SAP Security tool within to determine the affects of a security change.

Hi -
Do anyone know of a security application tool within SAP to determine the affects of a security change to roles other than SUIM, SE16 ( tables), PFCG, etc
The basics are:
1) A role is updated to include additional t-codes, removal of t-codes, or change authorizations of existing t-codes.
2) Currently there is no way to determine what other t-codes may be affected by the change in authorizations which makes regression testing almost impossible.  The ultimate solution would be a list to the process teams for regression testing to ensure everyone is aware of the consequences of making a change.
The application in question would:
1) Use the change log within SAP (with a few parameters specified) to determine what authorizations were changed.
2) Lookup all the authorizations by t-code for every t-code in the roles meeting the criteria.
3) Create a list of roles / t-codes that use the authorizations that were identified as changed.  This would be the t-codes that need to be evaluated for regression testing.
This process is possible today, but would take hours to evaluate a simple change by hand.  A single t-code can have 100+ authorizations and a role could have 50+ t-codes.  This case would lead to the manual cross referencing of 5000+ items which would be extremely time consuming and prone to error.
Thanks
Larry Mac

Hi Larry,
I am only aware of SUIM....
there are some possibilities beside change logs, for instance Transaction->executable with role/for user,....
Also rsusr008_009_new(critical authorizations) gives you a good chance for finding such
possible effects.
The cusotmizing of critical auths./combinations/variants is a bit complex, but following the documentation step by step gives a good starting point.
So if after the changes users show up in the result, you knwo, that you have to react.
Of course this is not 100% the solution you are looking for, but gives the possibility for an additional check/countercheck.
b.rgds, Bernhard

Similar Messages

  • How to determine the affected IOS?

    We have just received a Cisco Security Advisory re. the misformed BGP packets and we're having a hard time determining whether the IOS on our BGP routers is affected. We happened to be running the IOS 12.1(5) and this specific IOS is NOT on the list of the affected IOSes that Cisco listed in the warning, however, the 12.1 is.
    In the past warnings, the exact based releases of our IOSes have always been on that list, but for this one, it's not, so we're kind of stumped.
    thanks.

    If you are refering to the advisory regarding the malformed BGP packet on a system that has support for MPLS, the 12.1 train of IOS is not vulnerable. This would include the 12.1(5) version you are running.
    Vulnerable versions of IOS include:
    Cisco IOS release trains based on 12.1T, 12.2, 12.2T, 12.3 and 12.3T. IOS versions based on 12.1 and 12.1E are not vulnerable.
    Here's a link to the advisory:
    http://www.cisco.com/en/US/customer/products/products_security_advisory09186a00803be77c.shtml
    If you are looking at the advisory for the misformed packet when the command "bgp log-neighbor-changes" is enabled, you are likely vulnerable as all versions of IOS are vunerable up to this point. You would need to upgrade to at least 12.1(26) to address this vulnerability if you plan to stay in the 12.1 train of IOS. You can also address this issue by removing the neighbor change logging by issuing the command "no bgp log-neighbor-changes" under your "router bgp" configuration. There are also a few other things listed in the workarounds section of the advisory. Here is a link to the advisory:
    http://www.cisco.com/en/US/customer/products/products_security_advisory09186a00803be7d9.shtml
    HTH,
    Steve

  • How to determine the username before it was changed by run-as principal?

    Hello, please help me with this (simplified) case:
    <ol>
    <li>User logs in to a JSP (bean) A with username X</li>
    <li>A calls stateless sessionbean B and runs-as-principal Y</li>
    <li>B creates entitybean C</li>
    </ol>
    I want to store the (original) username X into entity C, but when I call getCallerPrincipal() from the entity context it returns Y (of course ;-) ).
    <br><br>
    <u>Question 1</u>: Is it possible to determine the original username X from the entity context using the default Weblogic security providers?<br><br>
    <u>Question 2</u>: If not, is it possible by implementing a custom provider?<br><br>
    <u>Question 3</u>: If it is possible to determine the original username, can I use the same mechanism to pass-on other stuff like remote host, http-session-id, et cetera.<br><br>
    <b>Restrictions</b>
    <ol>
    <li>Getting the data from the JSP context and passing it all the way down to my entity beans through parameters on the EJB's is not an option.</li>
    <li>I can't change the runs-as-principal to runs-as-client because of the huge number of existing EJB's.</li>
    </ol>
    Thanks in advance,
    <br><br>
    Martijn

    Mike,
    the RDT table name is in the georaster object (gr) you just created. It's an attribute of sdo_georaster object, i.e., gr.RASTERDATATABLE in your case.
    generally, automatically generating the RDT name thru sdo_geor.init is not recommended because that would generate an RDT for each GeoRaster object. An RDT table should be used to contain the raster blocks of many smaller GeoRaster objects while you devote a single RDT table for a huge GeoRaster object (an image with a size over tens of GB to many terabytes for example). Even though the RDT tables are internal to GeoRaster, the creation of the RDT table is done by users, which is intentional, so that you can fully leverage the configuration and tuning power of oracle database (for example, if ASM is not used, RDT tables may be created on different tablespaces so that the raster blocks are distributed to different disks to improve performance).
    to generate unique RDT names, you can leverage the SEQUENCE object to create sequence numbers and then attach them to a special table name you picked up.
    Regards,
    Jeffrey

  • SAP security - changing check maintain setting for security objects

    I am trying to change the check maintain indicator for a couple of transactions
    to alow me to manage access based on security objects that are not currently defined as check maintain.  Specifically, I have updated the check indicator
    (using SU24) to check maintain for object c_stue_ber on transactions MD11 and MD12 (planned order create/change).  The transactions still do not check this object as expected.  Does anything else need to be done to enable checking an
    object that is not set up as check maintain originally?
    Any help is appreciated.
    Thanks,
    Doug Scott

    Hello Kerstin,
    I also wrote a message to SAP and got the following response.  Looks like there are no security checks for this object in these transactions.
    Regards,
    Doug
    Response from SAP
    03.04.2007 - 12:48:38 CET    SAP    Reply 
    Dear Doug,
    An authority check on C_STUE_BER is not possible for the transactions
    CO02, CO03, MD11, MD12, CO26, CO27, CO28, COOIS, COHV, CO05, CO05N,
    CO04N, COMAC or CO46.
    In CO01 we check if the user has the authority to resolve the BOM
    (C_STUE_BER). After resolving the BOM we don't check any longer with
    C_STUE_BER since we don't work with the BOM but with a component list
    in the order (which is actually a copy or the BOM).
    For this component list there is no authority check.
    The component list is visible in CO02, CO03, CO26, CO27, CO28, COOIS,
    COHV, CO05N, CO04N, COMAC, CO46.
    For production orders we use authority C_AFKO_AWA. With this
    authority you can limit the access to CO02, CO03 and the change of
    production orders by other transactions.
    But please note that there are still transactions
    that will display the orders and its components without authority
    checks. For example infosystem transactions (COOIS, COHV, CO26, CO27,
    ...) and other processing transactions (COGI, ...). For those
    transactions you would have to limit access.
    For the creation of planned orders MD11, the authority check C_STUE_BER
    is not used. Here you can use M_MTDI_ORG to check on a MRP controller.
    So you should enter the same MRP controller in the material master
    of the troublesome products and only this MRP controller will be able
    to create a planned order for this material.
    I am sorry not to be able to offer you any better solution for this
    problem.
    Kind Regards
    Eoin Donnelly
    SAP Support Consultant (SCM)
    SAP GSC Ireland

  • Any ideas on restricting userID Role Assigment within the SAP Security Team

    Hello,
    I have gotten a request to look into restriction of assignment of roles to oneself within the company SAP Security Team. Thoughts I have come up with so far involve the use of UserID User Groups, Role Assignment Ranges, and forcing all role assignements for all userIDs through GRC-AC CUP for QA and Prod. Has anyone come up with a workable solution that is outside of these suggestions that they have put into practice?
    Thanks in advance for your help!
    John

    Hi John,
    There can be a manual control in place and individual should not assign role/s to himself / herself.
    Otherwise, security team members can be assigned to a specific group (let say Security) and they shouldn't have access to authorization S_USER_GRP with ACTVT 22 & CLASS - Security.There should be a dedicated power user to assign the role/s to the security team members and this can be auditted (SM20 log for manual super user / FireFighter log for FireFighter user).
    Thanks
    Prasanna

  • Make Business systems visible within SAP PI Tools

    Hi!
    I defined technical system and business system as well within SLD. Now I would like to see this business system within SAP PI tools (such as Integration Builder).
    Question:
    Which actions are requiered after the definition the technical and business system in order to work with these systems in SAP PI tools? 
    Is thers some documents describing this issue?
    Thank you!

    Hi,
    The order for without party is simple, just import it, then
    1. Create configuration scenario
    2. Assign this system to your scenario
    3. Create communication channels
    4. Create Sender Agreement, Receiver Determination, Interface Determination, Receiver Agreement
    And for with party.
    1. Create Party in Integration Directory
    2. Assign business system to this party
    Now when you create your scenario
    1. Create configuration scenario
    2. Assign this party and system to your scenario
    3. Create communication channels
    4. Create Sender Agreement, Receiver Determination, Interface Determination, Receiver Agreement
    >>- Creation of Party
    First
    >>- Creation of Business component
    Second
    >>- Creation of Scenario
    Third
    >>- Assign Business system
    Fourth
    Hope now it is clarified.
    Regards
    Suraj
    Edited by: S.R.Suraj on Oct 1, 2009 4:33 AM

  • What are the Essentials for a Sap Security Consultant.

    Hi Gurus,
    I have completed a Implementation in which I alone handled the entire Security . It is a defense client .
    Now I am technically expert at security. But I have no functional knowledge.
    Implementing Security in SAP one needs to have knowledge of funtional process as well. The course that are purely technical stuff and I have good idea of techincal stuff.
    The Question is what is a Sap Security Consultant expected to know . And how to go about acquiring that knowledge?

    Hi Hussain,
    There is a little bit of release-dependent-everything in this thread: Authorization for VAP2 in conflict with VD02 for F_KNA1_GRP
    Try solve it and you will understand that you need the requirements (without that you are anyway doomed) and the knowledge and the appropriate access to create / test it.
    BAPI's are remote enabled stable interfaces to SAP standard functionality. They are the best examples of combining functional, technical and standard skills in a sustainable way without creating a mess (a mess, way beyond the bounds of your concerns...).
    If you learn to use the available tools and information sources, then you dont need to stress about the essentials, even if your customer makes a design error before or after your advice.
    Cheers,
    Julius

  • CE71SR5 install failure (Start SAP Secure Store in the File System)

    Hi!
        when i install CE71SR5 CompositionPlatform,met a question, below is the log information, waiting help,thanks.
    An error occurred while processing service SAP NetWeaver CE Developer Edition > SAP NetWeaver CE Development System( Last error reported by the step :Cannot create the secure store. SOLUTION: See output of log file SecureStoreCreate.log: INFO: Loading tool launcher... INFO: [OS: Windows XP] [VM vendor: SAP AG] [VM version: 5.1.021] [VM type: SAP Java Server VM] INFO: Main class to start: "com.sap.security.core.server.secstorefs.SecStoreFS" INFO: Loading 8 JAR files: [C:\usr\sap\CE1\SYS\global\security\lib\tools\iaik_jce.jar, C:\usr\sap\CE1\SYS\global\security\lib\tools\iaik_jsse.jar, C:\usr\sap\CE1\SYS\global\security\lib\tools\iaik_smime.jar, C:\usr\sap\CE1\SYS\global\security\lib\tools\iaik_ssl.jar, C:\usr\sap\CE1\SYS\global\security\lib\tools\w3c_http.jar, C:\Program Files\sapinst_instdir\CE71_DEV_ADA\INSTALL\install\lib\sap.comtcexceptionimpl.jar, C:\Program Files\sapinst_instdir\CE71_DEV_ADA\INSTALL\install\lib\sap.comtcloggingjavaimpl.jar, C:\Program Files\sapinst_instdir\CE71_DEV_ADA\INSTALL\install\lib\sap.comtcsecsecstorefsjavacore.jar] INFO: Start SAP Secure Store in the File System - Copyright (c) 2003 SAP AG FATAL: Main class "com.sap.security.core.server.secstorefs.SecStoreFS" cannot be started: java.lang.ExceptionInInitializerError at javax.crypto.Cipher.getInstance(DashoA12275) at javax.crypto.Cipher.getInstance(DashoA12275) at iaik.security.provider.IAIK.a(Unknown Source) at iaik.security.provider.IAIK.addAsJDK14Provider(Unknown Source) at iaik.security.provider.IAIK.addAsJDK14Provider(Unknown Source) at com.sap.security.core.server.secstorefs.Crypt. (Crypt.java:85) at com.sap.security.core.server.secstorefs.SecStoreFS.setSID(SecStoreFS.java:175) at com.sap.security.core.server.secstorefs.SecStoreFS.handleCreate(SecStoreFS.java:836) at com.sap.security.core.server.secstorefs.SecStoreFS.main(SecStoreFS.java:1306) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25) at java.lang.reflect.Method.invoke(Method.java:585) at com.sap.engine.offline.OfflineToolStart.main(OfflineToolStart.java:161) Caused by: java.lang.SecurityException: Cannot set up certs for trusted CAs at javax.crypto.SunJCE_b. (DashoA12275) ... 14 more Caused by: java.lang.SecurityException: Cannot locate policy or framework files! at javax.crypto.SunJCE_b.i(DashoA12275) at javax.crypto.SunJCE_b.g(DashoA12275) at javax.crypto.SunJCE_r.run(DashoA12275) at java.security.AccessController.doPrivileged(Native Method) ... 15 more FATAL: com.sap.engine.offline.OfflineToolStart will abort now with exitcode 2.). You may now
    choose Retry to repeat the current step.
    choose View Log to get more information about the error.
    stop the task and continue with it later.
    Log files are written to C:\Program Files/sapinst_instdir/CE71_DEV_ADA/INSTALL.

    I have the same problem.
    Although i try it use jdk1.5.0.16, the same err occured.
    Also i use the jce_policy-1_5_0.zip.
    I will appreciate your answer.
    I have resolved the problem by copy the
    local_policy.jar
    US_export_policy.jar
    to
    sapinst_instdir\CE71_DEV_ADA\INSTALL\sapjvm\sapjvm_5\jre\lib\security
    Edited by: wang zhen on Aug 28, 2008 11:08 AM
    Edited by: wang zhen on Aug 29, 2008 9:53 AM

  • Benefits of SAP Business Warehouse Reporting compared with the Query-tools?

    Hello experts,
    I've been creating reports with SAP Query tools, but been faced with few problems. First of all, there are restricted possibilities in terms of joining tables, and thus I cannot include all the data required for the report.
    One solution for this would have been to create separate queries and join the data together in Excel. The problem with this is that there exists no common field that would make sense as for a selection criterion. If the selection criterion is different in different queries, there is the danger of combining false data together, which would eventually result with distorted data. 
    So I was wondering, could anyone briefly tell me if SAP Business Warehouse reporting would solve these problems? And what other benefits would it provide compared with the SAP Query? I'd urgently need to know if it would be a beneficial investment for the company, since I haven't found solutions for the problems occurred in the creation of reports.
    Thank you in advance for you help!
    Maria

    The answers are yes - and thousands of companies have gone down this route
    Puttingin BW is a strategic aim of the comapny and not to be thought about and discussed in a BI forum such as this
    The costs of implementation and hardware will no doubt make your eyes water.
    To be quite honest SAP BI is a "no brainer" as most of the new e-SOA and new R3 modules reply on BW for their reporting needs

  • How to determine the number of pixels of a desired object within a digital photograph?

    Hi everyone. I want to determine the number of pixels in an object that is part of a digital photo. I use cameras to film chunks of ice breaking away from ice cliffs or tidewater glaciers. I want to know the size of the ice chunk that my digital photographs capture. I know the width and height of the ice cliff in metres already, so I was thinking that I could convert the equivalent of 1 pixel : ? metres - this is really what I want to do. That way every time I see a chunk of ice breaking off, I can pull up the photo, outline the chunk, calculate how many pixels fill the area of ice removed by the chunk breaking off and convert to metres area 2 - thus giving me my size order. If anyone has ideas on how to do this I would really appreciate it, thanks so much community. I was thinking that Photoshop or Fireworks could help me with this, Ricky

    Thanks gener7 and normfb.
    The Photoshop help measurement page is brilliant and I think I can use the info on that page to work out my iceberg sizes. Check out the attached photo - you are looking at an ice cliff - essentially the front of a tidewater glacier that flows in the ocean. I'm a research student and I look at the process of iceberg calving - this is the term we use to define the sudden breaking away or detachment of ice chunks from glaciers that end in the sea.
    I used the lasso tool to crop the area of ice lost as a single chunk of ice detached from the ice cliff. At the same time I had the histogram window open. The histogram showed me how many pixels were contained in the cropped area. What I need to do now is work out what 1 pixel is equivalent to in metres. Soon I will have a digital elevation model for the ice cliff that will offer centimetre to metre scale resolution of the surface topography - so that should really help. The photographs I have are taken every 30 seconds - which is brilliant for documenting how the geometry of the ice cliff adjusts in response to detaching ice pieces and also because the ice is moving. I am a research student in Canada, and at the time I took the photos we measured that the ice cliff was advancing at a rate of approximately 12 metres per day! That's pretty fast. The flow of the ice is a first order control on the rate of iceberg production - you are essentially pushing ice into the ocean where it breaks off. I'm having to learn everything Photoshop from scratch...so please bare with me because maybe some of the photoshop questions I ask are simple to most!
    I noticed the "integrated density" function on the help sheet you suggested. This function also provides the square number of pixels contained in the cropped area I select...I guess this is similar to the histogram right?
    Either way - i just need the scale conversion to go from 1 pixel : metres or cm equivalent. At that point I think I will have to manually select every single iceberg event from my time-lapse photos and do this the manual way!  I have about 800 events to manually digitise and calculate the area for...
    Thanks everyone, Ricky

  • Trying to determine the last occurence of a number within a word string.

    Hi All,
    I am trying to find the last occurence of a number within a string. I have had a quick look at the Java Tutorial and know about lastIndexOf and substring. The thing is I have to test for the existance of the numbers 0-9 within a product code that typically looks like this:
    s1_14G12B
    s1_17G1BA
    s2_24GD
    The only part of the above strings that I am interested in is the letter(s) that follow the very last number, so in the case of those codes presented above, I would like to extract the following:
    B
    BA
    D
    I have written some code that performs a similar operation:
    public class FindPriceCode
      private String priceCode;
      private String[] numberValues = {"0", "1", "2", "3", "4", "5", "6", "7", "8", "9"};
      public FindPriceCode()
        priceCode = "s2_71G4BA";
        for(int i=0; i<numberValues.length; i++)
          int location = priceCode.lastIndexOf(numberValues);
    System.out.println("Character " + numberValues[i] + " found at position: " + location);
    public static void main(String[] args)
    FindPriceCode myPriceCode = new FindPriceCode();
    ...finding the location of numberValues string within the given example code. I am now at a loss as to how I can determine the location of the last number occurence (moving right to left) and then build a substring from that number. Any help will be greatly appreicated.
    Thanks
    David

    Hello,
    import javax.swing.*;
    import java.awt.*;
    import java.awt.event.*;
    public class CutNumberTest extends JFrame implements ActionListener {
         private JTextField input= new JTextField(10);
         private JTextArea result=new JTextArea(10,10);
         char[]numbers=new char[]{'0','1','2','3','4','5','6','7','8','9'};
         public CutNumberTest() {
              super("CutNumberTest");
              setDefaultCloseOperation(DISPOSE_ON_CLOSE);
              JButton cutButton = new JButton("cut number");
              cutButton.addActionListener(this);
              JPanel topPanel=new JPanel();
              JLabel label=new JLabel("Please enter price-code:");
              topPanel.add(label);
              topPanel.add(input);
              topPanel.add(cutButton);
              getContentPane().add(topPanel, BorderLayout.NORTH);
              getContentPane().add(new JScrollPane(result));
              pack();
              setLocationRelativeTo(null);
         public void actionPerformed(ActionEvent e) {
              char[] code=input.getText().toCharArray();          
              int counter=code.length;
              boolean lastNumFound=false;
              while(!lastNumFound && --counter >= 0)
                   lastNumFound=isNumber(code[counter]);
              result.append(lastNumFound ? "result: "+input.getText().substring(counter+1)+"\n" : "No number found!\n");
         private boolean isNumber(char chr){
              boolean isNumber=false;
              int counter=-1;
              while(++counter < numbers.length && !isNumber)
                   isNumber=numbers[counter]==chr;
              return isNumber;
         public static void main(String[] args) {
              new CutNumberTest().setVisible(true);
    }//copy/paste:
    import javax.swing.*;
    import java.awt.*;
    import java.awt.event.*;
    public class CutNumberTest extends JFrame implements ActionListener {
         private JTextField input= new JTextField(10);
         private JTextArea result=new JTextArea(10,10);
         char[]numbers=new char[]{'0','1','2','3','4','5','6','7','8','9'};
         public CutNumberTest() {
              super("CutNumberTest");
              setDefaultCloseOperation(DISPOSE_ON_CLOSE);
              JButton cutButton = new JButton("cut number");
              cutButton.addActionListener(this);
              JPanel topPanel=new JPanel();
              JLabel label=new JLabel("Please enter price-code:");
              topPanel.add(label);
              topPanel.add(input);
              topPanel.add(cutButton);
              getContentPane().add(topPanel, BorderLayout.NORTH);
              getContentPane().add(new JScrollPane(result));
              pack();
              setLocationRelativeTo(null);
         public void actionPerformed(ActionEvent e) {
              char[] code=input.getText().toCharArray();          
              int counter=code.length;
              boolean lastNumFound=false;
              while(!lastNumFound && --counter >= 0)
                   lastNumFound=isNumber(code[counter]);
              result.append(lastNumFound ? "result: "+input.getText().substring(counter+1)+"\n" : "No number found!\n");
         private boolean isNumber(char chr){
              boolean isNumber=false;
              int counter=-1;
              while(++counter < numbers.length && !isNumber)
                   isNumber=numbers[counter]==chr;
              return isNumber;
         public static void main(String[] args) {
              new CutNumberTest().setVisible(true);
    Regards,
    Tim

  • SAP ABAP Client proxy Errror occured when determining the Business system.

    Dear Friends
       I am trying to push data from ECC to PI and then MS-SQL Server. My SAP scenario is ABAP Proxy to JDBC
      I have created on Enhancement Implementation for AS01 ( Asset Master creation). Here I am calling my ABAP proxy and uploading ANLA and ANLZ strucutre  to my abap proxy.  but I get the run time error. that suggest Error occurred while determining the Business system - SLD_API_Exception.
    My all IR and ID objects are activated, I have tested the scenario successfully without error in ID, 
    When I check SM21 it suggest that error is due to XI is unable to access the SLD. Could_not_determine_sld_access_data.
    SLDCHECK works fine in PI system.
    SLDCHECK is failed in my ECCDEV 400 client System.
    Is it mandatory to configure SLD access in ecc development system as well ?  is this  the reason why I am not able to push the data to my PI system? Please tell me How can I solve this error? you any answer will be appreciated greatly.
    Please look the below link it contains the enhancement code of AS01 transaction code where I am calling abap proxy to send the data.  Runtime analysis report, SM21 log, and SLDCHECK failed screen shot in 400 client. SLD working fine in PI system. my SLD is configured in SOLMAN system.
    You can see the error and Code from this link ->  [Code , Runtime Dump Analysis report, SM21 Log and SLDCHECK|http://www.scribd.com/doc/61192432/Sap-Abap-Proxy-Error]
    Please help me How can I solve this ?
    Regards
    Naeem

    Hi Naeem,
    >>>is it mandatory to configure SLD access in ecc development system as well ? is this the reason why I am not able to push the data to my PI system? Please tell me How can I solve this error? you any answer will be appreciated greatly
    YES...you need to configure SLD check in your ECC System also
    Also check the links below for proxy connectivity step by step
    /people/vijaya.kumari2/blog/2006/01/26/how-do-you-activate-abap-proxies
    http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/50d69314-1be0-2b10-11ab-8045021f0c3a?quicklink=index&overridelayout=true
    http://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/e0ac1a33-debf-2c10-45bf-fb19f6e15649?quicklink=index&overridelayout=true
    Regards,
    Naveen

  • Hello. I have two version of Office for Mac. 2008 and 2001. I want to delete the 2008 version. If I use the removal tool within the Offie 2008 folder, is there any danger of the 2001 version being removed too.  Thanks Dave UK

    Hello. I have two version of Office for Mac. 2008 and 2001. I want to delete the 2008 version. If I use the removal tool within the Offie 2008 folder, is there any danger of the 2001 version being removed too.  Thanks Dave UK

    Do you mean Office 2008 and 2011 or do you really want Office 2001? I think you mean 2011 since Office 2001 wouldn't make much sense.
    The Office uninstaller should be able to identify there are two versions and allow you to delete either one or both.

  • Problems with "Background Eraser Tool" and "Blur". The tools don't affect the whole area but just connect the start and the last points.

    Hello!
    I have some issues with Photoshop CC 2014. The tools "Background Eraser Tool" and "Blur" won't work correctly. When I’m holding down the left mouse button and trying to erase or blur some area, the tools don’t affect the whole area but just connect the start and the last points – like drawing a line. These troubles exist with mentioned tools only, other tools work correctly.
    I’ve restored each tool separately, restored all the tools together, installed new drivers for tablet, re-installed Photoshop and even Windows. Nothing helped. These tools worked correctly earlier with the same adjustments, but one day something went wrong.
    How can I make the tools work correctly?
    Some information about my computer:
    • Notebook Lenovo Y560
    • Windows 7 Home Basic SP1 x64
    • Intel Core i5 2.53 GHz
    • 4Gb RAM
    • ATI Mobility Radeon HD 5730 1Gb
    • Tablet Wacom Bamboo CTL-470

    Hi,
    I have a similar problem with the Background Eraser tool as well. It's the same both on my PC and on my laptop, both running Win 8.1 and PS CC2014. Would be great to have a solution for this. Did you managed to find a fix?

  • How to install the SAP Netweaver tools

    Dear Friends,
    I want to develop applications thro SAP Netweaver Tools.  Can any one guide me thro installation process, since I am new to Netweaver.  Where do i get the software.  Pls help.
    Regards,
    Shankaran J
    +91 98404 61721

    HI
    Hi,
    You can download NWDS from this link
    https://www.sdn.sap.com/irj/sdn?rid=/library/uuid/cfc19866-0401-0010-35b2-dc8158247fb6
    Refer the thread for more information
    Re: Where "SAP Netweaver Developer Studio 2.0"?
    For Development refer these links
    NETWEAVER
    http://help.sap.com/saphelp_nw04/helpdata/en/30/c4461ff69d5a438f1286e344b545fa/frameset.htm
    PORTAL
    http://help.sap.com/saphelp_nw04/helpdata/en/a9/76bd3b57743b09e10000000a11402f/frameset.htm
    DEVELOPMENT MANUAL
    http://help.sap.com/saphelp_nw04/helpdata/en/6a/50c0b26e2543a2984dcd518e26dc65/frameset.htm

Maybe you are looking for

  • Error during client copy in GRC 10.0 -Application exit

    Hello Experts, After installing GRC 10.0,as post installation activity , we are doing client copy (accordence with the sap note 1505255). but we are getting  'Application Exit Error' when executing method FDT_BEFORE_EXPORT_C: any help would be apprec

  • XI message id in inbound proxy

    Hello,   Is it possible to retreive the xi message id in a proxy. Regards, Michel

  • Inventory management problem with WS-C2950-24 on CWLMS 4.0

    Hi Joe, I have a problem with inventory management wiht 2950- 24 switches on which I am not able to capture inventory as well as the configurations. The IOS version is 121-22.EA13 and featureset is i6k2l2q4-mz. However, when I troubleshoot it, all th

  • MacAir OX Mavericks merge contacts with Outlook:Mac 2011

    Can anyone help me merge the contacts within my MacAir running OS Mavericks with Outlook:Mac 2011?  Outlook can't seem to see my contacts and I'm creating duplicate contacts within Outlook.  There must be some way!

  • APEX OAS HTTP SERVER etc

    Hi I'm not clear on architecture - for 10g Enterprise Edition, if I want to install APEX do I have to have an application server or can I just install the http server on the same box as the database? Is there anything wrong with this on a system that