Security issues using Open Realty and DW (any sites hacked?)...

I am doing a real estate site and woud prefer to stick with DW and integrate the Open Realty plugin rather than jump in to Joomla for ease of manipulating the overall design. Have any of you ever had any sites hacked using OR? I know you have to use pconnect to use OR; does this increase MySQL vulnerability? I am using GoDaddy and am not sure if they even allow pconnect on their Linux/Apache servers...

A Trojan Horse almost always results from someone visiting a web site and/or receiving email and in the process inadvertently downloading malicious software. Therefore, it is the *computer user* that literally invites this malware into their computer. This malware did not get into the PCs on your network because someone on the internet got past your network's "firewall" ie the Airport Base Station.
What someone needs to do is to educate these PC users on your network on the basics of "safe computing", and to install and maintain software on their PCs to guard against and detect this type of malware at the moment it gains entry to the PC. What you do not need to do is expend effort beefing up the security of your network's connection to the internet.

Similar Messages

  • How to use open cursor and iner join in one statement

    Hello All,
    Could any one post the code for the below question?
    How to use open cursor and iner join in one statement
    Regards,
    Lisa

    OPEN CURSOR c FOR SELECT     carrid connid fldate bookid smoker
                        FROM     sbook innerjoin shook
                        ORDER BY carrid connid fldate smoker bookid.
    Pls reward if helpful.

  • Logging with whereabouts using open source and freeware

    You can find the html version of this at:
    http://www.acelet.com/whitepaper/loggingWithWhereabouts.html
    Logging with whereabouts using open source and freeware
    The purpose of logging is to find out what had happened when needed. When the
    time comes to read log messages, you want to know both the log message and its
    whereabouts (class name, method name, file name and line number). So you need
    to hard code whereabouts.
    But hard coded whereabouts are very difficult to maintain: when you modify your
    source code, line number changes; when you copy and paste a line, its class name
    and method name change. If whereabouts are wrong, you introduce bugs in your logging
    logic and the log messages are useless at the best.
    This article shows you an example of using freeware Redress tool to rectify whereabouts
    programmatically in your Makefile or Ant build file. So your whereabouts are always
    correct for both Java and JSP source file.
    Redress tool is part of SuperLogging at http://www.ACElet.com. SuperLogging also
    provides an open source wrapper Alog.java, which redirects log method calls to
    your favorite logging package. Redress tool can rectify whereabouts information
    on all Alog's method calls in your application. So, if you call Alog's log methods,
    these calls will be rectified by Redress.
    JDK 1.4 introduces a new utility package java.util.logging. The example in this
    article is based on JDK logging. Log4J is a cousin of JDK logging. Log4J users
    should have no difficulties to modify this example for Log4J. Both JDK logging
    and Log4J are excellent logging software for single JVM.
    Note: Redress tool rectifies method calls on Alog, not JDK logging. You need to
    call Alog instead of JDK logging in your application.
    Source code of Alog.java
    The following is the source code of Alog's JDK logging version. It serves as an
    library file and should be on your CLASSPATH:
    * Copyright Acelet Corp. 2000. All rights reserved
    * License agreement begins >>>>>>>>>> <br>
    * This program (com.acelet.opensource.logging.Alog) ("Software") is an
    * open source software. <p>
    * LICENSE GRANT. The Software is owned by Acelet Corporation ("Acelet").
    * The Software is licensed to you ("Licensee"). You are granted a
    * non-exclusive right to use, modify, distribute the Software for either
    * commercial or non-commercial use for free, as long as: <br>
    * 1. this copyright paragraph remains with this file. <br>
    * 2. this source code (this file) must be included with distributed
    * binary code.<br>
    * NO WARRANTY. This comes with absolutely no warranty. <p>
    * <<<<<<<<<< License agreement ends <p><p>
    * The purpose of releasing this open source program is to prevent vendor
    * lock in. <p>
    * You can code your program using this class to indirectly use Acelet
    * SuperLogging (com.acelet.logging). If later you want to swith to other
    * logging package, you do not need to modify your program. All you have
    * to do is: <p>
    * 1. modify this file to redirect to other logging packages. <br>
    * 2. replace existing com.acelet.opensource.Alog with your modified one. <br>
    * 3. you may have to reboot your EJB server to make the changes effect.<br>
    * <p>
    * This program is just a wrapper. For detail information about the methods
    * see documents of underline package, such as com.acelet.logging.Logging.
    * <p>
    * Visit http://www.ACElet.com for more information.
    * <p>
    * This file is a modified for using JDK logging as an EXAMPLE.
    * <br>
    * You can use Redress tool to keep your whereabouts information
    * always correct. See http://www.ACElet.com/freeware for detail.
    * <p>
    * Please see http://www/ACElet.com/opensource if you want to see the
    * original version.
    package com.acelet.opensource.logging;
    import java.util.logging.*;
    public final class Alog {
    * Log level value: something will prevent normal program execution.
    public static int SEVERE = 1000;
    * Log level value: something has potential problems.
    public static int WARNING = 900;
    * Log level value: for significant messages.
    public static int INFO = 800;
    * Log level value: for config information in debugging.
    public static int CONFIG = 700;
    * Log level value: for information such as recoverable failures.
    public static int FINE = 500;
    * Log level value: for information about entering or returning a
    * method, or throwing an exception.
    public static int FINER = 400;
    * Log level value: for detail tracing information.
    public static int FINEST = 300;
    static Logger logger;
    static {
    logger = Logger.getLogger("");
    public Alog() {
    public static void alert(String subject, String message) {
    public static void error(String text, int level, String fullClassName,
    String methodName, String baseFileName, int lineNumber) {
    String[] para = {lineNumber + "", baseFileName};
    logger.logp(getLevel(level), fullClassName, methodName, text, para);
    public static Level getLevel(int levelValue) {
    if (levelValue == SEVERE)
    return Level.SEVERE;
    else if (levelValue == WARNING)
    return Level.WARNING;
    else if (levelValue == INFO)
    return Level.INFO;
    else if (levelValue == CONFIG)
    return Level.CONFIG;
    else if (levelValue == FINE)
    return Level.FINE;
    else if (levelValue == FINER)
    return Level.FINER;
    else if (levelValue == FINEST)
    return Level.FINEST;
    else
    return Level.ALL;
    public static void log(String text, int level, String fullClassName,
    String methodName, String baseFileName, int lineNumber) {
    String[] para = {lineNumber + "", baseFileName};
    logger.logp(getLevel(level), fullClassName, methodName, text, para);
    public static void sendMail(String to, String from, String subject,
    String text) throws Exception {
    public static void sendMail(String to, String cc, String bcc, String from,
    String subject, String text) throws Exception {
    Test program
    The simple test program is Test.java:
    import com.acelet.opensource.logging.Alog;
    public class Test {
    public static void main(String argv[]){
    Alog.log("Holle world", Alog.SEVERE, "wrongClassName", "wrongMethod",
    "wrongFileName", -1);
    How to run the test program
    1. Compile Alog.java (JDK 1.4 or later, not before):
    javac Alog.java
    2. Download freeware Redress tool from http://ACElet.com/freeware.
    3. Run Redress tool:
    java -cp redress.jar Test.java
    4. Check Test.java. The Alog.log method call should be rectified.
    5. Run test program:
    java Test
    You should see log message with correct class name and method name.

    Hi;
      I found this code and would like to share it with you :
    JCoDestination destination = JCoDestinationManager
      .getDestination(DESTINATION_NAME2);
      JCoFunction function = destination.getRepository().getFunction(
      "RFC_FUNCTION_SEARCH");
      if (function == null)
      throw new RuntimeException("RFC_FUNCTION_SEARCH not found in SAP.");
      function.getImportParameterList().setValue("FUNCNAME", "*");
      function.getImportParameterList().setValue("GROUPNAME", "*");
      try {
      function.execute(destination);
      JCoTable funcDetailsTable = function.getTableParameterList()
      .getTable("FUNCTIONS");
      int totalNoFunc = funcDetailsTable.getNumRows();
      if (totalNoFunc > 0) {
      for (int i = 0; i < totalNoFunc; i++) {
      System.out.println("Function Name: "
      + funcDetailsTable.getValue(i));
      } catch (AbapException e) {
      System.out.println(e.toString());
      return;
      System.out.println("RFC_FUNCTION_SEARCH finished");
    It is working and retrieving FM.
    Regards
    Anis

  • I have a VI A. I want A to call another VI B and execute. After B executes, I want it to close automatically and go back to A. Is this possible ? I tried using open reference and those methods, but I am not able to do it. Can someone help me ? Thanks !

    Thanks !
    Kudos always welcome for helpful posts

    Re: I have a VI A. I want A to call another VI B and execute. After B executes, I want it to close automatically and go back to A. Is this possible ? I tried using open reference and those methods, but I am not able to do it. Can someone help me ? Thanks !Hi Stephan ! Thanks ! I guess I explained my question not so right. I've created a customized menu and at the instance of me selecting a menu, a VI should load itself dynamically. I am using call by reference. Sometimes it works and sometimes it won't. In short, what I want to achieve is load VIs dynamically and close them dynamically once they finish executing. Thanks !
    Kudos always welcome for helpful posts

  • UCM 11g - how to accessing secured content using open WCM service

    Hi All,
    Does any one has an idea on how to access the contents that are checked in with security groups as "Secured". If the contents are checked in as "Public" then, we can easily access the same with the following open WCM servervice:l
    http://<ucm_server>:16200/cs/idcplg??IdcService=WCM_PLACEHOLDER&dataFileDocName=<data_file_name>&templateDocName=<region_template_name>
    Regards,
    Sanjay

    Hi Donato,
    Did you ever get an answer for this issue? I'm trying to get a similar case working and would be curious on how you ended up doing this...
    For what I know so far, this may help you:
    1) The trigger-EBSProfile requires you to pass th afGuid value, this value, is created automatically by the IPM process, basically, when you click the MA button in EBS, the SOA call to IPM does 2 things:
    First, it creates a row in the AFGRANTS table in the WCContent DB, this basically overwrites UCM security and give the user access to the documents, this table has the information of the EBS record (Business Object, and Primary Key) as well as the auto generated afGuid
    Second it sends back the URL to WCContent, mainly "/cs/idcplg/_p/min/af/trigger-EBSProfile?IdcService=GET_SEARCH_RESULTS_FORCELOGIN" and passes the afGuid created in the first step, which identifies the EBS record.
    So if you need to make direct calls to UCM under the trigger-EBSProfile you will need to manually (custom) add the afGuid and details of the EBS record to the table, the entries in this table get removed automatically based on the dexpirationdate value
    2) While the IPM SOA call overwrites the UCM security, if you have implemented your own security structure (assign a different security group to the documents and give the users access to it) you could make calls directly to UCM bypassing the "trigger-EBSProfile"..
    for example, in the call you were trying to make originally to DOC_INFO, if you know the dDocName of the document, you can simply call the service as "/cs/idcplg?IdcService=DOC_INFO_BY_NAME&dDocName=POC2001" (I use DOC_INFO_BY_NAME because you need to know the dDocId for DOC_INFO)
    You can do the same with other services like checkin/checkout etc, (for checking you will need to pass the additional parameters dfBusinessObejct, dAFBusinessObject and dfApplication to link the document to the EBS record)
    Regards,
    Juan Becerra

  • Severe Security Issue with Sharing Permissions and Windows

    I recently discovered a severe Security issue with the windows sharing an permission settings:
    I have two users, an admin user and a parental controlled user. On my mac mini, i have a external harddrive connected. On the harddrive, i have three folders, Itunes, Iphoto (Package) and a Temp Folder. I want to share the Harddrive RW for the admin, but only R for the parental user. But the Temp folder should be accessible for RW for the parental as well.
    1. I set the Drive checkbox "ignore ownership" off.
    2. I set the permissions of the drive to admin RW, parental R and Everyone to "no access"
    3. I apply to enclosed Items
    4. I set the permission of the Temp folder to admin RW, parental RW and Everyone to "no access"
    5. I apply to enclosed Items
    6. I go to "File Sharing" in the Preferences and activate SMB sharing for both users
    7. I delete all previous shares
    8. I add the Disk and use the proposed permissions which are admin RW, parental R, Everyone "no access"
    9. I add the Temp folder and use the proposed permissions which are admin RW, parental RW, Everyone "no access" - Funny, there is a new Group called "Temp" created which has custom access on both sharepoints
    10. I connect to the mac over a Windows machine (NTLM auth set appropriatly). Now I try to create a folder on the root of the Disk share, I get a denied message.
    BUT WHEN I GO INTO A SUBFOLDER (eg. ITUNES or IPHOTO), WHICH HAS ALSO JUST "R" PERMISSION FOR THE PARENTAL USER, I AM ABLE TO RW, DELETE AND DO EVERYTHING!!!
    TO RECAPITULATE: THE SHARING PERMISSIONS ARE "R", AND THE FILE PERMISSIONS IN THE RESPECTIVE FOLDERS FOR THE RESPECTIVE USER ARE ALSO JUST "R". BUT THE USER CAN DO EVERYTHING IN THE SUBFOLDERS!!!

    I recently discovered a severe Security issue with the windows sharing an permission settings:
    I have two users, an admin user and a parental controlled user. On my mac mini, i have a external harddrive connected. On the harddrive, i have three folders, Itunes, Iphoto (Package) and a Temp Folder. I want to share the Harddrive RW for the admin, but only R for the parental user. But the Temp folder should be accessible for RW for the parental as well.
    1. I set the Drive checkbox "ignore ownership" off.
    2. I set the permissions of the drive to admin RW, parental R and Everyone to "no access"
    3. I apply to enclosed Items
    4. I set the permission of the Temp folder to admin RW, parental RW and Everyone to "no access"
    5. I apply to enclosed Items
    6. I go to "File Sharing" in the Preferences and activate SMB sharing for both users
    7. I delete all previous shares
    8. I add the Disk and use the proposed permissions which are admin RW, parental R, Everyone "no access"
    9. I add the Temp folder and use the proposed permissions which are admin RW, parental RW, Everyone "no access" - Funny, there is a new Group called "Temp" created which has custom access on both sharepoints
    10. I connect to the mac over a Windows machine (NTLM auth set appropriatly). Now I try to create a folder on the root of the Disk share, I get a denied message.
    BUT WHEN I GO INTO A SUBFOLDER (eg. ITUNES or IPHOTO), WHICH HAS ALSO JUST "R" PERMISSION FOR THE PARENTAL USER, I AM ABLE TO RW, DELETE AND DO EVERYTHING!!!
    TO RECAPITULATE: THE SHARING PERMISSIONS ARE "R", AND THE FILE PERMISSIONS IN THE RESPECTIVE FOLDERS FOR THE RESPECTIVE USER ARE ALSO JUST "R". BUT THE USER CAN DO EVERYTHING IN THE SUBFOLDERS!!!

  • Autherntication using Open Directory and NO home folder

    We are looking to set up an Open Directory on a Snow Leopard server in our medium sized company - we would like to use it for Single Sign On authentication but do not want to create home folders on the server. All we want OD to do is authenticate
    We have been able to authenticate using OD bound and unbound but both need home folders. Is there a way to have no home holder and still authenticate?
    thanks

    What I did was in WGM select a user account. Then select the Home tab. Click the + button to add a home folder. In the sheet that drops down, in the bottom box put /Users/username. Leave the other boxes blank. This will create a home folder locally on whatever machine the user logs into.

  • Security issue with a website and java

    I am having trouble getting Java to work on a website, the message tells me that I have a security issue  but I don't know how to fix it??

    The site may be sending Firefox for Android a page that is not correctly formed.
    We have a feature in Firefox 39 which will allow the request desktop site menu item to show the full desktop site.

  • Firefox just stopped working! It opens but wont load any sites and gives no error messages. internet working as using safari now.

    Was in the UK yesterday and Firefox was working no problem. Arrived back in Denmark today and FF has stopped working. Mac was closed down for the flight over. Firefox opens and does nothing.. when I click on a bookmark the address bar stays empty and the little search icon continues to rotate. Reset firefox and still get the same problem. I am using the same internet connection I used before going away! Please help!

    Check the connection settings.
    *Firefox > Preferences > Advanced : Network : Connection > Settings
    *https://support.mozilla.org/kb/Options+window+-+Advanced+panel
    See "Firefox connection settings":
    *https://support.mozilla.org/kb/Firefox+cannot+load+websites+but+other+programs+can
    Do other browsers and services that can contact internet like e-mail work?

  • I'm getting Could not initialize the application's security component, when opening Firefox and I can't bookmark anymore, why?

    Here is the message I get when I open Firefox;
    Could not initialize the application's security component. The most
    likely cause is problems with files in your application's profile
    directory. Please check that this directory has no read/write
    restrictions and your hard disk is not full or close to full. It is
    recommended that you exit the application and fix the problem. If you
    continue to use this session, you might see incorrect application
    behaviour when accessing security features. Plus I can't bookmark anymore.

    Rename secmod.db (secmod.db.old) in the [http://kb.mozillazine.org/Profile_folder_-_Firefox Profile Folder] in case there is a problem with the file.
    You may have to rename cert8.db (cert8.db.old) as well.<br />
    Firefox will create new files.

  • HFM and Workspace 11.1.2.0 issues with opening Apps and reports via web

    Hi,
    we are running decentralized environment where we have HFM Web and App servers on Windows 2008 Server SP2 and few shared elements like OHS, HSS (Shared Services) and Workspace service from Solaris 10 SPARC (64bit) server.
    The base version is 11.1.2.0 and on Windows we have fixes from 1-9 installed whereas on top of Solaris we have no fixes/patches yet installed.
    When we test workspace from web server desktop connecting to Solaris server it seems traffic is fine as Apps are available and browsing them seems to work normally = Webserver is able to locate Workspace on Solaris, Workspace is able to connect to HFM App server and App server again able to connect HFM App db container.
    When we access to workspace url over web (the traffic according to my understanding should go via OHS to Webserver and then redirect to Solaris server Workspace and then like mentioned above.
    Something gets wrong here as when accessing Workspace url we get non-showing icons, $ characters in messed up menu rows and few error messages like :
    - Invalid or could not find module configuration
    - Required application module hfm.appcontainer is not configured. Please contact your administrator
    - Namespace Communication Error
    Also opening test report via web url workspace gives error:
    Required application module reporting.reportViewer is not configured. Please contact your administrator.
    +
    Namespace Communication Error
    Our experience from previous lower environment was that symptons like described might be caused by wrong service start order. Thus we tried to review this carefully and boot in correct order, but still problems. Also, boot order shouldn't be totally wrong as workspace works when using directly from Web server.
    If any of mentioned symptons rings anyone's bell please reply.
    Something still in firewalls or rather in configuration, OHS maybe?
    At this point we don't yet dream of proper loadbalancing or High availability, but rather get this single web and single app server server + shared elements from Solaris server to work without error messages.
    We do know that release 11.1.2.1 is supposed to fix many things, but we need to get this 11.1.2.0 working in a way or another.
    Thanks for any tips that might arise.
    Br, MK
    Edited by: user9327521 on Nov 30, 2010 4:55 AM

    Were u able to ever resolve this? And how?
    Thanks,
    Sejal

  • When I use brush tool and click any where ... I find that line has been drawn from unspecified point from the bottom to the point I clicked .. !!

    Note : This Problem has occurred with Genius Tablet ... not with the mouse ..
    Thanks In Advance ,,

    Hi,
    This issue is reproducible on some specific devices only and is being investigated and tracked internally.Any progress on this will be conveyed.
    Meanwhile if it is not a problem for you could you please uninstall the driver for tablet and Flash(Use CC cleaner tool) and re-install the latest version of drivers for your tablet and also Flash Pro CC 2014 from Creative cloud. reboot the system and check if the issue happens??Because most of the times updation of the driver has helped resolve the issues related to brush.
    Thanks,
    Sangeeta

  • Security issue , Attn: John Stegman and Frank

    Hello Frank/John:
    I am in the process of experimenting with Frank's suggestion
    http://www.oracle.com/technology/products/jdev/howtos/1013/oc4jjaas/oc4j_jaas_login_module.htm
    I already have a schema in my local Oracle Express for testing ADFBC Demo and I have completed Chapter 9. So, I am going to add APPLICATION_USERS and APPLICATION_ROLES in the same schema (instead of AUTHSCHEMA as the article suggests) and see if I can continue from that ADFBC demo (which uses file based security). Looks like a switch in orion-app.xml should help me experiment Frank' suggestion. Let me see if I can apply Frank's suggestion to the ADFBC demo.
    John: It would great if you provide a step by step for something really really simple app where the users/pw/roles can be set up in Oracle Express and the app merely allows access to different tables based on user roles and nothing else. I am kinda wary about continuing with SRDemo.
    Thanks everyone and I will let you know how things go. By the way, I never knew DBTableOraDataSourceLoginModule existed. I understand it is part of JDEV. I did not see any mention of it in system-jazn-data.xml as the article said.
    UPDATE: 4/11/07: Got stuck on page 7- Data-sources.xml. What is a "View Layer Project?" Anyway, selected "UserInterface" and tried to create data-sources.xml. Instead of going WEB-INF, it goes to META-INF under UserInterface. Is the <option>data_source_code... a hard coded entry? I decided to go on and tried add jazn-data.xml but jazn-data.xml is not highlighted in the option and all downhill from that point. Just three more pages (upto Page 10) and I am almost ready to test the non-standalone version! Help!

    To Frank:
    "To populate the created jazn-data.xml file with the indirected passwords from the data-sources.xml file, choose Tools | Embedded OC4J Server Preferences from the JDeveloper menu. In the menu, expand the Current Workspace node and select the Data Sources entry. Press the Refresh Now button on the right hand side to copy all database connections that exist in JDeveloper into the data-sources.xml file."
    This paragraph seems to trouble me, you said that system-jazn.xml need to be populated with the undirected passwords from the data-sources.xml, but in the end you say press the Refresh Now button on the right hand side to COPY all database connections that exist in JDeveloper INTO THE DATA-SOURCES.XML FILE, so which file needs to be updated...
    my data-sources.xml is populated, but I can't populate the system-jazn.xml the way you explained above...
    when I compile my project everything goes fine no errors, but when I type in the username "sking" and password "welcome" and click on Ok I get the following error in Log: "User sking not authenticated: datasource name could not be resolved"
    you use jdbc/authscema -> where jdbc is database connection name and authschema is schema which has the two table in it... I have the same situation but with different names, so I simply changed your jdbc/authschema with system/users... but obviously something is wrong... I don't know what...
    please can you tell me what am I doing wrong... thanks in advance Frank

  • Capturing Issues using FCP 7 and Sony HVRZ7U

    I am using FCP 7.0.3
    On a Mac Book Pro OS 10.5.8
    With 2.33 Ghz Intel Core 2 duo processor
    I am capturing HD tapes to a WD 2TB external drive.
    I am using the Sony HVRZ7U as my playback deck All HD footage was shot on Sony HVRZ7U and Sony HDRFX1.
    I have my capture settings set to HDV apple pro res 4222
    A. I have noticed that FCP is not capturing in “real time” is this due to the hi res capturing setting? and do I need to let FCP finish process footage even though tape is done with capture? (This usualy adds another 20mins per 1 hr off footage) Is there something I can do to maintain high quality and not have to wait for FCP to be behind capture?
    B. Having already gone through aprox 20+ tapes I have come across a few tapes that wont capture? is this due to the fact that not all tapes came from the same camera source? or is it perhaps a bad tape? or something in FCP that went buggy? i tried the usual dumping my preference files, but still fcp keeps frezzing on the capture and then not saving any of the file. I tired to capture smaller portions of tape but still no mater where on tape I try to capture I get same problem

    A. Yes and yes. Only by increasing the speed of the processor.
    B. Maybe because of the different camera types, what cameras are they? It could be a bad tape. Can you view it playing back in your camera?

  • Issue using PCIe-1430 and Magma ExpressBox1

    Hi - I'm trying to get my laptop working with the PCIe-1430 Camera Link frame grabber and the Magma ExpressBox1. The device shows up in the device manager twice, saying the drivers are installed but there are problems with the device. One device shows error code 10 ("This device cannot start."). The other shows error code 12 ("This device cannot find enough free resources that it can use (Code 12)     If you want to use this device, you will need to disable one of the other devices on this system."
    I've tried disabling one and the other PCIe-1430 devices, and I'm not sure what other devices I could try to disable. The computer has 3GB of RAM, so I'd doubt that's the problem. I've noticed that the board is PCIe x4 and the ExpressBox1 interface is x1, but since there is a bridge in between I assumed this would, at the worst, result in a lower maximum transfer rate. The Magma website mentions National Instruments boards in one of their case studies. Any ideas what may be causing this?
    Thanks

    Hi,
    I have been looking into this, and everyone I look the ExpressBox1 has only 1 PCI slot and it is x16.  Are you using a different version?  If it is only one PCI slot, then it should not show 2 devices in Windows.  Also how many PCIe-1430's are you trying to use?
    Regards,
    Greg H.
    Applications Engineer
    National Instruments

Maybe you are looking for

  • Trouble connecting via Ethernet

    At home I use Airport with a Time Capsule and a DSL connection. Recently I've tried to plug into the modems at friends' houses via Ethernet and haven't been able to get online. At one location it's a cable modem, the other DSL. I go to Network Prefer

  • OCI Process hanging problem

    I'm writing some code run with oracle oci. My Environments are like these OS : Red Hat Enterprise Linux AS release 3 (Taroon) DB : Oracle 10g(10.1.0.3) Language : C(not Pro C/C++)(gcc) Programing Steps are like below 1. Generating DB Connection(OCIIn

  • Data Caching in PI

    Hello all, I have an interesting client requirement regarding PI caching datasets which it can query in order to minimize amount of hits to the SAP database. These datasets would be refreshes in a specified batch. For example, there is a requirement

  • Iphone 5 really worth it ? or samsung galaxy s3 ?

    thinking about buying iphone 5 buy im stuck inbetween that and samsung galaxy s 3 . help please !

  • What are the ideal specs for professional graphic designer using CS5 illustrator, photoshop and indesign?g

    What are the ideal Mac Pro specs for a professional graphic designer using CS5 Premium- using mostly InDesign, Illustrator and PhotoShop?