Some Virus Questions

I have been trying to stay as safe as possible
in my web life recently. I was getting a bit
overconfident because of the Macs reputation.
I have had only Macs going back to OS7.
My questions are
#1.
When I finally get a Intel Mac and heaven
only knows, if for some reason wanted to run
windows on this Mac, does it now become as
vulnerable as a normal PC to attacks?
Would I then have to do the whole spyware/
viruse regiment on the computer as a whole or
would the Mac side still be insulated against
the PCs bugs?
#2
I have a fairly large collection of cassette
tapes. I have been kind of lazy in that instead
of digging out a tape for a song I want to put
on my ipod and having to convert it to a digital
format which is kind of a pain.I would just
download it from a file sharing program. I heard
a podcast where they said that viruses could be
hidden in the mp3 files. Is this a concern for
Mac users or a real threat?
#3.
I learned about Root kits recently and was
wondering if there is a utility for finding
them on your machine? Is this something that
is not possible on OSX because of the Administrator
password necessary to install a program?
#4.
I recently had my Airport die so I am using
only the software firewall which according
to the GRC website was very secure.Heres what
their sites said when it tried to access my machine.
Your Internet port 139 does not appear to exist!
One or more ports on this system are operating in FULL
STEALTH MODE! Standard Internet behavior requires port
connection attempts to be answered with a success or
refusal response. Therefore, only an attempt to connect
to a nonexistent computer results in no response of
either kind. But YOUR computer has DELIBERATELY CHOSEN
NOT TO RESPOND (that's very cool!) which represents
advanced computer and port stealthing capabilities.
A machine configured in this fashion is well hardened
to Internet NetBIOS attack and intrusion.
Unable to connect with NetBIOS to your computer.
All attempts to get any information from your computer
have FAILED. (This is very uncommon for a Windows
networking-based PC.) Relative to vulnerabilities
from Windows networking, this computer appears to be
VERY SECURE since it is NOT exposing ANY of its internal
NetBIOS networking protocol over the Internet.
Should I take this with a grain of salt or is
it right on? I received similar results in all
areas. I do get numerous entries in the logs
about stealth attempts to connect to my computer.
It is amazing how often it happens (many times everyday)
This is why I having been stepping up the vigilance.
Thanks for all your thoughts. I admit I am
a little paranoid but with phishing and zombies,
I do think the internet justifies it sometimes.

Hi Wayne,
Regarding your question,
This is what I did:
Using Secure Empty Trash from the Finder menu:
After running the full scan as I described in the previous
post now set preferences in ClamXav to quarantaine the
corrupt files in a folder on my desktop named "Birdcage"
I set the preferences to look for '.rar' extensions.
(The elaborate scans showed 2 infected files with the
'.rar' extension, all scans described in this post run in
these settings)
The HD scan resulted in 1 infected file.
(this is a little strange because there where 2 infected
files reported after the force trash experiment described
in the previous post)
Log output:
/Applications/Utilities/Installer.app/Contents/PlugIns/Documents
/Office 2003 - Fully Registered.rar: Trojan.IRCBot-725 FOUND
/Applications/Utilities/Installer.app/Contents/PlugIns/Documents
/Office 2003 - Fully Registered.rar: moved to '/Users/janpietermelchior/
Desktop/Birdcage///Office 2003 - Fully Registered.rar'
-- summary --
Known viruses: 84873
Engine version: 0.88.7
Scanned directories: 129927
Scanned files: 4392
Infected files: 1
Data scanned: 122.96 MB
Time: 105.848 sec (1 m 45 s)
I know there are at least 2 infected files so I scan my
personal folder seperately, and infected file 2 is located
only after I individually selected my personal folder, and
gets automatically quarantained in the folder "birdcage"
on my desktop.
Log output:
Scan started: Fri Dec 22 23:40:44 2006
/Applications/Utilities/Installer.app/Contents/PlugIns/Documents
/Office 2003 - Fully Registered.rar: Trojan.IRCBot-725 FOUND
/Applications/Utilities/Installer.app/Contents/PlugIns/Documents
/Office 2003 - Fully Registered.rar: moved to '/Users/janpietermelchior/
Desktop/Birdcage///Office 2003 - Fully Registered.rar'
-- summary --
Known viruses: 84873
Engine version: 0.88.7
Scanned directories: 129927
Scanned files: 4392
Infected files: 1
Data scanned: 122.96 MB
Time: 105.848 sec (1 m 45 s)
I have a Raid set with 2 external HD's, I scan them 1 by 1.
They show no '.rar' executables.
The log output:
Scan started: Fri Dec 22 23:58:08 2006
external HD 1
-- summary --
Known viruses: 84873
Engine version: 0.88.7
Scanned directories: 16193
Scanned files: 391
Infected files: 0
Data scanned: 39.82 MB
Time: 17.697 sec (0 m 17 s)
Scan started: Fri Dec 22 23:59:16 2006
external HD 2
-- summary --
Known viruses: 84873
Engine version: 0.88.7
Scanned directories: 16193
Scanned files: 393
Infected files: 0
Data scanned: 39.83 MB
Time: 17.338 sec (0 m 17 s)
Now I have a file on my desktop with two infected files.
I drag them to the trash and choose "secure empty trash"
from the finder menu.
I run a full scan with ClamXav and now I do not get the message:
ERROR: Can't access file /Users/janpietermelchior/.Trash
/Office 2003 - Fully Registered.rar
But:
Log output:
Scan started: Sat Dec 23 00:35:15 2006
-- summary --
Known viruses: 84873
Engine version: 0.88.7
Scanned directories: 48236
Scanned files: 139757
Infected files: 0
Data scanned: 44570.47 MB
Time: 12805.845 sec (213 m 25 s)
1. I backed up my important files after running the
ClamXav scans and removing the infected files, and
installed a new osx.
2. I did not import keychains from another computer
after booting the new osx I (read somewhere this a
solution for the diskpermissions). I checked wether
my disk permissions where restored by choosing
Disk Utility in the /Applications/Utilities folder and
refer to Disk Utility Help. "verify permissions".
3. After downloading ClamXav, it promted me to donate,
I did this after I removed the infected files.
4. As Mac OS X is essentially a UNIX-like operating
system,the ClamAV project has recently pledged improved
support for it, which includes the adding of any potential Mac OS X
malware to the definitions list. Of course, this implies that the community reports such programs to the ClamAV authors and that they
in return judge the threat of significance so that they act upon it.
Unfortunately they do not have a database of Mac infections
or other malware.
5.After the proceedings described above ClamXav did
not report infected files.
I am not aware of infected files that are residing on my
harddrive after running ClamXav, backing up and installing a new osx.
Many thanks to ClamXav, it is the only virus scanner I ran
that located these infected files.
I entered my creditcard data for a donation.
Hope this kind of answers your question Wayne, I hope the files are gone.
If anyone has advice on what i did or sees that I made a mistake, or could
do better please inform me a.s.a.p. I never had a pc.
I'll keep you posted.
JP
2.16 GhzIntel CoreDuo2GB 667MHz DDR2 sdRAM. MacBook Pro 17" (P1.2)   Mac OS X (10.4.8)  
2.16 GhzIntel CoreDuo2GB 667MHz DDR2 sdRAM.
2.16 GhzIntel CoreDuo2GB 667MHz DDR2 sdRAM. MacBook Pro 17" (P1.2)   Mac OS X (10.4.8)   RaidexHD1150LC,ex2d2lunLC232,airEX.apa.2.0.5
2.16 GhzIntel CoreDuo2GB 667MHz DDR2 sdRAM. MacBook Pro 17" (P1.2)   Mac OS X (10.4.8)   RaidexHD1150LC,ex2d2lunLC232,airEX.apa.2.0.5

Similar Messages

  • I have a Macbook Pro june 2011... I have 8GB ram but I only have 256mb VRAM... I've read some other questions about this and I realized... Why do I not have 560mb of VRAM since I have 8GB of RAM? Is there any way to get more VRAM to play games on steam?

    I have a Macbook Pro june 2011... I have 8GB ram but I only have 256mb VRAM...
    I've read some other questions about this and I realized... Why do I not have 560mb of VRAM since I have 8GB of RAM?
    Is there any way to get more VRAM to play games on steam?
    I've learned  by reading other topics that I can't upgrade my graphics card on my Macbook Pro because it's soldered into the motherboard or somthing like that, but please tell me if there is any way to get more video ram by chaning some setting or upgrading something else. I'd also like to know why I only have 256MB of VRAM when I have 8GB of RAM, since I have 8GB of RAM I thought I was supposed to have 560mb of VRAM...
    So the two questions are...
    Is there any way to upgrade my VRAM, so that I can play games on steam?
    Why do I only have 256MB VRAM when I have 8GB total RAM?
    Other Info:
    I have a quad core i7 Processor.
    My graphcics card is the AMD Radeon HD 6490M.
    I am also trying to play games on my BOOTCAMPed side of my mac, or my Windows 7 Professional side.
    THANK YOU SO MUCH IF YOU CAN REPLY,
    Dylan

    The only two items that a user can change on a MBP are the RAM and HDD (Retinas not included).  You have what the unit came with and the only way you will be able to change that is to purchase a MBP with superior graphics
    If you are very much into gaming, the I suggest A PC.  They are far superior for that type of application to a MBP.
    Ciao.

  • SGA Size for 8.1.7.4 32 bit? , some Interview Questions

    Hi buddies,
    I got some interview questions, might be simple for geeks in DBA. I am in need of answers. Could anyone help me.
    Thanks,
    Raaj
    1) Does windows NT support direct I/O?
    Answer: Choose one of the answers that apply
    A: No, only AIO
    B: Yes, depending on hardware.
    C: Yes.
    D: No.
    2) Can you take a coldbackup from solaris and use it on windows NT?
    Answer: Choose one of the answers that apply
    A: Yes.
    B: Yes if RMAN backup performed from NT server.
    C: Yes, after running RMAN convert.
    D: No.
    3) All of the following will alter the number of checkpoints that occur in one hour on the database, except one. Which is it?
    Answer: Choose one of the answers that apply
    A: Decreasing tablespace size
    B: Decreasing size of redo log members
    C: Setting LOG_CHECKPOINT_INTERVAL greater than the size of the redo log file
    D: Setting LOG_CHECKPOINT_TIMEOUT to zero
    4) The DBA is attempting to back up the Oracle database control file. After
    issuing the ALTER DATABASE BACKUP CONTROLFILE TO TRACE command, where can the DBA find the backup control file creation materials Oracle created for him or her ?
    Answer: Choose one of the answers that apply
    A: USER_DUMP_DEST
    B: LOG_ARCHIVE_DEST
    C: CORE_DUMP_DEST
    D: BACKGROUND_DUMP_DEST
    5) What is the most important action a DBA must perform after changing the database from NOARCHIVELOG TO ARCHIVELOG?
    Answer: Choose one of the answers that apply
    A: Shutdown normal and restart the database
    B: Perform a full logical database backup
    C: Perform a full offline database backup
    D: Manually switch the log files
    6) Which of the following choices lists an ALTER USER option that can be executed by the user herself or himself?
    Answer: Choose one of the answers that apply
    A: DEFAULT TABLESPACE
    B: IDENTIFIED BY
    C: TEMPORARY TABLESPACE
    D: PROFILE
    7) You need to view the initialization parameter settings for your Oracle
    database. Which of the following choices does not identify a method
    you can use to obtain values set for your initialization parameters?
    Answer: Choose one of the answers that apply
    A: Issue SELECT * FROM DBA_PARAMETERS; from SQL*Plus
    B: Issue SELECT * FROM V$PARAMETER; from SQL*Plus
    C: Issue SHOW PARAMETERS from Server Manager
    D: Use OEM Instance Manager
    8) As a result of a media failure, the current online redo log group is corrupted, the database crashes, as the current online group is inaccessible. Which type of incomplete recovery are you most likely to perform ?
    Answer: Choose one of the answers that apply
    A: Change-based
    B: Time-based
    C: Recovery using a backup control file
    D: Cancel-based
    9) User SNOW executes the following statement: SELECT * FROM EMP. This
    statement executes successfully, and SNOW can see the output. Table
    EMP is owned by user REED. What object would be required in order for
    this scenario to happen ?
    Answer: Choose one of the answers that apply
    A: User SNOW would need the role to view table EMP.
    B: User SNOW would need the privileges to view table EMP.
    C: User SNOW would need a synonym for table EMP.
    D: User SNOW would need the password for table EMP.
    10) Which one of the following statements is true?
    Answer: Choose one of the answers that apply
    A: The request queue is common, and the response queue is different for all the dispatchers.
    B: The request queue and response queue are different for all the dispatchers.
    C: The request queue is different, and response queue is common for all the dispatchers.
    D: The request queue and response queue are common for all the dispatchers.
    11) What is the largest SGA size for 8.1.7.4 32 bit?
    Answer: Choose one of the answers that apply
    A: approximately 2GB
    B: approximately 3.5GB
    C: approximately 4GB
    D: approximately 8GB
    E: approximately 16GB
    12) The DBA is about to perform some administrative tasks. Specifying the
    OPTIMAL parameter has which of the following appropriate uses?
    Answer: Choose one of the answers that apply
    A: Limiting concurrent users
    B: Limiting concurrent transactions
    C: Limiting growth of rollback segments
    D: Limiting growth of tables
    13) If the DBA wants to find information about how often transactions are
    wrapping transaction information between multiple rollback segment
    extents, where would the DBA look to find that information?
    Answer: Choose one of the answers that apply
    A: DBA_ROLLBACK_SEGS
    B: V$ROLLSTAT
    C: V$ROLLNAME
    D: DBA_SEGMENTS
    14) You have 30 rollback segments in your database, for which
    TRANSACTIONS_PER_ ROLLBACK_SEGMENT is set to 49 and
    TRANSACTIONS is set to 1000. During periods of heavy usage, about how many rollback segments will be actively used by Oracle?
    Answer: Choose one of the answers that apply
    A: 50
    B: 60
    C: 20
    D: 30
    15) The DBA has a table created with the following statement:
    CREATE TABLE EMPL
    (EMPID NUMBER(10),
    LASTNAME VARCHAR2(40),
    RESUME LONG RAW);
    The DBA attempts to issue the following statement:
    ALTER TABLE EMPL
    ADD ( PERF_APPRAISE LONG);
    What happens?
    Answer: Choose one of the answers that apply
    A: The statement succeeds.
    B: The statement succeeds, but column is added as VARCHAR2.
    C: The statement fails.
    D: The statement adds a disabled constraint.
    16) The primary key of the EMP table has three columns, EMPID, LASTNAME,
    and FIRSTNAME. You issue the following SELECT statement:
    SELECT * FROM EMP WHERE LASTNAME = 'HARRIS' AND FIRSTNAME = 'BILLI'
    AND EMPID = '5069493';
    Where would you look to see if this query will use the index associated
    with the primary key?
    Answer: Choose one of the answers that apply
    A: DBA_IND_COLUMNS
    B: DBA_TAB_COLUMNS
    C: DBA_INDEXES
    D: DBA_CLU_COLUMNS
    17) You are configuring your index to be stored in a tablespace. Which of the
    following storage parameters are not appropriate for indexes?
    Answer: Choose one of the answers that apply
    A: OPTIMAL
    B: INITIAL
    C: PCTINCREASE
    D: NEXT
    18) You need to set up auditing in an order entry and product shipment
    application so that when the ORDER_STATUS column in the ORDERS
    table changes to ‘SHIPPED’, a record is placed in a special table associated
    with a part of the application that gives sales representatives a daily list
    of customers to call on a follow-up to make sure the customer is satisfied
    with the order. Which of the following choices represents the best way
    to perform this auditing?
    Answer: Choose one of the answers that apply
    A: Statement auditing
    B: Object auditing
    C: Audit by access
    D: Value-based auditing
    19) Information in the buffer cache is saved back to disk in each of the
    following situations except one. In which situation does this not occur?
    Answer: Choose one of the answers that apply
    A: When a time-out occurs
    B: When a log switch occurs
    C: When the shared pool is flushed
    D: When a checkpoint occurs
    20) In order to allow remote administration of users and tablespaces on an Oracle database, which of the following types of files must exist in the database?
    Answer: Choose one of the answers that apply
    A: Password file
    B: Initialization file
    C: Datafile
    D: Control file
    E: Nothing, SYSDBA privileges are not required for these actions.
    21) You are planning the storage requirements for your database. Which of the following is an effect of maintaining a high PCTFREE for a table?
    Answer: Choose one of the answers that apply
    A: Oracle will manage filling data blocks with new records more actively.
    B: Oracle will manage filling data blocks with new records less actively.
    C: Oracle will leave more space free in data blocks for existing records.
    D: Oracle will leave less space free in data blocks for existing records.
    22) You manage database access privileges with roles where possible.
    You have granted the SELECT_MY_TABLE role to another role, called
    EMP_DEVELOPER. To view information about other roles that may be
    granted to EMP_DEVELOPER, which of the following dictionary views
    are appropriate?
    Answer: Choose one of the answers that apply
    A: DBA_ROLE_PRIVS
    B: DBA_TAB_PRIVS
    C: USER_SYS_PRIVS
    D: ROLE_ROLE_PRIVS
    23) In order to set your SQL*Plus session so that your NLS_DATE_FORMAT
    information is altered in a specific way every time you log into Oracle,
    what method would be used?
    Answer: Choose one of the answers that apply
    A: Setting preferences in the appropriate menu option
    B: Creating an appropriate LOGIN.SQL file
    C: Issuing the ALTER USER statement
    D: Issuing the ALTER TABLE statement
    24) You create a sequence with the following statement:
    CREATE SEQUENCE MY_SEQ
    START WITH 394
    INCREMENT BY 12
    NOMINVALUE
    NOMAXVALUE
    NOCACHE
    NOCYCLE;
    Two users have already issued SQL statements to obtain NEXTVAL, and
    four more have issued SQL statements to obtain CURRVAL. If you issue a
    SQL statement to obtain the NEXTVAL, what will Oracle return?
    Answer: Choose one of the answers that apply
    A: 406
    B: 418
    C: 430
    D: 442

    1.-
    2.c
    3.a
    4.a
    5.c
    6.b
    7.a
    8.d
    9.b
    10.a -
    11.a
    12.c
    13.b
    14.d
    15.c
    16.a -
    17.a
    18.d
    19.c
    20.a
    21. -
    22.d
    23.b
    24.?
    hope it helps u.
    Thanks
    Kuljeet

  • HT5312 So I have a problem with iTunes not letting me download anything without first responding to some security questions which I don't remember setting up, how can fix it? Oh, and it won't let me reset the questions either!

    So I have a problem with iTunes not letting me download anything without first responding to some security questions which I don't remember setting up, how can fix it? Oh, and it won't let me reset the questions either!

    If you mean that you aren't getting the reset link, then from the page that you posted from :
    Note: The option to send an email to reset your security questions and answers will not be available if a rescue email address is not provided. You will need to contact iTunes Store support in order to do so. 
    You can contact iTunes Support in your country via this page : http://support.apple.com/kb/HT5699
    When they've been reset you can then use the steps half-way down the HT5312 page that you posted from to add a rescue email address for potential future use

  • Photoshop Elements 12 has been wiped of my laptop when they removed some viruses. How do I get it back because I bought it online and downloaded it instead of having the program disc?

    How do I recover the program for Photoshop Elements 12 that was wiped off my computer when they removed some viruses? I no longer have the program because I bought it on-line and downloaded it instead of having the program disc. I bought it last year and can't seem to contact anyone at Adobe or find out who to call.

    You can download it here:
    http://prodesigntools.com/photoshop-elements-12-direct-download-links-premiere.html
    Follow the Very Important Instructions exactly, even when they don't seem to make much sense. Of course you will need your serial number.

  • I have some problem when I want to download app in iTunes some security question ask me about my visa when I right my visa number I got an errors and on top of the page told me go to iTunes support I do these things and now what should I do

    I have some problem when I want to download app in iTunes some security question ask me about my visa when I right my visa number I got an errors and on top of the page told me go to iTunes support I do these things and now what should I do

    Most of the people on these forums, including myself, are fellow users - you're not talking to iTunes Support here.
    You can contact iTunes Support via this link : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Purchases, Billing & Redemption

  • I got a new ipad and went buy music on iTunes and in is telling me that this is a new device on this account and wants me to answer some security questions I dont remember setting thes up and dont know the answers how do i reset the security questions

    i got a new ipad and went buy music on iTunes and in is telling me that this is a new device on this account and wants me to answer some security questions I dont remember setting thes up and dont know the answers how do i reset the security questions

    Click here and search the article for '2 out of 3' without the quotes; this generally involves either a message being sent to your rescue email address or contacting the iTunes Store staff directly.
    (74313)

  • Some basic questions on File Adapter

    Hello all,
    I have some basic questions on XI and File Adapter and hope you can help me. Any answer is appreciated.
    1. Can I use NFS transport protocol to poll a file from a machine in the network, which is not the XI? Or do I have to use FTP instead?
    2. If I understand it correctly - when using the FTP-File Adapter, XI has the role of a ftp client. I have to run a ftp server on my distant machine. XI connects to FTP-Server and polls the file.
    Can it also be configured the other way round? The scenario I think of would be: FTP client installed on distant machine, which connects to FTP-Server(XI) and loads up a file. So XI would act as FTP Server.
    I know this works, if I install a ftp Server on the computer my XI runs on, and use the NFS-File Adapter to observe the folder. But I want to know, if I need a second, independant ftp server for this.
    3. And last but not least: When do I need the active ftp mode instead of passive?
    Thanx a lot for your answers!
    Ilona

    > Hello all,
    > I have some basic questions on XI and File Adapter
    > and hope you can help me. Any answer is appreciated.
    >
    >
    > 1. Can I use NFS transport protocol to poll a file
    > from a machine in the network, which is not the XI?
    <b>yes</b>
    > Or do I have to use FTP instead?
    >
    <b>also you can do it</b>
    > 2. If I understand it correctly - when using the
    > FTP-File Adapter, XI has the role of a ftp client. I
    > have to run a ftp server on my distant machine. XI
    > connects to FTP-Server and polls the file.
    > Can it also be configured the other way round? The
    > scenario I think of would be: FTP client installed on
    > distant machine, which connects to FTP-Server(XI) and
    > loads up a file. So XI would act as FTP Server.
    > I know this works, if I install a ftp Server on the
    > computer my XI runs on, and use the NFS-File Adapter
    > to observe the folder. But I want to know, if I need
    > a second, independant ftp server for this.
    >
    <b>XI cannot act as FTP server, but it is always a client. When XI is reading (File sender adpater) when XIis writing than it is File Receiver adapter</b>
    > 3. And last but not least: When do I need the active
    > ftp mode instead of passive?
    >
    <b>It depends on your firewall configuration. The best and the fastests is active mode but not always available.</b>
    > Thanx a lot for your answers!
    > Ilona

  • Some generic questions on BPM of NW CE

    Hi Gurus
      i have over 6 years of ABAP business workflow experience and over 3 years of XI experience. Now i'm getting tough with this new stuff, BPM of NW CE. Here i have some generic questions of it:
    1. How can i trigger a BPM task while a document, like a sales order , has been created in the system? is there any processes to catch the event of R3 in NWDI?
    2. Can BPM consume RFC/BAPIs in R3?
    3. Is it possible to make message mapping in BPM? i found there is a 'mapping' choice in the context setting of NWDI whereas it is quite simple compared with PI.
    4. Can the BPM be integrated with webdynpro ABAP? or send the relevant tasks into R3 directly? Actually what i mean is , can i bypass java programing while dealing with BPM of CE, if possible.
    thanks

    Hi Stephen,
    In the first released version of SAP NetWeaver BPM it is not possible to catch events of R/3 directly. Anyway. In case you have the possibility to trigger a web service in that situation you could start off a specific (BPM) process instance that handles the situation.
    The same is basically true for the question regarding RFC: In the initial version you'd need to wrap the RFC into a web service in order to consume it.
    The mapping possibilities in SAP NetWeaver BPM are meant to perform data flow between different activities in a BPMN based process model. This way you could transform a message that came into the process in that way that if fits your needs in regards to the BPM process (data) context.
    Bypassing Java when using SAP NetWeaver BPM would be difficult as the supported UI technology is Web Dynpro for Java. In addition the possibility to add more flexibility to your mappings by defining custom functions is based on EJB, thus again Java.
    Best regards,
    Martin

  • I have a jailbroked iphone,and  it seems that it has some viruses how can I remove them from my iphone?

    I have a jailbroked iphone,and it seems that it has some viruses how can I remove them from my iphone?

    You have viruses because you jailbroke your phone, and now you're probably spreading them to other phones. Nice.
    Jailbroken phones are generally bricked for good. Throw it away, it's junk.

  • Some interview Question?

    hello all, as this forum has many brilliant minds, i have some interview question, if you mind please let me know the answer....
    q1. default level at which validation accurs?
    q2. in which case property pallet display **** as a property value, what its meaning?
    q3. best way to ensure that item can not accept query criteria?
    q4. what is the use of key-other trigger?
    q5. what is the use of forms module validation unit. if it is set to form then data block pre-text-item trigger at point will raise?
    i tried but did not find any relevant answer.

    Hi yash...
    q1. default level at which validation accurs?Well, the default level is where ur trigger exist ( Form Level ,Block Level or Item Level )
    q2. in which case property pallet display **** as a property value, what its meaning?Conceal ; it means hiding displaying data and it is almost used in password text item.
    q3. best way to ensure that item can not accept query criteria?Well, actually i don't have any forms now but u could try it urself item property > query criteria (any related query allowed property ) >NO
    q4. what is the use of key-other trigger?A Key-Others trigger fires when an operator presses the associated key.
    A Key-Others trigger is associated with all keys that can have key triggers associated with them but are not currently defined by function key triggers (at any level).
    A Key-Others trigger overrides the default behavior of a Runform function key (unless one of the restrictions apply). When this occurs, however, Oracle Forms still displays the function key's default entry in the Keys screen.
    Hope this helps...
    Good Luck :)
    Regards,
    Amatu Allah.

  • Some simple questions regarding the Xcode.

    I have some preliminary questions regarding the Xcode (objective C):
    What is the difference between the programming files followed by .h and .m?
    What does an asterisk * followed by a text mean (i.e. *window;)?
    Is there any source that briefly explains the most common codes with examples (nsstring, nsarray, iboutlet, inaction.....etc)?
    Any other tips will be highly appreciated.
    Many thanks.

    Xcode is the IDE.
    Objective-C is the most common language used within Xcode.
    UIWindow *window .....  the * means return the address of the instance variable 'window'.
    An * is called a pointer to a variable.
    Everything you need is explained here:  https://developer.apple.com

  • Some basic questions from a mac newbie

    hi,
    i have been using linux and windows all this while, and recently began using an apple too. have some simple questions here that i hope to get some answers for.
    1. is there something similar to /etc/hosts in linux where i can add the IP address of a server? this is for me to use the 'ssh' command in the terminal
    2. when i open up an application, say safari or chrome, i want the window to fill the entire screen automatically, instead of having to drag the bottom right of the window to fill the screen. how to configure that?
    3. when i close an application by clicking on the 'x' at the top left, why is it that it still appears in the list when i press command+tab? to remove the application from the list, i have to right click on its icon on the dock, then click 'quit'. this is rather troublesome.
    appreciate any help!

    1. is there something similar to /etc/hosts in linux where i can add the IP address of a server? this is for me to use the 'ssh' command in the terminal
    The /etc/hosts file is there, but the /etc/ folder is hidden. You can use the Terminal (in /Applications/Utilities/) to access it via Unix, or could enter "open /etc" in the Terminal to open that folder in the Finder.
    However, I'm not sure how this relates to ssh... I have not needed to modify that file, yet I can ssh all I need to. Are you trying to connect to your new Mac via ssh, or connect to other machines from the Mac via ssh?
    2. when i open up an application, say safari or chrome, i want the window to fill the entire screen automatically, instead of having to drag the bottom right of the window to fill the screen. how to configure that?
    Just drag the window out to full-screen and the browser should remember and open new windows at that size in the future. There are also some utilities (one called "Right Zoom" IIRC?) that will make the zoom button (green + button) behave more like the Windows zoom button.
    3. when i close an application by clicking on the 'x' at the top left, why is it that it still appears in the list when i press command+tab?
    Applications shouldn't quit just because you close their last window, unless the application's entire user interface is contained within that window. That is the case with ALL Windows apps, since there's no global menu bar, but only in some Mac apps. This is something that always ticked me off big-time with Windows... there have been times when I carelessly closed a window I didn't need anymore, but wanted to keep using the app, and then had to wait for it to load again. That won't happen on the Mac.
    If this bothers you, just use the key combination command-Q to quit apps.

  • I have some more question

    I have some more question.How can I create web.xml and check it.And
    how can check the URL patten.thanks

    write a simple Test servlet,compile it and place it in your WEB-INF\classes of your application context.configure this servlet class in your web.xml and access it thru your browser to test it all
    Regards
    padmanava

  • Some interview questions help

    Hi friends i have some interview questions please give me good answers.thanks for advance.
    1.what is info provider?what is advantages and disadvantages?
    2.when your working process chains you set up 2 jobs ,one is 12 pm and anothet 3 am.when you come morning there is errors what is the first thing you do?
    3.in the info provider data is loaded in serial or parallel?
    4.when your working in reports there is 8 columns,but we have requirement of 10 columns how you can added it?
    5.what is integrating planning in BPS?
    If possible please send me good interview questions to my mail id.
    takecare
    bye
    habeeb
    [email protected]

    Please think when you were at the beginer stage.Yes, I guess setting up a second machine under your desk and spending the next - oh I don't know - 2 months fiddling around and trying out all kinds of things is really nothing that can be asked of anyone anymore today. </sarcasm>
    Mind you, my boss at the time did not find it funny that I just formatted a surplus workstation and monopolized it, but when I then took the first official training I had a whole stack of questions at the ready with which to hassle the teacher.
    Now you tell me: which approach enables you to learn and understand more and better?
    @rnm1978: +1!

Maybe you are looking for