System.security.allowDomain in macs

has anyone ever come across this? is this a known bug? etc?
this line:
System.security.allowDomain("spoofdomain.mycompany.com");
makes the swf work on a pc but not on a mac.
anyone?

waynecto wrote:
> I'm using flash 7. My application is a weather bug on a
portal page. I'm
> getting the feed from yahoo and compile the application
using
> System.security.allowDomain("
http://xml.weather.yahoo.com/");
and it is working
> fine when I'm testing from my local machine.
Well, that has to work both ways. On your site and On the
giving data server side.
It needs XML file on the root of the directory allowing you
to take the data.
Otherwise we could cross domain people traffic w/o their
consent.
So, I don't expect yahoo to drop such xml just for you and
because that's the case,
you will need to work around it using proxy on your domain.
When you request the file from your domain, your domain
requests it from yahoo and
hands it off as if it was yours. That's the only way around
it.
Best Regards
Urami
!!!!!!! Merry Christmas !!!!!!!
Happy New Year
<urami>
If you want to mail me - DO NOT LAUGH AT MY ADDRESS
</urami>

Similar Messages

  • System.security() && _global.variables

    Hi,
    I'm using a container .swf, loaded over HTTP to bring in some
    forms over HTTPS.
    I have tried using System.security.allowDomain(); and
    System.security.allowInsecureDomain();
    in the container and form respectively to no avail.
    Does anybody have experience of achieving synchronous global
    variable access across
    these protocols?

    fixed it myself!
    What happened is this: after half a year, a second programmer started working on this project. He pulled the project from subversion, including the pfx, which was in the app-data directory, somehow, he has replaced it with a different pfx file, with a different
    private key and committed this to subversion and thats how this different pfx found its way to my solution and caused thisi error.

  • Internet Security Suite on Mac

    I insalled the Internet security suite for Mac and am running OS X 10.5.8.  VISS popped up with a mesage that there was a virus found on my system and 'no action was taken'.  I scanned my system and checked the disinfect/delete infected files but when it found the infected file, it said no action taken again  When the scan was complete, the scan status said n viruses were found, but two were listed in the log and the 'action' taken was 'Reported' even though I selected all infected files to be disinfected/deleted.  I had to manually find the files and delete them from my system to rid the infected files.

    This is what it found in today's  (11/27) scan- 6  .pdf files:
    Viruses detected: Exploit.PDF-JS.Gen
    Action taken: None, file was left in its original location.
    Earlier in the week, it found 2 other files with the same virus- one in my Toast 9 Titanium folder and one in my Toast 10 Titanium folder for a cd/dvd label background (.pdf files).
    The original viruses it found were Joke.Rabbit in 2 files on 11/8/09, Spyware.945 and Backdoor.Generic.148842 on 11/7/09. 
    In all cases Internet Security Suite is set to Repair/Delete, but it reports back 'Action taken: None, file was left in its original location.' and I have to manually delete the files.

  • How do I run a system security scan on an iPad or iMac?

    How do I run a system security scan for things like malware that i could have got from Facebook on an iPad or iMac?

    iPads and Macs are very different.
    For Macs there are many security suites and virus scanners out there you can use.  A Google search should point some out.
    iPads at this time cannot get infected by malware or viruses. There is just nothing out there currently that can infect them.  As such there is no way to scan them for anything and its not really necessary.

  • What is the best security software for mac?

    I had Norton years ago but found it slowed things down unacceptably at the time and so have never revisited it since. However, as internet infection becomes more prevalent on Macs I am considering some kind of protection.
    1. What is the general feeling for the most optimal security software for Mac kit?
    2. Are there any side effects that one should be aware of which might affect the Mac or software operations?
    Thanks and regards

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I cannot perform security update with Mac OS X v10.411

    I cannot perform security update with Mac OS X v10.411.  My Mac Book Pro is super behind concerning updates and security.

    Yes, I too have that problem.  And, I have actually been hacked into, had all of my files, folders, photos, applications, sys pref, (in-other-words) EVERYTHING copied and recopied.   It has been a nightmare.  My identity was completely stolen.  What makes it worse is that when I told apple ~ I was told by 1 Apple Supervising Technician that I was out of my mind and that it wasn't possible.  He was very dismissive and treated me if I were some kind of idiot.  Well, check out below.  This is since Saturday or Sunday last.  I didn't authorize this and I sure as **** don' know who any of these people are. 
    I installed the 10.5 disk.  And I too, like many Macbook Pro users had the "Black Screen" bug.  So I had to go back to 10.4.  I went back and this is what I inherited.   I now rarely have control over the computer, never my printer and I my security has been and is constantly being compromised.  I believe that Apple needs to own up to this and, perhaps, do something about it?  Am I asking too much?
    Last login: Wed Sep 14 20:28:35 on console
    Welcome to Darwin!
    localhost:~ cat$ who
    cat      console  Sep 14 20:28
    cat      ttyp1    Sep 14 20:28
    localhost:~ cat$ whois
    usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
    localhost:~ cat$ finger
    Login    Name                 TTY  Idle  Login  Time   Office  Phone
    cat      catherine ronalds   *con    56  Wed    20:28
    cat      catherine ronalds    p1         Wed    20:28
    localhost:~ cat$ whois *con
    Whois Server Version 2.0
    Domain names in the .com and .net domains can now be registered
    with many different competing registrars. Go to http://www.internic.net
    for detailed information.
       Server Name: CON.ZZBB.COM
       IP Address: 203.231.42.121
       Registrar: INAMES CO., LTD.
       Whois Server: whois.inames.co.kr
       Referral URL: http://www.inames.co.kr
       Server Name: CON.VENUS.ORDERBOX-DNS.COM
       IP Address: 74.54.56.236
       IP Address: 74.54.56.227
       IP Address: 74.54.56.231
       Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
       Whois Server: whois.PublicDomainRegistry.com
       Referral URL: http://www.PublicDomainRegistry.com
       Server Name: CON.TOM.RU
       Registrar: REGIONAL NETWORK INFORMATION CENTER, JSC DBA RU-CENTER
       Whois Server: whois.nic.ru
       Referral URL: http://www.nic.ru
       Server Name: CON.MERCURY.ORDERBOX-DNS.COM
       IP Address: 67.15.253.251
       IP Address: 67.15.47.189
       IP Address: 67.15.253.220
       Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
       Whois Server: whois.PublicDomainRegistry.com
       Referral URL: http://www.PublicDomainRegistry.com
       Server Name: CON.MARS.ORDERBOX-DNS.COM
       IP Address: 74.52.140.84
       IP Address: 74.52.140.82
       IP Address: 74.52.140.83
       Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
       Whois Server: whois.PublicDomainRegistry.com
       Referral URL: http://www.PublicDomainRegistry.com
       Server Name: CON.MAIYEUBE.NET
       IP Address: 207.218.250.214
       Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE
       Whois Server: whois.melbourneit.com
       Referral URL: http://www.melbourneit.com
       Server Name: CON.MAFIAWORLDCONFLICT.COM
       IP Address: 96.125.168.211
       Registrar: DOMAIN.COM, LLC
       Whois Server: whois.domain.com
       Referral URL: http://www.domain.com
       Server Name: CON.KONKAK.COM
       IP Address: 67.214.175.71
       Registrar: TUCOWS.COM CO.
       Whois Server: whois.tucows.com
       Referral URL: http://domainhelp.opensrs.net
       Server Name: CON.KANGX.COM
       IP Address: 210.118.234.6
       Registrar: YESNIC CO. LTD.
       Whois Server: whois.yesnic.com
       Referral URL: http://www.yesnic.com
       Server Name: CON.JCSMEDIA.COM
       IP Address: 216.199.69.35
       Registrar: WILD WEST DOMAINS, INC.
       Whois Server: whois.wildwestdomains.com
       Referral URL: http://www.wildwestdomains.com
       Server Name: CON.HNIP.CO.KR
       Registrar: INAMES CO., LTD.
       Whois Server: whois.inames.co.kr
       Referral URL: http://www.inames.co.kr
       Server Name: CON.ETVILLE.COM
       IP Address: 112.220.108.114
       Registrar: ASADAL, INC.
       Whois Server: whois.asadal.com
       Referral URL: http://www.asadal.com
       Server Name: CON.EARTH.ORDERBOX-DNS.COM
       IP Address: 67.15.253.252
       IP Address: 67.15.47.188
       IP Address: 67.15.253.219
       Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
       Whois Server: whois.PublicDomainRegistry.com
       Referral URL: http://www.PublicDomainRegistry.com
       Server Name: CON.DIABLOIII.PRO
       Registrar: OVH
       Whois Server: whois.ovh.com
       Referral URL: http://www.ovh.com
       Server Name: CON.DELDC.COM
       IP Address: 210.91.181.71
       Registrar: YESNIC CO. LTD.
       Whois Server: whois.yesnic.com
       Referral URL: http://www.yesnic.com
       Server Name: CON.CONFESIONESDESOFIA.COM
       IP Address: 174.121.246.152
       Registrar: MYDOMAIN, INC.
       Whois Server: whois.namesdirect.com
       Referral URL: http://www.namesdirect.com
       Server Name: CON.CAUTO.COM
       IP Address: 12.31.226.135
       Registrar: NETWORK SOLUTIONS, LLC.
       Whois Server: whois.networksolutions.com
       Referral URL: http://www.networksolutions.com
       Server Name: CON.BLAZINGREALMS.COM
       IP Address: 68.67.78.230
       Registrar: OVH
       Whois Server: whois.ovh.com
       Referral URL: http://www.ovh.com
       Server Name: CON.BELLSFERRY.COM
       IP Address: 216.199.69.35
       Registrar: WILD WEST DOMAINS, INC.
       Whois Server: whois.wildwestdomains.com
       Referral URL: http://www.wildwestdomains.com
       Domain Name: CON.NET
       Registrar: UNIVERSAL REGISTRATION SERVICES INC. DBA NEWDENTITY.COM
       Whois Server: whois.newdentity.com
       Referral URL: http://www.newdentity.com
       Name Server: NS1.SEDOPARKING.COM
       Name Server: NS2.SEDOPARKING.COM
       Status: clientDeleteProhibited
       Status: clientTransferProhibited
       Status: clientUpdateProhibited
       Updated Date: 04-may-2011
       Creation Date: 03-may-2003
       Expiration Date: 03-may-2012
       Domain Name: CON.COM
       Registrar: TUCOWS.COM CO.
       Whois Server: whois.tucows.com
       Referral URL: http://domainhelp.opensrs.net
       Name Server: NS1.CON.COM
       Name Server: NS2.CON.COM
       Status: clientTransferProhibited
       Status: clientUpdateProhibited
       Updated Date: 05-nov-2010
       Creation Date: 05-dec-1993
       Expiration Date: 04-dec-2011
    >>> Last update of whois database: Thu, 15 Sep 2011 04:25:10 UTC <<<
    NOTICE: The expiration date displayed in this record is the date the
    registrar's sponsorship of the domain name registration in the registry is
    currently set to expire. This date does not necessarily reflect the expiration
    date of the domain name registrant's agreement with the sponsoring
    registrar.  Users may consult the sponsoring registrar's Whois database to
    view the registrar's reported date of expiration for this registration.
    TERMS OF USE: You are not authorized to access or query our Whois
    database through the use of electronic processes that are high-volume and
    automated except as reasonably necessary to register domain names or
    modify existing registrations; the Data in VeriSign Global Registry
    Services' ("VeriSign") Whois database is provided by VeriSign for
    information purposes only, and to assist persons in obtaining information
    about or related to a domain name registration record. VeriSign does not
    guarantee its accuracy. By submitting a Whois query, you agree to abide
    by the following terms of use: You agree that you may use this Data only
    for lawful purposes and that under no circumstances will you use this Data
    to: (1) allow, enable, or otherwise support the transmission of mass
    unsolicited, commercial advertising or solicitations via e-mail, telephone,
    or facsimile; or (2) enable high volume, automated, electronic processes
    that apply to VeriSign (or its computer systems). The compilation,
    repackaging, dissemination or other use of this Data is expressly
    prohibited without the prior written consent of VeriSign. You agree not to
    use electronic processes that are automated and high-volume to access or
    query the Whois database except as reasonably necessary to register
    domain names or modify existing registrations. VeriSign reserves the right
    to restrict your access to the Whois database in its sole discretion to ensure
    operational stability.  VeriSign may restrict or terminate your access to the
    Whois database for failure to abide by these terms of use. VeriSign
    reserves the right to modify these terms at any time.
    The Registry database contains ONLY .COM, .NET, .EDU domains and
    Registrars.
    No match "*con."
    localhost:~ cat$

  • Problems with Scrollbar and Security.allowDomain("*")

    When I use Security.allowDomain) the scrollbar stops work when my app is used in swfloader.
    If I remove Security.allowDomain() will my app not work in FireFox.
    I'm using Weborb .net.

    The app that using my app is on an other server. On both sides we have  crossdomain.xml:
    <?xml version="1.0"?>
    <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
    <cross-domain-policy>
        <allow-access-to domain="*"/>
        <allow-access-from domain="*" secure="false"/>
    </cross-domain-policy

  • Can I use my creative cloud products on more them one system at a time (Mac and PC)

    Can I use my creative cloud products on more them one system at a time (Mac and PC)
    I want to use the premiere on my Mac and some times on my PC.
    Can  I use it on other operating systems with one membership or do I have to purchase an other membership for my other system.   I am only working on one system or the other at one time.
    Thx

    http://www.adobe.com/au/products/creativecloud/faq.html
    Are there any unique benefits that come with my paid membership?
    Yes, as a member of Creative Cloud, you get many benefits that you do not get when you purchase a traditional shrinkwrapped product:
    Access to both the Mac OS and Windows® versions of the desktop applications and the ability to install them on your primary computer and one backup computer. So, if you have a Mac at home and a PC at work, you can install your applications on both as long as they are not running at the same time. See the product license agreements page for more information.

  • HT204053 i dont have the icloud icon in my system preference on my mac. what do i do?

    i am trying to find my pics and photo stream on my icloud on my mac and there is no icon for pictures, i have all of iphones and ipads backed up to the cloud but there isn't a picture icon showing they have been uploaded. I go into system preferences on my mac and there is NO icloud icon. what do i do???

    Your signature says you have 10.4.6 (Tiger) - is this correct? (If it isn't please keep your signature up to date to prevent confusion). The minimum requirement for iCloud is Lion 10.7.5 (Mavericks preferred): the iCloud Preference Pane does not appear on earlier systems - the MobileMe pane appears on Lion and earlier but is now non-functional - you cannot now open or access a MobileMe account.
    To make use of iCloud you will have to upgrade your Mac to Lion or Mavericks, provided it meets the requirements - if you are indeed running Tiger it's possible that you may not be able to.
    If you are rusing an Intel Mac you will have to upgrade to Snow Leopard first to be able to access the Mac App Store - it's available in the online Apple Store. However if you have a PPC Mac you cannot run Snow Leopard and cannot proceed further.
    The requirements for Lion are:
    Mac computer with an Intel Core 2 Duo, Core i3, Core i5, Core i7, or Xeon processor
    2GB of memory
    OS X v10.6.6 or later (v10.6.8 recommended)
    7GB of available space
    Lion is available in the Online Apple Store ($19.99). Mountain Lion (10.8.x) is also available there at the same price (though it's reported to have been removed from sale in some countries so may well cease to be available generally) but there seems little point as the system requirements are the same for Mavericks (10.9.x) - which is free - unless you need to run specific software which will run on Mountain Lion only.
    The requirements for Mountain Lion and Mavericks are:
    OS X v10.6.8 or later
    2GB of memory
    8GB of available space
      and the supported models are:
    iMac (Mid 2007 or newer)
    MacBook (Late 2008 Aluminum, or Early 2009 or newer)
    MacBook Pro (Mid/Late 2007 or newer)
    Xserve (Early 2009)
    MacBook Air (Late 2008 or newer)
    Mac mini (Early 2009 or newer)
    Mac Pro (Early 2008 or newer)
    It is available from the Mac App Store (in Applications).
      You should be aware that PPC programs (such as AppleWorks) will not run on Lion or above; and some other applications may not be compatible - there is a useful compatibility checklist at http://roaringapps.com/apps:table , and that no system later than Tiger will run the Classic Environment.

  • Can't access safe mode to delete System Security fake anti virus virus. HELP.

    Hi, our SL500 has become infected with "System Security" fake anti virus software. We have tracked down how to remove it.
    http://www.geekstogo.com/forum/system-security-malware-t222291.html
    However when we get to the "reboot your computer in safe mode" (see instructions below) we can't as this is not possible.
    We have tried F8...........Repeatedly . And also  Run->msconfig->BOOT.INI->/SAFEBOOT . But to no avail . Actually we get a pop up stating that Windows  can not find said command and have we typed it in correctly . Please could some one help us as this is driving us insane . One last thing . A computer WITHOUT a "safe mode " option, isn't that kinda of unsafe and a tad.....
    Thanks in advance.  
    Instructions for malware removal. 
    You will need to print out a copy of these instructions, or save them to NotePad and put a shortcut to the file on the desktop so that you can refer to while you complete this procedure as you will be required to boot into Safe Mode where you wont have internet access.
    Please download ATF Cleaner by Atribune.
    Caution: This program is for Windows 2000, XP and Vista only
    Double-click ATF-Cleaner.exe to run the program.
    Under Main choose: Select All
    Click the Empty Selected button.
    If you use Firefox browser
    Click Firefox at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    If you use Opera browser
    Click Opera at the top and choose: Select All
    Click the Empty Selected button.
    NOTE: If you would like to keep your saved passwords, please click No at the prompt.
    Click Exit on the Main menu to close the program.
    Run MBAM again, only this time perform a full scan and post the log.
    Please click here to download AVP Tool by Kaspersky.
    Save it to your desktop.
    Reboot your computer into SafeMode.
    You can do this by restarting your computer and continually tapping the F8 key until a menu appears.
    Use your up arrow key to highlight SafeMode then hit enter.
    Double click the setup file to run it.
    Click Next to continue.
    It will by default install it to your desktop folder.Click Next.
    Hit ok at the prompt for scanning in Safe Mode.
    It will then open a box There will be a tab that says Automatic scan.
    Under Automatic scan make sure these are checked.
    System Memory
    Startup Objects
    Disk Boot Sectors.
    My Computer.
    Also any other drives (Removable that you may have)
    After that click on Security level then choose Customize then click on the tab that says Heuristic Analyzer then choose Enable Deep rootkit search then choose ok.
    Then choose OK again then you are back to the main screen.
    Then click on Scan at the to right hand Corner.
    It will automatically Neutralize any objects found.
    If some objects are left un-neutralized then click the button that says Neutralize all
    If it says it cannot be Neutralized then chooose The delete option when prompted.
    After that is done click on the reports button at the bottom and save it to file name it Kas.
    Save it somewhere convenient like your desktop and just post only the detected Virus\malware in the report it will be at the very top under Detected post those results in your next reply.
    Note: This tool will self uninstall when you close it so please save the log before closing it.
    In your next reply I would like to see:
    C:\RSIT\info.txt
    MBAM log
    Kaspersky AVP scan results
    Also let me know how the computer is behaving. 
    This post has been edited by Octagonal: Dec 27 2008, 08:08 AM 

    Thanks for trying to help. Sadly, I followed the instructions and it rebooted to the blue screen again.
    It's going to have to go to Apple for repairs now. I'm out of options.
    I am wondering how much easier it would have been if I'd created a time machine restore point. I got what I deserved for failing to do that, but I'm doubtful even that would have worked in this case. It does seem to be because of that piece of widely reported malware that didn't want to leave without causing damage.
    The most frustrating aspect is the safe boot. I get to the desktop but without any menu, finder or dock. It seems to be similar to the problem below...
    http://www.macsmarts.com/?p=109
    But that's for Tiger. I tried that to no effect.
    Like I said, it's going to have to go to Apple now because I've done so many things I don't know if I'm just digging myself a deeper hole.
    Thanks again for offering help.

  • Calling web service from SQL 2008 error: System.Security.HostProtectionException: Attempted to perform an operation that was forbidden by the CLR host.

    Hi, 
    Im trying to use web service in c# sql database project. when running stored procedure, in which the web service should be called, im getting this error:
    System.TypeInitializationException: The type initializer for 'System.ServiceModel.ClientBase`1' threw an exception. ---> System.Security.HostProtectionException: Attempted to perform an operation that was forbidden by the CLR host.
    at System.ServiceModel.DiagnosticUtility.GetUtility()
    at System.ServiceModel.DiagnosticUtility.get_Utility()
    at System.ServiceModel.ClientBase`1..cctor()
    The protected resources (only available with full trust) were:
    All
    The demanded resources were:
    Synchronization, ExternalThreading
    --- End of inner exception stack trace ---
    at System.ServiceModel.ClientBase`1.InitializeChannelFactoryRef()
    at System.ServiceModel.ClientBase`1..ctor()
    at UMGClient..ctor()
    at UMG_StoredProcedures.spUMG_ProcessEmail(SqlInt64 cid_request)
    Here is the code:
    using System;
    using System.Data;
    using System.Data.SqlClient;
    using System.Data.SqlTypes;
    using Microsoft.SqlServer.Server;
    using CredexDB.Workflow;
    using System.Collections.Generic;
    using CredexDB.umgwcftest;
    public partial class UMG_StoredProcedures
    /// <summary>
    /// </summary>
    /// <param name="bankDate"></param>
    /// <param name="stateCategory"></param>
    [Microsoft.SqlServer.Server.SqlProcedure]
    public static void spUMG_ProcessEmail( SqlInt64 cid_request )
    SqlConnection conn = new SqlConnection("Context Connection=true;");
    conn.Open();
    try
    SqlContext.Pipe.Send("A");
    UMGClient umgcl = new UMGClient();
    SqlContext.Pipe.Send("B");
    UMGwcf.SoapExchangeMailMessage email = new UMGwcf.SoapExchangeMailMessage();
    string[] names = new string[1];
    names[0] = "[email protected]";
    email.To = names;
    email.Subject = "Test UmgWcf";
    email.MessageBody = "Testovacia správa - ľľššččťťťýéáí";
    email.From = "[email protected]";
    email.Priority = 20;
    email.Sender = 1;
    email.DoNotArchive = false;
    email.EncryptAndSign = false;
    //long ret = umgcl.SendMailMessage(email);
    catch (Exception e)
    SqlContext.Pipe.Send("C");
    SqlContext.Pipe.Send(e.ToString());
    finally
    SqlContext.Pipe.Send("D");
    conn.Close();
    private static void execSql(string sql, SqlConnection conn)
    new SqlCommand(sql, conn).ExecuteNonQuery();
    The error occurs at this row:
    UMGClient umgcl = new UMGClient();
    Here is the UMG class:
    [System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
    [System.ServiceModel.ServiceContractAttribute(Namespace="vub.sk/UMGwcf", ConfigurationName="IUMG")]
    public interface IUMG
    [System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/SendMailMessage", ReplyAction="vub.sk/UMGwcf/IUMG/SendMailMessageResponse")]
    long SendMailMessage(UMGwcf.SoapExchangeMailMessage message);
    [System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/ResendEmailMessage", ReplyAction="vub.sk/UMGwcf/IUMG/ResendEmailMessageResponse")]
    long ResendEmailMessage(long emailid);
    [System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/GetEmailById", ReplyAction="vub.sk/UMGwcf/IUMG/GetEmailByIdResponse")]
    UMGwcf.SoapDeliveredMailMessage GetEmailById(long emailid);
    [System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/SendSMSMessage", ReplyAction="vub.sk/UMGwcf/IUMG/SendSMSMessageResponse")]
    long SendSMSMessage(UMGwcf.SoapSMSMessage smsmessage);
    [System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/GetSMSById", ReplyAction="vub.sk/UMGwcf/IUMG/GetSMSByIdResponse")]
    UMGwcf.SoapDeliveredSMSMessage GetSMSById(long smsid);
    [System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
    public interface IUMGChannel : IUMG, System.ServiceModel.IClientChannel
    [System.Diagnostics.DebuggerStepThroughAttribute()]
    [System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
    public partial class UMGClient : System.ServiceModel.ClientBase<IUMG>, IUMG
    public UMGClient()
    public UMGClient(string endpointConfigurationName) :
    base(endpointConfigurationName)
    public UMGClient(string endpointConfigurationName, string remoteAddress) :
    base(endpointConfigurationName, remoteAddress)
    public UMGClient(string endpointConfigurationName, System.ServiceModel.EndpointAddress remoteAddress) :
    base(endpointConfigurationName, remoteAddress)
    public UMGClient(System.ServiceModel.Channels.Binding binding, System.ServiceModel.EndpointAddress remoteAddress) :
    base(binding, remoteAddress)
    public long SendMailMessage(UMGwcf.SoapExchangeMailMessage message)
    return base.Channel.SendMailMessage(message);
    public long ResendEmailMessage(long emailid)
    return base.Channel.ResendEmailMessage(emailid);
    public UMGwcf.SoapDeliveredMailMessage GetEmailById(long emailid)
    return base.Channel.GetEmailById(emailid);
    public long SendSMSMessage(UMGwcf.SoapSMSMessage smsmessage)
    return base.Channel.SendSMSMessage(smsmessage);
    public UMGwcf.SoapDeliveredSMSMessage GetSMSById(long smsid)
    return base.Channel.GetSMSById(smsid);
    the CLR where created as follows:
    ALTER DATABASE XXXX SET TRUSTWORTHY ON;
    CREATE ASSEMBLY [System.ServiceModel]
    FROM 'C:\ttrojcak\System.Runtime.Serialization.dll'
    WITH PERMISSION_SET = UNSAFE
    CREATE ASSEMBLY [System.ServiceModel]
    FROM 'C:\ttrojcak\System.ServiceModel.dll'
    WITH PERMISSION_SET = UNSAFE
    the message window shows warnings:
    Warning: The Microsoft .NET Framework assembly 'system.servicemodel, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.web, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=x86.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.drawing, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.directoryservices, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.directoryservices.protocols, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.enterpriseservices, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=x86.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.runtime.remoting, version=2.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.runtime.serialization.formatters.soap, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.design, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.windows.forms, version=2.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'accessibility, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.drawing.design, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.web.regularexpressions, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.serviceprocess, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.configuration.install, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.identitymodel, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.messaging, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'system.identitymodel.selectors, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    Warning: The Microsoft .NET Framework assembly 'microsoft.transactions.bridge, version=3.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
    creating store procedure:
    EXEC sp_executesql N'
    CREATE PROCEDURE [spUMG_ProcessEmail]
    @cid_request bigint
    AS
    EXTERNAL NAME [CredexDB].[UMG_StoredProcedures].[spUMG_ProcessEmail]'
    IF (@@ERROR = 0)
    BEGIN
    DECLARE @procSchema sysname
    DECLARE @procName sysname
    SELECT @procSchema = SCHEMA_NAME(schema_id), @procName = name
    FROM sys.objects
    WHERE object_id = OBJECT_ID(N'[spUMG_ProcessEmail]')
    EXEC sp_addextendedproperty 'AutoDeployed', N'yes',
    'SCHEMA', @procSchema,
    'PROCEDURE', @procName
    EXEC sp_addextendedproperty 'SqlAssemblyFile', N'UMG\UMG.cs',
    'SCHEMA', @procSchema,
    'PROCEDURE', @procName
    EXEC sp_addextendedproperty 'SqlAssemblyFileLine', 95,
    'SCHEMA', @procSchema,
    'PROCEDURE', @procName
    END
    Any tips? 
    Thank you

    and this moves me to another problem. the stored procedure spUMG_ProcessEmail is unable to find and read app.config
    stored procedure is unable to read app.config. it is necesary to rewrite the xml config into c# code:
    <?xml version="1.0" encoding="utf-8"?>
    <configuration>
    <system.serviceModel>
    <bindings>
    <basicHttpBinding>
    <binding name="BasicHttpBinding_IUMG" closeTimeout="00:01:00"
    openTimeout="00:01:00" receiveTimeout="00:10:00" sendTimeout="00:01:00"
    allowCookies="false" bypassProxyOnLocal="false" hostNameComparisonMode="StrongWildcard"
    maxBufferSize="65536" maxBufferPoolSize="524288" maxReceivedMessageSize="65536"
    messageEncoding="Text" textEncoding="utf-8" transferMode="Buffered"
    useDefaultWebProxy="true">
    <readerQuotas maxDepth="32" maxStringContentLength="8192" maxArrayLength="16384"
    maxBytesPerRead="4096" maxNameTableCharCount="16384" />
    <security mode="None">
    <transport clientCredentialType="None" proxyCredentialType="None"
    realm="" />
    <message clientCredentialType="UserName" algorithmSuite="Default" />
    </security>
    </binding>
    </basicHttpBinding>
    </bindings>
    <client>
    <endpoint address="http://umgwcftest/UMGwcf.svc" binding="basicHttpBinding"
    bindingConfiguration="BasicHttpBinding_IUMG" contract="IUMG"
    name="BasicHttpBinding_IUMG" />
    </client>
    </system.serviceModel>
    </configuration>
    and the rewrited code:
    BasicHttpBinding myBinding = new BasicHttpBinding();
    myBinding.Name = "BasicHttpBinding_IUMG";
    myBinding.CloseTimeout = new TimeSpan(00, 01, 00);
    myBinding.OpenTimeout = new TimeSpan(00, 01, 00);
    myBinding.ReceiveTimeout = new TimeSpan(00, 10, 00);
    myBinding.CloseTimeout = new TimeSpan(00, 01, 00);
    myBinding.AllowCookies = false;
    myBinding.BypassProxyOnLocal = false;
    myBinding.HostNameComparisonMode = HostNameComparisonMode.StrongWildcard;
    myBinding.MaxBufferSize = 65536;
    myBinding.MaxBufferPoolSize = 524288;
    myBinding.MaxReceivedMessageSize = 65536;
    myBinding.MessageEncoding = WSMessageEncoding.Text;
    myBinding.TextEncoding = System.Text.Encoding.UTF8;
    myBinding.TransferMode = TransferMode.Buffered;
    myBinding.UseDefaultWebProxy = true;
    myBinding.ReaderQuotas.MaxDepth = 32;
    myBinding.ReaderQuotas.MaxStringContentLength = 8192;
    myBinding.ReaderQuotas.MaxArrayLength = 16384;
    myBinding.ReaderQuotas.MaxBytesPerRead = 4096;
    myBinding.ReaderQuotas.MaxNameTableCharCount = 16384;
    myBinding.Security.Mode = BasicHttpSecurityMode.None;
    myBinding.Security.Transport.ClientCredentialType = HttpClientCredentialType.None;
    myBinding.Security.Transport.ProxyCredentialType = HttpProxyCredentialType.None;
    myBinding.Security.Transport.Realm = "";
    myBinding.Security.Message.ClientCredentialType = BasicHttpMessageCredentialType.UserName;
    myBinding.Security.Message.AlgorithmSuite = System.ServiceModel.Security.SecurityAlgorithmSuite.Default;
    EndpointAddress endPointAddress = new EndpointAddress(new Uri("http://umgwcftest/UMGwcf.svc"));
    SqlContext.Pipe.Send("2");
    UMGClient umgcl = new UMGClient(myBinding, endPointAddress);
    after that, I got another error and it's solution is here:
    error and solution
    So I got it finaly working 

  • WSUS Sync is not working Sync failed: UssCommunicationError: WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. --- System.Security.Authentication.AuthenticationException: The remote

    I know there are loads of posts with same issue and most of them were related to proxy and connectivity .
    This was case for me as well (few months back). Now the same error is back. But I've confirmed that FW ports and proxy are fine this time around.
    server is configured on http port 80 
    ERROR
    Sync failed: UssCommunicationError: WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. ---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid
    according to the validation procedure.~~at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request). Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WSyncAction.WSyncAction.SyncWSUS
    I've checked proxy server connectivity. I'm able browse following site from WSUS server
    http://catalog.update.microsoft.com/v7/site/Home.aspx?sku=wsus&version=3.2.7600.226&protocol=1.8
    I did telnet proxy server on the particular port (8080) and that is also fine.
    I've doubt on certificates, any idea which are the certificates which we need to look? And if certificate is expired then (my guess) we won't be able open the above mentioned windows update catalog site?
    Any tips appreciated !
    Anoop C Nair (My Blog www.AnoopCNair.com)
    - Twitter @anoopmannur -
    FaceBook Forum For SCCM

    Hi Lawrence ! - Many thanks for looking into this thread and replying. Appreciate your help.
    Your reply  ("SSL is enabled/configured, and the certificate being used is invalid
    (or the cert does not exist or cannot be obtained), or the SSL connection could not be established.") is very helpful.
    I've already tested CONTENT DOWNLOAD and it's working fine. WSUS Sync was also working fine for years with proxy server configured on port (8080) and WSUS server on port 80.
    My Guess (this is my best guess ;)) is this something to do with Firewall or Proxy side configuration rather than WSUS. However, I'm not finding a way to prove this to proxy/firewall team. From their perspective all the required port communication open and
    proxy server is also reachable. More over we're able to access internet (Microsoft Update Catalog site) over same port (8080).
    Any other hints where I can prove them it's a sure shot problem from their side.
    Thanks again !!
    Anoop C Nair (My Blog www.AnoopCNair.com)
    - Twitter @anoopmannur -
    FaceBook Forum For SCCM

  • System.Security.VerificationException: Operation could destabilize the runtime during code coverage run in visual studio

    I have a unit test that basically does the following:
    Creates an app domain using minimum priviledges.  The MarshalByRefObject that is living in the app domain, loads another assembly to execute.  This new assembly basically takes in a data object defined in a separate assembly, and returns a
    new data object of that type.
    All this works fine in debug mode, or when running w/out code coverage.  The Sandbox assembly is signed.
    The exception that gets thrown is this:
    Test method TestProject1.UnitTest1.TestMethod1 threw exception:
    System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. ---> System.Security.VerificationException: Operation could destabilize the runtime.
    ClassLibrary3.Bar..ctor()
    ClassLibrary2.Foo.TestMethod(Bar testBar)
    System.RuntimeMethodHandle._InvokeMethodFast(IRuntimeMethodInfo method, Object target, Object[] arguments, SignatureStruct& sig, MethodAttributes methodAttributes, RuntimeType typeOwner)
    System.RuntimeMethodHandle.InvokeMethodFast(IRuntimeMethodInfo method, Object target, Object[] arguments, Signature sig, MethodAttributes methodAttributes, RuntimeType typeOwner)
    System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture, Boolean skipVisibilityChecks)
    System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture)
    System.Reflection.MethodBase.Invoke(Object obj, Object[] parameters)
    ClassLibrary1.RemoteSandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters)
    ClassLibrary1.RemoteSandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters)
    ClassLibrary1.SandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters) in c:\users\la22426\documents\visual studio 2010\Projects\TestProject1\ClassLibrary1\Sandbox.cs: line 43
    TestProject1.UnitTest1.TestMethod1() in c:\users\la22426\documents\visual studio 2010\Projects\TestProject1\TestProject1\UnitTest1.cs: line 21
    Unit Test code:
    [TestClass]
    public class UnitTest1
    [TestMethod]
    public void TestMethod1()
    using (SandBox sandbox = new SandBox())
    string assemblyLocation = Path.Combine(Environment.CurrentDirectory, @"..\..\..\ClassLibrary2\bin\Debug\ClassLibrary2.dll");
    object result = sandbox.Execute(assemblyLocation, "ClassLibrary2.Foo", "TestMethod", new Bar() { X = "test" });
    Assert.IsNotNull(result);
    Data Object code:
    namespace ClassLibrary3
    [Serializable]
    public class Bar
    public Bar() { }
    public string X { get; set; }
    Assembly to execute code:
    namespace ClassLibrary2
    public class Foo
    public Bar TestMethod(Bar testBar)
    return new Bar() { X = testBar.X };
    Sandbox code:
    namespace ClassLibrary1
    public class SandBox : IDisposable
    AppDomain Domain { get; set; }
    RemoteSandBox RemoteSandBox { get; set; }
    public SandBox()
    var setup = new AppDomainSetup()
    ApplicationBase = AppDomain.CurrentDomain.BaseDirectory,
    ApplicationName = Guid.NewGuid().ToString(),
    DisallowBindingRedirects = true,
    DisallowCodeDownload = true,
    DisallowPublisherPolicy = true,
    //DisallowApplicationBaseProbing = true,
    var permissions = new PermissionSet(PermissionState.None);
    permissions.AddPermission(new SecurityPermission(SecurityPermissionFlag.Execution));
    permissions.AddPermission(new ReflectionPermission(PermissionState.Unrestricted));
    this.Domain = AppDomain.CreateDomain(setup.ApplicationName, null, setup, permissions,
    typeof(RemoteSandBox).Assembly.Evidence.GetHostEvidence<StrongName>());
    this.RemoteSandBox = (RemoteSandBox)Activator.CreateInstanceFrom(this.Domain, typeof(RemoteSandBox).Assembly.ManifestModule.FullyQualifiedName, typeof(RemoteSandBox).FullName).Unwrap();
    public object Execute(string assemblyPath, string scriptType, string method, params object[] parameters)
    return this.RemoteSandBox.Execute(assemblyPath, scriptType, method, parameters);
    public void Dispose()
    if (this.Domain != null)
    AppDomain.Unload(this.Domain);
    class RemoteSandBox : MarshalByRefObject
    public RemoteSandBox()
    public object Execute(string assemblyPath, string scriptType, string method, params object[] parameters)
    //we need some file io permissions to load the assembly
    new FileIOPermission(FileIOPermissionAccess.Read | FileIOPermissionAccess.PathDiscovery, assemblyPath).Assert();
    Assembly assembly;
    try
    assembly = Assembly.LoadFile(assemblyPath);
    finally
    CodeAccessPermission.RevertAssert();
    Type type = assembly.GetType(scriptType, true);
    MethodInfo methodInfo = type.GetMethod(method);
    object instance = (methodInfo.IsStatic) ? null : Activator.CreateInstance(type);
    object returnVal = null;
    returnVal = methodInfo.Invoke(instance, parameters);
    return returnVal;

    I marked the shared data library with the attributes:
    [assembly: AllowPartiallyTrustedCallers]
    [assembly: SecurityRules(SecurityRuleSet.Level2, SkipVerificationInFullTrust = true)]
    And then marked  the data class Bar with the attribute:
    [SecuritySafeCritical]
    And got a little more insight into what's going on:
    Test method TestProject1.UnitTest1.TestMethod1 threw exception:
    System.MethodAccessException: Attempt by security transparent method 'Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.Register()' to call native code through method 'Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.VSCoverRegisterAssembly(UInt32[],
    System.String)' failed.  Methods must be security critical or security safe-critical to call native code.
    Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.Register()
    ClassLibrary3.Bar..ctor() in c:\users\xxx\documents\visual studio 2010\Projects\TestProject1\ClassLibrary3\Bar.cs: line 13
    TestProject1.UnitTest1.TestMethod1() in c:\users\xxx\documents\visual studio 2010\Projects\TestProject1\TestProject1\UnitTest1.cs: line 21
    Since the injected code coverage il is doing some native stuff, it's throwing.  Any ideas on how to allow this?

  • Why does it say that the updated version of Firefox (which I am trying to download) is not compatible with my operating system when I have Mac OS X 10.5.8?

    Why does it say that the updated version of Firefox (which I am trying to download) is not compatible with my operating system when I have Mac OS X 10.5.8? I had an older version of Firefox and it said I needed to update it but that was the message that appeared.

    Sorry, it's because Firefox 4+ are only compiled for the Intel processors.
    There is a separate project for PPC Macs called Ten Four Fox. You might give it a spin when you're tired of 3.6.
    http://www.floodgap.com/software/tenfourfox/

  • I recently upgraded to a G5 and Logic Pro 8. My previous system was a Power Mac 7200 with Logic Platinum 3.5.3. I can not open the old song files unless they are first saved in Logic 6 or 7. Where do I get a dongle for Logic 7?

    I recently upgraded to a G5 and Logic Pro 8. My previous system was a Power Mac 7200 with Logic Platinum 3.5.3. I can not open the old song files unless they are first saved in Logic 6 or 7. Where do I get a dongle for Logic 7?

    eBay or Craigslist would be the only choice.

Maybe you are looking for