Synchronize Folder - Scan For Metadata Updates

Can anybody explain to me, what exactly is supposed to happen when I am synchronizing folders and have "Scan for metadata updates" checked?
What kind of metadata is searched
(I notice that keywords are not synchronized)
What action is supposed to be taken
(write metadata to image, read metadata into catalog, any prompt before updates?)
The manual isn't really specific about this, and by trying I haven't really found out what to expect.
Thanks for any suggestions.
Beat Gossweiler
Switzerland

Basically, the folder is scanned for new or changed images. The metadata changes will include new or updated IPTC, Keywords, ratings, labels, develop adjustments, which will have been applied in an external app such as Bridge/Camera Raw. If the folder contains new images these will be identified as such. If an image has been removed from the folder but still remains in the catalog you will be notified and given the choice of removing it.
Synchronise Folder does NOT save anything back to the actual files. If you have made a change to a file in Lightroom that change will NOT be applied to the actual file when Sync Folder is run. It reads the folder for externally applied changes/additions/omissions and subject to user choice will update the catalog accordingly.

Similar Messages

  • An error occurred while scanning for security updates. (0x80004003)

    Has anyone seen this error:   An error occurred while scanning for security updates. (0x80004003)?
    This error occurs when I run the MBSA tool either locally or remote against a workstation.  I also thought that the firewall may be the issue, it is not.  I ran the MBSA tool on the WSUS replica and WSUS upstream server and received the same results. I
    have been running the MBSA tool and have not run into this probem before.   I am running SolarWinds PatchManager on the upstream WSUS server and have recently configured the upstream and downstream servers to communicate, I imported
    the certifcate from the WSUS upstream to the replica and noticed that after this we started having issues with the MBSA scans.  Not sure if this is related but it is the only change between MBSA working and not working.  P.S.  The scan does
    work when we use the offline scenario instead of pointing to the WSUS server.
    Any help would be appreciated.
    Thanks
    bc

    Yes, the log file was too large I have pasted the 2nd half after running MBSA on the server (the setting is to scan using Windows Server Update Services (WSUS) only.)  This second half of the windowslog file shows errors after running MBSA
    MBSA scan time was 9:44 PM
    2014-07-31   
    19:38:35:487  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:44:14:497  216   2344  
    Report Uploading 4 events using cached cookie, reporting URL =
    http://eus1:8530/ReportingWebService/ReportingWebService.asmx
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING: ReportEventBatch failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING: SOAP Fault: 0x00012c
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING:    
    faultstring:Fault occurred
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING:    
    ErrorCode:ConfigChanged(2)
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING:    
    Message:(null)
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING:    
    Method:"http://www.microsoft.com/SoftwareDistribution/ReportEventBatch"
    2014-07-31   
    19:44:14:555  216   2344  
    PT     WARNING:    
    ID:2b9836c5-3159-494b-ae27-72559d089586
    2014-07-31   
    19:44:14:555  216   2344  
    Report WARNING: Reporter failed to upload events with hr = 8024400d.
    2014-07-31   
    19:45:57:201  9128   12a8  
    Misc   =========== 
    Logging initialized (build: 7.6.7600.256, tz: -0400) 
    ===========
    2014-07-31   
    19:45:57:201  9128   12a8  
    Misc     = Process: C:\Program Files\Microsoft Baseline Security Analyzer 2\mbsa.exe
    2014-07-31   
    19:45:57:201  9128   12a8  
    Misc     = Module: C:\Windows\system32\wuapi.dll
    2014-07-31   
    19:45:57:200  9128   12a8  
    COMAPI -------------
    2014-07-31   
    19:45:57:201  9128   12a8  
    COMAPI -- START --  COMAPI: Search [ClientId = MBSA]
    2014-07-31   
    19:45:57:202  9128   12a8  
    COMAPI ---------
    2014-07-31   
    19:45:57:218  216   2344  
    Agent  *************
    2014-07-31   
    19:45:57:218  9128   12a8  
    COMAPI <<-- SUBMITTED -- COMAPI: Search [ClientId = MBSA]
    2014-07-31   
    19:45:57:218  216   2344  
    Agent  ** START **  Agent: Finding updates [CallerId = MBSA]
    2014-07-31   
    19:45:57:218  216   2344  
    Agent  *********
    2014-07-31   
    19:45:57:218  216   2344  
    Agent    * Include potentially superseded updates
    2014-07-31   
    19:45:57:218  216   2344  
    Agent    * Online = Yes; Ignore download priority = No
    2014-07-31   
    19:45:57:218  216   2344  
    Agent    * Criteria = "IsInstalled=0 or
    IsInstalled=1"
    2014-07-31   
    19:45:57:218  216   2344  
    Agent    * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-07-31   
    19:45:57:218  216   2344  
    Agent    * Search Scope = {Machine}
    2014-07-31   
    19:45:58:410  216   2344  
    PT     +++++++++++  PT: Synchronizing server updates 
    +++++++++++
    2014-07-31   
    19:45:58:410  216   2344  
    PT       + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =
    http://eus1:8530/ClientWebService/client.asmx
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING: SyncUpdates failure, error = 0x8024400D, soap client error = 7, soap error code = 300, HTTP status code = 200
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING: SOAP Fault: 0x00012c
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING:    
    faultstring:Fault occurred
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING:    
    ErrorCode:ConfigChanged(2)
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING:    
    Message:(null)
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING:    
    Method:"http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/SyncUpdates"
    2014-07-31   
    19:46:00:453  216   2344  
    PT     WARNING:    
    ID:e9b0d06e-d0c8-443f-abc9-512bc0f2cfa1
    2014-07-31   
    19:46:00:481  216   2344  
    PT     Initializing simple targeting cookie,
    clientId = e651f142-bc0f-467d-b416-d344215f5c0a, target group = EMCC Servers, DNS name = elf1.monarch.com
    2014-07-31   
    19:46:00:481  216   2344  
    PT       Server URL =
    http://eus1:8530/SimpleAuthWebService/SimpleAuth.asmx
    2014-07-31   
    19:46:18:451  216   2344  
    PT     +++++++++++ 
    PT: Synchronizing extended update info  +++++++++++
    2014-07-31   
    19:46:18:451  216   2344  
    PT       + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =
    http://eus1:8530/ClientWebService/client.asmx
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {92AEAB02-F8FC-4527-B285-50FDC8EF3F85}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {2212D902-7C3B-408E-96A3-ECE4D00BFAE6}.101 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {490BE004-BC5C-4EEF-AC82-769542FC3A2D}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {568C1005-5178-4C13-8486-18E2C5AF4834}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Update {D9F49D05-AC6D-4A2A-8150-D2B4B730DEED}.101 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {74844E07-2F55-40D4-9E16-E17A2815FEBE}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {3C72A908-F3CD-413D-B2BF-ECB68D24B6FE}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {50990D0B-4795-4830-9C3A-753485B2D433}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {9DB82D0B-5611-4BC1-A4B8-432FE1A3CC43}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {7BB7B30C-351D-4F8C-ABE4-5F7965635A03}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {AEF6280F-8C4D-4804-9913-407582227E75}.202 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {16BB6A11-B540-4486-AB13-F3B9789E90B5}.105 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {1B127611-D28E-4167-A1DC-243A51BC528F}.203 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {2F6F2013-2990-4FA6-8AB9-CA59DCA4E62D}.202 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {21732D13-3D34-4DD7-B663-32F2A1631EA9}.105 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Update {E879EE15-340D-442C-B8A4-CF91D18C1B6B}.101 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent  Update {99FEC317-44CD-40B4-B67E-94C840510983}.101 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {8096C018-252D-4C32-BC9E-F33AC67ECFF1}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {ECCC4D19-3032-4C82-91AB-A31560B13F80}.205 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {BB49CC19-8847-4986-AA93-5E905421E55A}.103 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {023BB023-490F-4DF3-BCAA-9521EE8B5847}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {9676C624-58CB-4A30-B7B3-1D013CF3DBBC}.201 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {1BB3DE24-0D76-4D59-9B9E-556722BFE852}.101 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {F4695A25-0D22-4E3B-9BA9-9BBC62198C28}.103 to search result
    2014-07-31   
    19:46:18:893  216   2344  
    Agent    * Added update {11152F27-ACCA-4438-B21D-A0B61480D33B}.101 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {308DE327-7354-4481-9981-DEA0FC61925E}.101 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {16E9C62D-05B2-4E14-BFB0-CF55EDBD4F61}.106 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {C750962E-9D5E-45CE-9967-AE2D67115966}.202 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {9F7D6930-6816-423A-AF3C-C83ADFA7F612}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {497BCC31-ACF7-46E2-B664-C79FD2D39F8B}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:894  216   2344  
    Agent  Update {E00B2634-BEF9-4C32-B2BF-DEAF7D7221E4}.102 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {7738E837-B152-487B-8527-CD3A9C0E43E3}.101 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {39757C3A-7ABE-4418-8B2A-C7EA7D88B36A}.202 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {A8968B3A-7FB5-4089-888F-4CDB14055DE9}.102 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {E6ED643C-8611-4453-A723-9847B7BF60EB}.103 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {C499223D-2F22-4626-BBE5-F5A35E7A5854}.204 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {48BEEF41-9D2D-4E72-9A61-59F98B12C07A}.204 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {332AA342-7AC4-4FB4-9C27-C2C9F4EAE6C0}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {2661BD46-2980-4FCF-A062-B3A0C7820663}.102 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {DC548E48-407C-48E1-ACA4-6B4C0DF14E69}.102 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {ED981249-8D8F-42A1-87DB-0AB5C07430B2}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {18FEE64A-1E7F-4932-8158-E8AB241F3A1A}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {3732354D-3DAE-4E71-B82C-61A12C300F72}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {3061954E-EDAA-4625-837C-CE768D68927D}.204 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {78F92451-801A-40F5-9582-CB8D1CA993BE}.202 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {ADA7CF51-66B0-4A00-B37B-68D569D6FF8B}.102 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {345B0353-DFC6-48CC-A6B6-A490CA26B503}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {1330DB53-75FF-4D87-9270-6A5449A67AD7}.101 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent    * Added update {E35E5957-A5A9-4576-9D54-314A34C47C53}.201 to search result
    2014-07-31   
    19:46:18:894  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:894  216   2344  
    Agent  Update {DC17765A-6814-47AD-9F54-5BFBCBF95FB0}.101 is not a valid bundle. Not
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {CEFF8CA0-08DB-41D0-B825-FCC2CEBAF8B4}.108 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {2FECFFA0-44C8-4719-8F72-EC7BD8EDB793}.1 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {2BDE2BA3-EF93-49C6-A3C6-A806835A680F}.200 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {FA04F2A3-4DB5-4903-A08C-ADDFCF93EE28}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {0B8586A5-EEB6-4DC0-BCDA-2635C7E12B55}.102 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:895  216   2344  
    Agent  Update {A6BD61A7-CC63-4068-8510-AA5268FB03E8}.101 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {4C0BA6A7-A8F0-417E-B9DA-906207429CE6}.204 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {CE9876A9-83BF-4EDC-8793-4CBD6F3A6C5A}.202 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {63A011AC-FF81-44B9-811C-BECE5DC6C34B}.101 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {4A0A69AD-4237-43E7-8FB9-5A814361EC76}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {7E8ACCAD-2892-4F2D-9549-1FF8BE44AAD1}.203 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {E17C01AE-BACC-4147-97AD-51A0708126D2}.102 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {CB1F1FAE-F738-49E7-AE3E-7A0C2308838B}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {9696B7B0-FF6F-4AA6-B29C-E0200CB6EB79}.200 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {B58F24B1-58A0-4661-9882-0FF509712946}.102 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {E47BE4B1-5EF0-442F-995F-C000D5AFF062}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {D68E0CB2-9501-405E-AF9C-156F352D6735}.107 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {09593FB3-C94B-4A07-84C4-2E60703AD644}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {99C920B7-65AB-4ACD-A4AD-C4F522E4D7A9}.201 to search result
    2014-07-31   
    19:46:18:895  216   2344  
    Agent    * Added update {EDE986B7-03CE-4B0C-8891-AF09113CB0DB}.200 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {B8315ACF-BF26-4C3A-979B-80A46D06697F}.200 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {013AF7D6-EC9F-4DEF-AE41-007D211F9FBC}.202 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {6E3C01DB-6977-46D2-A537-00F53DA0B3B3}.201 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {9842D9DB-8AE8-4F0B-B974-66787AEC8FBC}.201 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent  Bundle contains no deployed children and thus is invalid.
    2014-07-31   
    19:46:18:896  216   2344  
    Agent  Update {0C1447DC-904E-4DCE-B208-50741D1CC65C}.102 is not a valid bundle. Not returning it.
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {DD7619DD-D6A6-4765-8406-612FD79583BA}.202 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {ABB0AFDD-4B0A-4C3E-8341-07EA3941C465}.201 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {B66BA1DF-4BC1-4145-859F-239C9F9BB5A0}.201 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {E2C928E1-BE92-4715-817D-FD6090F2FB07}.202 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {C16FDFFD-A0D3-49EB-A8EB-B8F5E21D52C3}.202 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent    * Added update {57260DFE-227C-45E3-9FFC-2FC77A67F95A}.104 to search result
    2014-07-31   
    19:46:18:896  216   2344  
    Agent   * Added update {5BCDA2FE-A3F5-42C9-91F0-823230942BD8}.204 to search result
    2014-07-31   
    19:46:18:897  216   2344  
    Agent    * Found 151 updates and 95 categories in search; evaluated appl. rules of 1327 out of 2207 deployed entities
    2014-07-31   
    19:46:18:918  216   2344  
    Agent  *********
    2014-07-31   
    19:46:18:918  216   2344  
    Agent  **  END 
    **  Agent: Finding updates [CallerId = MBSA]
    2014-07-31   
    19:46:18:918  216   2344  
    Agent  *************
    2014-07-31   
    19:46:18:932  216   2344  
    Report REPORT EVENT: {A427D5D8-F546-4FBB-9F5F-931DF1F46063}      
    2014-07-31 19:46:18:898-0400      1     
    147    101    {00000000-0000-0000-0000-000000000000}  
    0       0     
    MBSA   Success      
    Software Synchronization   Windows Update Client successfully detected 151 updates.
    2014-07-31   
    19:46:18:932  216   2344  
    Report REPORT EVENT: {C8151494-E563-4AEB-B37F-14FD7864BF5D}      
    2014-07-31 19:46:18:898-0400      1     
    156    101    {00000000-0000-0000-0000-000000000000}  
    0       0     
    MBSA   Success      
    Pre-Deployment Check Reporting client status.
    2014-07-31   
    19:46:18:933  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:934  9128   2550  
    COMAPI >>--  RESUMED 
    -- COMAPI: Search [ClientId = MBSA]
    2014-07-31   
    19:46:18:934  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:934  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:935  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:935  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:935  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:935  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:935  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:936  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:936  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:18:936  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    2014-07-31   
    19:46:19:032  9128   2550  
    COMAPI   - Updates found = 151
    2014-07-31   
    19:46:19:033  9128   2550  
    COMAPI ---------
    2014-07-31   
    19:46:19:033  9128   2550  
    COMAPI --  END 
    --  COMAPI: Search [ClientId = MBSA]
    2014-07-31   
    19:46:19:033  9128   2550  
    COMAPI -------------
    2014-07-31   
    19:46:23:918  216   2344  
    Report CWERReporter finishing event handling. (00000000)
    bc

  • Alert: Synchronization failure alert for software update point ( SCCM 2012 R2)

    SCCM 2012 R2
    Alert: Synchronization failure alert for software update point: MY.net(MY)
    Alert type: Software update synchronization failure
    Severity: Critical
    Active time (UTC): 13-09-2014 19:37:34
    Condition: Generate an alert if software updates synchronization fails for the Software Update Point role at the
    MY (MY) site.
    Alert Text: Software updates synchronization for the Software Update Point role at the
    MY (MY)) site failed.
    Please let me know what will be the cause of this Alert, how to resolve it

    The reason is stated in the message: "Generate an alert if software updates synchronization fails
    for the Software Update Point role at theMY (MY) site"
    Examine wsyncmgr.log
    Torsten Meringer | http://www.mssccmfaq.de

  • Itune music folder scan for changed location

    I created playlists in itune quickly while initial set up loong time back,
    I then rearranged my folders using windows explorer and categorized them and what not, now when i start itune it cant find the folder, gives exclamation mark on each file and asks me to locate each of them, the files located in same folder are automatically found by itune, but the ones that are not, like hundreds of them, still cant be found. How to link all the music files in itunes by making it scan folders and connect them automatically, all of them. Any help would be great.

    I am expericing exactly the same problem; I wish itunes to use a location on my network storage drive. I had it set up in this manner last year but since then I've had to re-install XP and ever since then it always resets the location.
    Did you manage to resolve this issue, since I'd love to know how - very frustrating!

  • I can´t rescan for software updates with wmic command

    Hi guys,
    I read in all the sites that to install all updates  I need to run a command, but when I try to scan for software updates both a OSD task as from a command line on a machine with installed client gives me an error: Modifier Verb is invalid. Anyone know
    why? Is there any requirement to launch this command?
    Command: WMIC /namespace:\\root\ccm path sms_client CALL TriggerSchedule "{00000000-0000-0000-0000-000000000113}"
    /NOINTERACTIVE
    Sccm 2012 SP1 with SQL Server 2012 and Windows Server 2012. All in spanish. Reference OS is Windows 7 x64.
    THX for all!!!

    Hi,
    Please review the link below, here is a useful article for you.
    Configuration Manager 2012: Offline Servicing for Operating System Images
    http://blogs.technet.com/b/inside_osd/archive/2011/04/18/configuration-manager-2012-offline-servicing-for-operating-system-images.aspx
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Rules for Folder Metadata Update

    How to create a rule which is executed when the folder metadata is updated?
    I tried creating a global rule. Rule groupings are reflected on folder metadata information, but when I need to derive one value from another when the folder information page is update - it does not happen.

    No. But thank you for the imformation. I know how to create dependent choice lists.
    The problem was in the following.
    As I want some metadata fields be dependent on dsecuritygroup and ddoctype and they can not be chosen as dependent fields, i had to implement additional xdoctype and xsecuritygroup metadata fields. that means that for system ddoctype and dsecuritygroup fields the values shlould be derived from my custom fields.What was done with the use of rules. But the problem was, that the values were derived only for the content items, but not for folders. E.g. when I updated xSecurityGroup for the folder, corresponding value of dSecurityGroup for this folder was not updated.
    Finally I wrote a trigger on Colmeta and Collections tables.
    But I am very glad, you answered my post, may be you can also help me with the following:
    1) Derived Value - Concatenated String Fields
    2) When you define a view there is a nuber of parameters which are not defined in help:
    - publish view data
    - allow modification by contributors
    - use standard doc. security
    - use custom security implementor
    3) Choice List Depending on Two Fields
    Regards,
    Gulnara
    Edited by: guliflower on Jul 8, 2010 12:41 AM

  • LR2: Synchronize Folder doesn't read back changed .xmp metadata

    LR2 on Mac.
    My workflow for geotagging CR2 RAW files, which worked fine in LR 1.4:
    - Catalog Settings: Automatically write changes into XMP (but this can't always be trusted if you just imported them)
    - If needed, Save Metadata to force metadata to XMP
    - Run external tools that update GPS metadata in CR2 file
    - Unix 'touch' .xmp sidecar file to update its mod date (since LR doesn't see changes in CR2, probably thinking it is read-only)
    - Back in LR, Synchronize Folder
    Used to bring GPS data into LR, now doesn't notice any change.
    Workaround: Read Metadata from File (but less safe if you made any intermediate changes in LR, since Read seems to do a total metadata replace, whereas Sync seemed to be smarter).
    Any other ideas on how to get LR to notice GPS changes actually made in CR2 file?

    Another bit of info....   As I looked at this further, it seems to be occuring only on those photos where I previously ran camera raw from CS3. I've upgraded to CS5 but have not rerun camera raw since. I understand the camera raw engine in CS3 was different. Could this be involved? Could Lightroom be changing the metadata because the engine is updating the information and I have to save TO file to get this to synch?
    update about this camera raw engine possibilty..... it would not appear to be the answer. I have some files that synch even tho lightroom develop says they are using the 2003 process version. I have some files that are on the new version that won't synch.

  • Can not update Term value for metadata columm field to empty

    Hi ,
    I have created a TermSet for Sitecollection and created Managed metadata column called Delivery linked with the Term (onsite , online, etc..)  in the Term set . If i try to update the Term Value for Metadata Colum  field to
    blank ( e.g remove onsite so it has blank value)  then click Save , it does not save the blank value it reverts back to the original value set for that metadata field.  The metadata column is set "not to require to contain information" 
    & do not force unique value
    Any idea
    Thanks
    mp

    Hi,
    I understand that you want to change a metadata column to be blank. I cannot reproduce your issue. I can set the managed metadata column to blank as expected. Can you reproduce this issue with another managed metadata column? Or does this happen to the only
    managed metadata column?
    Here are my steps to achieve this:
    Open the root site of the site collection in browser.
    Click Site Actions> Site Settings.  Click Term Store Management under Site Administration.
    Created the term store. Then create a managed metadata column to use this term store(have tested this column with both list and library).
    Set "not to require to contain information"  & do not force unique value &Allow fill in value& Don’t specify a default value.
    Thanks,
    Entan Ming
    Entan Ming
    TechNet Community Support

  • Metadata updates and Re-Submit for conversion

    Is there a configuration parameter that tells which metadata updates will submit the document for conversion?

    Never heard that OOTB this could be metadata-driven. There is a service http://docs.oracle.com/cd/E23943_01/doc.1111/e11011/c04_core.htm#CSSRG2306 that can be called from RepoMan or ContentInfo pages - see http://docs.oracle.com/cd/E23943_01/doc.1111/e10978/c05_workflows.htm#CSMRC1452 and you can recognize resubmit as an action in workflows - see http://docs.oracle.com/cd/E23943_01/doc.1111/e10726/c06_core_ref.htm#CSIDO606

  • HT4623 in my settings folder there is no option for softwear update.....how can i update my softwear.

    I am trying to update the softwear for my phone iphone 4. currently only has version 4.1 softwear installed.
    problem is when i go into settings then general there is no tab for softwear updates?......what to do?

    katelou wrote:
    ...  when i go into settings then general there is no tab for softwear updates?......
    That is only a feature of iOS 5 or later...
    You have iOS 4... See Here...
    http://support.apple.com/kb/HT4972
    OR...
    Connect to iTunes on the computer you usually Sync with and “ Check for Updates “...
    If an Update Appears Install it...
    See the Using iTunes Section Here...
    How to update your iPhone, iPad, or iPod touch

  • Domain Group Policy changes causes clients to be unable to connect to WSUS for Windows Updates

    Domain Controller is Windows Server 2008 R2 64-bit, Group Policy Management version 6.0.0.1. WSUS server is Windows Server 2008 Enterprise 32-bit, Update Services version 3.2.7600.226. Client machines are Windows 7, some are 64-bit and some are 32-bit.
    Every time we make any changes to any of our Group Policies most of our clients stop getting their Windows Updates from the WSUS server within 2-3 days. This occurs when we add a new policy for a group of users, temporarily disable a policy or edit a policy.
    Check of the WindowsUpdate.log on affected client machines shows:
    2014-06-25 13:40:44:976  760 1610 PT WARNING: GetAuthorizationCookie failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
    2014-06-25 13:40:44:977  760 1610 PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80072ee2
    2014-06-25 13:40:44:977  760 1610 PT WARNING: PopulateAuthCookies failed: 0x80072ee2
    2014-06-25 13:40:44:977  760 1610 PT WARNING: RefreshCookie failed: 0x80072ee2
    2014-06-25 13:40:44:977  760 1610 PT WARNING: RefreshPTState failed: 0x80072ee2
    2014-06-25 13:40:44:977  760 1610 PT WARNING: PTError: 0x80072ee2
    2014-06-25 13:40:44:977  760 1610 Report WARNING: Reporter failed to upload events with hr = 80072ee2.
    A further check of the log files shows:
    2014-06-21 19:36:06:995  156 1b0c Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <proxy server name:8080> Bypass List used : <(null)> Auth Schemes used : <>
    We do not use a proxy except for Internet connections. We configure IE with a pac file. This is set through Group Policy since we restrict user accounts from being able to set it. 
    The clients that are connecting to the WSUS server have these entries instead:
    2014-06-24 09:12:16:779  992 270 Agent Setting download properties on call A20329BC-3467-4B7E-B9F4-6AC6ACBA23E1: priority=3, interactive=1, owner is system=0, proxy settings=1, proxy session id=2
    I have a routine that will fix the problem but it is time-consuming and pulls me away from other things I should be doing:
    Run registry files on client machine (WindowsUpdate and AU) This is not always necessary and is already set by Group Policy and the affected clients already have the registry settings. No idea why it is necessary to do but it the steps below don't always
    work unless it is.
    netstop bits and netstop wuauserv
    ipconfig /flushdns
    Delete qmgr*.* files from Downloader folder
    Delete Software Distribution folder
    Run from command prompt:
    sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    netstart bits and netstart wuauserv
    wuauclt /resetauthorization /detectnow
    Run Windows Updates again from Control Panel
    This routine always fixes the problem but I've found that I must do each step to guarantee success.
    How or where is the proxy setting being changed for WSUS that we see in the WindowsUpdate logs and how do I prevent this from happening? It is also curious that it happens to most but not all of the client machines. When it does happen it's not always the
    same client machines.

    You're right - the WSUS server is on the inside and does not need a proxy server. Tried running the netsh winhttp reset proxy command but was still not able to connect to the WSUS server. After running the netsh winhttp reset proxy command received response:
    Current WinHTTP proxy setting: Direct access <no proxy server>.
    Ran the command at 13:49 and then tried Windows Updates again. Here's snippet from the log file:
    2014-06-27 13:49:56:889  548 f6c AU Triggering AU detection through DetectNow API
    2014-06-27 13:49:56:890  548 f6c AU Triggering Online detection (interactive)
    2014-06-27 13:49:56:890  548 4b8 AU #############
    2014-06-27 13:49:56:890  548 4b8 AU ## START ##  AU: Search for updates
    2014-06-27 13:49:56:890  548 4b8 AU #########
    2014-06-27 13:49:56:893  548 4b8 AU <<## SUBMITTED ## AU: Search for updates [CallId = {9CE06AB2-E859-4B4D-8D1A-193AD89623C5}]
    2014-06-27 13:49:56:893  548 1260 Agent *************
    2014-06-27 13:49:56:893  548 1260 Agent ** START **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-06-27 13:49:56:893  548 1260 Agent *********
    2014-06-27 13:49:56:893  548 1260 Agent   * Online = Yes; Ignore download priority = No
    2014-06-27 13:49:56:893  548 1260 Agent   * Criteria = "IsInstalled=0 and DeploymentAction='Installation' or IsPresent=1 and DeploymentAction='Uninstallation' or IsInstalled=1 and DeploymentAction='Installation' and RebootRequired=1
    or IsInstalled=0 and DeploymentAction='Uninstallation' and RebootRequired=1"
    2014-06-27 13:49:56:893  548 1260 Agent   * ServiceID = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7} Managed
    2014-06-27 13:49:56:893  548 1260 Agent   * Search Scope = {Machine}
    2014-06-27 13:49:56:893  548 1260 Setup Checking for agent SelfUpdate
    2014-06-27 13:49:56:893  548 1260 Setup Client version: Core: 7.6.7600.256  Aux: 7.6.7600.256
    2014-06-27 13:49:56:894  548 1260 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-06-27 13:49:56:901  548 1260 Misc  Microsoft signed: Yes
    2014-06-27 13:49:56:927  548 1260 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wuident.cab:
    2014-06-27 13:49:56:934  548 1260 Misc  Microsoft signed: Yes
    2014-06-27 13:49:56:936  548 1260 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-06-27 13:49:56:943  548 1260 Misc  Microsoft signed: Yes
    2014-06-27 13:49:56:956  548 1260 Misc Validating signature for C:\Windows\SoftwareDistribution\SelfUpdate\wsus3setup.cab:
    2014-06-27 13:49:56:962  548 1260 Misc  Microsoft signed: Yes
    2014-06-27 13:49:56:974  548 1260 Setup Determining whether a new setup handler needs to be downloaded
    2014-06-27 13:49:56:974  548 1260 Setup SelfUpdate handler is not found.  It will be downloaded
    2014-06-27 13:49:56:974  548 1260 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-06-27 13:49:56:976  548 1260 Setup Setup package "WUClient-SelfUpdate-ActiveX~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-06-27 13:49:56:976  548 1260 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-06-27 13:49:56:989  548 1260 Setup Setup package "WUClient-SelfUpdate-Aux-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-06-27 13:49:56:989  548 1260 Setup Evaluating applicability of setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256"
    2014-06-27 13:49:57:007  548 1260 Setup Setup package "WUClient-SelfUpdate-Core-TopLevel~31bf3856ad364e35~amd64~~7.6.7600.256" is already installed.
    2014-06-27 13:49:57:007  548 1260 Setup SelfUpdate check completed.  SelfUpdate is NOT required.
    2014-06-27 13:49:57:165  548 1260 PT +++++++++++  PT: Synchronizing server updates  +++++++++++
    2014-06-27 13:49:57:165  548 1260 PT   + ServiceId = {3DA21691-E39D-4DA6-8A4B-B43877BCB1B7}, Server URL =
    http://(FQDN of WSUS server)/ClientWebService/client.asmx
    2014-06-27 13:49:57:175  548 1260 PT WARNING: Cached cookie has expired or new PID is available
    2014-06-27 13:49:57:175  548 1260 PT Initializing simple targeting cookie, clientId = 6be4a1ae-3313-4855-bdb1-57e3312f03ec, target group = AGENCIES, DNS name = dpk2.clear-rcic.rcc.org
    2014-06-27 13:49:57:175  548 1260 PT   Server URL =
    http://(FQDN of WSUS server)/SimpleAuthWebService/SimpleAuth.asmx
    2014-06-27 13:50:57:280  548 1260 Misc WARNING: SendRequest failed with hr = 80072ee2. Proxy List used: <(proxy server):8080> Bypass List used : <(null)> Auth Schemes used : <>
    2014-06-27 13:50:57:281  548 1260 PT   + Last proxy send request failed with hr = 0x80072EE2, HTTP status code = 0
    2014-06-27 13:50:57:281  548 1260 PT   + Caller provided proxy = No
    2014-06-27 13:50:57:281  548 1260 PT   + Proxy list used = webgate.rcc.org:8080
    2014-06-27 13:50:57:281  548 1260 PT   + Bypass list used = <NULL>
    2014-06-27 13:50:57:281  548 1260 PT   + Caller provided credentials = No
    2014-06-27 13:50:57:281  548 1260 PT   + Impersonate flags = 0
    2014-06-27 13:50:57:281  548 1260 PT   + Possible authorization schemes used =
    2014-06-27 13:50:57:281  548 1260 PT WARNING: GetAuthorizationCookie failure, error = 0x80072EE2, soap client error = 5, soap error code = 0, HTTP status code = 200
    2014-06-27 13:50:57:281  548 1260 PT WARNING: Failed to initialize Simple Targeting Cookie: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 PT WARNING: PopulateAuthCookies failed: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 PT WARNING: RefreshCookie failed: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 PT WARNING: RefreshPTState failed: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 PT WARNING: Sync of Updates: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 PT WARNING: SyncServerUpdatesInternal failed: 0x80072ee2
    2014-06-27 13:50:57:281  548 1260 Agent   * WARNING: Failed to synchronize, error = 0x80072EE2
    2014-06-27 13:50:57:282  548 1260 Agent   * WARNING: Exit code = 0x80072EE2
    2014-06-27 13:50:57:282  548 1260 Agent *********
    2014-06-27 13:50:57:282  548 1260 Agent **  END  **  Agent: Finding updates [CallerId = AutomaticUpdates]
    2014-06-27 13:50:57:282  548 1260 Agent *************
    2014-06-27 13:50:57:282  548 1260 Agent WARNING: WU client failed Searching for update with error 0x80072ee2
    2014-06-27 13:50:57:302  548 e04 AU >>##  RESUMED  ## AU: Search for updates [CallId = {9CE06AB2-E859-4B4D-8D1A-193AD89623C5}]
    2014-06-27 13:50:57:302  548 e04 AU   # WARNING: Search callback failed, result = 0x80072EE2
    2014-06-27 13:50:57:302  548 e04 AU   # WARNING: Failed to find updates with error code 80072EE2
    2014-06-27 13:50:57:302  548 e04 AU #########
    2014-06-27 13:50:57:302  548 e04 AU ##  END  ##  AU: Search for updates [CallId = {9CE06AB2-E859-4B4D-8D1A-193AD89623C5}]
    2014-06-27 13:50:57:302  548 e04 AU #############
    2014-06-27 13:50:57:303  548 e04 AU Successfully wrote event for AU health state:0
    2014-06-27 13:50:57:303  548 e04 AU AU setting next detection timeout to 2014-06-27 22:50:57
    2014-06-27 13:50:57:304  548 e04 AU Setting AU scheduled install time to 2014-06-28 05:00:00
    2014-06-27 13:50:57:304  548 e04 AU Successfully wrote event for AU health state:0
    2014-06-27 13:50:57:305  548 e04 AU Successfully wrote event for AU health state:0
    2014-06-27 13:51:02:285  548 1260 Report REPORT EVENT: {BD25B39C-6570-454C-A046-AF3AF2DEBDD4} 2014-06-27 13:50:57:282-0400 1 148 101 {00000000-0000-0000-0000-000000000000} 0 80072ee2 AutomaticUpdates Failure Software
    Synchronization Windows Update Client failed to detect with error 0x80072ee2.
    2014-06-27 13:51:02:295  548 1260 Report CWERReporter::HandleEvents - WER report upload completed with status 0x8
    2014-06-27 13:51:02:295  548 1260 Report WER Report sent: 7.6.7600.256 0x80072ee2 00000000-0000-0000-0000-000000000000 Scan 101 Managed
    2014-06-27 13:51:02:295  548 1260 Report CWERReporter finishing event handling. (00000000)
    2014-06-27 13:51:48:184  548 4b8 AU ###########  AU: Uninitializing Automatic Updates  ###########
    2014-06-27 13:51:48:187  548 4b8 DnldMgr FATAL: DM:CBitsJob::SetCallbackHandler: SetNotifyInterface failed with 0x80080008.
    2014-06-27 13:51:48:187  548 4b8 DnldMgr FATAL: DM:CBitsJob::SetCallbackHandler: SetNotifyInterface failed with 0x80080008.
    2014-06-27 13:51:48:187  548 4b8 DnldMgr FATAL: DM:CBitsJob::SetCallbackHandler: SetNotifyInterface failed with 0x80080008.
    2014-06-27 13:51:48:187  548 4b8 DnldMgr FATAL: DM:CBitsJob::SetCallbackHandler: SetNotifyInterface failed with 0x80080008.
    2014-06-27 13:51:48:187  548 4b8 Report CWERReporter finishing event handling. (00000000)
    2014-06-27 13:51:48:252  548 4b8 Service *********
    2014-06-27 13:51:48:252  548 4b8 Service **  END  **  Service: Service exit [Exit code = 0x240001]
    2014-06-27 13:51:48:252  548 4b8 Service *************
    2014-06-27 13:51:53:002  548 160c Misc ===========  Logging initialized (build: 7.6.7600.256, tz: -0400)  ===========
    2014-06-27 13:51:53:002  548 160c Misc   = Process: C:\Windows\system32\svchost.exe
    2014-06-27 13:51:53:002  548 160c Misc   = Module: c:\windows\system32\wuaueng.dll
    Ran a batch file which resets the AU and WindowsUpdate registry keys and then runs the steps listed above:
    regedit /s C:\WindowsUpdate.reg
    regedit /s C:\AU.reg
    net stop bits
    net stop wuauserv
    Ipconfig /flushdns
    del C:\ProgramData\Microsoft\Network\Downloader\qmgr*.*
    del  /F /Q C:\Windows\SoftwareDistribution\*.*
    sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)
    net start bits
    net start wuauserv
    wuauclt /resetauthorization /detectnow
    After this runs, am able to connect to WSUS server for updates. I mentioned Group Policy changes because this only breaks after the Group Policy changes. It doesn't affect every client machine but most of them. Was wondering how the proxy gets reset from
    none to the proxy server for Windows Updates?

  • ClamAV fails to scan for viruses in emails [CLAWS MAIL]

    I've recently switched from Thunderbird to Claws Mail and ran into one small, but annoying, problem.
    I want to use ClamAV + the clamav extension for claws mail to scan for viruses, however it does seem to have permission problems.
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Here's my clamd.conf:
    ## Please read the clamd.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Uncomment this option to enable logging.
    # LogFile must be writable for the user running daemon.
    # A full path is required.
    # Default: disabled
    LogFile /var/log/clamav/clamd.log
    # By default the log file is locked for writing - the lock protects against
    # running clamd multiple times (if want to run another clamd, please
    # copy the configuration file, change the LogFile variable, and run
    # the daemon with --config-file option).
    # This option disables log file locking.
    # Default: no
    #LogFileUnlock yes
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    LogTime yes
    # Also log clean files. Useful in debugging but drastically increases the
    # log size.
    # Default: no
    #LogClean yes
    # Use system logger (can work together with LogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Log additional information about the infected file, such as its
    # size and hash, together with the virus name.
    #ExtendedDetectionInfo yes
    # This option allows you to save a process identifier of the listening
    # daemon (main thread).
    # Default: disabled
    PidFile /run/clamav/clamd.pid
    # Optional path to the global temporary directory.
    # Default: system specific (usually /tmp or /var/tmp).
    TemporaryDirectory /tmp
    # Path to the database directory.
    # Default: hardcoded (depends on installation options)
    DatabaseDirectory /var/lib/clamav
    # Only load the official signatures published by the ClamAV project.
    # Default: no
    OfficialDatabaseOnly yes
    # The daemon can work in local mode, network mode or both.
    # Due to security reasons we recommend the local mode.
    # Path to a local socket file the daemon will listen on.
    # Default: disabled (must be specified by a user)
    LocalSocket /var/lib/clamav/clamd.sock
    # Sets the group ownership on the unix socket.
    # Default: disabled (the primary group of the user running clamd)
    LocalSocketGroup clamav
    # Sets the permissions on the unix socket to the specified mode.
    # Default: disabled (socket is world accessible)
    #LocalSocketMode 660
    # Remove stale socket after unclean shutdown.
    # Default: yes
    #FixStaleSocket yes
    # TCP port address.
    # Default: no
    #TCPSocket 3310
    # TCP address.
    # By default we bind to INADDR_ANY, probably not wise.
    # Enable the following to provide some degree of protection
    # from the outside world.
    # Default: no
    #TCPAddr 127.0.0.1
    # Maximum length the queue of pending connections may grow to.
    # Default: 200
    #MaxConnectionQueueLength 30
    # Clamd uses FTP-like protocol to receive data from remote clients.
    # If you are using clamav-milter to balance load between remote clamd daemons
    # on firewall servers you may need to tune the options below.
    # Close the connection when the data size limit is exceeded.
    # The value should match your MTA's limit for a maximum attachment size.
    # Default: 25M
    #StreamMaxLength 10M
    # Limit port range.
    # Default: 1024
    #StreamMinPort 30000
    # Default: 2048
    #StreamMaxPort 32000
    # Maximum number of threads running at the same time.
    # Default: 10
    #MaxThreads 20
    # Waiting for data from a client socket will timeout after this time (seconds).
    # Default: 120
    #ReadTimeout 300
    # This option specifies the time (in seconds) after which clamd should
    # timeout if a client doesn't provide any initial command after connecting.
    # Default: 5
    #CommandReadTimeout 5
    # This option specifies how long to wait (in miliseconds) if the send buffer is full.
    # Keep this value low to prevent clamd hanging
    # Default: 500
    #SendBufTimeout 200
    # Maximum number of queued items (including those being processed by MaxThreads threads)
    # It is recommended to have this value at least twice MaxThreads if possible.
    # WARNING: you shouldn't increase this too much to avoid running out of file descriptors,
    # the following condition should hold:
    # MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual max is 1024)
    # Default: 100
    #MaxQueue 200
    # Waiting for a new job will timeout after this time (seconds).
    # Default: 30
    #IdleTimeout 60
    # Don't scan files and directories matching regex
    # This directive can be used multiple times
    # Default: scan all
    #ExcludePath ^/proc/
    #ExcludePath ^/sys/
    # Maximum depth directories are scanned at.
    # Default: 15
    #MaxDirectoryRecursion 20
    # Follow directory symlinks.
    # Default: no
    #FollowDirectorySymlinks yes
    # Follow regular file symlinks.
    # Default: no
    #FollowFileSymlinks yes
    # Scan files and directories on other filesystems.
    # Default: yes
    #CrossFilesystems yes
    # Perform a database check.
    # Default: 600 (10 min)
    #SelfCheck 600
    # Execute a command when virus is found. In the command string %v will
    # be replaced with the virus name.
    # Default: no
    #VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
    # Run as another user (clamd must be started by root for this option to work)
    # Default: don't drop privileges
    User clamav
    # Initialize supplementary group access (clamd must be started by root).
    # Default: no
    #AllowSupplementaryGroups no
    # Stop daemon when libclamav reports out of memory condition.
    #ExitOnOOM yes
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Do not remove temporary files (for debug purposes).
    # Default: no
    #LeaveTemporaryFiles yes
    # Detect Possibly Unwanted Applications.
    # Default: no
    #DetectPUA yes
    # Exclude a specific PUA category. This directive can be used multiple times.
    # See http://www.clamav.net/support/pua for the complete list of PUA
    # categories.
    # Default: Load all categories (if DetectPUA is activated)
    #ExcludePUA NetTool
    #ExcludePUA PWTool
    # Only include a specific PUA category. This directive can be used multiple
    # times.
    # Default: Load all categories (if DetectPUA is activated)
    #IncludePUA Spy
    #IncludePUA Scanner
    #IncludePUA RAT
    # In some cases (eg. complex malware, exploits in graphic files, and others),
    # ClamAV uses special algorithms to provide accurate detection. This option
    # controls the algorithmic detection.
    # Default: yes
    #AlgorithmicDetection yes
    ## Executable files
    # PE stands for Portable Executable - it's an executable file format used
    # in all 32 and 64-bit versions of Windows operating systems. This option allows
    # ClamAV to perform a deeper analysis of executable files and it's also
    # required for decompression of popular executable packers such as UPX, FSG,
    # and Petite. If you turn off this option, the original files will still be
    # scanned, but without additional processing.
    # Default: yes
    #ScanPE yes
    # Executable and Linking Format is a standard format for UN*X executables.
    # This option allows you to control the scanning of ELF files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanELF yes
    # With this option clamav will try to detect broken executables (both PE and
    # ELF) and mark them as Broken.Executable.
    # Default: no
    #DetectBrokenExecutables yes
    ## Documents
    # This option enables scanning of OLE2 files, such as Microsoft Office
    # documents and .msi files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanOLE2 yes
    # With this option enabled OLE2 files with VBA macros, which were not
    # detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
    # Default: no
    #OLE2BlockMacros no
    # This option enables scanning within PDF files.
    # If you turn off this option, the original files will still be scanned, but
    # without decoding and additional processing.
    # Default: yes
    #ScanPDF yes
    ## Mail files
    # Enable internal e-mail scanner.
    # If you turn off this option, the original files will still be scanned, but
    # without parsing individual messages/attachments.
    # Default: yes
    #ScanMail yes
    # Scan RFC1341 messages split over many emails.
    # You will need to periodically clean up $TemporaryDirectory/clamav-partial directory.
    # WARNING: This option may open your system to a DoS attack.
    # Never use it on loaded servers.
    # Default: no
    #ScanPartialMessages yes
    # With this option enabled ClamAV will try to detect phishing attempts by using
    # signatures.
    # Default: yes
    #PhishingSignatures yes
    # Scan URLs found in mails for phishing attempts using heuristics.
    # Default: yes
    #PhishingScanURLs yes
    # Always block SSL mismatches in URLs, even if the URL isn't in the database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockSSLMismatch no
    # Always block cloaked URLs, even if URL isn't in database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockCloak no
    # Allow heuristic match to take precedence.
    # When enabled, if a heuristic scan (such as phishingScan) detects
    # a possible virus/phish it will stop scan immediately. Recommended, saves CPU
    # scan-time.
    # When disabled, virus/phish detected by heuristic scans will be reported only at
    # the end of a scan. If an archive contains both a heuristically detected
    # virus/phish, and a real malware, the real malware will be reported
    # Keep this disabled if you intend to handle "*.Heuristics.*" viruses
    # differently from "real" malware.
    # If a non-heuristically-detected virus (signature-based) is found first,
    # the scan is interrupted immediately, regardless of this config option.
    # Default: no
    #HeuristicScanPrecedence yes
    ## Data Loss Prevention (DLP)
    # Enable the DLP module
    # Default: No
    #StructuredDataDetection yes
    # This option sets the lowest number of Credit Card numbers found in a file
    # to generate a detect.
    # Default: 3
    #StructuredMinCreditCardCount 5
    # This option sets the lowest number of Social Security Numbers found
    # in a file to generate a detect.
    # Default: 3
    #StructuredMinSSNCount 5
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxx-yy-zzzz
    # Default: yes
    #StructuredSSNFormatNormal yes
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxxyyzzzz
    # Default: no
    #StructuredSSNFormatStripped yes
    ## HTML
    # Perform HTML normalisation and decryption of MS Script Encoder code.
    # Default: yes
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    #ScanHTML yes
    ## Archives
    # ClamAV can scan within archives and compressed files.
    # If you turn off this option, the original files will still be scanned, but
    # without unpacking and additional processing.
    # Default: yes
    #ScanArchive yes
    # Mark encrypted archives as viruses (Encrypted.Zip, Encrypted.RAR).
    # Default: no
    #ArchiveBlockEncrypted no
    ## Limits
    # The options below protect your system against Denial of Service attacks
    # using archive bombs.
    # This option sets the maximum amount of data to be scanned for each input file.
    # Archives and other containers are recursively extracted and scanned up to this
    # value.
    # Value of 0 disables the limit
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 100M
    #MaxScanSize 150M
    # Files larger than this limit won't be scanned. Affects the input file itself
    # as well as files contained inside it (when the input file is an archive, a
    # document or some other kind of container).
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 25M
    #MaxFileSize 30M
    # Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
    # file, all files within it will also be scanned. This options specifies how
    # deeply the process should be continued.
    # Note: setting this limit too high may result in severe damage to the system.
    # Default: 16
    #MaxRecursion 10
    # Number of files to be scanned within an archive, a document, or any other
    # container file.
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 10000
    #MaxFiles 15000
    ## Clamuko settings
    # Enable Clamuko. Dazuko must be configured and running. Clamuko supports
    # both Dazuko (/dev/dazuko) and DazukoFS (/dev/dazukofs.ctrl). DazukoFS
    # is the preferred option. For more information please visit www.dazuko.org
    # Default: no
    #ClamukoScanOnAccess yes
    # The number of scanner threads that will be started (DazukoFS only).
    # Having multiple scanner threads allows Clamuko to serve multiple
    # processes simultaneously. This is particularly beneficial on SMP machines.
    # Default: 3
    #ClamukoScannerCount 3
    # Don't scan files larger than ClamukoMaxFileSize
    # Value of 0 disables the limit.
    # Default: 5M
    #ClamukoMaxFileSize 10M
    # Set access mask for Clamuko (Dazuko only).
    # Default: no
    #ClamukoScanOnOpen yes
    #ClamukoScanOnClose yes
    #ClamukoScanOnExec yes
    # Set the include paths (all files inside them will be scanned). You can have
    # multiple ClamukoIncludePath directives but each directory must be added
    # in a seperate line. (Dazuko only)
    # Default: disabled
    #ClamukoIncludePath /home
    #ClamukoIncludePath /students
    # Set the exclude paths. All subdirectories are also excluded. (Dazuko only)
    # Default: disabled
    #ClamukoExcludePath /home/bofh
    # With this option you can whitelist specific UIDs. Processes with these UIDs
    # will be able to access all files.
    # This option can be used multiple times (one per line).
    # Default: disabled
    #ClamukoExcludeUID 0
    # With this option enabled ClamAV will load bytecode from the database.
    # It is highly recommended you keep this option on, otherwise you'll miss detections for many new viruses.
    # Default: yes
    #Bytecode yes
    # Set bytecode security level.
    # Possible values:
    # None - no security at all, meant for debugging. DO NOT USE THIS ON PRODUCTION SYSTEMS
    # This value is only available if clamav was built with --enable-debug!
    # TrustSigned - trust bytecode loaded from signed .c[lv]d files,
    # insert runtime safety checks for bytecode loaded from other sources
    # Paranoid - don't trust any bytecode, insert runtime checks for all
    # Recommended: TrustSigned, because bytecode in .cvd files already has these checks
    # Note that by default only signed bytecode is loaded, currently you can only
    # load unsigned bytecode in --enable-debug mode.
    # Default: TrustSigned
    #BytecodeSecurity TrustSigned
    # Set bytecode timeout in miliseconds.
    # Default: 5000
    # BytecodeTimeout 1000
    My freshclam.conf:
    ## Please read the freshclam.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Path to the database directory.
    # WARNING: It must match clamd.conf's directive!
    # Default: hardcoded (depends on installation options)
    #DatabaseDirectory /var/lib/clamav
    # Path to the log file (make sure it has proper permissions)
    # Default: disabled
    UpdateLogFile /var/log/clamav/freshclam.log
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes).
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    #LogTime yes
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Use system logger (can work together with UpdateLogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # This option allows you to save the process identifier of the daemon
    # Default: disabled
    #PidFile /var/run/freshclam.pid
    # By default when started freshclam drops privileges and switches to the
    # "clamav" user. This directive allows you to change the database owner.
    # Default: clamav (may depend on installation options)
    #DatabaseOwner clamav
    # Initialize supplementary group access (freshclam must be started by root).
    # Default: no
    #AllowSupplementaryGroups yes
    # Use DNS to verify virus database version. Freshclam uses DNS TXT records
    # to verify database and software versions. With this directive you can change
    # the database verification domain.
    # WARNING: Do not touch it unless you're configuring freshclam to use your
    # own database verification domain.
    # Default: current.cvd.clamav.net
    #DNSDatabaseInfo current.cvd.clamav.net
    # Uncomment the following line and replace XY with your country
    # code. See http://www.iana.org/cctld/cctld-whois.htm for the full list.
    # You can use db.XY.ipv6.clamav.net for IPv6 connections.
    #DatabaseMirror db.XY.clamav.net
    # database.clamav.net is a round-robin record which points to our most
    # reliable mirrors. It's used as a fall back in case db.XY.clamav.net is
    # not working. DO NOT TOUCH the following line unless you know what you
    # are doing.
    DatabaseMirror database.clamav.net
    # How many attempts to make before giving up.
    # Default: 3 (per mirror)
    #MaxAttempts 5
    # With this option you can control scripted updates. It's highly recommended
    # to keep it enabled.
    # Default: yes
    #ScriptedUpdates yes
    # By default freshclam will keep the local databases (.cld) uncompressed to
    # make their handling faster. With this option you can enable the compression;
    # the change will take effect with the next database update.
    # Default: no
    #CompressLocalDatabase no
    # With this option you can provide custom sources (http:// or file://) for
    # database files. This option can be used multiple times.
    # Default: no custom URLs
    #DatabaseCustomURL http://myserver.com/mysigs.ndb
    #DatabaseCustomURL file:///mnt/nfs/local.hdb
    # Number of database checks per day.
    # Default: 12 (every two hours)
    #Checks 24
    # Proxy settings
    # Default: disabled
    #HTTPProxyServer myproxy.com
    #HTTPProxyPort 1234
    #HTTPProxyUsername myusername
    #HTTPProxyPassword mypass
    # If your servers are behind a firewall/proxy which applies User-Agent
    # filtering you can use this option to force the use of a different
    # User-Agent header.
    # Default: clamav/version_number
    #HTTPUserAgent SomeUserAgentIdString
    # Use aaa.bbb.ccc.ddd as client address for downloading databases. Useful for
    # multi-homed systems.
    # Default: Use OS'es default outgoing IP address.
    #LocalIPAddress aaa.bbb.ccc.ddd
    # Send the RELOAD command to clamd.
    # Default: no
    NotifyClamd /etc/clamav/clamd.conf
    # Run command after successful database update.
    # Default: disabled
    #OnUpdateExecute command
    # Run command when database update process fails.
    # Default: disabled
    #OnErrorExecute command
    # Run command when freshclam reports outdated version.
    # In the command string %v will be replaced by the new version number.
    # Default: disabled
    #OnOutdatedExecute command
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Timeout in seconds when connecting to database server.
    # Default: 30
    #ConnectTimeout 60
    # Timeout in seconds when reading from database server.
    # Default: 30
    #ReceiveTimeout 60
    # With this option enabled, freshclam will attempt to load new
    # databases into memory to make sure they are properly handled
    # by libclamav before replacing the old ones.
    # Default: yes
    #TestDatabases yes
    # When enabled freshclam will submit statistics to the ClamAV Project about
    # the latest virus detections in your environment. The ClamAV maintainers
    # will then use this data to determine what types of malware are the most
    # detected in the field and in what geographic area they are.
    # Freshclam will connect to clamd in order to get recent statistics.
    # Default: no
    #SubmitDetectionStats /path/to/clamd.conf
    # Country of origin of malware/detection statistics (for statistical
    # purposes only). The statistics collector at ClamAV.net will look up
    # your IP address to determine the geographical origin of the malware
    # reported by your installation. If this installation is mainly used to
    # scan data which comes from a different location, please enable this
    # option and enter a two-letter code (see http://www.iana.org/domains/root/db/)
    # of the country of origin.
    # Default: disabled
    #DetectionStatsCountry country-code
    # This option enables support for our "Personal Statistics" service.
    # When this option is enabled, the information on malware detected by
    # your clamd installation is made available to you through our website.
    # To get your HostID, log on http://www.stats.clamav.net and add a new
    # host to your host list. Once you have the HostID, uncomment this option
    # and paste the HostID here. As soon as your freshclam starts submitting
    # information to our stats collecting service, you will be able to view
    # the statistics of this clamd installation by logging into
    # http://www.stats.clamav.net with the same credentials you used to
    # generate the HostID. For more information refer to:
    # http://www.clamav.net/support/faq/faq-cctts/
    # This feature requires SubmitDetectionStats to be enabled.
    # Default: disabled
    #DetectionStatsHostID unique-id
    # This option enables support for Google Safe Browsing. When activated for
    # the first time, freshclam will download a new database file (safebrowsing.cvd)
    # which will be automatically loaded by clamd and clamscan during the next
    # reload, provided that the heuristic phishing detection is turned on. This
    # database includes information about websites that may be phishing sites or
    # possible sources of malware. When using this option, it's mandatory to run
    # freshclam at least every 30 minutes.
    # Freshclam uses the ClamAV's mirror infrastructure to distribute the
    # database and its updates but all the contents are provided under Google's
    # terms of use. See http://code.google.com/support/bin/answer.py?answer=70015
    # and http://safebrowsing.clamav.net for more information.
    # Default: disabled
    #SafeBrowsing yes
    # This option enables downloading of bytecode.cvd, which includes additional
    # detection mechanisms and improvements to the ClamAV engine.
    # Default: enabled
    #Bytecode yes
    # Download an additional 3rd party signature database distributed through
    # the ClamAV mirrors. Here you can find a list of available databases:
    # http://www.clamav.net/download/cvd/3rdparty
    # This option can be used multiple times.
    #ExtraDatabase dbname1
    #ExtraDatabase dbname2
    Any help is much appreciated.

    MatejLach wrote:
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Seems like a permissions error to me... maybe check the actual file it is attempting to scan... I know it is in your home folder, but just to be sure, you might want to check that everything is sane.

  • Synchronize folder command no longer works

    I have a folder on my Mac with almost 9000 photos in it, 2000 of which are in sub-folders.  I have been adding and removing files from this folder since LR 3, am currently using LR 5.
    I have always used "synchronize folder" on the root folder to update the contents of the library (I add and remove photos with other apps). Worked flawlessly.
    However, recently, every time I use the command it follows this sequence:
    1.  right-click, synchronize folder
    2. dialog comes up and indicates (for example) 38 added photos.
    3. I click synchronize.
    4.  Four images are added.  The progress bar goes to the end but does not complete.  I have left it for an hour or more to test.
    5. I quit the app, it alerts me the import is still in progress, i say ignore.
    6. re-open app, start over.  now of course it says 34 added photos.  Click Synchronize.
    7. all but 2 of those images import (32)!
    This happens without fail, every time.  What's going on? What can I do?
    This did not start with 5, started in 4.2.

    Handycam wrote:
    What's going on?
    Dunno - sorry.
    Handycam wrote:
    What can I do?
    Not sure the "right" way to remedy - I use Ottomanic Importer to bypass such quirks in Lr's native import/synchronization logic - beware it's one of the trickier plugins to setup/use - sorry.
    Rob

  • Photoshop CC gets stuck on scanning for plugins

    Windows 8.1    i7   256Gb SSHD 
    Photoshop Creative Cloud newly updated
    On clicking photoshop icon task manager show photoshop stuck in Background Process
    doesn't move up to Apps
    if photoshop later starts  after many minutes then
    it gets stuck for minutes on scanning for plugins
    when scanning for plugins task manager shows that it is essentially idle
    whereas LR opens immediately and shows CPU use up over 20%
    PS CC still at zero
    about 10 or 15 minutes later then PS finally wakes up
    What is the problem with photoshop getting stuck on not starting only starting as a background process and then not scaning for plug ins until 5 or 10 minutes later?

    A frequent reason for stalling Photoshop on start up, are bad font files, so I would think the same would be true with a corrupted filter or plugin. 
    CC handles third party plugins differently to older versions, and you can't point to a folder like you could with CS6 etc.  This link might help
    https://support.alienskin.com/hc/en-us/articles/200145325-Using-a-custom-plug-ins-folder-w ith-Photoshop-CC

  • Scan for and connect to networks from an openbox pipe menu (netcfg)

    So the other day when i was using wifi-select (awesome tool) to connect to a friends hot-spot, i realized "hey! this would be great as an openbox pipe menu."  i'm fairly decent in bash and i knew both netcfg and wifi-select were in bash so why not rewrite it that way?
    Wifi-Pipe
    A simplified version of wifi-select which will scan for networks and populate an openbox right-click menu item with available networks.  displays security type and signal strength.  click on a network to connect via netcfg the same way wifi-select does it.
    zenity is used to ask for a password and notify of a bad connection.  one can optionally remove the netcfg profile if the connection fails.
    What's needed
    -- you have to be using netcfg to manage your wireless
    -- you have to install zenity
    -- you have to save the script as ~/.config/openbox/wifi-pipe and make it executable:
    chmod +x ~/.config/openbox/wifi-pipe
    -- you have to add a sudoers entry to allow passwordless sudo on this script and netcfg (!)
    USERNAME ALL=(ALL) NOPASSWD: /usr/bin/netcfg
    USERNAME ALL=(ALL) NOPASSWD: /home/USERNAME/.config/openbox/wifi-pipe
    -- you have to adjust  ~/.config/openbox/menu.xml like so:
    <menu id="root-menu" label="Openbox 3">
    <menu id="pipe-wifi" label="Wifi" execute="sudo /home/USERNAME/.config/openbox/wifi-pipe INTERFACE" />
    <menu id="term-menu"/>
    <item label="Run...">
    <action name="Execute">
    <command>gmrun</command>
    </action>
    </item>
    where USERNAME is you and INTERFACE is probably wlan0 or similar
    openbox --reconfigure and you should be good to go.
    The script
    #!/bin/bash
    # pbrisbin 2009
    # simplified version of wifi-select designed to output as an openbox pipe menu
    # required:
    # netcfg
    # zenity
    # NOPASSWD entries for this and netcfg through visudo
    # the following in menu.xml:
    # <menu id="pipe-wifi" label="Wifi" execute="sudo /path/to/wifi.pipe interface"/>
    # the idea is to run this script once to scan/print, then again immediately to connect.
    # therefore, if you scan but don't connect, a temp file is left in /tmp. the next scan
    # will overwrite it, and the next connect will remove it.
    # source this just to get PROFILE_DIR
    . /usr/lib/network/network
    [ -z "$PROFILE_DIR" ] && PROFILE_DIR='/etc/network.d/'
    # awk code for parsing iwlist output
    # putting it here removes the wifi-select dependency
    # and allows for my own tweaking
    # prints a list "essid=security=quality_as_percentage"
    PARSER='
    BEGIN { FS=":"; OFS="="; }
    /\<Cell/ { if (essid) print essid, security, quality[2]/quality[3]*100; security="none" }
    /\<ESSID:/ { essid=substr($2, 2, length($2) - 2) } # discard quotes
    /\<Quality=/ { split($1, quality, "[=/]") }
    /\<Encryption key:on/ { security="wep" }
    /\<IE:.*WPA.*/ { security="wpa" }
    END { if (essid) print essid, security, quality[2]/quality[3]*100 }
    errorout() {
    echo "<openbox_pipe_menu>"
    echo "<item label=\"$1\" />"
    echo "</openbox_pipe_menu>"
    exit 1
    create_profile() {
    ESSID="$1"; INTERFACE="$2"; SECURITY="$3"; KEY="$4"
    PROFILE_FILE="$PROFILE_DIR$ESSID"
    cat > "$PROFILE_FILE" << END_OF_PROFILE
    CONNECTION="wireless"
    ESSID="$ESSID"
    INTERFACE="$INTERFACE"
    DESCRIPTION="Automatically generated profile"
    SCAN="yes"
    IP="dhcp"
    TIMEOUT="10"
    SECURITY="$SECURITY"
    END_OF_PROFILE
    # i think wifi-select should adopt these perms too...
    if [ -n "$KEY" ]; then
    echo "KEY=\"$KEY\"" >> "$PROFILE_FILE"
    chmod 600 "$PROFILE_FILE"
    else
    chmod 644 "$PROFILE_FILE"
    fi
    print_menu() {
    # scan for networks
    iwlist $INTERFACE scan 2>/dev/null | awk "$PARSER" | sort -t= -nrk3 > /tmp/networks.tmp
    # exit if none found
    if [ ! -s /tmp/networks.tmp ]; then
    rm /tmp/networks.tmp
    errorout "no networks found."
    fi
    # otherwise print the menu
    local IFS='='
    echo "<openbox_pipe_menu>"
    while read ESSID SECURITY QUALITY; do
    echo "<item label=\"$ESSID ($SECURITY) ${QUALITY/.*/}%\">" # trim decimals
    echo " <action name=\"Execute\">"
    echo " <command>sudo $0 $INTERFACE connect \"$ESSID\"</command>"
    echo " </action>"
    echo "</item>"
    done < /tmp/networks.tmp
    echo "</openbox_pipe_menu>"
    connect() {
    # check for an existing profile
    PROFILE_FILE="$(grep -REl "ESSID=[\"']?$ESSID[\"']?" "$PROFILE_DIR" | grep -v '~$' | head -n1)"
    # if found use it, else create a new profile
    if [ -n "$PROFILE_FILE" ]; then
    PROFILE=$(basename "$PROFILE_FILE")
    else
    PROFILE="$ESSID"
    SECURITY="$(awk -F '=' "/$ESSID/"'{print $2}' /tmp/networks.tmp | head -n1)"
    # ask for the security key if needed
    if [ "$SECURITY" != "none" ]; then
    KEY="$(zenity --entry --title="Authentication" --text="Please enter $SECURITY key for $ESSID" --hide-text)"
    fi
    # create the new profile
    create_profile "$ESSID" "$INTERFACE" "$SECURITY" "$KEY"
    fi
    # connect
    netcfg2 "$PROFILE" >/tmp/output.tmp
    # if failed, ask about removal of created profile
    if [ $? -ne 0 ]; then
    zenity --question \
    --title="Connection failed" \
    --text="$(grep -Eo "[\-\>]\ .*$" /tmp/output.tmp) \n Remove $PROFILE_FILE?" \
    --ok-label="Remove profile"
    [ $? -eq 0 ] && rm $PROFILE_FILE
    fi
    rm /tmp/output.tmp
    rm /tmp/networks.tmp
    [ $(id -u) -ne 0 ] && errorout "root access required."
    [ -z "$1" ] && errorout "usage: $0 [interface]"
    INTERFACE="$1"; shift
    # i added a sleep if we need to explicitly bring it up
    # b/c youll get "no networks found" when you scan right away
    # this only happens if we aren't up already
    if ! ifconfig | grep -q $INTERFACE; then
    ifconfig $INTERFACE up &>/dev/null || errorout "$INTERFACE not up"
    while ! ifconfig | grep -q $INTERFACE; do sleep 1; done
    fi
    if [ "$1" = "connect" ]; then
    ESSID="$2"
    connect
    else
    print_menu
    fi
    Screenshots
    removed -- Hi-res shots available on my site
    NOTE - i have not tested this extensively but it was working for me in most cases.  any updates/fixes will be edited right into this original post.  enjoy!
    UPDATE - 10/24/2009: i moved the awk statement from wifi-select directly into the script.  this did two things: wifi-select is no longer needed on the system, and i could tweak the awk statement to be more accurate.  it now prints a true percentange.  iwlist prints something like Quality=17/70 and the original awk statement would just output 17 as the quality.  i changed to print (17/70)*100 then bash trims the decimals so you get a true percentage.
    Last edited by brisbin33 (2010-05-09 01:28:20)

    froli wrote:
    I think the script's not working ... When I type
    sh wifi-pipe
    in a term it returns nothing
    well, just to be sure you're doing it right...
    he above is only an adjustment to the OB script's print_menu() function, it's not an entire script to itself.  so, if the original OB script shows output for you with
    sh ./wifi-pipe
    then using the above pint_menu() function (with all the other supporting code) should also show output, (only really only changes the echo's so they print the info in the pekwm format).
    oh, and if neither version shows output when you rut it in a term, then you've got other issues... ;P
    here's an entire [untested] pekwm script:
    #!/bin/bash
    # pbrisbin 2009
    # simplified version of wifi-select designed to output as an pekwm pipe menu
    # required:
    # netcfg
    # zenity
    # NOPASSWD entries for this and netcfg through visudo
    # the following in pekwm config file:
    # SubMenu = "WiFi" {
    # Entry = { Actions = "Dynamic /path/to/wifi-pipe" }
    # the idea is to run this script once to scan/print, then again immediately to connect.
    # therefore, if you scan but don't connect, a temp file is left in /tmp. the next scan
    # will overwrite it, and the next connect will remove it.
    # source this to get PROFILE_DIR and SUBR_DIR
    . /usr/lib/network/network
    errorout() {
    echo "Dynamic {"
    echo " Entry = \"$1\""
    echo "}"
    exit 1
    create_profile() {
    ESSID="$1"; INTERFACE="$2"; SECURITY="$3"; KEY="$4"
    PROFILE_FILE="$PROFILE_DIR$ESSID"
    cat > "$PROFILE_FILE" << END_OF_PROFILE
    CONNECTION="wireless"
    ESSID="$ESSID"
    INTERFACE="$INTERFACE"
    DESCRIPTION="Automatically generated profile"
    SCAN="yes"
    IP="dhcp"
    TIMEOUT="10"
    SECURITY="$SECURITY"
    END_OF_PROFILE
    # i think wifi-select should adopt these perms too...
    if [ -n "$KEY" ]; then
    echo "KEY=\"$KEY\"" >> "$PROFILE_FILE"
    chmod 600 "$PROFILE_FILE"
    else
    chmod 644 "$PROFILE_FILE"
    fi
    print_menu() {
    # scan for networks
    iwlist $INTERFACE scan 2>/dev/null | awk -f $SUBR_DIR/parse-iwlist.awk | sort -t= -nrk3 > /tmp/networks.tmp
    # exit if none found
    if [ ! -s /tmp/networks.tmp ]; then
    rm /tmp/networks.tmp
    errorout "no networks found."
    fi
    # otherwise print the menu
    echo "Dynamic {"
    IFS='='
    cat /tmp/networks.tmp | while read ESSID SECURITY QUALITY; do
    echo "Entry = \"$ESSID ($SECURITY) $QUALITY%\" {"
    echo " Actions = \"Exec sudo $0 $INTERFACE connect \\\"$ESSID\\\"\"</command>"
    echo "}"
    done
    unset IFS
    echo "}"
    connect() {
    # check for an existing profile
    PROFILE_FILE="$(grep -REl "ESSID=[\"']?$ESSID[\"']?" "$PROFILE_DIR" | grep -v '~$' | head -n1)"
    # if found use it, else create a new profile
    if [ -n "$PROFILE_FILE" ]; then
    PROFILE=$(basename "$PROFILE_FILE")
    else
    PROFILE="$ESSID"
    SECURITY="$(awk -F '=' "/$ESSID/"'{print $2}' /tmp/networks.tmp | head -n1)"
    # ask for the security key if needed
    if [ "$SECURITY" != "none" ]; then
    KEY="$(zenity --entry --title="Authentication" --text="Please enter $SECURITY key for $ESSID" --hide-text)"
    fi
    # create the new profile
    create_profile "$ESSID" "$INTERFACE" "$SECURITY" "$KEY"
    fi
    # connect
    netcfg2 "$PROFILE" >/tmp/output.tmp
    # if failed, ask about removal of created profile
    if [ $? -ne 0 ]; then
    zenity --question \
    --title="Connection failed" \
    --text="$(grep -Eo "[\-\>]\ .*$" /tmp/output.tmp) \n Remove $PROFILE_FILE?" \
    --ok-label="Remove profile"
    [ $? -eq 0 ] && rm $PROFILE_FILE
    fi
    rm /tmp/output.tmp
    rm /tmp/networks.tmp
    [ $(id -u) -ne 0 ] && errorout "root access required."
    [ -z "$1" ] && errorout "usage: $0 [interface]"
    INTERFACE="$1"; shift
    # i added a sleep if we need to explicitly bring it up
    # b/c youll get "no networks found" when you scan right away
    # this only happens if we aren't up already
    if ! ifconfig | grep -q $INTERFACE; then
    ifconfig $INTERFACE up &>/dev/null || errorout "$INTERFACE not up"
    sleep 3
    fi
    if [ "$1" = "connect" ]; then
    ESSID="$2"
    connect
    else
    print_menu
    fi
    exit 0

Maybe you are looking for

  • How can i delete duplicates from my itunes account?

    At "View" I chose "Show duplicates." Now what do I do to delete duplicates quickly without having to delete each one separately? THanks

  • Custom Web Template fails, List does not exist

    Can somebody help me with this? After I patched the SharePoint 2013 SP 1 to the April 2014 CU I've been getting this error. When I apply a custom template I keep getting the error: "Exception calling ApplyWebTemplate with 1 argument: List does not ex

  • Music stops playing when plugging in dock connector.

    With the new iPhone os I noticed that when plugging in a dock connector thats connected to the computer and playing music it stops the music and the volume bar disappears?? Anyone else notice this.

  • HP d5560 Wireless Issue - No IP Address (Mac OS 10.9)

    Hi there, I recently moved house. In my previous house I had my printer set-up and working wirelessly. I've moved and now have a new Wireless hub and I can not get my printer to connect with my Virgin Media Super Hub. I have tried doing the one-touch

  • Report size

    I had a group of 25 tables (one master and 20 childs). I want to make a compact report. the page size may be 81/2X12 when i select page size then i can't get more then 5 tables in a report. vinod