(Solved) rxvt transparency "can't determine colour"

Hi Everyone
So I have been trying to add one of those fancy transparent background terminals to my system. But I've stumbled upon a problem and google hasn't been so kind as to provide an answer.
The true transparency refuses to work. I'm using the cairo composite manager, openbox and the xf86-video-ati drivers.
.Xdefaults
RootTerm.scrollbar: false
RootTerm.borderless: true
RootTerm.depth: 32
RootTerm.background: rgba:1111/1111/1111/dddd
.config/openbox/rc.conf
<application name="RootTerm">
<decor>no</decor>
<skip_taskbar>yes</skip_taskbar>
<skip_pager>yes</skip_pager>
<layer>below</layer>
<position>
<x>center</x>
<y>center</y>
</position>
<focus>no</focus>
<desktop>all</desktop>
</application>
The result:
$ rxvt -name RootTerm
rxvt: can't determine colour: rgba:1111/1111/1111/dddd
And the rxvt terminal is not transparent. The whole "can't determine colour" bit has me stumped and google won't find me anything useful.
Probably related to this issue, I tried to manually configure my Radeon drivers (HD5850), but I am unsure if I did so correctly.
//etc/X11/xorg.conf.d/20-radeon.conf
Section "Device"
Identifier "Radeon"
Driver "radeon"
Option "ColorTiling" "on"
Option "AccelMethod" "EXA"
Option "RenderAccel" "on"
Option "EXANoOffscreenPixmaps" "true"
EndSection
Finally I was wondering if it is possible to make the openbox menu appear if you rightclick on the rxvt background terminal.
Thanks in advance
Last edited by Wieke (2012-02-07 13:21:11)

I'm not familiar with the rxvt package, but I did just install it and replicated your issue.  This setup works perfectly however with urxvt (package: rxvt-unicode).  Perhaps the rxvt package was compiled with different options that do not allow these settings.

Similar Messages

  • [Solved] OpenSSH 6.8p1-1 and keychain: can't determine fingerprint

    Is anyone else seeing this warning when starting ssh-agent via keychain?
    Warning: can't determine fingerprint from the following line, falling back to filename
    The keychain source seems to suggest that this shouldn't really be happening.
    Is this a case of keychain, or ssh-agent, just needing to be updated for the current OpenSSH?

    This is weird, because if I isolate that function and run my keys through it, they all pass without any error.
    If you set your variable with `keys=$(ssh-add -l)` and then pipe that to this script: `echo "$keys | keytest`, it works:
    #!/usr/bin/sh
    shopt -s extglob
    while read key; do
    case "$key" in
    *\ @(SHA256|MD5):[0-9a-zA-Z\+\/=]*)
    echo "$key" | cut -f2 -d' '
    # Fall back to filename. Note that commercial ssh is handled
    # explicitly in ssh_l and ssh_f, so hopefully this rule will
    # never fire.
    echo "Can\'t determine fingerprint from the following line, falling back to filename"
    echo "$key"
    basename "$key" | sed 's/[ (].*//'
    esac
    done | xargs
    But that is what is generating the error message...

  • How can I determine which browser is used(Microsoft IE or Netscape)

    As you probely know: Netscape doesn't support the same functionality as IE.
    To gain the maxium functionality from IE without solving problems in Netscape, the customer has decided to work with two different stylesheets(one for IE and one for Netscape).
    Now my question is, how can I determine in Portal in which browser(IE or Netscape) it is running.
    Thanks
    arny
    Therefor we are using two differen

    The browser ID string is a HTTP request parameter. How you get to it depends entirely on what you're programming in. You want to get the value of the User-Agent parameter (for example, in CGI, this is HTTP_USER_AGENT).
    However, I'd advise against doing things this way unless you really understand how HTTP works on many levels. One common problem people run into on sending different content based on the browser is that proxy servers will happily cache everything and send content intended for one browser to another.
    I have not seen any IE functionality that Netscape does not also have that is worth this hassle, but that's just my very stubborn opinion. :-)

  • So Can I determine the business partners linked to user based on the assigned role and org. structure?

    Hello, I am working on a SAP CRM 7 Sales implementation and we are implementing leads and opportunity scenarios. The current business organization model is that there multiple vertical and horizontal departments. This is typical matrix structure. This organization has done the segregation of its clients based on the verticals so every clients belongs to at least one or more Vertical department but Horizontal departments can contact all the clients. In the same way sales executives are also either belonging to one or more Verticals or Horizontal departments? Horizontal sales executive can create leads for any clients available in the system but a Vertical sales executive can only create lead only for the client belongs to his vertical and assigned to him. This can be achieved by creating organization structure and business partner relationship.
    Now the problem statement is that few sales executives need work for both some Verticals and Horizontals at the same time. But requirement is that they should be able to do the both roles with single user id but multiple roles. So when sales executive is creating leads his vertical department, he should only be able to select clients assigned to his Vertical only but when he is creating lead for Horizontal department, he should be able to select any clients.
    So Can I determine the business partners linked to user based on the assigned role and org. structure?
    Please let me know if this is not clear also  note we are only using CRM WebUI no SAP ePortal.
    Thanks a lot your help in advance.
    Regards
    Sudesh Sharma

    Thanks, Tahir
    my problem has solved
    Kind Regards,
    Faisal

  • No business area can be determined for item 000010

    Hi All
    I'm facing above error during sales contract (T code VA41) creation.The following are the scenario,
    we had two plants, one is manufacturing 'A' and another one is warehouse plant 'B'.Noramally we will do GR against production order in manufacturing plant 'A'and will make stock transfer to ware house plant 'B'.We made this transaction and material also transferred.
    But we are trying make sales from warehouse plant 'B' for that material.We are getting error message during sales contract creation 'No business area can be determined for item 000010'.This error comes for all materials extended to warehouse plant 'B'.This plant newly created,we checked all config every thing alright.
    Anybody can help me out of this issue.
    S S

    Hi Suresh,
    Go to TCode: SPRO -- Enterprise structure -- Assignment -- Sales and Distribution -- Business Area Account Assignment -- Assign Business Area To Plant And Division and check also --  Assign Business Area by Sales Area.
    Check whether you have maintained here the necessary settings for plant B.
    Hope this solves your problem.
    Thanks,
    Viswanath

  • How can I change colour or design to the folder icons in Mail ?

    How can I change colour or design to the folder icons in Mail ?

    Apple doesn’t routinely monitor the discussions.
    Send Apple feedback. They won't answer, but at least will know there is a problem. If enough people send feedback, it may get the problem solved sooner.
    Mail/Provide Mail Feedback

  • Since installing OSX 10 my iMac randomly shuts down and restarts.  I can not determine why this is happening.  Any ideas?

    Since installing OSX 10, my iMac randomly shuts down and restarts.  I can not determine why this is happening.  Any ideas?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real danger comes from highly targeted "zero-day" attacks that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you care? In practice, there's seldom a reason to use the software unless an institutional policy requires it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Async tcp client and server. How can I determine that the client or the server is no longer available?

    Hello. I would like to write async tcp client and server. I wrote this code but a have a problem, when I call the disconnect method on client or stop method on server. I can't identify that the client or the server is no longer connected.
    I thought I will get an exception if the client or the server is not available but this is not happening.
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    How can I determine that the client or the server is no longer available?
    Server
    public class Server
    private readonly Dictionary<IPEndPoint, TcpClient> clients = new Dictionary<IPEndPoint, TcpClient>();
    private readonly List<CancellationTokenSource> cancellationTokens = new List<CancellationTokenSource>();
    private TcpListener tcpListener;
    private bool isStarted;
    public event Action<string> NewMessage;
    public async Task Start(int port)
    this.tcpListener = TcpListener.Create(port);
    this.tcpListener.Start();
    this.isStarted = true;
    while (this.isStarted)
    var tcpClient = await this.tcpListener.AcceptTcpClientAsync();
    var cts = new CancellationTokenSource();
    this.cancellationTokens.Add(cts);
    await Task.Factory.StartNew(() => this.Process(cts.Token, tcpClient), cts.Token, TaskCreationOptions.LongRunning, TaskScheduler.Default);
    public void Stop()
    this.isStarted = false;
    foreach (var cancellationTokenSource in this.cancellationTokens)
    cancellationTokenSource.Cancel();
    foreach (var tcpClient in this.clients.Values)
    tcpClient.GetStream().Close();
    tcpClient.Close();
    this.clients.Clear();
    public async Task SendMessage(string message, IPEndPoint endPoint)
    try
    var tcpClient = this.clients[endPoint];
    await this.Send(tcpClient.GetStream(), Encoding.ASCII.GetBytes(message));
    catch (Exception exception)
    private async Task Process(CancellationToken cancellationToken, TcpClient tcpClient)
    try
    var stream = tcpClient.GetStream();
    this.clients.Add((IPEndPoint)tcpClient.Client.RemoteEndPoint, tcpClient);
    while (!cancellationToken.IsCancellationRequested)
    var data = await this.Receive(stream);
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    private async Task Send(NetworkStream stream, byte[] buf)
    await stream.WriteAsync(BitConverter.GetBytes(buf.Length), 0, 4);
    await stream.WriteAsync(buf, 0, buf.Length);
    private async Task<byte[]> Receive(NetworkStream stream)
    var lengthBytes = new byte[4];
    await stream.ReadAsync(lengthBytes, 0, 4);
    var length = BitConverter.ToInt32(lengthBytes, 0);
    var buf = new byte[length];
    await stream.ReadAsync(buf, 0, buf.Length);
    return buf;
    Client
    public class Client
    private TcpClient tcpClient;
    private NetworkStream stream;
    public event Action<string> NewMessage;
    public async void Connect(string host, int port)
    try
    this.tcpClient = new TcpClient();
    await this.tcpClient.ConnectAsync(host, port);
    this.stream = this.tcpClient.GetStream();
    this.Process();
    catch (Exception exception)
    public void Disconnect()
    try
    this.stream.Close();
    this.tcpClient.Close();
    catch (Exception exception)
    public async void SendMessage(string message)
    try
    await this.Send(Encoding.ASCII.GetBytes(message));
    catch (Exception exception)
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.SafeInvoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    private async Task Send(byte[] buf)
    await this.stream.WriteAsync(BitConverter.GetBytes(buf.Length), 0, 4);
    await this.stream.WriteAsync(buf, 0, buf.Length);
    private async Task<byte[]> Receive()
    var lengthBytes = new byte[4];
    await this.stream.ReadAsync(lengthBytes, 0, 4);
    var length = BitConverter.ToInt32(lengthBytes, 0);
    var buf = new byte[length];
    await this.stream.ReadAsync(buf, 0, buf.Length);
    return buf;

    Hi,
    Have you debug these two applications? Does it go into the catch exception block when you close the client or the server?
    According to my test, it will throw an exception when the client or the server is closed, just log the exception message in the catch block and then you'll get it:
    private async void Process()
    try
    while (true)
    var data = await this.Receive();
    this.NewMessage.Invoke(Encoding.ASCII.GetString(data));
    catch (Exception exception)
    Console.WriteLine(exception.Message);
    Unable to read data from the transport connection: An existing   connection was forcibly closed by the remote host.
    By the way, I don't know what the SafeInvoke method is, it may be an extension method, right? I used Invoke instead to test it.
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • How can I determine the type of video out connector I need?

    Howdy,
    I have a white macbook purchased Jun/2008. I want to connect to a TV but don't know what adapter I need. How can I determine the type of video out jack my macbook has?
    System Profiler says the model identifier is "MacBook 4,1". Under Graphics/Displays the only thing it says about the "Display Connector" is that no display is connected. Too bad it doesn't tell me what type of connector it is. If I knew the name of the connector I'd probably be home free. But it seems like every macbook model has a different video connector (since the state of the art has advanced over the years) and I haven't been able to keep up with the names.
    Now, I have a 6" long adapter that will convert this connector to VGA. And searching the Apple store for VGA adapters, the existence of mine says my connector is might be one of "Mini DisplayPort", "Apple Mini DVI", "Apple DVI", or "Apple Micro-DVI". But then there is also the connector at
    http://store.apple.com/us/product/M8639G/A?mco=MTY3ODQ5OTY
    and that looks like the one I have. But unlike the other adapters, this one is just called a "VGA Display Adapter". Does the connector have a name? How can I find adapters that have that same connector?
    I know I could use the adapter I have, plus a VGA to VGA cable, to hook up to a TV. But the quality of the VGA signal is poor in the digital world. My goal is to hook up to the TV via HDMI. Is this even possible? By which I mean, will my macbook generate the signals necessary to be able to be converted to HDMI?
    Thanks for any help,
    Zebulon T

    Thanks, Ded,
    You're right, the cable that I have won't work. I't from my previous, 2004 iBook. This is pretty embarrassing... I looked at the cable but didn't bother to try plugging it in.
    Looking at the close-up picture of the Mini-DVI to VGA adapter, that does look like the right connector. So I have Mini-DVI, and the other apter you pointed to can convert this to DVI. I'll take a look to see what makes the most sense, connector wise, downstream from that.
    Thanks very much.
    Zeb T

  • When I upgraded from v4 to v5 my bookmarks was lost. I do have the one that is in the firefox toolbar. Apparently I had a bookmarks add-on. V5 changed my browser how can I determine what the program was and if the bookmarks are still there?

    When I upgraded from v4 to v5 my bookmarks was lost. I do have the one that is in the firefox toolbar. Apparently I had a bookmarks add-on. V5 changed my browser how can I determine what the program was and if the bookmarks are still there?

    Start Firefox in <u>[[Safe Mode|Safe Mode]]</u> to check if one of the extensions (Firefox/Tools > Add-ons > Extensions) or if hardware acceleration is causing the problem (switch to the DEFAULT theme: Firefox/Tools > Add-ons > Appearance).
    *Do NOT click the Reset button on the Safe Mode start window or otherwise make changes.
    *https://support.mozilla.org/kb/Safe+Mode
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes
    Websites remembering you and automatically log you in is stored in a cookie.
    *Create an allow Cookie Exception to keep such a cookie, especially for secure websites and if cookies expire when Firefox is closed.
    *Tools > Options > Privacy > Cookies: Exceptions
    In case you are using "Clear history when Firefox closes":
    *do not clear Cookies
    *do not clear Site Preferences
    *Tools > Options > Privacy > Firefox will: "Use custom settings for history": [X] "Clear history when Firefox closes" > Settings
    *https://support.mozilla.org/kb/Clear+Recent+History
    Note that clearing "Site Preferences" clears all exceptions for cookies, images, pop-up windows, software installation, and passwords.
    Clearing cookies will remove all specified (selected) cookies including cookies that have an allow exception and cookies from plugins.

  • How can I determine what computers are home sharing??

    How can I determine what computers are home sharing??

    Launch iTunes on the computers you're interested in. Check in the "Advanced" menu.
    If "Turn on Home Sharing" is listed as an option, the iTunes library that you have open is not Home Sharing.
    If "Turn off Home Sharing ([accountname]) is listed as an option, the iTunes library that you have open is Home Sharing.

  • How Can I Determine the Size of the 'My Documents' Folder for every user on a local machine using VBScript?

    Hello,
    I am at my wits end into this. Either I am doing it the wrong way or it is not possible.
    Let me explain. I need a vb script for the following scenario:
    1. The script is to run on multiple Windows 7 machines (32-Bit & 64-Bit alike).
    2. These are shared workstation i.e. different users login to these machines from time to time.
    3. The objective of this script is to traverse through each User Profile folder and get the size of the 'My Documents' folder within each User Profile folder. This information is to be written to a
    .CSV file located at C:\Temp directory on the machine.
    4. This script would be pushed to all workstations from SCCM. It would be configured to execute with
    System Rights
    I tried the script detailed at:
    http://blogs.technet.com/b/heyscriptingguy/archive/2005/03/31/how-can-i-determine-the-size-of-the-my-documents-folder.aspx 
    Const MY_DOCUMENTS = &H5&
    Set objFSO = CreateObject("Scripting.FileSystemObject")
    Set objShell = CreateObject("Shell.Application")
    Set objFolder = objShell.Namespace(MY_DOCUMENTS)
    Set objFolderItem = objFolder.Self
    strPath = objFolderItem.Path
    Set objFolder = objFSO.GetFolder(strPath)
    Wscript.Echo objFolder.Size
    The Wscript.Echo objFolder.Size command in the script at the above mentioned link returned the value as
    '0' (zero) for the current logged on user. Although the actual size was like 30 MB or so.
    I then tried the script at:
    http://www.experts-exchange.com/Programming/Languages/Visual_Basic/VB_Script/Q_27869829.html
    This script returns the correct value but only for the current logged-on user.
    Const blnShowErrors = False
    ' Set up filesystem object for usage
    Set objFSO = CreateObject("Scripting.FileSystemObject")
    Set objShell = CreateObject("WScript.Shell")
    ' Display desired folder sizes
    Wscript.Echo "MyDocuments : " & FormatSize(FindFiles(objFSO.GetFolder(objShell.SpecialFolders("MyDocuments"))))
    ' Recursively tally the size of all files under a folder
    ' Protect against folders or files that are not accessible
    Function FindFiles(objFolder)
    On Error Resume Next
    ' List files
    For Each objFile In objFolder.Files
    On Error Resume Next
    If Err.Number <> 0 Then ShowError "FindFiles:01", objFolder.Path
    On Error Resume Next
    FindFiles = FindFiles + objFile.Size
    If Err.Number <> 0 Then ShowError "FindFiles:02", objFile.Path
    Next
    If Err.Number = 0 Then
    ' Recursively drill down into subfolder
    For Each objSubFolder In objFolder.SubFolders
    On Error Resume Next
    If Err.Number <> 0 Then ShowError "FindFiles:04", objFolder.Path
    FindFiles = FindFiles + FindFiles(objSubFolder)
    If Err.Number <> 0 Then ShowError "FindFiles:05", objSubFolder.Path
    Next
    Else
    ShowError "FindFiles:03", objFolder.Path
    End If
    End Function
    ' Function to format a number into typical size scales
    Function FormatSize(iSize)
    aLabel = Array("bytes", "KB", "MB", "GB", "TB")
    For i = 0 to 4
    If iSize > 1024 Then iSize = iSize / 1024 Else Exit For End If
    Next
    FormatSize = Round(iSize, 2) & " " & aLabel(i)
    End Function
    Sub ShowError(strLocation, strMessage)
    If blnShowErrors Then
    WScript.StdErr.WriteLine "==> ERROR at [" & strLocation & "]"
    WScript.StdErr.WriteLine " Number:[" & Err.Number & "], Source:[" & Err.Source & "], Desc:[" & Err.Description & "]"
    WScript.StdErr.WriteLine " " & strMessage
    Err.Clear
    End If
    End Sub
    The only part pending, is to achieve this for the 'My Documents' folder within each User Profile folder.
    Is this possible?
    Please help.

    Here are a bunch of scripts to get folder size under all circumstances.  Take your pick.
    https://gallery.technet.microsoft.com/scriptcenter/site/search?query=get%20folder%20size&f%5B0%5D.Value=get%20folder%20size&f%5B0%5D.Type=SearchText&ac=2
    ¯\_(ツ)_/¯

  • How can I determine if my iMac is infected with Malware.  Internet is very slow at times.

    Some time ago I opened a link in an email from a friend and later found out that his email address had been hijacked.  The site the link took me to seemed innocuous, but ever since it seems that from time to time that my internet connection is very slow, as if there is not enough band width.  Is it possible that my computer is infected with some sort of malware?  How can I determine that?  If it is infected how can the malware be removed?

    Here is the report.
    Problem description:
    I clicked on a link in a email from a hacked email account and since then my internet connection runs very slow at times.  I am concerned that my iMac may be infected with some sort of Malware
    EtreCheck version: 2.1.6 (109)
    Report generated January 21, 2015 at 12:26:10 PM MST
    Download EtreCheck from http://etresoft.com/etrecheck
    Click the [Support] links for help with non-Apple products.
    Click the [Details] links for more information about that line.
    Click the [Adware] links for help removing adware.
    Hardware Information: ℹ️
      iMac (21.5-inch, Late 2009) (Technical Specifications)
      iMac - model: iMac10,1
      1 3.06 GHz Intel Core 2 Duo CPU: 2-core
      12 GB RAM Upgradeable
      BANK 0/DIMM0
      4 GB DDR3 1067 MHz ok
      BANK 1/DIMM0
      4 GB DDR3 1067 MHz ok
      BANK 0/DIMM1
      2 GB DDR3 1067 MHz ok
      BANK 1/DIMM1
      2 GB DDR3 1067 MHz ok
      Bluetooth: Old - Handoff/Airdrop2 not supported
      Wireless:  en1: 802.11 a/b/g/n
    Video Information: ℹ️
      NVIDIA GeForce 9400 - VRAM: 256 MB
      iMac 1920 x 1080
    System Software: ℹ️
      OS X 10.10.1 (14B25) - Time since boot: 1:8:36
    Disk Information: ℹ️
      WDC WD5000AAKS-40V2B0 disk0 : (500.11 GB)
      EFI (disk0s1) <not mounted> : 210 MB
      Macintosh HD (disk0s2) / : 499.25 GB (398.65 GB free)
      Recovery HD (disk0s3) <not mounted>  [Recovery]: 650 MB
      PIONEER DVD-RW  DVRTS09 
    USB Information: ℹ️
      Apple Inc. Built-in iSight
      Apple Internal Memory Card Reader
      Apple Computer, Inc. IR Receiver
      Apple Inc. BRCM2046 Hub
      Apple Inc. Bluetooth USB Host Controller
    Gatekeeper: ℹ️
      Mac App Store and identified developers
    Kernel Extensions: ℹ️
      /Library/Extensions
      [loaded] com.symantec.kext.SymAPComm (12.7.1f4 - SDK 10.8) [Support]
      [loaded] com.symantec.kext.filesecurity (12.7f4 - SDK 10.8) [Support]
      [loaded] com.symantec.kext.fw (5.3.1f4 - SDK 10.8) [Support]
      [loaded] com.symantec.kext.internetSecurity (5.4f4 - SDK 10.8) [Support]
      [loaded] com.symantec.kext.ips (3.9.2f1 - SDK 10.8) [Support]
      [loaded] com.symantec.kext.pf (5.7.1f4 - SDK 10.8) [Support]
      /System/Library/Extensions
      [not loaded] com.seagate.driver.PowSecDriverCore (5.2.4 - SDK 10.4) [Support]
      /System/Library/Extensions/Seagate Storage Driver.kext/Contents/PlugIns
      [not loaded] com.seagate.driver.PowSecLeafDriver_10_4 (5.2.4 - SDK 10.4) [Support]
      [not loaded] com.seagate.driver.PowSecLeafDriver_10_5 (5.2.4 - SDK 10.5) [Support]
      [not loaded] com.seagate.driver.SeagateDriveIcons (5.2.4 - SDK 10.4) [Support]
    Launch Agents: ℹ️
      [running] com.brother.LOGINserver.plist [Support]
      [loaded] com.google.keystone.agent.plist [Support]
      [loaded] com.symantec.errorreporter-periodicagent.plist [Support]
      [loaded] com.symantec.nis.application.plist [Support]
      [running] com.symantec.uiagent.application.plist [Support]
    Launch Daemons: ℹ️
      [loaded] com.adobe.fpsaud.plist [Support]
      [running] com.fitbit.galileod.plist [Support]
      [loaded] com.google.keystone.daemon.plist [Support]
      [running] com.sec.faxdb.plist [Support]
      [running] com.symantec.deepsight-extractor.plist [Support]
      [loaded] com.symantec.errorreporter-periodic.plist [Support]
      [loaded] com.symantec.liveupdate.daemon.ondemand.plist [Support]
      [loaded] com.symantec.liveupdate.daemon.plist [Support]
      [invalid?] com.symantec.MissedTasks.plist [Support]
      [not loaded] com.symantec.nav.migrateqtf.plist [Support]
      [invalid?] com.symantec.Sched501-1.plist [Support]
      [running] com.symantec.sharedsettings.plist [Support]
      [running] com.symantec.symdaemon.plist [Support]
      [invalid?] com.symantec.symSchedDaemon.plist [Support]
    User Launch Agents: ℹ️
      [loaded] com.adobe.ARM.[...].plist [Support]
      [invalid?] com.google.GoogleContactSyncAgent.plist [Support]
    User Login Items: ℹ️
      Microsoft AU Daemon Application  (/Applications/Microsoft AutoUpdate.app/Contents/MacOS/Microsoft AU Daemon.app)
      Fitbit Connect Menubar Helper Application  (/Applications/Fitbit Connect.app/Contents/MacOS/Fitbit Connect Menubar Helper.app)
    Internet Plug-ins: ℹ️
      o1dbrowserplugin: Version: 5.38.6.0 - SDK 10.8 [Support]
      Default Browser: Version: 600 - SDK 10.10
      Flip4Mac WMV Plugin: Version: 2.3.8.1 [Support]
      AdobePDFViewerNPAPI: Version: 11.0.10 - SDK 10.6 [Support]
      FlashPlayer-10.6: Version: 16.0.0.257 - SDK 10.6 [Support]
      Silverlight: Version: 5.1.30317.0 - SDK 10.6 [Support]
      Flash Player: Version: 16.0.0.257 - SDK 10.6 [Support]
      iPhotoPhotocast: Version: 7.0
      googletalkbrowserplugin: Version: 5.38.6.0 - SDK 10.8 [Support]
      QuickTime Plugin: Version: 7.7.3
      AdobePDFViewer: Version: 11.0.10 - SDK 10.6 [Support]
      CouponPrinter-FireFox_v2: Version: Version 1.1.6 [Support]
      GarminGpsControl: Version: 2.9.3.0 Release [Support]
      NortonInternetSecurityBF: Version: 1.11.0 - SDK 10.6 [Support]
      JavaAppletPlugin: Version: 15.0.0 - SDK 10.10 Check version
    User internet Plug-ins: ℹ️
      Google Earth Web Plug-in: Version: 7.1 [Support]
    Safari Extensions: ℹ️
      Norton Internet Security [Installed]
    3rd Party Preference Panes: ℹ️
      Flash Player  [Support]
      Flip4Mac WMV  [Support]
      Norton\nQuickMenu  [Support]
    Time Machine: ℹ️
      Skip System Files: NO
      Mobile backups: OFF
      Auto backup: NO - Auto backup turned off
      Volumes being backed up:
      Macintosh HD: Disk size: 499.25 GB Disk used: 100.60 GB
      Destinations:
      Seagate Backup Plus Drive [Local]
      Total size: 1.00 TB
      Total number of backups: 15
      Oldest backup: 2013-08-01 22:49:49 +0000
      Last backup: 2014-11-06 19:34:10 +0000
      Size of backup disk: Adequate
      Backup size 1.00 TB > (Disk used 100.60 GB X 3)
    Top Processes by CPU: ℹ️
          5% WindowServer
          1% Fitbit Connect Menubar Helper
          0% fontd
          0% AppleSpell
          0% launchservicesd
    Top Processes by Memory: ℹ️
      580 MB com.apple.dock.extra
      322 MB SymDaemon
      206 MB Google Chrome
      168 MB spindump
      155 MB mds_stores
    Virtual Memory Information: ℹ️
      7.46 GB Free RAM
      2.59 GB Active RAM
      1.51 GB Inactive RAM
      1.05 GB Wired RAM
      2.56 GB Page-ins
      0 B Page-outs
    Diagnostics Information: ℹ️
      Jan 21, 2015, 11:23:52 AM /Library/Logs/DiagnosticReports/rpcsvchost_2015-01-21-112352_[redacted].cpu_res ource.diag [Details]
      Jan 21, 2015, 11:18:14 AM Self test - passed

  • How can I determine which computer a share is connected to in /Volumes from terminal or a script?

    I run a set of virtual machines via Fusion on an iMac that we run automated tests on for our website.  There is a folder on each VM called /Automation that is shared. 
    I have a python script that runs on the host, that will find an open VM, start it up and then mount the VM's /Automation folder.  So if there is only 1 VM powered on, the folder shows up in /Volumes as /Volumes/Automation.  The  problem is when there are 2 or more VM's powered on, because then the shares start being named /Volumes/Automation-1 and Automation-2 etc.  So my question is, how can I determine which computer each share belongs to from terminal or a script?
    In other words, I'm looking for something like:
    /Volumes/Automation = "FirstVirtualMachineName.local"
    /Volumes/Automation-1 = "SecondVirtualMachineName.local"
    Is there any way to determine which computer a mounted share is connected to?  In the past, I've just unmounted all /Automation folders, and then mounted them in a particular order, but that's unreliable and messy in my opinion.  If anyone knows a better way, please let me know.  Any help is appreciated.
    Thanks,

    Well I think I have a workable solution.  It's not perfect, but I think it will do the trick. I can put a spotlight comment on the folder similar to 'HostName=OSX-Automation-1.local' and can then retrieve that value from our server with the following python snippet:
    import subprocess
    out,err = subprocess.Popen(['osascript','-e','tell application \"Finder\" to get comment of \"Macintosh HD:Volumes:Automation-1\"'],stdout=subprocess.PIPE, stderr=subprocess.PIPE).communciate()
    So I could just loop through each 'Automation*' folder in /Volumes and grab the name from the spotlight attributes on the directories.  I don't think I really need to worry about the comments being overwritten, but I may have one of our launch daemons that run on the VM check that spotlight comment once a minute or something to ensure that the correct value is there.
    If it ends up not working well in practice, I'm going to give your suggestion about a config script a shot.  It would require a little more up front work, but seems as if it would be pretty solid after that. 
    Thanks again for helping me think it through

  • How can I determine where to publish each comment in my website?

    How can I determine where to publish each comment in my website?
    I have one form for the comments, but I want to show them in different webpages depending on the user choice
    for example, I created 6 pages blue circle, pink circle,  green circle, blue square, pink square, and green square,so  the user chooses pink or blue or green from one menu and circle or square from another menu which determine which page it will be displayed on.
    you can see the form on the bottom of this website  www.assori.com
    thanks for any help

    It's my fault, I lost you there.
    See I wrote the steps as they were in  "Adobe Help" so please forget about the last comment.
    I chose the "advanced mode" because I have more than one menu to filter (shape and color) 
    lets say I want the comments on my website to be displayed conditionaly, and I have two lists one for colors (blue and pink) and other for shapes (square and circle), 
    So I'm going to have four pages each page has its own recordset, let's say now I want to filter the recordset for (Blue Circle) page 
    I don't know how to do it but by following the steps in Dreamweaver help: 
    -Select name, and click the Select button. 
    -Select content, and click the Select button. 
    -Select shape, and click the Where button. 
    -Select section, and click the Where button. 
    -Select time, and click the Order By button. 
    this is how the SQL statement look likes:
    SELECT mytable.name, mytable.contents
    FROM mytable
    WHERE mytable.shape='circle' AND mytable.`section`='blue'
    ORDER BY mytable.hdw_serverTime 
    then to Define the variables 'circle' and 'blue' :
    by clicking the Plus (+) button in the Variables area and entering the following values in the Name, Default Value, and Run-Time Value columns:
    circle,square,Request("circle")
    blue,blue,Request("blue") 
    Also I understand that I have to define a parameter but which (URL or Form) and how?  I don't know 

Maybe you are looking for