Rogue Detection and SPT issues

Deployed wireless a few months. From a client to infrastrure standpoint, majority of users are happy with the ability to go wireless with their personal and work devices.
The problem we're facing is proper identification of rogue's AP's on our wired network (hot spots aren't important)
I've setup a few linksys AP's connected to our access switches and found WLC/PRIME finds the rogue AP's but when a SPT is performed, both WLC/PRIME state it's not on the wired network (which is not true). If I do a manual trace, in Prime,  it will work but I can't do a manual trace everytime I get an alert (we're in a major US city). Further investigation shows the lan and wlan mac address of this linksys router is +/- from one another (confirmed by with arp table on access switch and going into prime and looking at the alert).. Which in this case, Prime should see it as WIRED and mark it as a ROGUE and alert me
Found a document
http://www.cisco.com/en/US/customer/docs/wireless/prime_infrastructure/1.3/configuration/guide/admin.html#wp1603927 stating only the following switches are supported: 3750, 3560, 3750E, 3560E, and 2960.
I can't see how these are the only supported devices, most are older than the 4510. I posted this in another thread and a rep provided me the link
http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml
Read this and even went further and read ROGUE MANAGMENT WHITE PAPER
http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml
This does not mention a limitation of switches support. States if CDP and SNMP is enable, along with the local access switches added to PRIME it should work
Here is the currently list of deployed devices, code and basic configuration
Access Switches - 4510 - image: cat4500e-universalk9.SPA.03.02.02.SG.150-2.SG2.bin
WLC - 5500 - image 7.4.103.9
AIR-CAP3602I-A-K9 - 152 deployed, 151 are configured for Local Mode, 1 is configured as Rogue Detector (trunked with all access vlan's passing thru)
RLDP is enabled on all Local Mode AP's - which after reading is not best practice because of time slicing and the fact is degrades client quality and can kick users off
Basically looking for feedback from others who have deployed wireless and have succesfully configured their environement for ROGUE AP DETECTION with SPT.. What are your thoughts and what do you run?
Thanks in advance

Mark:
Complaints about the performance of Switchport Tracing are pretty common.  The best way to build this out is to start with your planted rogue AP is connected to the same switch that your Prime Infrastructure server connects to--or the first wired switch that ESX/ESXi host connects to--and validate that it works there, make whatever changes you need to get it working, then move the planted rogue AP to the next switch and so on.  The logging modules Configuration, General, Monitor, GUI, System and Tools should cover everything you need to know why Switchport Tracing isn't giving the results you expect.  This "start small and work your way up" helps you learn lessons about what needs to be configured on all your switches to have it working the way you want it to.
Configuring Switchport Tracing

Similar Messages

  • Second monitor detection and resolution issue with iMac

    Hi All,
    long time reader here, got a lot of helpful tips, thanks to all who post!!
    I have a 24" iMac, Intel based, with OSX 10.5.8.
    I bought a Viewsonic 22" monitor to use along side my iMac when using CS4 and I do a lot of photography. Now the problem is that sometimes my iMac recognizes it as VA2213w and other times it see it as VGA monitor. When is sees it as the VGA monitor the resolution changes a bit, even though it has it on its highest setting 1920x1080 @60hz. My tool pallets on the screen are a bit fuzzy, readable but not the best. I'm using a mini dvi to VGA adaptor as the Viewsonic only has a VGA plug. Could this be the issue? As I have read a lot of the problems here and they seem to be all pointing to the adaptor. If so then why does my iMac sometimes see it as VA2213w monitor and then on other times as VGA. I'm doing nothing to the display other than switching on in the morning.
    There doesn't seem to be any consistency! Its driving me mad. I can't seem to get it back to recognize the display as VA2213. I have clicked on detect displays etc etc.
    It was working fine all week and then suddenly last night it went back to seeing it as a VGA monitor only. Any help would be appreciated. I have no cursor issues, just the resolution and monitor detection.
    Regards
    Fergul

    Hi All,
    Well the issue seems to be the cable. I had an older TFT monitor that I was using and when I bought the above viewsonic, I just simply connected it to the existing cable. It wasn't till I was about to send the monitor back for one that had a DVI connection that I decided to use the VGA cable that came with the new monitor. What can I say, there hasn't been an issue since my last post which was a few weeks ago. Even when the iMac goes to sleep and awaken, no probs. Thanks to those that posted, its appreciated!
    So far so good.
    Take care.

  • Imac wifi detection and connection issues

    I'm trying to connect to my wifi network through my Imac.  When it is first turned on it does not connect, but will detect the network and will connect to it.  Then it will disconnect for no reason and will not detect the network anymore.
    Are there any downloads to fix this bug??

    DonJose,
    You may want to reset your modem and router and while you are at it check to see if your router has the most up-to-date firmware from the router mfg. You will need to refer to your router's manual for that utility.
    Next do some basics, first is change the DNS settings, your ISP may be your problem. Click DNS Settings Update to learn how.
    Next I'd recommend resetting your IP address by renewing the DHCP lease, here is an article that explains how, please click Renew a DHCP Lease in Mac OS X for instructions.

  • S-10 AC/Battery detection and Susepnd Issue

    I have these 2 issues for S-10.
    1) When AC Chord is pulled out or inserted, EC ASL code does not generate event notifications properly. Sometimes there are  3 events in a burst or sometimes there are no events. Can this be fixed by updating EC firmware on the motherboad ?
    2) Frequnecy the proceessor ( 800 Mz Min 1600 Mz Max) can not be changed unless I do one Suspend/Resume ?
    Anand

    I've had no problems with the update.

  • What is the best malwear detection and protection for use on a Mac?

    What is the best malwear detection and protection for use on a Mac?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Flash player crashes and other issues.

    My wife is having issues with Zynga Bingo and Flashplayer.  Over the past 3 days (starting approx 20 July) she will be able to play for a bit and then it will just lock up on her.  Now it won't run at all, Flashplayer keeps giving an error stating it is unresponsive.
    What is odd is that it is only occuring on her account.  When I get on my account or our daughter gets on her account on the same laptop we do not have any of these problems.
    In researching this issue I have seen so many suggestions for fixing it, I have tried to run it on Google Chrome, Internet Explorer and Firefox.  It does the same thing on all browsers, and the other 2 accounts do not have any issues on any of the browsers.
    I have uninstalled and reinstalled the graphics drivers, sound drivers, Flashplayer and Java.
    Why?  If this is a hardware or software issue, is the problem only occurring on one account out of the three when they are all three played on the same laptop.
    After starting the game on her account it comes to the screen where you select how many Bingo cards you want to play and the music and screen freezes a couple seconds after loading and you can't select anything on the screen.
    I should add, we have had many problems with her Zynga account in the past, she had a stroke last year and there was several hundred dollars worth of charges at a time when she was in the hospital and didn't have the laptop with her.  Just a couple months ago her laptop and my laptop both crashed and had to have the operating systems reinstalled (recovery programs failed to work).  This was just after a major windows update, both laptops would not boot up after installing the same updates.  During the week the laptops were being worked on we did not have access to a computer and yet there were "again" hundreds of dollars in Zynga charges which we could not explain.
    Is it possible that her account has somehow been hacked by someone thru the Zynga service, as that is the only place she is having problems...and would explain why only her account locks up and not the other two?
    Attaching a DirectX file so you can see the system setup....what else can I add to help in troubleshooting?  No antivirus programs or spyware has been detected and the operating system is a fresh install.  All she uses the laptop for is her facebook games and email.
    Thankyou for your help.
    System Information
    Time of this report: 7/23/2012, 19:59:46
           Machine name: DEX-PC
       Operating System: Windows 7 Home Premium 64-bit (6.1, Build 7601) Service Pack 1 (7601.win7sp1_gdr.120503-2030)
               Language: English (Regional Setting: English)
    System Manufacturer: Dell Inc.        
           System Model: Dell System XPS L702X
                   BIOS: Default System BIOS
              Processor: Intel(R) Core(TM) i7-2670QM CPU @ 2.20GHz (8 CPUs), ~2.2GHz
                 Memory: 8192MB RAM
    Available OS Memory: 8086MB RAM
              Page File: 2096MB used, 14073MB available
            Windows Dir: C:\Windows
        DirectX Version: DirectX 11
    DX Setup Parameters: Not found
       User DPI Setting: Using System DPI
    System DPI Setting: 120 DPI (125 percent)
        DWM DPI Scaling: Disabled
         DxDiag Version: 6.01.7601.17514 64bit Unicode
    DxDiag Notes
          Display Tab 1: No problems found.
            Sound Tab 1: No problems found.
              Input Tab: No problems found.
    DirectX Debug Levels
    Direct3D:    0/4 (retail)
    DirectDraw:  0/4 (retail)
    DirectInput: 0/5 (retail)
    DirectMusic: 0/5 (retail)
    DirectPlay:  0/9 (retail)
    DirectSound: 0/5 (retail)
    DirectShow:  0/6 (retail)
    Display Devices
              Card name: Intel(R) HD Graphics Family
           Manufacturer: Intel Corporation
              Chip type: Intel(R) HD Graphics Family
               DAC type: Internal
             Device Key: Enum\PCI\VEN_8086&DEV_0116&SUBSYS_04B81028&REV_09
         Display Memory: 1696 MB
       Dedicated Memory: 64 MB
          Shared Memory: 1632 MB
           Current Mode: 1920 x 1080 (32 bit) (60Hz)
           Monitor Name: Generic PnP Monitor
          Monitor Model: unknown
             Monitor Id: CMO1720
            Native Mode: 1920 x 1080(p) (60.010Hz)
            Output Type: Internal
            Driver Name: igdumd64.dll,igd10umd64.dll,igd10umd64.dll,igdumdx32,igd10umd32,igd10umd32
    Driver File Version: 8.15.0010.2455 (English)
         Driver Version: 8.15.10.2455
            DDI Version: 10.1
           Driver Model: WDDM 1.1
      Driver Attributes: Final Retail
       Driver Date/Size: 7/20/2011 08:39:56, 8310272 bytes
            WHQL Logo'd: Yes
        WHQL Date Stamp:
      Device Identifier: {D7B78E66-4256-11CF-3669-B424B7C2C535}
              Vendor ID: 0x8086
              Device ID: 0x0116
              SubSys ID: 0x04B81028
            Revision ID: 0x0009
    Driver Strong Name: oem79.inf:IntelGfx.NTamd64.6.0:iSNBM0:8.15.10.2455:pci\ven_8086&dev_0116&subsys_04b81028
         Rank Of Driver: 00E60001
            Video Accel: ModeMPEG2_A ModeMPEG2_C ModeWMV9_C ModeVC1_C
       Deinterlace Caps: {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(YUY2,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(YUY2,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(YUY2,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(UYVY,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(UYVY,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(UYVY,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(YV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(YV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(YV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(NV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(NV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(NV12,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(IMC1,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(IMC1,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(IMC1,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(IMC2,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(IMC2,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(IMC2,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(IMC3,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(IMC3,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(IMC3,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
                         {BF752EF6-8CC4-457A-BE1B-08BD1CAEEE9F}: Format(In/Out)=(IMC4,YUY2) Frames(Prev/Fwd/Back)=(0,0,1) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_EdgeFiltering
                         {335AA36E-7884-43A4-9C91-7F87FAF3E37E}: Format(In/Out)=(IMC4,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend DeinterlaceTech_BOBVerticalStretch
                         {5A54A0C9-C7EC-4BD9-8EDE-F3C75DC4393B}: Format(In/Out)=(IMC4,YUY2) Frames(Prev/Fwd/Back)=(0,0,0) Caps=VideoProcess_YUV2RGB VideoProcess_StretchX VideoProcess_StretchY VideoProcess_AlphaBlend
           D3D9 Overlay: Supported
                DXVA-HD: Supported
           DDraw Status: Enabled
             D3D Status: Enabled
             AGP Status: Enabled
    Sound Devices
                Description: Speakers (Realtek High Definition Audio)
    Default Sound Playback: Yes
    Default Voice Playback: Yes
                Hardware ID: HDAUDIO\FUNC_01&VEN_10EC&DEV_0665&SUBSYS_102804B8&REV_1000
            Manufacturer ID: 1
                 Product ID: 100
                       Type: WDM
                Driver Name: RTKVHD64.sys
             Driver Version: 6.00.0001.6312 (English)
          Driver Attributes: Final Retail

    Thank you for providing all details in your first post; very few posters do that.
    Two things to try:
    disable hardware acceleration on the affected account; see http://forums.adobe.com/thread/891337
    if that improves the situation, then updating the graphics drivers would be advised; see http://forums.adobe.com/thread/945765 - you can re-enable hardware acceleration after that

  • MacBook Pro Health and safety issue: Potential Burn during normal use

    Hi,
    I am not a complainer. I worked for Apple of 6+ years and have had a top of the line Apple Notebook since Apple created the concept of the laptop notebook.
    I recently experienced a 3rd degree burn using my MacBook Pro that I think Apple needs to warn folks about:
    MacBook Pro 17"
    Machine Model: MacBookPro1,2
    CPU Type: Intel Core Duo
    Number Of Cores: 2
    CPU Speed: 2.16 GHz
    L2 Cache (shared): 2 MB
    Memory: 2 GB
    Bus Speed: 667 MHz
    Boot ROM Version: MBP12.0061.B00
    Serial Number: ()
    SMC Version: 1.5f10
    Sudden Motion Sensor:
    State: Enabled
    I had my laptop on my lap. I was wearing shorts. It noticed that it was warm on my leg where the left side of the MacBook Pro was touching my leg, but it didn't create a reflex pain response.
    Upon completing my session, when I closed the machine and put it away, I noticed a 1 inch x .75 inch blister on my leg where it had been touching the MacBook/Pro; and it has turn out to be a significant burn.
    I checked all the documentaiton that came with my MacBook Pro and there was no warning about the potential of this situation.
    I recommend that Apple let owners know, perhaps through an email or a popup when they visit the Apple site. Lastly, when I encountered this issue, I wasn't running any high performance, compute bound applications. It was email. So, I have to believe that it is possible to detect wait states within the processes running and take the processors to a low power mode of operation when they are not performing actual work. Am I out in left field here?
    I want Apple to be successful. I haven't heard of a similar complaint on any of the high performance PC's at work. Beyond a Health and Safety issue, this is also a reputation issue. Better to face into the storm and honestly deal with this issue.
    A slightly crisp, but loyal, MacBook Pro user.
    Mike Doherty
    MacBook Pro Mac OS X (10.4.5) Potential Health and Safety Issue- 3rd degreee burn potential under normal use

    Mike... I do sympathize with your situation but let me correct you:
    I recently experienced a 3rd degree burn using my
    MacBook Pro
    Do you know what a 3rd degree burn is? A 3rd degree burn involves the dermis, and is full thickness involving the subcutaneous tissues and fat underneath your skin layers. This is something that usually happens when man meets fire, electrocution, and chemical burns. A 3rd degree burn is not typically achieved by a simple transfer of energy by conduction, unless extreme heat for an extended period of time.
    I had my laptop on my lap. I was wearing shorts. It
    noticed that it was warm on my leg where the left
    side of the MacBook Pro was touching my leg, but it
    didn't create a reflex pain response.
    Reflex pain response? Don't try to make up medical terminology. You didn't feel it much like you don't feel the sun when you get a sunburn initially... your skin slowly adjusted to the temperature, and at some point the heat increased over the threshold of which causes damage. You should have gone to the doctor if you were overly concerned.
    Upon completing my session, when I closed the machine
    and put it away, I noticed a 1 inch x .75 inch
    blister on my leg where it had been touching the
    MacBook/Pro; and it has turn out to be a significant
    burn.
    You're right, if you have a 1inch by almost 1 inch heat related blister on your leg, it is bad, nothing that I would consider significant. That is less then 1% of your body, probably about 0.25% to 0.5%, and only a 2nd degree burn. Your most significant complication would be a local skin infection.
    I checked all the documentaiton that came with my
    MacBook Pro and there was no warning about the
    potential of this situation.
    Actually... I'd hate to call you a liar, but I'm pretty sure that it does warn about burns.
    To confirm this, apple has also information online:
    http://docs.info.apple.com/article.html?artnum=30612
    I recommend that Apple let owners know, perhaps
    through an email or a popup when they visit the Apple
    site.
    They do... link above.
    Lastly, when I encountered this issue, I wasn't
    running any high performance, compute bound
    applications. It was email. So, I have to believe
    that it is possible to detect wait states within the
    processes running and take the processors to a low
    power mode of operation when they are not performing
    actual work. Am I out in left field here?
    No, you're definitely not. Here's where I start to agree with you. For the computer to heat up that much, when not doing things like rendering video is abnormal, and you deserve to have apple check out your computer. I think you should contact them on this concern.
    I want Apple to be successful. I haven't heard of a
    similar complaint on any of the high performance PC's
    at work. Beyond a Health and Safety issue, this is
    also a reputation issue. Better to face into the
    storm and honestly deal with this issue.
    It's harder for other manufacturers... our computers are aluminum, designed to disperse the heat. Technically they are considered "portables" not laptops, but I don't get into that argument because I disagree with the word "portable"... it's meant to work on your lap, and if you can't comfortably using regular apps, you deserve an answer.
    A slightly crisp, but loyal, MacBook Pro user.
    Hey, at least you're taking it with some humor. It's a shame you had to get hurt as a result of your computer. If I were you I would have gone to your Primary Care Physician, documented the burn, and returned your computer for a new one, and for something say, a free iPod for your pain.
    Sorry you got hurt, I think you should have your heat issue professionally investigated through apple care

  • Overprint Preview question and another issue...

    Hi...
    CS4, Win XP.
    Overprint Preview question:
    The other day i sent a file for printing (poster) in PDF and CS2 formats. For some reason, the printer converted the file to a .tif and then printed. Parts dropped out... Both the PDF and CS2 files looked fine.Description follows:
    1/ Background black
    2/ Design element over the black (blue lines to form a wave).
    3/ Logo in red and white. Plus a line of text in red. And other text in white.
    The white of the logo vanished. The red line of text kind of vanished... printed very faintly and only (i think in parts). Printer tried to do a patch job of printing the line separately and pasting... anyway... to cut a long story short, he wanted the final output in .tif. OK...
    So, i converted to tif and sure enough... those parts vanished... did a search here and found the solution - view file in Overprint Preview and then in Attributes, turn off the Overprint Fill... so all well...
    So, the question is, why does this happen? And, how, do i know in advance that x or y is likely to cause a problem? I have noticed in Bridge that sometimes, parts of a logo or a line of text does not show... but looks fine in AI or Acrobat... now realise the cause, but not the reason.
    The other issue...
    Same black background(s)... placed Photoshop file/s with a transparent background... Prints fine at the printers (various machines and media) ... But on the laserprinter an HP Color Laser Jet CP1510 series, there's a dark patch around the image (the actual file area).
    Again, any ideas?
    Cheers...
    S

    PrepressPro1 wrote:
    <snipped>... so if your looking for this forum to play detective and tell you who in your workflow set the elements to overprint, I don't think this can be done. I don't think I have ever seen Illustrator set any elements to overprint all by its self. <snipped>
    Hi PrepressPro...
    Many thanks for your earlier inputs, but not quite sure where you got the idea that i want someone or anyone to play detective... i've understood the Overprint problem... and moved on. If anything, maybe i was just musing and wondering if any particular action turns on "Overprint Fill"...
    Or maybe, i was referring to the second question which has not been resolved yet... Quoting it below for easy reference:
    ++++
    The other issue...
    Same black background(s)... placed  Photoshop file/s with a transparent background... Prints fine at the  printers (various machines and media) ... But on the laserprinter an HP  Color Laser Jet CP1510 series, there's a dark patch around the image  (the actual file area).
    ++++
    To elaborate, the pix above are product shots which have been cut out and placed on a transparent background... The PS file is then placed in AI CS4 with the object option selected to maintain transparency. The transparent area is printing darker on the printer above. But is fine when sent to commerciqal printers...
    Attached is a scan of the problem...

  • Problem in implements ADF Faces: Detecting and handling user session expiry

    Hello everybody
    I´m trying to implement a method to handle user session expiry as explained by frank nimphius in his blog.
    http://thepeninsulasedge.com/frank_nimphius/2007/08/22/adf-faces-detecting-and-handling-user-session-expiry/
    I have implemented the class bellow and add the filters in web.xml. However when I add the JavaServer Faces Servlet to sign the filter, my hole application get nuts. I try to publish the applicatoin in the OAS and it seems that it already starts expired.
    Someone konw what I´m doing wrong?
    I use the filter
    <filter>
    <filter-name>ApplicationSessionExpiryFilter</filter-name>
    <filter-class>adf.sample.ApplicationSessionExpiryFilter</filter-class>
    <init-param>
    <param-name>SessionTimeoutRedirect</param-name>
    <param-value>SessionExpired.jspx</param-value>
    </init-param>
    </filter>
    then I add
    XML:
    <filter-mapping>
    <filter-name>ApplicationSessionExpiryFilter</filter-name>
    <servlet-name>Faces Servlet</servlet-name>
    </filter-mapping>
    package adf.sample;
    import java.io.IOException;
    import javax.servlet.Filter;
    import javax.servlet.FilterChain;
    import javax.servlet.FilterConfig;
    import javax.servlet.ServletException;
    import javax.servlet.ServletRequest;
    import javax.servlet.ServletResponse;
    import javax.servlet.http.HttpServletRequest;
    import javax.servlet.http.HttpServletResponse;
    this is the class
    public class ApplicationSessionExpiryFilter implements Filter {
    private FilterConfig _filterConfig = null;
    public void init(FilterConfig filterConfig) throws ServletException {
    _filterConfig = filterConfig;
    public void destroy() {
    _filterConfig = null;
    public void doFilter(ServletRequest request, ServletResponse response,
    FilterChain chain) throws IOException, ServletException {
    String requestedSession = ((HttpServletRequest)request).getRequestedSessionId();
    String currentWebSession = ((HttpServletRequest)request).getSession().getId();
    boolean sessionOk = currentWebSession.equalsIgnoreCase(requestedSession);
    // if the requested session is null then this is the first application
    // request and "false" is acceptable
    if (!sessionOk && requestedSession != null){
    // the session has expired or renewed. Redirect request
    ((HttpServletResponse) response).sendRedirect(_filterConfig.getInitParameter("SessionTimeoutRedirect"));
    else{
    chain.doFilter(request, response);
    I'm really having trouble controlling user sessions. if someone know where I can get materials to learn how to implements session in Jdev ADF + BC, I´m very grateful.
    Thank you Marnie

    The class works fine.. the issue is when I add the this code into web.xml
    <filter-mapping>
    <filter-name>ApplicationSessionExpiryFilter</filter-name>
    <servlet-name>Faces Servlet</servlet-name>
    </filter-mapping>
    bellow the web.xml
    <?xml version = '1.0' encoding = 'windows-1252'?>
    <web-app>
    <description>Empty web.xml file for Web Application</description>
    <context-param>
    <param-name>javax.faces.STATE_SAVING_METHOD</param-name>
    <param-value>client</param-value>
    </context-param>
    <context-param>
    <param-name>CpxFileName</param-name>
    <param-value>userinterface.DataBindings</param-value>
    </context-param>
    <filter>
    <filter-name>ApplicationSessionExpiryFilter</filter-name>
    <filter-class>view.managedBean.ApplicationSessionExpiryFilter</filter-class>
    </filter>
    <filter>
    <filter-name>adfFaces</filter-name>
    <filter-class>oracle.adf.view.faces.webapp.AdfFacesFilter</filter-class>
    </filter>
    <filter>
    <filter-name>adfBindings</filter-name>
    <filter-class>oracle.adf.model.servlet.ADFBindingFilter</filter-class>
    </filter>
    <filter-mapping>
    <filter-name>ApplicationSessionExpiryFilter</filter-name> ==> the problem occurs when I try to add this code
    <servlet-name>Faces Servlet</servlet-name>
    </filter-mapping>
    <filter-mapping>
    <filter-name>adfFaces</filter-name>
    <servlet-name>Faces Servlet</servlet-name>
    <dispatcher>FORWARD</dispatcher>
    <dispatcher>REQUEST</dispatcher>
    </filter-mapping>
    <filter-mapping>
    <filter-name>adfBindings</filter-name>
    <url-pattern>*.jsp</url-pattern>
    </filter-mapping>
    <filter-mapping>
    <filter-name>adfBindings</filter-name>
    <url-pattern>*.jspx</url-pattern>
    </filter-mapping>
    <servlet>
    <servlet-name>Faces Servlet</servlet-name>
    <servlet-class>javax.faces.webapp.FacesServlet</servlet-class>
    <load-on-startup>1</load-on-startup>
    </servlet>
    <servlet>
    <servlet-name>resources</servlet-name>
    <servlet-class>oracle.adf.view.faces.webapp.ResourceServlet</servlet-class>
    </servlet>
    <servlet-mapping>
    <servlet-name>Faces Servlet</servlet-name>
    <url-pattern>/faces/*</url-pattern>
    </servlet-mapping>
    <servlet-mapping>
    <servlet-name>resources</servlet-name>
    <url-pattern>/adf/*</url-pattern>
    </servlet-mapping>
    <session-config>
    <session-timeout>1</session-timeout>
    </session-config>
    <mime-mapping>
    <extension>html</extension>
    <mime-type>text/html</mime-type>
    </mime-mapping>
    <mime-mapping>
    <extension>txt</extension>
    <mime-type>text/pain</mime-type>
    </mime-mapping>
    </web-app>
    By the way, how can I post code on the forum properly?

  • Rogue detection with Prime 2.1

    Hi@all,
    i know many questions in the last days, but i must say, the last WCS works better as the compination Prime 2.1 and 5760 ;).
    My problem, we have a huge campus and at peaks ~ 1500 rogue-aps. 
    In my new configuration (2x 5760 and Prime 2.1), the wlc see the rogue-aps but in the security dashboard at the prime no rogue are listet.
    The 5760 are in the same mobility/rf-group, the polling interval at the Prime are 15 minutes.
    Maybe some one has a similar problem and could help.
    regards
      René

    Hi
    Do you see the rogue AP on 5760 itself ? "show wireless wps rogue ap summary" output shows you the identified rogue APs. If you can't see anything there, then you may not enable Rogue AP detection on your controller. See whether in your 5760 configuration, the first line below is configured (which will enable rogue detection). Second line is to increase the threshold to minimize false detection. Refer 5760 RRM config guide for more details.
    wireless wps ap-authentication
    wireless wps ap-authentication threshold 50
    This document describe some of the best practices of 5760 configuration including rogue detection as well.
    Cisco 5760 IOS Wireless LAN Controller Configuration Best Practices
    HTH
    Rasika
    **** Pls rate all useful responses ****

  • Access Connections 5 and up issues

    Hi,
    For years our organization has been using Access Connections 4.52 flawlessly.  Recently we purchased a boat load of R500 notebooks.  At this point, we were forced to upgrade to version 5.20 as 4.52 will not recognize the wireless card.
    With 4.52, when a client would boot up wireless and attempt to login to our network , Access Connections would pop up, then attempt the login only AFTER it has connected to the network.  With 5.20, 5.33 and 5.50, this function seems to work ok until I sysprep the image.
    After I sysprep our image, this is what happens:  User boots up wireless and attempts to login to our network....gets and error stating "OURDOMAIN is not available"....15 seconds later Access Connections wakes up and connects to the wireless network.  Now, here is the really dumb part.  I can resolve the issue on my image by opening Access Connections > Location Profiles > Select Profile > Edit > OK.   Access Connections will now behave properly, until I sysprep.
    Is there any solution out there for this?  Or even better, is there a way I can make 4.52 work on a newer model.  4.52 did not have this issue.
    Thanks
    Rosy

    Hi,
    I cannot see it being fair, to blaim Access Connection for situation, that is clearly not caused by Access Connection.
    In the past I was working with multiple corporate images, which I of course had to create, which included syspreping the image. And I can tell you, that sysprepping a 100% working image is always, and I really mean ALLWAYS screwing up some part of the image. If you have been doing images for longer time, then surelly you will be agreed with me.
    If you are not, then you have not created enough images manually (I mean starting with the times of RIS, going through WDS, IUB, SCCM .... ).
    So much for understanding, where to look when you are looking for the root cause.
    So Access Connection is a tool, that depends on other applications and driver. Almost the same as by all other TVT applicaitons. For Access Connection it's highly important, that it's installed in following order together with other tools/drivers:
    1) Power Managerment driver
    2) Power Manager
    3) System Interface driver
    4) Hotkey utility/driver
    5) LAN Driver
    6) WLAN driver
    7) WWAN driver
    8) Access Connection
    It's highly important, that this order is kept.
    So back to the imaging, here is what might happen, when you sysprep the image:
    - you sysprep it, where some parts (usually ini files) are remoted from the dirver installed on the machine.
    - of course you configure the sysprep to load up all the drivers depending on the HW, or some input from the client
    - this will load everything back and inclusiv all the drivers
    ISSUE:
    - WLAN, driver is installed/inicialized after Access Conenction was present in the image
    - by syspreping some of the above menitoned applications from Lenovo are taken as drivers and therefore, they are re-installed only after sysprep kicks-in
    I'm pretty sure, that you know, how you install you image and by some points you might not be agreed with what I'm writing, but I was working with the informations, that I could find in your description.
    I think more description on the sysprep, or the imaging tool and structure might help me imagine, what is goin on.
    BTW: I just remembered, that by olders versions of AC 2.x and 3.x when such issue was present, like also LAN was not detected and all this happened after I installed a corporate image, then my fix for the image was quite simple:
    Reinstall all the above drivers + apps in the order as you can see it in here .
    Cheers

  • I connect my pendrive to macbook pro but it cannot detect and my important data is there in my pen drive so how can i collect this data from my pendrive?

    i connect my externalpendrive to macbook pro but it cannot detect and my important data is there in my pen drive so how can i collect this data from my pendrive?

    make sure that in your finder preferences you have it checked to show external drives on the desktop and in the sidebar of finder
    you find these preferences by selecting the finder icon (blue square on the dock w/ smiley face on it) then click on the work "finder" at top left corner of computer screen then click on preferences then general and put check next to show these items on the desktop and put check next to external drives
    now you should see it on the desktop if you still can't open the drive or access it, it may be in format the mac can't read or write to so that could be an issue.

  • HP C4440 ALL -IN- ONE PRINTING AND INK ISSUES

    I have an HP C4440 ALL-IN-ONE that seems to be having some printing and ink issues.
    Ink keeps saying it is in backup mode
    and its also saying it is not detected or intalled
    this is not a new cartridge and has been used before without any problems.
    i tried using all of the solutions hp gives you with no help.
    all ink levels are detected and i am also using color ink cartridge.
    thanks for any help.

    Hi! I have same problem too. After printer (HP B110b) turn on and then off, all my Wi-Fi devices lose network. I should reboot my router every time after use printer =(((This problem only with Wi-Fi. All ethernet-connected devices woks OK.
    My network: D-Link DIR-320 with firmware 1.21
    Wi-Fi: hidden network with WPA/WPA2 and PSK mode.
    Wi-Fi devices: netbook with WinXP SP3, netbook with Win7 Home Premium x32, Sony-PRS-T2 reader and Galaxy S3 phone (last 2 based on android).

  • ORA-06519: active autonomous transaction detected and rolled back

    I am getting this error. when i am doing insert from my package Any solution to reslove this issue
    ORA-06519: active autonomous transaction detected and rolled back . thanks
    I am doing select - insert...

    Also, if you have any exception handler sections in the code,
    then you have to add a commit or rollback statement for
    every exception that is handled.

  • IE 10 templates doesn't load in 2008 Error"An Invalid or out of place input element was detected and will be ignored"

    Hi Team,
    In our organisation we have DC running on Windows 2008 R2 server along with more than 1000 clients.
    We recently procured around 600 new desktop, which are shipped with Windows 8.1 OS.
    Now the issue is
    Hence we can't create GPP for IE 10, we have created a GPP for IE 10 from a Windows 8.1 client, but that policy wasn't get pushed to the all other client machine.
    We have tried replacing the ADMX & ADML template in our server to push the GPP, still it doesn't worked.
    When we expand the GPP we get the following error message.
    "An invalid or out of place input element was detected and will be ignored."
    Due to this we are unable to push the GPP for around 600 machines, need your assistance.

    As like the blog page you have shared; I am trying to imply proxy settings for the client machines running with IE11, Hence I have created GPP in one of a Windows 8.1 client machine and noticed it wasn't working  (as they are not compatible with the
    IE 10 and above) in windows 2008 server to push the GPP.
    Based on the Microsoft forums I to replaced the ADMX and ADML files in my Windows Server 2008, for getting the GPP created for IE 10.
    Answering your question, I get that error messages only in my Windows 2008R2, as they dont aware about those settings.
    The WindowsServer OS version is irrelevant for applying/pushing GPP.
    We use WS2003 DC's with GPP (GPP settings for IE11 created with Win8.1 RSAT/GPMC) and it all works perfectly.
    Check your GPP settings with Win8.1 - have you correctly set the "enabled/disabled" by using F5/F6/F7/F8 ?
    http://blogs.technet.com/b/grouppolicy/archive/2008/10/13/red-green-gp-preferences-doesn-t-work-even-though-the-policy-applied-and-after-gpupdate-force.aspx
    http://technet.microsoft.com/en-us/library/cc754299.aspx
    http://www.gruppenrichtlinien.de/artikel/f5-f6-f7-f8-und-f3-gpps-aktivierendeaktivierennicht-konfigurieren/
    Don
    (Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable.
    This helps the community, keeps the forums tidy, and recognises useful contributions. Thanks!)

Maybe you are looking for

  • How to write a pgm to change the existing encrypted password

    Hi all, can anybody tell me how to write a pgm to change the existing encrypted password. thanks in advance.

  • Show html in af:richTextEditor

    Hi all, I use Jdev 11g. I have some html formatted emails saved in the database. To show them in an ADF faces application I use a af:richTextEditor. That worked for a while, but now I have some html code in a mail and if that mail is openend the page

  • Bug in Hyper-V: Network Bridge's ARP proxying broken in certain scenarios

    Edit I am quite sure now this is a bug. The ARP proxying does not work for VMs if the packet-recipient is not directly attached to the external vswitch that is bridged to the wifi-nic! /Edit I am running a test lab on my Windows 8.1 using Hyper-V. My

  • Downloaded apps in other languages then English

    I just got my iPhone 5S and some of the apps I download is in spanish and not english. Maybe 3-4 apps out of 50 is in spanish. What is wrong and how can i change it back? I have tried to delete them and download again, but doesnt work. All the apps a

  • No 'Refresh' tab, can't find in Customize menu

    Another application directs me to refresh my browser page. FF doesn't show any command for doing that. I followed instructions from a user in your community, but there is no option for refreshing or reloading in the Customize palette.