects they are assigned to.
    (iii)Only the manager of a project should be able to update (insert, update, delete) any non-key information in the project table relating to that project.
    Here is the project tables
    set echo on
    * Changes
    * 4.10.00
    * manager of employee on a project included in the employee on project table
    * activity table now has compound key, based on ID dependence between project
    * and activity
    drop table org_unit cascade constraints;
    drop table project cascade constraints;
    drop table employee cascade constraints;
    drop table employee_on_project cascade constraints;
    drop table employee_on_activity cascade constraints;
    drop table activity cascade constraints;
    drop table activity_order cascade constraints;
    drop table work_unit cascade constraints;
    * org_unit
    * type - for example in lmu might be FACULTY, or SCHOOL
    CREATE TABLE org_unit
    ou_id               NUMBER(4)      CONSTRAINT ou_pk PRIMARY KEY,
    ou_name          VARCHAR2(40)     CONSTRAINT ou_name_uq UNIQUE
                             CONSTRAINT ou_name_nn NOT NULL,
    ou_type          VARCHAR2(30) CONSTRAINT ou_type_nn NOT NULL,
    ou_parent_org_id     NUMBER(4)     CONSTRAINT ou_parent_org_unit_fk
                             REFERENCES org_unit
    * project
    CREATE TABLE project
    proj_id          NUMBER(5)     CONSTRAINT project_pk PRIMARY KEY,
    proj_name          VARCHAR2(40)     CONSTRAINT proj_name_uq UNIQUE
                             CONSTRAINT proj_name_nn NOT NULL,
    proj_budget          NUMBER(8,2)     CONSTRAINT proj_budget_nn NOT NULL,
    proj_ou_id          NUMBER(4)     CONSTRAINT proj_ou_fk REFERENCES org_unit,
    proj_planned_start_dt     DATE,
    proj_planned_finish_dt DATE,
    proj_actual_start_dt DATE
    * employee
    CREATE TABLE employee
    emp_id               NUMBER(6)     CONSTRAINT emp_pk PRIMARY KEY,
    emp_name          VARCHAR2(40)     CONSTRAINT emp_name_nn NOT NULL,
    emp_hiredate          DATE          CONSTRAINT emp_hiredate_nn NOT NULL,
    ou_id               NUMBER(4)      CONSTRAINT emp_ou_fk REFERENCES org_unit
    * activity
    * note each activity is associated with a project
    * act_type is the type of the activity, for example ANALYSIS, DESIGN, BUILD,
    * USER ACCEPTANCE TESTING ...
    * each activity has a people budget , in other words an amount to spend on
    * wages
    CREATE TABLE activity
    act_id               NUMBER(6),
    act_proj_id          NUMBER(5)     CONSTRAINT act_proj_fk REFERENCES project
                             CONSTRAINT act_proj_id_nn NOT NULL,
    act_name          VARCHAR2(40)     CONSTRAINT act_name_nn NOT NULL,
    act_type          VARCHAR2(30)     CONSTRAINT act_type_nn NOT NULL,
    act_planned_start_dt     DATE,
    act_actual_start_dt      DATE,
    act_planned_end_dt     DATE,
    act_actual_end_dt     DATE,
    act_planned_hours     number(6)     CONSTRAINT act_planned_hours_nn NOT NULL,
    act_people_budget     NUMBER(8,2)      CONSTRAINT act_people_budget_nn NOT NULL,
    CONSTRAINT act_pk PRIMARY KEY (act_id, act_proj_id)
    * employee on project
    * when an employee is assigned to a project, an hourly rate is set
    * remember that the persons manager depends on the project they are on
    * the implication being that the manager needs to be assigned to the project
    * before the 'managed'
    CREATE TABLE employee_on_project
    ep_emp_id          NUMBER(6)     CONSTRAINT ep_emp_fk REFERENCES employee,
    ep_proj_id          NUMBER(5)     CONSTRAINT ep_proj_fk REFERENCES project,
    ep_hourly_rate      NUMBER(5,2)      CONSTRAINT ep_hourly_rate_nn NOT NULL,
    ep_mgr_emp_id          NUMBER(6),
    CONSTRAINT ep_pk PRIMARY KEY(ep_emp_id, ep_proj_id),
    CONSTRAINT ep_mgr_fk FOREIGN KEY (ep_mgr_emp_id, ep_proj_id) REFERENCES employee_on_project
    * employee on activity
    * type - for example in lmu might be FACULTY, or SCHOOL
    CREATE TABLE employee_on_activity
    ea_emp_id          NUMBER(6),
    ea_proj_id          NUMBER(5),
    ea_act_id          NUMBER(6),      
    ea_planned_hours      NUMBER(3)     CONSTRAINT ea_planned_hours_nn NOT NULL,
    CONSTRAINT ea_pk PRIMARY KEY(ea_emp_id, ea_proj_id, ea_act_id),
    CONSTRAINT ea_act_fk FOREIGN KEY (ea_act_id, ea_proj_id) REFERENCES activity ,
    CONSTRAINT ea_ep_fk FOREIGN KEY (ea_emp_id, ea_proj_id) REFERENCES employee_on_project
    * activity order
    * only need a prior activity. If activity A is followed by activity B then
    (B is the prior activity of A)
    CREATE TABLE activity_order
    ao_act_id          NUMBER(6),      
    ao_proj_id          NUMBER(5),
    ao_prior_act_id      NUMBER(6),
    CONSTRAINT ao_pk PRIMARY KEY (ao_act_id, ao_prior_act_id, ao_proj_id),
    CONSTRAINT ao_act_fk FOREIGN KEY (ao_act_id, ao_proj_id) REFERENCES activity (act_id, act_proj_id),
    CONSTRAINT ao_prior_act_fk FOREIGN KEY (ao_prior_act_id, ao_proj_id) REFERENCES activity (act_id, act_proj_id)
    * work unit
    * remember that DATE includes time
    CREATE TABLE work_unit
    wu_emp_id          NUMBER(5),
    wu_act_id          NUMBER(6),
    wu_proj_id          NUMBER(5),
    wu_start_dt          DATE CONSTRAINT wu_start_dt_nn NOT NULL,
    wu_end_dt          DATE CONSTRAINT wu_end_dt_nn NOT NULL,
    CONSTRAINT wu_pk PRIMARY KEY (wu_emp_id, wu_proj_id, wu_act_id, wu_start_dt),
    CONSTRAINT wu_ea_fk FOREIGN KEY (wu_emp_id, wu_proj_id, wu_act_id)
              REFERENCES employee_on_activity( ea_emp_id, ea_proj_id, ea_act_id)
    /* enter data */
    start ouins
    start empins
    start projins
    start actins
    start aoins
    start epins
    start eains
    start wuins
    start pmselect
    I have the tables containing ouins and the rest. email me on [email protected] if you want to have a look at the tables.

    Answer to your 2nd question is easy. Create database roles for the various groups of people who are allowed to access or perform various DML actions.
    The assign the various users to these groups. The users will be restricted to what the roles are restricted to.
    Look up roles if you are not familiar with it.

  • Performance tuning & Securing MX 7 on IIS 6

    I never had much at all to do with Coldfusion and have just been asked to look into making some security and performance suggestions for a small Windows 2003/IIS 6 server farm using Coldfusion MX 7.
    This is what I was planning;
    Configure all IIS websites to use a seperate IIS application pool (security)
    Configure all IIS websites to use a seperate windows user account for authentication (security)
    Configure IIS content expiration (performance)
    Configure IIS file compression and static file caching (performance)
    Use 3rd party anti leech tool (security/performance)
    Problem is although I am familiar enough with IIS, I don't really have a good understanding of how Coldfusion MX 7 hangs together. From what I've read to date (which is pretty limited) it appears as if Coldfusion doesn't use IIS for much more than serving HTTP requests. Is this an accurate summation?
    If so, then how does Coldfusion interact with IIS? Particularity in relation to the points I mentioned above? I read a guide on securing Coldfusion MX 7 on IIS from the Adobe website and it makes no mention of doing the segregation I listed above, and one of my colleagues told me that Coldfusion doesn't even use IIS application pools or worker processes (not sure how this would even be possible) and handles content compression and caching itself as well as security.
    Basically, any pointers/advice on how Coldfusion MX 7 interacts with IIS 6 and if the points I made are valid in an IIS/Coldfusion environment would be greatly appreciated.
    Cheers!

    Distributed Mode is what you are after.
    http://www.adobe.com/support/coldfusion/administration/cfmx_in_distributed_mode/
    Although written a few years ago, it'll still point you in
    the right direction.
    Andy

  • Performance and security trade-off

    h1. Scenario
    When I run my code without implementing security its performance decreases from 40% to 70% .
    My goals is to decide: do I really need any trade-off (speed vs security)? in either case I must provide arguments
    Any kind of advice will be appreciated. I just need professional's view about the above scenario
    Thank you

    Hey Aasem,
    As such, there is no thumb-rule for this trade off concept. It all depends on the type of database and its security. It may happen that you have to secure the data more than the performance; e.g. banking, insurance, stock market secotrs. In these sectors, the on-line transactions are required, but the data security is more important than the performance. So, here you may have to cmpromise with the performance.
    But if you take an example of an live score of a cricket match, then the data security is not that much important rather the performance counts more. so, here you can compromise the security of the data with the database performance.
    But, my point is that as a dba, you have to always consider the security of the data more than the performance. And the calculation what you are talking of is not of a fixed manner. It varies as per the requirement and need. And there is no thumb rule for this. It is only your experience which will help you to find out the measurement of everything what you are asking for.
    Thanks and Regards,
    MSORA

  • Performance Scorecard Security

    Hi,
    I am new to Hyperion Performace Scorecard. We got a requirement to develop a POC.
    I have installed & configured HPS 11.1.1.3.
    When I login with "admin" account/credentials, I am able to see only Security node in Object View. Nothing else is coming.
    I have created another user with Designer previleges, and when I am opening the application, I am getting the error message like "Message: Hub role setup is inconsistent with HPS user security role setup.". But if I create a user with name "Designer", with this Designer user account I am able to. But it is not giving the option to create Application Framework.
    Am I missing any thing? Please help me.
    Thanks,
    Naveen

    Hi,
    Just Create a Username called "Designer" with Interactive Role then Syn. it with Admin Account then Logon with Designer .
    it will Work.
    Cheers
    Lotfy

  • Can't get Firefox to start after performing OS security updates

    Just did the most recent updates on OS-X 10.6.8, and now I can't get Firefox to start. It comes up and says that it is having problems (the "embarassing" window) and that I should try closing tabs. However, it's not responding at all, so finally I have to resort to force quit. I've try cold starting the computer with no effect.

    Let's try this. You said you are trying to start Firefox 8 on the problem machine? Can you try downloading Firefox 11 from [http://www.getfirefox.com www.getfirefox.com], install that, restart your computer, then see if it still acts up?
    If it does, try running Firefox in [[Safe mode|Safe mode]].

  • Save BB settings before performing security wipe

    Hello, We are moving from a internal mail environment to Microsoft Online Services hosted email. I understand as part of the process that all BlackBerry users will need to perform a security wipe prior to reactiving their devices. What is the best way for users to save/keep their settings before they perform the security wipe? Is it only possible to do this via Desktop Manager? I ask because not all our users have/utilize the Desktop Manger. Thanks for any help on this topic!!
    Solved!
    Go to Solution.

    Right. Using the Backup and Restore feature in the Desktop Manager is the only option for you I believe. Couldn't you place the Desktop Manager on a shared drive that everyone has access to for them to install it?
    If you were using a BES I would suggest using the BlackBerry Web Desktop Manager because you can configure it to allow anyone to access it from your intranet
    Message Edited by jmrmb80 on 09-29-2008 12:25 PM
    If someone has been helpful please consider giving them kudos by clicking the star to the left of their post.
    Remember to resolve your thread by clicking Accepted Solution.

  • Can't access the web but can screen share and secure shell on my network???

    Hi,
    I don't know if this is relevant, but I installed a security patch along with a safari patch the other day and the next morning, I could not access the internet, however I can do things like screen share and ssh. I cannot however view internal websites on my network, whether I'm connected via airport or ethernet cable (attached to either time capsule or the modem directly). Whenever I try to go to a website in either firefox or Safari, I get a message saying I'm not connected to the internet and a "Network Diagnostics" button (which says it cannot fix my problem). Here is what I've tried:
    -Repair Disk (everything OK)
    -Repair Permissions
    -Restart computer
    -Turn Airport card off then on
    -Restart modem and routers, one by one in daisy chain order (and then restarted computer)
    -Tried different browsers
    -Tried connecting directly to modem via Ethernet cable in addition to wireless
    -Restored the System from a time-capsule backup from Sept. 6th (noticed the problem on the 10th)
    -Turned off my firewall
    -Created a new user account and tried it
    -Let my computer remain off for a half hour
    -Zapped the p-ram
    Here's what I've confirmed I CAN'T do:
    -Access the web via either Safari or firefox (haven't tried any other browsers)
    -Access the Software Update Server
    -My iCal calendars cannot access the webdav server
    Surprisingly, here's what I've confirmed I CAN do:
    -Ping other computers on my network
    -Use the Screen Sharing App. with computers on my network
    -Access the internet from every other computer on my network (4 of them)
    -ssh to other computers on my network
    I've been using my computer infrequently lately, and I'm not sure when the last time was I accessed the internet or for that matter when I performed the security patching, but I'm pretty sure it was within the last week and a half. I really don't want to try restoring from an earlier backup, but I'm reaching the end of my rope. Anyone have any other ideas? I'm fresh out.
    Rob

    The problem was either the Security Patch 2010-005 or the Safari update (though I don't have the version number in front of me). Note, I had ignored the iTunes 10 update. I assume that I must have miscalculated the date I performed the updates because the problem persisted after restore from a Sept. 6th backup off my time capsule.
    I went to the Apple Store and they were able to restore full internet access by performing a 10.5.8 combo-update. When we ran Software Update at the Apple Store, the 3 updates were again there available for download, but I am going to ignore them all because of this issue. The people at the apple store agreed that it was the update which caused the problem.
    Rob

  • Mail app 4.5 can't be used with 10.6.8 after security update?

    I just performed a security update based on an automatic notice to my Mac. It has made the mail app unaccesible  running OSX 10.6.8. Is there a solution or work around here? I don't think I'm the only one who has made this update and is running the Apple Mail.app.
    Running
    Hardware Overview:
      Model Name:    iMac
      Model Identifier:    iMac11,3
      Processor Name:    Intel Core i3
      Processor Speed:    3.2 GHz
      Number Of Processors:    1
      Total Number Of Cores:    2
      L2 Cache (per core):    256 KB
      L3 Cache:    4 MB
      Memory:    4 GB
      Processor Interconnect Speed:    5.86 GT/s
      Boot ROM Version:    IM112.0057.B00

    Mac OS X v10.6: Mail.app won’t open, or "You can't use this version of Mail…" alert after installing Security Update 2012-004:
    http://support.apple.com/kb/TS4424?viewlocale=en_US&locale=en_US
    Fellow user Grant Bennet-Alder offers this solution:
    Some users have reported this problem if the Mail Application has been moved out of the top-level /Applications folder, or duplicated in another location.
    When the Security Update is done, the old version of Mail is disabled.
    The solution has been to:
    1) make certain Mail is in the /Applications folder
    2) There is no other copy anywhere else.
    3) Once steps 1 and 2 have been done, Manually download and re-apply the Security Update (2012-004) by hand.
    Security Update 2012-004 (Snow Leopard)
    If the Mail.app has been LOST, it can be re-installed by applying the 10.6.8 version 1.1 combo update. But this update is quite large and it is usually not necessary:
    Mac OS X 10.6.8 Update Combo v1.1

  • Instructions for setting WRT54GS security to WPA2? Can't find them anywhere.

    Hi,
    I'm an amateur at this, so please excuse this load of ignorant questions.
    I have 2 PC clients, both Dell Dimensions 3.2GHz 1GB RAM, Wireless-G adapters. OS is Windows XP SP2
    The router is a Linksys WRT54GS. I'm using the wireless ports only, at least when I'm not modifying the security settings. Then I use a temporary cable to connect one of the PC's to the router.
    I also have a TiVo DVR series 3 with a wireless adapter.
    The router came with a copy of Linksys Advisor. When I ran this software I was able to set the security level to WPA-Personal. However I could find no option to set the level to WPA2.
    I know the TiVo supports WPA2 because I saw the option when I was configuring it for WPA-personal.
    My question(s):
    Why doesn't EasyLink Advisor have an option to set the security level to WPA2? Is it just deficient, or does it check to see if the client PCs support WPA2 and disable the option if they don't?
    How would I go about checking if my PCs support WPA2?
    Finally, if I have to set the security to WPA2 manually, what is the procedure for doing this?
    It's pretty easy to see how this can be done on the router's little web server pages; but as soon as I set the security to WPA2 there, I'm going to lose wireless connections to the PCs and I won't be able to access the router.
    I know I can get there via a cable connection, but then what do I do? How do I set up my clients for WPA2?
    What's a real pain about all this is that the EasyLink Advisor gives hints on how to optimize performance on secured wireless systems. It advises going to WPA2! But its Wizard doesn't give the option to do that. Its offline help file is minimal - it just says "use the wizard" and that's it.
    The online help describes how to manually configure WPA but not WPA2. And the instructions for WPA are incomplete. They explain how to set up the router, but then do not explain how to use the enccryption keys when reconnecting client PCs. They just say to select the SSID in the wireless icon's connect menu, then click on connect. Where does the key go?
    Thanks for your time in reading this,
    Big Al Mintaka

    First of all, Windows XP SP2 can do WPA2, however it requires a patch.   Go to Microsoft Knowledge base, article ID=917021 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Additionally, be sure to give your network a unique SSID. Do not use "linksys". If you are using "linksys" you may be trying to connect to your neighbor's router. Also set "SSID Broadcast" to "enabled". This will help your computer find and lock on to your router's signal.
    As to why EasyLink Advisor works the way it does - I just don't know.
    To setup WPA2, you will first need to patch Windows XP, then, using a computer that is wired to the router, go into the router and change the encryption to "WPA2 - personal"  with  "AES".  Reboot modem and router.  You are correct that you will now loose your wireless connections until you update the settings in your wireless devices.
    Next go into your computers and likewise change the encryption to "WPA2 - personal"  (= WPA2 = PSK2 ).   (Note:  You do not necesarily need to specify "AES" in your computers (or Tivo), but if you are given a choice between TKIP and AES, choose AES.)
    To find these settings for your computers, go to the wireless software in your computer, and go to "Preferred Networks"  (sometimes called "Profiles" ).  There are probably a few networks listed. Delete any network named "linksys". Also delete any network that you do not recognize, or that you no longer use.  Delete your current network  (this will clear any old settings).  Reboot computer.  Return to "Preferred Networks" and enter your network info (SSID, encryption, and key). Then select your current network and make it your default network, and set it to automatic login. You may need to go to "settings" to do this, or you may need to right click on your network and select "Properties" or "settings".  Reboot computer.
    You will need to check the Tivo manual for how to change the Tivo to WPA2.

  • How to perform a complete "unconditional wipe" on OS 10 powered Q5?

    Hello,
    I am having two issues with my Q5 (10.2.1).
    It is a standard, officially unlocked phone, purchased in India. It has nothing to do with any of the service providers/carriers.
    Because of the two issues I am facing as mentioned in following post, I performed a security wipe after taking a back up of calendars and contacts.
    https://supportforums.blackberry.com/t5/BlackBerry-Link/Unknown-computer-showing-up-in-blackberry-li...
    After the wipe, I restored the back up, but very surprisingly, the device did not ask for my BB ID's login credentials. It didn’t even ask for my email accounts’ credentials. I’ve eight (8) email Ids configured on my device. One of them started to sync the mails directly, and the other seven could not start the sync cuz they have got two-step verification enabled.
    So the security wipe performed few minutes ago, did literally nothing at all except but restoring the personalised settings, and the wallpaper to the default state, and removing the installed applications. O_O
    What I included in the back file was nothing but “Device Settings and Local Contacts/Calendar Data”. I think whatever was causing the problems, was backed up during that “device settings”, and later backed up.
    So, what I am going to do now is: backing up contacts, and calendar through MS Outlook.
    Perform an “unconditional wipe”, with an extreme prejudice, with no remorse at all.
    And them uninstall the desktop BB Link similarly (MS Windows 7), with extreme prejudice. (After uninstalling, I will remove each and every file from C drive, and the registries as well.)
    So, my question here is:
    How to perform an unconditional wipe on blackberry device?
    I want the result as a “new blackberry device”. What I mean is, I want it to feel like a brand new device, with no trace of its previous activities at all.
    Whatever that process is called as, “new OS installation”, “memory wipe”, “security wipe”, “resetting to factory settings”; kindly let me know how to do/perform it.
    Thank you in advance.

    First, there was no reason to do a security wipe. The computers you think are unknown are in fact known. I wrote in the other thread that I don't know why, but I see the same thing and the other name is a generic name that Link and/or the BlackBerry device software assigned. I have paired Link to two computers. In the File Manager app I see the computer the device is connected to according to the name I have given in Windows. But in device settings I see four: two generic names for the two computes and two for the two names as I assigned. It is what it is. It is a mystery to me, but nothing nefarious.
    A security wipe deletes user data and settings. If there is an IT Policy (not an issue for you as far as I know) it is not removed. In my experience apps themselves are not deleted, though all app data is deleted.
    Also, a security wipe can be initiated from the device. A reset to factory cannot. Further, a reset to factory will remove an IT policy for devices running OS version 4.3 or later. By definition, reset to factory wipe the device and restores factory defaults.
    I don't completely follow your account of events. When I have done a security wipe I have logged in with BlackBerry ID and completed initial setup, and then restored. I was prompted on the device for BlackBerry ID after the security wipe.
    - Ira

  • Secure empty trash: How many passes?

    When performing a +Secure Empty Trash+ I presume the deleted files are zeroed out, much like when using the +Erase Free Space+ function in the Disk Utility. My question is, if this is indeed the case, how many passes are performed during a +Secure Empty Trash+?

    Way too many. I believe it's seven passes. Don't use it if you are deleting a large number of files because it could literally take days to complete.
    Unless you work for an employer that mandates such security I wouldn't suggest using it. If it needs to be securely erased, then it needs to be encrypted. If it's encrypted then there really isn't a need to use the secure erase option.

  • More Security Update Problems - Finder Menu on/off constantly

    I like many others here had a perfectly normal imac G5 and then performed the security update tonight, sadly since then the Finder is flashing on/off and I can't access Finder Menus, I can however open Safari and access internet.
    Can boot in Safe Mode without a recurrence of problem
    Running Startup Disk and running disc repair/permissions.
    Re-started and no change.
    Have tried some of the suggestions, downloading update manually onto USB but can't get the Terminal to identify the USB volume. I haven't however tried t
    I would be very grateful for any ideas

    Thank you for your response Greg, in the blind panic that set in last night I did manage to check the Console Log to see what if anything was happening with 'Finder'. I have Emblematic installed in the Admin Account and this was repeatedly coming up in the log as Finder was starting and quitting.
    I have read loads of issues with the Security Update but thought I would do the following first;
    1. Checked the 2 other accounts on the iMac, logged in to both - no issues with Finder quitting.
    2. Did a SafeBoot and no issues with Finder until I clicked on the Emblematic icon on the System Preferences menu. The Finder menu started to start/quit as it had been doing in normal start up.
    3. Uninstalled Emblematic while in SafeBoot and re-started.
    4. Logged in to Admin account and no problems with Finder
    5. Problem appears to have resolved so I can only assume it was conflict between Finder and a third party application.
    6. Can't even recall why I had Emblematic installed anyway - have never used it!
    Thanks again and a lesson learned with Auto updates.

  • Still freezing up after security wipe ?

    Greetings all,
    Despite performing a security wipe I am still experiencing constant freezing of my phone, especially with the calendar.  I suspect it may be an application that is causing the issue.  During backup and restore I didn't delete any applications.
    Any suggestions ?  Thanks in advance.

    Hi and Welcome to the Community!
    If indeed you suspect an app, then you can try removing them one by one until the behavior clears. But, be aware that if the app caused OS level corruption, then removing the app won't cure that corruption...only a clean OS reload would do so...and that's the process I recommend you follow.
    At the top of each device forum, there should be some "sticky" threads that discuss the OS levels available for many models. If they include your model, then please use those as reference as you proceed. Otherwise, you will have to dig through the official download portal for OS packages for your model:
    http://us.blackberry.com/support/downloads/download_sites.jsp
    From a PC, you can install any compatible (e.g., for your exact BB Model Number) OS package to a BB via this procedure:
    http://supportforums.blackberry.com/t5/BlackBerry-Device-Software/How-To-Reload-Your-Operating-Syste...
    Note that while written for "reload" and the Storm, it can be used to upgrade, downgrade, or reload any BB device model -- it all depends on the OS package you download and install to your PC. If that OS package is from a carrier other than the carrier for which your BB was originally manufactured, then delete, on your PC, all copies of VENDOR.XML...there will be at least one, and perhaps 2, and they will be located in or similarly to (it changes based on your Windows version) these folders:
    C:\Program Files (x86)\Common Files\Research In Motion\AppLoader
    C:\Users\(your Windows UserName)\AppData\Roaming\Research In Motion\BlackBerry\Loader XML
    Be sure that you remove, from your PC, any other BB device OS packages as having more than one installed to the PC can cause conflicts with this procedure.
    You may also want to investigate the use of BBSAK (bbsak.org) to perform the wipe it is capable of.
    You may also want to try this procedure to perhaps narrow down the precise causal item:
    Load your OS "bare bones"...if anything is optional, do not install it.
    If the behavior presents immediately, then try a different OS with step 1
    If the behavior does not immediately present, then run for as long as it takes for you to be sure that the behavior will not present.
    Add one thing -- no matter how tempting, just one.
    If the behavior does not present immediately, then again run for long enough to be sure it will not have the same problem
    Repeat steps 4 and 5 until all things are loaded or the behavior presents
    When the behavior presents, you know the culprit...the last thing you loaded.
    If the behavior does not re-present, then you know that either step 1 or 2 cured it.
    If the behavior presents no matter what, then you likely have a hardware level issue for which no amount of OS or software can cure.
    If you are on MAC, you are limited to only your carriers sanctioned OS packages...but can still use any levels that they currently sanction. See this procedure:
    KB19915How to perform a clean reload of BlackBerry smartphone application software using BlackBerry Desktop Software
    Good luck and let us know!
    Occam's Razor nearly always applies when troubleshooting technology issues!
    If anyone has been helpful to you, please show your appreciation by clicking the button inside of their post. Please click here and read, along with the threads to which it links, for helpful information to guide you as you proceed. I always recommend that you treat your BlackBerry like any other computing device, including using a regular backup schedule...click here for an article with instructions.
    Join our BBM Channels
    BSCF General Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • Getting  java.security.AccessControlException: access denied

    My application is applet based. In this when i trying to read one image file from my drive folder it is giving
    java.security.AccessControlException: access denied
    i tried AccessController.doPrivileged(new PrivilegedAction() {
                   public Object run() {
                   // perform the security-sensitive operation here
    but this is also not helping..
    What i m suppossing is that applet will not allow to acess Client machine
    then how i 'll get that image file from from my machine folder....
    I want to use this image file set as windows icon..
    or is there any other method  to set the icon of the window
    Edited by: Sandy10 on Mar 17, 2010 10:27 AM
    Edited by: Sandy10 on Mar 17, 2010 12:06 PM

    How does this differ from your [other question|http://forums.sun.com/thread.jspa?threadID=5432244]?

Maybe you are looking for

  • How do I change the phone number linked to one of my contacts?

    We want to FaceTime my mother in law but under her contact her work number is listed as the FaceTime phone number. I need to change that to either her mobile or her email address. How do I do that?

  • Sql developer installation problem

    Hi, trying to make new connection, without installing any other oracle software of database software in my pc, I receive the message " the network adapter could not establish the connection. Hostname is localhost, port is 1521 and SID is xe or orcl o

  • Document created succsesfully  but attached file unable to open.

    Dear Friends, For testing i was writing a program which is reading data from a db table and i am attaching its  text file to newly created DMS. this below program created the DMS dcoument and shows the attachment but it is not opening it and giving m

  • Unhandled exception in SOAP call

    I get this exception when I try to add a provider for the samples for inlineRendering. I recently installed the August 2002 version of the JPDK. Any help will be appreciated. -NP STACK::: start 8/30/02 10:53 AM default-app: [id=(null), instance=(null

  • What's the url for connecting to MSSQL

    I got the driver already. Right now I need the full url of this connection to connect.