System.security.allowDomain in macs
has anyone ever come across this? is this a known bug? etc?
this line:
System.security.allowDomain("spoofdomain.mycompany.com");
makes the swf work on a pc but not on a mac.
anyone?
waynecto wrote:
> I'm using flash 7. My application is a weather bug on a
portal page. I'm
> getting the feed from yahoo and compile the application
using
> System.security.allowDomain("
http://xml.weather.yahoo.com/");
and it is working
> fine when I'm testing from my local machine.
Well, that has to work both ways. On your site and On the
giving data server side.
It needs XML file on the root of the directory allowing you
to take the data.
Otherwise we could cross domain people traffic w/o their
consent.
So, I don't expect yahoo to drop such xml just for you and
because that's the case,
you will need to work around it using proxy on your domain.
When you request the file from your domain, your domain
requests it from yahoo and
hands it off as if it was yours. That's the only way around
it.
Best Regards
Urami
!!!!!!! Merry Christmas !!!!!!!
Happy New Year
<urami>
If you want to mail me - DO NOT LAUGH AT MY ADDRESS
</urami>
Similar Messages
-
System.security() && _global.variables
Hi,
I'm using a container .swf, loaded over HTTP to bring in some
forms over HTTPS.
I have tried using System.security.allowDomain(); and
System.security.allowInsecureDomain();
in the container and form respectively to no avail.
Does anybody have experience of achieving synchronous global
variable access across
these protocols?fixed it myself!
What happened is this: after half a year, a second programmer started working on this project. He pulled the project from subversion, including the pfx, which was in the app-data directory, somehow, he has replaced it with a different pfx file, with a different
private key and committed this to subversion and thats how this different pfx found its way to my solution and caused thisi error. -
Internet Security Suite on Mac
I insalled the Internet security suite for Mac and am running OS X 10.5.8. VISS popped up with a mesage that there was a virus found on my system and 'no action was taken'. I scanned my system and checked the disinfect/delete infected files but when it found the infected file, it said no action taken again When the scan was complete, the scan status said n viruses were found, but two were listed in the log and the 'action' taken was 'Reported' even though I selected all infected files to be disinfected/deleted. I had to manually find the files and delete them from my system to rid the infected files.
This is what it found in today's (11/27) scan- 6 .pdf files:
Viruses detected: Exploit.PDF-JS.Gen
Action taken: None, file was left in its original location.
Earlier in the week, it found 2 other files with the same virus- one in my Toast 9 Titanium folder and one in my Toast 10 Titanium folder for a cd/dvd label background (.pdf files).
The original viruses it found were Joke.Rabbit in 2 files on 11/8/09, Spyware.945 and Backdoor.Generic.148842 on 11/7/09.
In all cases Internet Security Suite is set to Repair/Delete, but it reports back 'Action taken: None, file was left in its original location.' and I have to manually delete the files. -
How do I run a system security scan on an iPad or iMac?
How do I run a system security scan for things like malware that i could have got from Facebook on an iPad or iMac?
iPads and Macs are very different.
For Macs there are many security suites and virus scanners out there you can use. A Google search should point some out.
iPads at this time cannot get infected by malware or viruses. There is just nothing out there currently that can infect them. As such there is no way to scan them for anything and its not really necessary. -
What is the best security software for mac?
I had Norton years ago but found it slowed things down unacceptably at the time and so have never revisited it since. However, as internet infection becomes more prevalent on Macs I am considering some kind of protection.
1. What is the general feeling for the most optimal security software for Mac kit?
2. Are there any side effects that one should be aware of which might affect the Mac or software operations?
Thanks and regards1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
If you find this comment too long or too technical, read only sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
☞ It can easily be disabled or overridden by the user.
☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
Software from an untrustworthy source
☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
Software that is plainly illegal or does something illegal
☞ High-priced commercial software such as Photoshop is "cracked" or "free."
☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
Conditional or unsolicited offers from strangers
☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
☞ You win a prize in a contest you never entered.
☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
☞ Anything online that you would expect to pay for is "free."
Unexpected events
☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
Why shouldn't you use commercial AV products?
☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
☞ Most importantly, a false sense of security is dangerous.
8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices. -
I cannot perform security update with Mac OS X v10.411
I cannot perform security update with Mac OS X v10.411. My Mac Book Pro is super behind concerning updates and security.
Yes, I too have that problem. And, I have actually been hacked into, had all of my files, folders, photos, applications, sys pref, (in-other-words) EVERYTHING copied and recopied. It has been a nightmare. My identity was completely stolen. What makes it worse is that when I told apple ~ I was told by 1 Apple Supervising Technician that I was out of my mind and that it wasn't possible. He was very dismissive and treated me if I were some kind of idiot. Well, check out below. This is since Saturday or Sunday last. I didn't authorize this and I sure as **** don' know who any of these people are.
I installed the 10.5 disk. And I too, like many Macbook Pro users had the "Black Screen" bug. So I had to go back to 10.4. I went back and this is what I inherited. I now rarely have control over the computer, never my printer and I my security has been and is constantly being compromised. I believe that Apple needs to own up to this and, perhaps, do something about it? Am I asking too much?
Last login: Wed Sep 14 20:28:35 on console
Welcome to Darwin!
localhost:~ cat$ who
cat console Sep 14 20:28
cat ttyp1 Sep 14 20:28
localhost:~ cat$ whois
usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] [-p port] name ...
localhost:~ cat$ finger
Login Name TTY Idle Login Time Office Phone
cat catherine ronalds *con 56 Wed 20:28
cat catherine ronalds p1 Wed 20:28
localhost:~ cat$ whois *con
Whois Server Version 2.0
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.
Server Name: CON.ZZBB.COM
IP Address: 203.231.42.121
Registrar: INAMES CO., LTD.
Whois Server: whois.inames.co.kr
Referral URL: http://www.inames.co.kr
Server Name: CON.VENUS.ORDERBOX-DNS.COM
IP Address: 74.54.56.236
IP Address: 74.54.56.227
IP Address: 74.54.56.231
Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Server Name: CON.TOM.RU
Registrar: REGIONAL NETWORK INFORMATION CENTER, JSC DBA RU-CENTER
Whois Server: whois.nic.ru
Referral URL: http://www.nic.ru
Server Name: CON.MERCURY.ORDERBOX-DNS.COM
IP Address: 67.15.253.251
IP Address: 67.15.47.189
IP Address: 67.15.253.220
Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Server Name: CON.MARS.ORDERBOX-DNS.COM
IP Address: 74.52.140.84
IP Address: 74.52.140.82
IP Address: 74.52.140.83
Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Server Name: CON.MAIYEUBE.NET
IP Address: 207.218.250.214
Registrar: MELBOURNE IT, LTD. D/B/A INTERNET NAMES WORLDWIDE
Whois Server: whois.melbourneit.com
Referral URL: http://www.melbourneit.com
Server Name: CON.MAFIAWORLDCONFLICT.COM
IP Address: 96.125.168.211
Registrar: DOMAIN.COM, LLC
Whois Server: whois.domain.com
Referral URL: http://www.domain.com
Server Name: CON.KONKAK.COM
IP Address: 67.214.175.71
Registrar: TUCOWS.COM CO.
Whois Server: whois.tucows.com
Referral URL: http://domainhelp.opensrs.net
Server Name: CON.KANGX.COM
IP Address: 210.118.234.6
Registrar: YESNIC CO. LTD.
Whois Server: whois.yesnic.com
Referral URL: http://www.yesnic.com
Server Name: CON.JCSMEDIA.COM
IP Address: 216.199.69.35
Registrar: WILD WEST DOMAINS, INC.
Whois Server: whois.wildwestdomains.com
Referral URL: http://www.wildwestdomains.com
Server Name: CON.HNIP.CO.KR
Registrar: INAMES CO., LTD.
Whois Server: whois.inames.co.kr
Referral URL: http://www.inames.co.kr
Server Name: CON.ETVILLE.COM
IP Address: 112.220.108.114
Registrar: ASADAL, INC.
Whois Server: whois.asadal.com
Referral URL: http://www.asadal.com
Server Name: CON.EARTH.ORDERBOX-DNS.COM
IP Address: 67.15.253.252
IP Address: 67.15.47.188
IP Address: 67.15.253.219
Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Server Name: CON.DIABLOIII.PRO
Registrar: OVH
Whois Server: whois.ovh.com
Referral URL: http://www.ovh.com
Server Name: CON.DELDC.COM
IP Address: 210.91.181.71
Registrar: YESNIC CO. LTD.
Whois Server: whois.yesnic.com
Referral URL: http://www.yesnic.com
Server Name: CON.CONFESIONESDESOFIA.COM
IP Address: 174.121.246.152
Registrar: MYDOMAIN, INC.
Whois Server: whois.namesdirect.com
Referral URL: http://www.namesdirect.com
Server Name: CON.CAUTO.COM
IP Address: 12.31.226.135
Registrar: NETWORK SOLUTIONS, LLC.
Whois Server: whois.networksolutions.com
Referral URL: http://www.networksolutions.com
Server Name: CON.BLAZINGREALMS.COM
IP Address: 68.67.78.230
Registrar: OVH
Whois Server: whois.ovh.com
Referral URL: http://www.ovh.com
Server Name: CON.BELLSFERRY.COM
IP Address: 216.199.69.35
Registrar: WILD WEST DOMAINS, INC.
Whois Server: whois.wildwestdomains.com
Referral URL: http://www.wildwestdomains.com
Domain Name: CON.NET
Registrar: UNIVERSAL REGISTRATION SERVICES INC. DBA NEWDENTITY.COM
Whois Server: whois.newdentity.com
Referral URL: http://www.newdentity.com
Name Server: NS1.SEDOPARKING.COM
Name Server: NS2.SEDOPARKING.COM
Status: clientDeleteProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 04-may-2011
Creation Date: 03-may-2003
Expiration Date: 03-may-2012
Domain Name: CON.COM
Registrar: TUCOWS.COM CO.
Whois Server: whois.tucows.com
Referral URL: http://domainhelp.opensrs.net
Name Server: NS1.CON.COM
Name Server: NS2.CON.COM
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 05-nov-2010
Creation Date: 05-dec-1993
Expiration Date: 04-dec-2011
>>> Last update of whois database: Thu, 15 Sep 2011 04:25:10 UTC <<<
NOTICE: The expiration date displayed in this record is the date the
registrar's sponsorship of the domain name registration in the registry is
currently set to expire. This date does not necessarily reflect the expiration
date of the domain name registrant's agreement with the sponsoring
registrar. Users may consult the sponsoring registrar's Whois database to
view the registrar's reported date of expiration for this registration.
TERMS OF USE: You are not authorized to access or query our Whois
database through the use of electronic processes that are high-volume and
automated except as reasonably necessary to register domain names or
modify existing registrations; the Data in VeriSign Global Registry
Services' ("VeriSign") Whois database is provided by VeriSign for
information purposes only, and to assist persons in obtaining information
about or related to a domain name registration record. VeriSign does not
guarantee its accuracy. By submitting a Whois query, you agree to abide
by the following terms of use: You agree that you may use this Data only
for lawful purposes and that under no circumstances will you use this Data
to: (1) allow, enable, or otherwise support the transmission of mass
unsolicited, commercial advertising or solicitations via e-mail, telephone,
or facsimile; or (2) enable high volume, automated, electronic processes
that apply to VeriSign (or its computer systems). The compilation,
repackaging, dissemination or other use of this Data is expressly
prohibited without the prior written consent of VeriSign. You agree not to
use electronic processes that are automated and high-volume to access or
query the Whois database except as reasonably necessary to register
domain names or modify existing registrations. VeriSign reserves the right
to restrict your access to the Whois database in its sole discretion to ensure
operational stability. VeriSign may restrict or terminate your access to the
Whois database for failure to abide by these terms of use. VeriSign
reserves the right to modify these terms at any time.
The Registry database contains ONLY .COM, .NET, .EDU domains and
Registrars.
No match "*con."
localhost:~ cat$ -
Problems with Scrollbar and Security.allowDomain("*")
When I use Security.allowDomain) the scrollbar stops work when my app is used in swfloader.
If I remove Security.allowDomain() will my app not work in FireFox.
I'm using Weborb .net.The app that using my app is on an other server. On both sides we have crossdomain.xml:
<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-to domain="*"/>
<allow-access-from domain="*" secure="false"/>
</cross-domain-policy -
Can I use my creative cloud products on more them one system at a time (Mac and PC)
Can I use my creative cloud products on more them one system at a time (Mac and PC)
I want to use the premiere on my Mac and some times on my PC.
Can I use it on other operating systems with one membership or do I have to purchase an other membership for my other system. I am only working on one system or the other at one time.
Thxhttp://www.adobe.com/au/products/creativecloud/faq.html
Are there any unique benefits that come with my paid membership?
Yes, as a member of Creative Cloud, you get many benefits that you do not get when you purchase a traditional shrinkwrapped product:
Access to both the Mac OS and Windows® versions of the desktop applications and the ability to install them on your primary computer and one backup computer. So, if you have a Mac at home and a PC at work, you can install your applications on both as long as they are not running at the same time. See the product license agreements page for more information. -
HT204053 i dont have the icloud icon in my system preference on my mac. what do i do?
i am trying to find my pics and photo stream on my icloud on my mac and there is no icon for pictures, i have all of iphones and ipads backed up to the cloud but there isn't a picture icon showing they have been uploaded. I go into system preferences on my mac and there is NO icloud icon. what do i do???
Your signature says you have 10.4.6 (Tiger) - is this correct? (If it isn't please keep your signature up to date to prevent confusion). The minimum requirement for iCloud is Lion 10.7.5 (Mavericks preferred): the iCloud Preference Pane does not appear on earlier systems - the MobileMe pane appears on Lion and earlier but is now non-functional - you cannot now open or access a MobileMe account.
To make use of iCloud you will have to upgrade your Mac to Lion or Mavericks, provided it meets the requirements - if you are indeed running Tiger it's possible that you may not be able to.
If you are rusing an Intel Mac you will have to upgrade to Snow Leopard first to be able to access the Mac App Store - it's available in the online Apple Store. However if you have a PPC Mac you cannot run Snow Leopard and cannot proceed further.
The requirements for Lion are:
Mac computer with an Intel Core 2 Duo, Core i3, Core i5, Core i7, or Xeon processor
2GB of memory
OS X v10.6.6 or later (v10.6.8 recommended)
7GB of available space
Lion is available in the Online Apple Store ($19.99). Mountain Lion (10.8.x) is also available there at the same price (though it's reported to have been removed from sale in some countries so may well cease to be available generally) but there seems little point as the system requirements are the same for Mavericks (10.9.x) - which is free - unless you need to run specific software which will run on Mountain Lion only.
The requirements for Mountain Lion and Mavericks are:
OS X v10.6.8 or later
2GB of memory
8GB of available space
and the supported models are:
iMac (Mid 2007 or newer)
MacBook (Late 2008 Aluminum, or Early 2009 or newer)
MacBook Pro (Mid/Late 2007 or newer)
Xserve (Early 2009)
MacBook Air (Late 2008 or newer)
Mac mini (Early 2009 or newer)
Mac Pro (Early 2008 or newer)
It is available from the Mac App Store (in Applications).
You should be aware that PPC programs (such as AppleWorks) will not run on Lion or above; and some other applications may not be compatible - there is a useful compatibility checklist at http://roaringapps.com/apps:table , and that no system later than Tiger will run the Classic Environment. -
Can't access safe mode to delete System Security fake anti virus virus. HELP.
Hi, our SL500 has become infected with "System Security" fake anti virus software. We have tracked down how to remove it.
http://www.geekstogo.com/forum/system-security-malware-t222291.html
However when we get to the "reboot your computer in safe mode" (see instructions below) we can't as this is not possible.
We have tried F8...........Repeatedly . And also Run->msconfig->BOOT.INI->/SAFEBOOT . But to no avail . Actually we get a pop up stating that Windows can not find said command and have we typed it in correctly . Please could some one help us as this is driving us insane . One last thing . A computer WITHOUT a "safe mode " option, isn't that kinda of unsafe and a tad.....
Thanks in advance.
Instructions for malware removal.
You will need to print out a copy of these instructions, or save them to NotePad and put a shortcut to the file on the desktop so that you can refer to while you complete this procedure as you will be required to boot into Safe Mode where you wont have internet access.
Please download ATF Cleaner by Atribune.
Caution: This program is for Windows 2000, XP and Vista only
Double-click ATF-Cleaner.exe to run the program.
Under Main choose: Select All
Click the Empty Selected button.
If you use Firefox browser
Click Firefox at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
If you use Opera browser
Click Opera at the top and choose: Select All
Click the Empty Selected button.
NOTE: If you would like to keep your saved passwords, please click No at the prompt.
Click Exit on the Main menu to close the program.
Run MBAM again, only this time perform a full scan and post the log.
Please click here to download AVP Tool by Kaspersky.
Save it to your desktop.
Reboot your computer into SafeMode.
You can do this by restarting your computer and continually tapping the F8 key until a menu appears.
Use your up arrow key to highlight SafeMode then hit enter.
Double click the setup file to run it.
Click Next to continue.
It will by default install it to your desktop folder.Click Next.
Hit ok at the prompt for scanning in Safe Mode.
It will then open a box There will be a tab that says Automatic scan.
Under Automatic scan make sure these are checked.
System Memory
Startup Objects
Disk Boot Sectors.
My Computer.
Also any other drives (Removable that you may have)
After that click on Security level then choose Customize then click on the tab that says Heuristic Analyzer then choose Enable Deep rootkit search then choose ok.
Then choose OK again then you are back to the main screen.
Then click on Scan at the to right hand Corner.
It will automatically Neutralize any objects found.
If some objects are left un-neutralized then click the button that says Neutralize all
If it says it cannot be Neutralized then chooose The delete option when prompted.
After that is done click on the reports button at the bottom and save it to file name it Kas.
Save it somewhere convenient like your desktop and just post only the detected Virus\malware in the report it will be at the very top under Detected post those results in your next reply.
Note: This tool will self uninstall when you close it so please save the log before closing it.
In your next reply I would like to see:
C:\RSIT\info.txt
MBAM log
Kaspersky AVP scan results
Also let me know how the computer is behaving.
This post has been edited by Octagonal: Dec 27 2008, 08:08 AMThanks for trying to help. Sadly, I followed the instructions and it rebooted to the blue screen again.
It's going to have to go to Apple for repairs now. I'm out of options.
I am wondering how much easier it would have been if I'd created a time machine restore point. I got what I deserved for failing to do that, but I'm doubtful even that would have worked in this case. It does seem to be because of that piece of widely reported malware that didn't want to leave without causing damage.
The most frustrating aspect is the safe boot. I get to the desktop but without any menu, finder or dock. It seems to be similar to the problem below...
http://www.macsmarts.com/?p=109
But that's for Tiger. I tried that to no effect.
Like I said, it's going to have to go to Apple now because I've done so many things I don't know if I'm just digging myself a deeper hole.
Thanks again for offering help. -
Hi,
Im trying to use web service in c# sql database project. when running stored procedure, in which the web service should be called, im getting this error:
System.TypeInitializationException: The type initializer for 'System.ServiceModel.ClientBase`1' threw an exception. ---> System.Security.HostProtectionException: Attempted to perform an operation that was forbidden by the CLR host.
at System.ServiceModel.DiagnosticUtility.GetUtility()
at System.ServiceModel.DiagnosticUtility.get_Utility()
at System.ServiceModel.ClientBase`1..cctor()
The protected resources (only available with full trust) were:
All
The demanded resources were:
Synchronization, ExternalThreading
--- End of inner exception stack trace ---
at System.ServiceModel.ClientBase`1.InitializeChannelFactoryRef()
at System.ServiceModel.ClientBase`1..ctor()
at UMGClient..ctor()
at UMG_StoredProcedures.spUMG_ProcessEmail(SqlInt64 cid_request)
Here is the code:
using System;
using System.Data;
using System.Data.SqlClient;
using System.Data.SqlTypes;
using Microsoft.SqlServer.Server;
using CredexDB.Workflow;
using System.Collections.Generic;
using CredexDB.umgwcftest;
public partial class UMG_StoredProcedures
/// <summary>
/// </summary>
/// <param name="bankDate"></param>
/// <param name="stateCategory"></param>
[Microsoft.SqlServer.Server.SqlProcedure]
public static void spUMG_ProcessEmail( SqlInt64 cid_request )
SqlConnection conn = new SqlConnection("Context Connection=true;");
conn.Open();
try
SqlContext.Pipe.Send("A");
UMGClient umgcl = new UMGClient();
SqlContext.Pipe.Send("B");
UMGwcf.SoapExchangeMailMessage email = new UMGwcf.SoapExchangeMailMessage();
string[] names = new string[1];
names[0] = "[email protected]";
email.To = names;
email.Subject = "Test UmgWcf";
email.MessageBody = "Testovacia správa - ľľššččťťťýéáí";
email.From = "[email protected]";
email.Priority = 20;
email.Sender = 1;
email.DoNotArchive = false;
email.EncryptAndSign = false;
//long ret = umgcl.SendMailMessage(email);
catch (Exception e)
SqlContext.Pipe.Send("C");
SqlContext.Pipe.Send(e.ToString());
finally
SqlContext.Pipe.Send("D");
conn.Close();
private static void execSql(string sql, SqlConnection conn)
new SqlCommand(sql, conn).ExecuteNonQuery();
The error occurs at this row:
UMGClient umgcl = new UMGClient();
Here is the UMG class:
[System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
[System.ServiceModel.ServiceContractAttribute(Namespace="vub.sk/UMGwcf", ConfigurationName="IUMG")]
public interface IUMG
[System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/SendMailMessage", ReplyAction="vub.sk/UMGwcf/IUMG/SendMailMessageResponse")]
long SendMailMessage(UMGwcf.SoapExchangeMailMessage message);
[System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/ResendEmailMessage", ReplyAction="vub.sk/UMGwcf/IUMG/ResendEmailMessageResponse")]
long ResendEmailMessage(long emailid);
[System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/GetEmailById", ReplyAction="vub.sk/UMGwcf/IUMG/GetEmailByIdResponse")]
UMGwcf.SoapDeliveredMailMessage GetEmailById(long emailid);
[System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/SendSMSMessage", ReplyAction="vub.sk/UMGwcf/IUMG/SendSMSMessageResponse")]
long SendSMSMessage(UMGwcf.SoapSMSMessage smsmessage);
[System.ServiceModel.OperationContractAttribute(Action="vub.sk/UMGwcf/IUMG/GetSMSById", ReplyAction="vub.sk/UMGwcf/IUMG/GetSMSByIdResponse")]
UMGwcf.SoapDeliveredSMSMessage GetSMSById(long smsid);
[System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
public interface IUMGChannel : IUMG, System.ServiceModel.IClientChannel
[System.Diagnostics.DebuggerStepThroughAttribute()]
[System.CodeDom.Compiler.GeneratedCodeAttribute("System.ServiceModel", "3.0.0.0")]
public partial class UMGClient : System.ServiceModel.ClientBase<IUMG>, IUMG
public UMGClient()
public UMGClient(string endpointConfigurationName) :
base(endpointConfigurationName)
public UMGClient(string endpointConfigurationName, string remoteAddress) :
base(endpointConfigurationName, remoteAddress)
public UMGClient(string endpointConfigurationName, System.ServiceModel.EndpointAddress remoteAddress) :
base(endpointConfigurationName, remoteAddress)
public UMGClient(System.ServiceModel.Channels.Binding binding, System.ServiceModel.EndpointAddress remoteAddress) :
base(binding, remoteAddress)
public long SendMailMessage(UMGwcf.SoapExchangeMailMessage message)
return base.Channel.SendMailMessage(message);
public long ResendEmailMessage(long emailid)
return base.Channel.ResendEmailMessage(emailid);
public UMGwcf.SoapDeliveredMailMessage GetEmailById(long emailid)
return base.Channel.GetEmailById(emailid);
public long SendSMSMessage(UMGwcf.SoapSMSMessage smsmessage)
return base.Channel.SendSMSMessage(smsmessage);
public UMGwcf.SoapDeliveredSMSMessage GetSMSById(long smsid)
return base.Channel.GetSMSById(smsid);
the CLR where created as follows:
ALTER DATABASE XXXX SET TRUSTWORTHY ON;
CREATE ASSEMBLY [System.ServiceModel]
FROM 'C:\ttrojcak\System.Runtime.Serialization.dll'
WITH PERMISSION_SET = UNSAFE
CREATE ASSEMBLY [System.ServiceModel]
FROM 'C:\ttrojcak\System.ServiceModel.dll'
WITH PERMISSION_SET = UNSAFE
the message window shows warnings:
Warning: The Microsoft .NET Framework assembly 'system.servicemodel, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.web, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=x86.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.drawing, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.directoryservices, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.directoryservices.protocols, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.enterpriseservices, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=x86.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.runtime.remoting, version=2.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.runtime.serialization.formatters.soap, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.design, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.windows.forms, version=2.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'accessibility, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.drawing.design, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.web.regularexpressions, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.serviceprocess, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.configuration.install, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.identitymodel, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.messaging, version=2.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'system.identitymodel.selectors, version=3.0.0.0, culture=neutral, publickeytoken=b77a5c561934e089, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
Warning: The Microsoft .NET Framework assembly 'microsoft.transactions.bridge, version=3.0.0.0, culture=neutral, publickeytoken=b03f5f7f11d50a3a, processorarchitecture=msil.' you are registering is not fully tested in the SQL Server hosted environment and is not supported. In the future, if you upgrade or service this assembly or the .NET Framework, your CLR integration routine may stop working. Please refer SQL Server Books Online for more details.
creating store procedure:
EXEC sp_executesql N'
CREATE PROCEDURE [spUMG_ProcessEmail]
@cid_request bigint
AS
EXTERNAL NAME [CredexDB].[UMG_StoredProcedures].[spUMG_ProcessEmail]'
IF (@@ERROR = 0)
BEGIN
DECLARE @procSchema sysname
DECLARE @procName sysname
SELECT @procSchema = SCHEMA_NAME(schema_id), @procName = name
FROM sys.objects
WHERE object_id = OBJECT_ID(N'[spUMG_ProcessEmail]')
EXEC sp_addextendedproperty 'AutoDeployed', N'yes',
'SCHEMA', @procSchema,
'PROCEDURE', @procName
EXEC sp_addextendedproperty 'SqlAssemblyFile', N'UMG\UMG.cs',
'SCHEMA', @procSchema,
'PROCEDURE', @procName
EXEC sp_addextendedproperty 'SqlAssemblyFileLine', 95,
'SCHEMA', @procSchema,
'PROCEDURE', @procName
END
Any tips?
Thank youand this moves me to another problem. the stored procedure spUMG_ProcessEmail is unable to find and read app.config
stored procedure is unable to read app.config. it is necesary to rewrite the xml config into c# code:
<?xml version="1.0" encoding="utf-8"?>
<configuration>
<system.serviceModel>
<bindings>
<basicHttpBinding>
<binding name="BasicHttpBinding_IUMG" closeTimeout="00:01:00"
openTimeout="00:01:00" receiveTimeout="00:10:00" sendTimeout="00:01:00"
allowCookies="false" bypassProxyOnLocal="false" hostNameComparisonMode="StrongWildcard"
maxBufferSize="65536" maxBufferPoolSize="524288" maxReceivedMessageSize="65536"
messageEncoding="Text" textEncoding="utf-8" transferMode="Buffered"
useDefaultWebProxy="true">
<readerQuotas maxDepth="32" maxStringContentLength="8192" maxArrayLength="16384"
maxBytesPerRead="4096" maxNameTableCharCount="16384" />
<security mode="None">
<transport clientCredentialType="None" proxyCredentialType="None"
realm="" />
<message clientCredentialType="UserName" algorithmSuite="Default" />
</security>
</binding>
</basicHttpBinding>
</bindings>
<client>
<endpoint address="http://umgwcftest/UMGwcf.svc" binding="basicHttpBinding"
bindingConfiguration="BasicHttpBinding_IUMG" contract="IUMG"
name="BasicHttpBinding_IUMG" />
</client>
</system.serviceModel>
</configuration>
and the rewrited code:
BasicHttpBinding myBinding = new BasicHttpBinding();
myBinding.Name = "BasicHttpBinding_IUMG";
myBinding.CloseTimeout = new TimeSpan(00, 01, 00);
myBinding.OpenTimeout = new TimeSpan(00, 01, 00);
myBinding.ReceiveTimeout = new TimeSpan(00, 10, 00);
myBinding.CloseTimeout = new TimeSpan(00, 01, 00);
myBinding.AllowCookies = false;
myBinding.BypassProxyOnLocal = false;
myBinding.HostNameComparisonMode = HostNameComparisonMode.StrongWildcard;
myBinding.MaxBufferSize = 65536;
myBinding.MaxBufferPoolSize = 524288;
myBinding.MaxReceivedMessageSize = 65536;
myBinding.MessageEncoding = WSMessageEncoding.Text;
myBinding.TextEncoding = System.Text.Encoding.UTF8;
myBinding.TransferMode = TransferMode.Buffered;
myBinding.UseDefaultWebProxy = true;
myBinding.ReaderQuotas.MaxDepth = 32;
myBinding.ReaderQuotas.MaxStringContentLength = 8192;
myBinding.ReaderQuotas.MaxArrayLength = 16384;
myBinding.ReaderQuotas.MaxBytesPerRead = 4096;
myBinding.ReaderQuotas.MaxNameTableCharCount = 16384;
myBinding.Security.Mode = BasicHttpSecurityMode.None;
myBinding.Security.Transport.ClientCredentialType = HttpClientCredentialType.None;
myBinding.Security.Transport.ProxyCredentialType = HttpProxyCredentialType.None;
myBinding.Security.Transport.Realm = "";
myBinding.Security.Message.ClientCredentialType = BasicHttpMessageCredentialType.UserName;
myBinding.Security.Message.AlgorithmSuite = System.ServiceModel.Security.SecurityAlgorithmSuite.Default;
EndpointAddress endPointAddress = new EndpointAddress(new Uri("http://umgwcftest/UMGwcf.svc"));
SqlContext.Pipe.Send("2");
UMGClient umgcl = new UMGClient(myBinding, endPointAddress);
after that, I got another error and it's solution is here:
error and solution
So I got it finaly working -
I know there are loads of posts with same issue and most of them were related to proxy and connectivity .
This was case for me as well (few months back). Now the same error is back. But I've confirmed that FW ports and proxy are fine this time around.
server is configured on http port 80
ERROR
Sync failed: UssCommunicationError: WebException: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel. ---> System.Security.Authentication.AuthenticationException: The remote certificate is invalid
according to the validation procedure.~~at System.Web.Services.Protocols.WebClientProtocol.GetWebResponse(WebRequest request). Source: Microsoft.SystemsManagementServer.SoftwareUpdatesManagement.WSyncAction.WSyncAction.SyncWSUS
I've checked proxy server connectivity. I'm able browse following site from WSUS server
http://catalog.update.microsoft.com/v7/site/Home.aspx?sku=wsus&version=3.2.7600.226&protocol=1.8
I did telnet proxy server on the particular port (8080) and that is also fine.
I've doubt on certificates, any idea which are the certificates which we need to look? And if certificate is expired then (my guess) we won't be able open the above mentioned windows update catalog site?
Any tips appreciated !
Anoop C Nair (My Blog www.AnoopCNair.com)
- Twitter @anoopmannur -
FaceBook Forum For SCCMHi Lawrence ! - Many thanks for looking into this thread and replying. Appreciate your help.
Your reply ("SSL is enabled/configured, and the certificate being used is invalid
(or the cert does not exist or cannot be obtained), or the SSL connection could not be established.") is very helpful.
I've already tested CONTENT DOWNLOAD and it's working fine. WSUS Sync was also working fine for years with proxy server configured on port (8080) and WSUS server on port 80.
My Guess (this is my best guess ;)) is this something to do with Firewall or Proxy side configuration rather than WSUS. However, I'm not finding a way to prove this to proxy/firewall team. From their perspective all the required port communication open and
proxy server is also reachable. More over we're able to access internet (Microsoft Update Catalog site) over same port (8080).
Any other hints where I can prove them it's a sure shot problem from their side.
Thanks again !!
Anoop C Nair (My Blog www.AnoopCNair.com)
- Twitter @anoopmannur -
FaceBook Forum For SCCM -
I have a unit test that basically does the following:
Creates an app domain using minimum priviledges. The MarshalByRefObject that is living in the app domain, loads another assembly to execute. This new assembly basically takes in a data object defined in a separate assembly, and returns a
new data object of that type.
All this works fine in debug mode, or when running w/out code coverage. The Sandbox assembly is signed.
The exception that gets thrown is this:
Test method TestProject1.UnitTest1.TestMethod1 threw exception:
System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. ---> System.Security.VerificationException: Operation could destabilize the runtime.
ClassLibrary3.Bar..ctor()
ClassLibrary2.Foo.TestMethod(Bar testBar)
System.RuntimeMethodHandle._InvokeMethodFast(IRuntimeMethodInfo method, Object target, Object[] arguments, SignatureStruct& sig, MethodAttributes methodAttributes, RuntimeType typeOwner)
System.RuntimeMethodHandle.InvokeMethodFast(IRuntimeMethodInfo method, Object target, Object[] arguments, Signature sig, MethodAttributes methodAttributes, RuntimeType typeOwner)
System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture, Boolean skipVisibilityChecks)
System.Reflection.RuntimeMethodInfo.Invoke(Object obj, BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture)
System.Reflection.MethodBase.Invoke(Object obj, Object[] parameters)
ClassLibrary1.RemoteSandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters)
ClassLibrary1.RemoteSandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters)
ClassLibrary1.SandBox.Execute(String assemblyPath, String scriptType, String method, Object[] parameters) in c:\users\la22426\documents\visual studio 2010\Projects\TestProject1\ClassLibrary1\Sandbox.cs: line 43
TestProject1.UnitTest1.TestMethod1() in c:\users\la22426\documents\visual studio 2010\Projects\TestProject1\TestProject1\UnitTest1.cs: line 21
Unit Test code:
[TestClass]
public class UnitTest1
[TestMethod]
public void TestMethod1()
using (SandBox sandbox = new SandBox())
string assemblyLocation = Path.Combine(Environment.CurrentDirectory, @"..\..\..\ClassLibrary2\bin\Debug\ClassLibrary2.dll");
object result = sandbox.Execute(assemblyLocation, "ClassLibrary2.Foo", "TestMethod", new Bar() { X = "test" });
Assert.IsNotNull(result);
Data Object code:
namespace ClassLibrary3
[Serializable]
public class Bar
public Bar() { }
public string X { get; set; }
Assembly to execute code:
namespace ClassLibrary2
public class Foo
public Bar TestMethod(Bar testBar)
return new Bar() { X = testBar.X };
Sandbox code:
namespace ClassLibrary1
public class SandBox : IDisposable
AppDomain Domain { get; set; }
RemoteSandBox RemoteSandBox { get; set; }
public SandBox()
var setup = new AppDomainSetup()
ApplicationBase = AppDomain.CurrentDomain.BaseDirectory,
ApplicationName = Guid.NewGuid().ToString(),
DisallowBindingRedirects = true,
DisallowCodeDownload = true,
DisallowPublisherPolicy = true,
//DisallowApplicationBaseProbing = true,
var permissions = new PermissionSet(PermissionState.None);
permissions.AddPermission(new SecurityPermission(SecurityPermissionFlag.Execution));
permissions.AddPermission(new ReflectionPermission(PermissionState.Unrestricted));
this.Domain = AppDomain.CreateDomain(setup.ApplicationName, null, setup, permissions,
typeof(RemoteSandBox).Assembly.Evidence.GetHostEvidence<StrongName>());
this.RemoteSandBox = (RemoteSandBox)Activator.CreateInstanceFrom(this.Domain, typeof(RemoteSandBox).Assembly.ManifestModule.FullyQualifiedName, typeof(RemoteSandBox).FullName).Unwrap();
public object Execute(string assemblyPath, string scriptType, string method, params object[] parameters)
return this.RemoteSandBox.Execute(assemblyPath, scriptType, method, parameters);
public void Dispose()
if (this.Domain != null)
AppDomain.Unload(this.Domain);
class RemoteSandBox : MarshalByRefObject
public RemoteSandBox()
public object Execute(string assemblyPath, string scriptType, string method, params object[] parameters)
//we need some file io permissions to load the assembly
new FileIOPermission(FileIOPermissionAccess.Read | FileIOPermissionAccess.PathDiscovery, assemblyPath).Assert();
Assembly assembly;
try
assembly = Assembly.LoadFile(assemblyPath);
finally
CodeAccessPermission.RevertAssert();
Type type = assembly.GetType(scriptType, true);
MethodInfo methodInfo = type.GetMethod(method);
object instance = (methodInfo.IsStatic) ? null : Activator.CreateInstance(type);
object returnVal = null;
returnVal = methodInfo.Invoke(instance, parameters);
return returnVal;I marked the shared data library with the attributes:
[assembly: AllowPartiallyTrustedCallers]
[assembly: SecurityRules(SecurityRuleSet.Level2, SkipVerificationInFullTrust = true)]
And then marked the data class Bar with the attribute:
[SecuritySafeCritical]
And got a little more insight into what's going on:
Test method TestProject1.UnitTest1.TestMethod1 threw exception:
System.MethodAccessException: Attempt by security transparent method 'Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.Register()' to call native code through method 'Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.VSCoverRegisterAssembly(UInt32[],
System.String)' failed. Methods must be security critical or security safe-critical to call native code.
Microsoft.VisualStudio.Coverage.Init_d2f466df4c65e2a7bb5d7592c49efef0.Register()
ClassLibrary3.Bar..ctor() in c:\users\xxx\documents\visual studio 2010\Projects\TestProject1\ClassLibrary3\Bar.cs: line 13
TestProject1.UnitTest1.TestMethod1() in c:\users\xxx\documents\visual studio 2010\Projects\TestProject1\TestProject1\UnitTest1.cs: line 21
Since the injected code coverage il is doing some native stuff, it's throwing. Any ideas on how to allow this? -
Why does it say that the updated version of Firefox (which I am trying to download) is not compatible with my operating system when I have Mac OS X 10.5.8? I had an older version of Firefox and it said I needed to update it but that was the message that appeared.
Sorry, it's because Firefox 4+ are only compiled for the Intel processors.
There is a separate project for PPC Macs called Ten Four Fox. You might give it a spin when you're tired of 3.6.
http://www.floodgap.com/software/tenfourfox/ -
I recently upgraded to a G5 and Logic Pro 8. My previous system was a Power Mac 7200 with Logic Platinum 3.5.3. I can not open the old song files unless they are first saved in Logic 6 or 7. Where do I get a dongle for Logic 7?
eBay or Craigslist would be the only choice.
Maybe you are looking for
-
Ipod is 80G Classic and displaying no other unusal or faulty behaviour. In the couple of days between the dock working fine and the error message appearing, there were no software updates. The ipod is actually a couple of years older than the dock- w
-
This is so frustrating and this question/answer place is my last resort. How do I get my favorite home page back? Sure hope you can help me.
-
HP 8500 All in one printer, Error msg to change yellow/black cartridge
Cartridge was changed but same error msg occurs. SN {Removed for privacy} DATE: 12-5-08. What can I check now that there is new ink cartridge properly installed. We have turned off, left it set and triedturning on again.
-
I have Acrobat Standard 8.1.2, but I do not have the sound or movie tool. I tried to use the link tool to add a link to play an mp3 sound file but I keep getting the message that the file is not compatible. Am I missing a component?
-
Add js scripts to the database (XDB)
Hi I have 2 js, which I need to access from HTML generated from PL/SQL. How do I load and register those 2 js in a separate directory on the server? And do I need to use another DAD to access them from the generated HTML code? (I have a DAD for the a