String values you should not put in cookies?

I am writing some information to a cookie but am concerned about what characters may be allowed by the cookie to be written inside of it. One of the things i will be doing is encrypting some of the information written to the cookie so i could end up with characters being entered into the cookie which could cause problems?
For example if i write
something'?"?><~@:}{+_())&(*&^*%^&^%%^$%!else
is there a danger that the browser will think the end of the value is at " or maybe ' instead at the end of else?

After encrypting it is customary to encode the data as text. One very popular method for doing so is Base64:
http://ostermiller.org/utils/Base64.html

Similar Messages

  • In the restrictions you can not put the call to voicemail?

    with the next update, in the restrictions you can not put the call to voicemail?

    so I have to delete the message?

  • FAQ: Creating PDF Files from FrameMaker v.6 & earlier Documents -- Why you should not use "save as PDF"! -- Windows & MacOS Only!

    An issue that has come up over and over again on several FrameMaker and Acrobat/PDF email lists as well on the corresponding Adobe User-to-User forums is that of creation of PDF files. FrameMaker 5.5.6 and 6 have what looks like a convenient feature that is supposed to allow you to create PDF files via simply saving the document as a PDF file. I have gone on record as advising end-users not to use this approach for reliable creation of PDF files from FrameMaker documents under Windows and MacOS with FrameMaker 6 and earlier. Why do I most vociferously offer this advice and why doesn't the problem get fixed? And how SHOULD you create PDF files from FrameMaker?
    GOOD NEWS
    I will start with the good news. The "next major version" of FrameMaker will indeed have "save as PDF" re-implemented in a manner that it will be as reliable as printing to the "Acrobat Distiller" printer instance under Windows or the "Create Adobe PDF" desktop printer under MacOS. I am personally working with the FrameMaker development organization to make sure this really happens and is fully and properly tested and debugged! Furthermore, this next major revision of FrameMaker, unlike FrameMaker 6, will come with a Distiller installer that will properly install the "Acrobat Distiller" printer instance under Windows and the "Create Adobe PDF" desktop printer on the Macintosh (of course assuring that the latest PostScript driver is also automatically and correctly installed).
    DON'T USE "SAVE AS PDF"
    But what's wrong with "save as PDF" as currently implemented?
    The following are some of the SYMPTOMS reported over the last few years by FrameMaker users that were traced back to use of "save as PDF" under FrameMaker:
    (1) No PDF file is produced at all, possibly with a log file showing not-readily apparent PostScript errors during distillation.
    (2) The PDF file "loses" color in images. All or some images (raster, bitmap images, NOT vector artwork) appear in the PDF file in grayscale.
    (3) The resultant PDF file is on the wrong paper size, i.e., the document's logical page size does not match the output page size as seen in Acrobat or Acrobat Reader.
    (4) Some or all text in the resultant PDF file is blotchy looking or overly bold.
    (5) Some or all text in the resultant PDF file cannot be searched or indexed.
    (6) Some or all text in the resultant PDF file appears in Courier or in some other substitution font.
    (7) Interword or intercharacter spacing is a bit irregular in the resultant PDF file.
    (8) Content is missing in the margin areas of the page, i.e. you cannot do full-page bleeds.
    (9) Some or all page content is missing (other than margin areas).
    (10) Relatively inefficient PDF is generated.
    If this list by itself isn't enough for you, please note that some of these symptoms are very subtle and may escape attention when the PDF is first viewed or printed. Oftimes, it is when one attempts to manipulate the PDF file in Acrobat or repurpose its content or even view or print on a system other than the one on which the PDF file was created, that some of these symptoms make themselves obnoxiously visible (or invisible in some cases I won't make any bad jokes here about graphic examples!).
    It is important to understand that FrameMaker does NOT have its own native ability to create PDF. Any and all PDF created from FrameMaker documents is actually done by creating PostScript via the PostScript driver and having the Acrobat Distiller create PDF from that PostScript. The only exception to this is creation of PDF via the Acrobat PDFWriter driver, which is likewise not recommended (see below).
    In order for "save as PDF" to work correctly, FrameMaker must do the equivalent of calling Printer Setup and selecting the "Acrobat Distiller" printer instance under Windows or the "Create Adobe PDF" desktop printer under MacOS followed by setting the driver's options correctly for paper size, page range, etc., followed by sending the proper commands to the driver to create PostScript.
    Contrary to popular belief, PostScript as generated by the Windows and MacOS PostScript drivers is VERY device-dependent. The information in the PPD file associated with a printer driver instance provides critical parameters for generation of PostScript including:
    Whether the printer supports color (Acrobat Distiller does)
    What PostScript language level is supported (Acrobat Distiller 4.x and Acrobat Distiller 5.x are both PostScript language level 3)
    Whether native TrueType support is available (Acrobat supports native TrueType as Type 42 fonts)
    Available binary communications (Acrobat Distiller supports pure binary and ASCII, but NOT TCP, TBCP, or PJL)
    Resident fonts (Acrobat Distiller doesn't really have resident fonts)
    Available paper sizes and custom paper size availability (Acrobat Distiller supports a wide range of predefined sizes and continually variable "custom" sizes up to 200" by 200")
    Margins / printable areas (for PDF and the Acrobat Distiller, there are no margins in which imaging is not permitted)
    Device resolution (Acrobat Distiller can be set to any value from 72 to 4000 dpi; as a convenience, the Acrobat Distiller PPD provides a series of values for use by the driver. Since there is no inherent "resolution" of a PDF file, this parameter is used only for purposes of allowing PostScript programs that query for such a value to be satisfied and for the driver to be able to communicate this value to the operating system and/or application as required.)
    Paper handling (totally irrelevant to Acrobat Distiller if input or output tray selection via "setpagedevice" is found in the PostScript stream, it is ignored by Acrobat Distiller)
    Thus, if the wrong printer driver instance is selected (i.e., it isn't associated with the Acrobat Distiller PPD file) or that driver instance is improperly configured, improper PostScript will result and one or more of the symptoms described above can occur. As currently implemented, FrameMaker depending upon version will not necessarily choose the correct printer driver instance and/or correctly parameterize the print job via driver setup options. In fact, FrameMaker 5,5,6 might even try to generate PDF via calling a PCL driver, FAX driver, or even a non-PostScript inkjet printer!
    DON'T USE PDFWRITER
    The Acrobat PDFWriter is a relic of older versions of Acrobat. In fact, it is no longer installed by default in the "easy install" or the "typical install" of Acrobat 5. It hasn't really be updated since Acrobat 3 and only supports PDF 1.2. It is a GDI (Windows) / QuickDraw (MacOS) driver that directly generates PDF without any intermediary PostScript. Since it is not a PostScript printer driver, applications cannot pass through EPS graphics and/or PDFMark information (used for a wide variety of purposes by FrameMaker). For EPS graphics, most applications will send the low resolution TIFF (or PICT) EPS header in lieu of the PostScript text, if they send anything at all, to the driver. Forget about links, structure, or any other PDF "goodies." Expect that PDFWriter will fully "bite the dust" in the next major version of Acrobat.
    SO HOW DO I GENERATE PDF FILES FROM FRAMEMAKER 6 & EARLIER?
    The ONLY method that is really reliable for producing PDF files with FrameMaker 6 and earlier requires the generation of PostScript via a properly set printer driver instance associated with the Acrobat Distiller PPD and distillation of the resultant PostScript by Acrobat Distiller.
    Case 1: FrameMaker and the Full Acrobat 4.05 or Acrobat 5.0x Products
    PDF file from a "chapter" -- print directly to the Acrobat Distiller printer instance (Windows) or the Create Adobe PDF desktop printer (MacOS) already installed by Acrobat. If you check the "Acrobat data" option, then make sure to UNcheck the "print to file" option that gets set at the same time. As a result, the driver will automatically send the generated PostScript to the Distiller for you and delete the intermediate PostScript when done.
    PDF file from a "book" -- print directly to the Acrobat Distiller printer instance with the "print to file" option checked (Windows) or the Virtual Printer desktop printer (MacOS) associated with the Distiller PPD (see details below under Case 2/MacOS). You will need to manually process the resultant PostScript file through the Distiller (or use a "watched folder" arrangement).
    In both the above sub-cases, the default driver options generally will be OK, but check on paper size and communication protocol (Use pure binary, not ASCII, for optimal performance AND no CTRL-D characters under Windows. Make sure to set Level 3 only and Binary under MacOS. Font inclusion "All" for Acrobat 4.05 and "None" for Acrobat 5 under MacOS.). With Acrobat 4.05, make sure you preset the Distiller to use the joboptions you want. With Acrobat 5, you can set this on a job-by-job basis via the driver printer setup interface (or print dialog on MacOS).
    Case 2: FrameMaker 6 and the Bundled Acrobat 4.05 Distiller
    Windows -- Create a new printer driver instance using the latest version of the Adobe Universal PostScript Driver Installer, downloadable from Adobe's web site AND the Acrobat Distiller PPD file (located in the XTRAS subdirectory of the Distiller directory). This driver instance should be set to print to the local port named "FILE:". Name this driver instance as "Acrobat Distiller". The default driver options generally will be OK, but check on paper size and communication protocol (use pure binary, not ASCII, for optimal performance AND no CTRL-D characters). Make sure you preset the Distiller to use the joboptions you want. Print directly to this Acrobat Distiller printer instance. Make sure that the "print to file" option is checked. You will need to manually process the resultant PostScript file through the Distiller (or use a "watched folder" arrangement).
    MacOS -- Install the latest version of AdobePS 8.7.x, downloadable from Adobe's web site. In FrameMaker, go to Page Setup and select the "Virtual Printer" and go to the "Virtual Printer" window pane. Select the Acrobat Distiller PPD file (located in the XTRAS subfolder of the Distiller folder). Print directly to the "Virtual Printer" (Make sure to set Level 3 only, Binary, and font inclusion "All".). Make sure you preset the Distiller to use the joboptions you want. You will need to manually process the resultant PostScript file through the Distiller (or use a "watched folder" arrangement).
    Case 3: Acrobat 3
    Acrobat 3 is not officially supported for the latest OS versions and I personally would no longer recommend its use for generation of PDF files given that Acrobat 5.0.5 is the current version of Acrobat.
    - Dov

    You're asking a lot of ancient Acrobat to work with an Office that never existed when it was made. "Just updated my office suite" is a massive change, and Window 8 didn't exist at that time either...

  • WHY YOU SHOULD NOT USE SKYPE (and where to file co...

    Approximately two weeks ago, my account was blocked for no apparent reason.
    I contacted customer support and they didn't know why it was blocked, but told me to go through the account verification process. I asked to speak to someone on the phone to discuss this but was ignored. Then, within 48 hours I suddenly received a NEW email telling me that my account was blocked PERMANENTLY (funnily enough THEY CHARGED ME $25 USD for SKYPE CREDIT before blcoking me!!!). I want to make sure ALL PEOPLE KNOW about the absurd practices of Skype. I am now out $25 USD and permanently locked out my account forever. WHere can we file complaints? Better BUsiness Bureau? I have contacted my rep numerous times on how to overturn this and he just ignores me saying nothign can be done. this is absurd!!
    See below from Tyron H (A horrible customer service rep I might add)
    Hello,
    Good Day! Unfortunately, we cannot re-activate your account. We take the safety of Skype customers very seriously and need to apply certain restrictions to protect our customers' details. We apologize for the inconvenience and appreciate your understanding.
    In accordance with paragraph 11.2 of the Skype Terms of Use we have terminated your right to use the Skype software, and have prevented any further access to your Skype account.
    This is because you are in breach of paragraph 6.3 (c) of the Terms of Use which prohibits the use of the Skype software to send unsolicited communications. Any Skype Credit that was in your account is non-refundable.
    Best Regards,
    Tyron H.
    Skype Customer Service

    My_Money wrote:
     A class action in the United States  prohibits them from doing this now (in the US) and repayed dupped users.
    Hello and welcome to the Skype Community.
    To clarify:
    The settlement reached in the USA applies to unused Skype Credit being made available to users following a 180 day period of inactivity and is honored by Skype worldwide [except in Japan].
    You are referring to a different issue - that of automatically recurring Subscription payments to which you agreed upon signing up.
    http://www.skype.com/en/legal/tou/   [item 9.4]
    TIME ZONE - US EASTERN. LOCATION - PHILADELPHIA, PA, USA.
    I recommend that you always run the latest Skype version: Windows & Mac
    If my advice helped to fix your issue please mark it as a solution to help others.
    Please note that I generally don't respond to unsolicited Private Messages. Thank you.

  • Nonstock material PO value should not allow to change once it picked fromPR

    Hi There,
    when create PO for non stock material it will pick price from PR to PO once it pick the value again it should not allow to change.
    so what ever value is there in PR same should be in PO also even if we try to change PO value system should not allow
    so please advise me

    Dear
    If you want to copy the price from PR to PO do the following settings
    Here we have to do:
    First create a parameter in
    SPRO>Materials Management>Purchasing>Authorization Management>Define Function
    Authorizations for Buyers
    set the following fields:
    Order price adoption, Ref. to PReq, Change source, Change
    OTy./it. cat. and with Field sel. equals to AKTH. After created
    this parameter we have to set the users profile (using SU01 Transaction) with Parameter
    EFB (Function Authorization: Purchase Order).
    After doing all the settings what i mentioned, when you create the requisition that time before saving you have to select the price adoption as net or gross than only it will copy to the po because default is do not copy
    so go Valuation tab in the requisition and in PO price field select as nte price or Gross price than save the reqs
    now if oyu create the PO you will see the price
    Regards

  • Does not print the string value ? what is wrong here

    Hi,
    I am trying to print the string value that does not have spaces.
    when I do that,I dont get what I want i.e 3334445555.
    Any help in this regard is appreciated.
    Thanks
    Chat
    import java.util.StringTokenizer;
    class TestTokenizer{
    public static void main(String args[]){
              StringTokenizer st = new StringTokenizer(" 333 444 5555");
              String tokens[] =new String[3];
              int i=1;
              while (st.hasMoreTokens()) {
                   //System.out.println(st.nextToken());
                   tokens=st.nextToken();
              System.out.println(tokens.toString());

    also, be sure to format your code in your next post...click the code button at the top of the message box you type in, and past your code
    *here*[\code]                                                                                                                                                                                                                                                                                                                               

  • Sale Order Excise Value should not be zero

    Dear Friends
    With the User Exit MV45AFZZ     Form:: Userexit_Save_Document_Prepare,
    we have written a condition that while saving the sale order, if the excise condition value JEX2 is zero, order could not be saved and this is working fine for normal process.
    But in some cases, we need to explode the BOM in sale order.  In this case, the above user exit is checking for components excise value which should not be the case. In fact, we tried to distinguish with item category for the above exit but the item category structures are not flowing in a particular area of user exit.
    My requirement is that for BOM exploded items, the above condition should not trigger for excise value in sale order.  It should trigger ONLY for Header Material.  How this should be achieved??
    thanks
    G. Lakshmipathi

    The problem is solved.
    Actually in the above user exit, we had looped thru' xvbap for the item category type NOT equal to 'Order Type'.
    Then, we read the xkomv table with two keys  JEX2 and POSNV ( referring to vbap-posnr) and checked if condition value is null, if so trigger the error message.
    In this way, though the xvbap is not dynamic in that form of userexit, the reading of xkomv helped to achieve
    our purpose of triggering the error for header materials.
    thanks
    G. Lakshmipathi

  • Should i put bt net protect on my mac mini

    I am new to Apple mac mini, do I need to put anti virus on, I am with BT so can get their BT Netprotect for free?
    Please advise.

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
       For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent. or Usenet, or on a website that also distributes pirated music or movies.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, your browser, or anything else.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    High-priced commercial software such as Photoshop is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Anything online that you would expect to pay for is "free."
    Unexpected events
    You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What jars should i put in my classpath?

    Hello
    I have installed the pack summer 02
    What jars should i put in my classpath to avoid the error I get every time i run this test program:
    import java.net.*;
    import java.io.*;
    import org.w3c.dom.*;
    import javax.xml.parsers.*;
    import javax.xml.transform.*;
    import javax.xml.transform.stream.StreamResult;
    import javax.xml.transform.dom.DOMSource;
    public class XmlTester{
         public static void main ( String [] args ){
              try{
                   DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
                   DocumentBuilder builder = factory.newDocumentBuilder();
                   Document document = builder.parse("Description.xml");
              }catch ( Exception e ){
                   System.out.println("Salto una excepcion");
              }//catch
              catch ( FactoryConfigurationError e ){
                   System.out.println(e.getMessage());
                   System.out.println(e.getException());
              }//catch
         }//main
    }//XmlTester
    ERROR:
    Provider org.apache.crimson.jaxp.DocumentBuilderFactoryImpl not found
    java.lang.ClassNotFoundException: org.apache.crimson.jaxp.DocumentBuilderFactoryImpl
    Thanks

    Whichever jars have the classes that you want to use (you should probably put all the jars that you got with this program)
    Also, try adding an import statement:
    import org.apache.crimson.jaxp.DocumentBuilderFactoryImpl;

  • Registry key string values disappearing with SCOM

    I'm trying to determine why some registry key string values are disappearing when Windows Server 2008 machines are restarting. In all cases, System Center Operations Manager is installed on the server. The registry keys whose string values are deleted are
    HKLM\System\CurrentControlSet\Services\IISADMIN, HKLM\System\CurrentControlSet\Services\W3SVC, and HKLM\System\CurrentControlSet\Services\WAS.
    The string value is the same in all cases. The string data item is called "Environment" and the string multisz value is "COR_ENABLE_PROFILING=0x1".
    Does SCOM, or part of it such as the Avicode monitor, cause these values to be removed when a system is restarted?
    Thanks,
     Bob

    Bob,
    SCOM2007 will do nothing in that sense, unless it is integrated with AVIcode --> but that would mean you have TWO agents on the machine (the SCOM and the AVIcode agent), since they were two separate products... where you run your other profiler,
    you should not use AVIcode.
    SCOM2012 installs the APM piece with its agent... but leaves it DISABLED until you configure it. While it is disabled, no rule that touches configuration gets applied to it. Once you do ENABLE the APM functionality, then yes, we will go and change the registry
    key adding ourselves (APM) as profiler... because that is what the configuration to tells us to do. If you REMOVE that configuration, we'll clear ourselves out of it.
    But again, it requires configuration to be done -- otherwise, out of the box, we do none of this.

  • Exchage rate should not  come during payment to the vendors

    Hi Sap Experts,
    My client have some different requirement, 
    At the time of MIRO system is picking the Exchange rate from OB08 table and converting to company code currency. When will make the payment to vendor, through company code currency system is picking exchange rate  from OB08 table and it is showing exchange rate Gain/loss Account, which our client does not required.
    At the time of payment to above vendor, system should picking only liability created value and should not show any exchange rate difference.
    Thanks in advance
    kareem

    Hi,
    If exchange rate is same at the time of invoice and payment then there will be no issue.
    But when there is difference you have to show the Gain and loss in your account.
    Otherwise how will you entry match.
    Eg invoice 100 USD with exchange rate is 50 INR
    When you are paying 100 USD exchange rate is 51 INR
    Then entry will come as
    Vendor A/c 5000  Dr
    Loss Exhange rate 100 Dr
    To Bank A/c        5100 Cr
    If you don't show the loss how will you match the entry.
    As you have to show what you have paid through bank which is not changeable

  • Do you have to put the sensor to sleep after every work out?

    do you have to put the sensor to sleep after every work out?
      Windows XP  

    No, when the sensor is not moving the battery is not being used. (Of course, you should not be wearing your running shoes all day long.)

  • Multi value Cascading Parameters Not working

    Hi ,
    I have created two report parameters and want them as Cascading. District Parameter depends on Region Parameter which should allow Multi selection. When I select single value in Region it works perfectly. But when I choose multiple values, District turns
    out to be a blank text box. Can you please advise on how to fix this?
    I have used the In clause in my code
    SELECT
    DISTINCT
    SalesDistrict
    FROMDistrict(NOLOCK)
    WHERESalesRegion
    IN(@SalesRegion)
    SG

    that's because  "public sector,East" is passed as a string rather than multiple values.
    you should split them into multiple rows...  there are several functions that do that.. you can pass the string to the function and use  IN clause look them in the district table.
    below example is using xml but you can also use functions, if you want... just google  "split comma delimited string to multiple rows" function
    declare @District table (Distrcit int,Region varchar(20))
    Insert into @District values (1,'East'),(2,'West'),(3,'Public Sector')
    declare @xml xml, @s nvarchar(max)
    select @s = N'public sector,East'
    set @xml = N'<root><r>' + replace(@s,',','</r><r>') + '</r></root>'
    select * from @District where Region in
    (select t.value('.','varchar(max)') as [delimited items]
    from @xml.nodes('//root/r') as a(t))
    refer http://www.kodyaz.com/articles/t-sql-convert-split-delimeted-string-as-rows-using-xml.aspx
    Hope it Helps!!

  • You have not maintained a rule for the fiscal year variant

    1) I have Fiscal Year Variant in the Cube ( it got added along with fiscal year ) but there is no Fiscal year variant in the datasource & when I dont map it Transformation activation prompts error " You have not maintained a rule for the fiscal year variant ".
    Can I just delete Fiscal year variant from the cube..does it matter?
    2) Fiscal year & Posting Period can be populated from Fiscal Period, is the vice versa possible..? Does the sytem will take care of the conversion..?

    1. no, you should not delete and you cannot delete fiscal year variant from cube, it's required by fiscal year/ period (compound infoobject), you should add it in your datasource, or you can map with a constant value e.g K4
    2. yes, fiscal period can be populated by posting period
    some info on time characteristic relationtionship
    http://help.sap.com/saphelp_nw70/helpdata/en/44/be8b631c743959e10000000a1553f6/frameset.htm
    hope this helps.

  • How to compare two dates that should not exceed morethan 3 years

    hi all,
    can you please tell me how to compare two dates( basically dates are string type)
    that should not exceed more than 3 years? in JAVASCRIPT
    Thanks in Advance.

    This is not a JavaScript forum.
    [*Google* JavaScript Forum|http://www.google.co.uk/search?q=JavaScript+Forum&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-GB:official&client=firefox-a]
    Good luck.

Maybe you are looking for