Using or not using integrity algorithm

When I stablish a ipsec tunnel using 3des is really necesary using integrity algorithm? or we can use without it?
best regrads

Your User Agent is showing that your using Firefox 3.5.5
Perform the suggestions mentioned in the following articles:
* [[Finding your Firefox version]]
* [[Websites or add-ons incorrectly report incompatible browser]]
IF it still doesn't resolve the issue, Download & Install latest Firefox version as suggested in the following article:
* [[Installing Firefox on Windows]]
Check and tell if its working.
-> Update All your Firefox Plugins
* https://www.mozilla.org/en-US/plugincheck/
* '''When Downloading Plugins Update setup files, Remove Checkmark from Downloading other Optional Softwares with your Plugins (e.g. Toolbars, McAfee, Google Chrome, etc.)'''
* Restart Firefox

Similar Messages

  • Idoc to flat file using Integration process does not show up at all

    Hello All,
    I created a scenario IDOC to Flat File using Integration Process and one without IntegrationProcess. I am able to execute the one without Integration Process easily.
    However when I send the IDOC from SAP then the Integration Process scenario just does not work.
    I Checked SXMB_MONI  There is no entry for the Integration Process.I can see entry for other without Integration Process.
    SXI_CACHE : I can see my Integration Process active
    SWEQADM :  I have activated the Event Queue and Background job
    SWF_XI_ADM_BPE :  ALL BPE is showing green status.
    All syntax check on IP are fine.
    There is no Basis Help for me so  there could be some additional basis steps which need to be configured.  Has anyone faced such an issue with Integration Process?
    Regards
    Prashanta

    Hope this might help you. when u configure an IDoc as Sender with BPM this is how you proceed.
    <b>1<b>. let us split the scenario into two</b>.</b>
    a. <b>Sender to BPM</b> ( Integration Process).
    b. <b>BPM to Receiver</b>.
    <b>2. First let us configure the first Sender to BPM.</b>
    a. Sender Agreement( <b>Not required</b> ).
    b. Receiver Agreement( <b>NOT Required</b>).
    c. Receiver Determination( Sender Service, Outbound Interface, Receiver Service(<b>Integration Process</b>).
    d. Interface Determination( Inbound Interface(Sender Abstract Interface), Message Mapping(NOT Required if your using transformation stepin Integration Process)).
    <b>3. Now let us configure the Second BPM to Receiver.</b>
    a. Sender Agreement( <b>NOT Required</b>)
    b. Receiver Agreement( Sender Service(<b>Integration process</b>), Receiver Abstarct Interface,Receiver service, Inbound Interface).
    c. Receiver Determination( Sender Service(Integration Process), Receiver Abstarct Interface,Receiver Service).
    d. Interface Determination( Inbound Interface, Message Mapping(<b>NOT Required</b>)).
    So Finally we have <b>One Receiver Agreement</b>, <b>Two Receiver Determinations</b>, <b>Two Interface Determinations</b>.
    Please let me know if you have any more queries.
    Regards
    Gopi

  • Getting Error while decrypt a file using Blowfish algorithm

    I am using blowfish algorithm for encrypt and decrypt my file. this is my code for encrypting decrypting .
    while i am running program i am getting an Exception
    Exception in thread "main" javax.crypto.BadPaddingException: Given final block not properly padded
    at com.sun.crypto.provider.SunJCE_h.b(DashoA6275)
    at com.sun.crypto.provider.SunJCE_h.b(DashoA6275)
    at com.sun.crypto.provider.BlowfishCipher.engineDoFinal(DashoA6275)
    at javax.crypto.Cipher.doFinal(DashoA12275)
    at Blowfishexe.main(Blowfishexe.java:65)
    import java.security.*;
    import javax.crypto.*;
    import javax.crypto.spec.*;
    import java.io.*;
    import org.bouncycastle.crypto.CryptoException;
    import org.bouncycastle.crypto.KeyGenerationParameters;
    import org.bouncycastle.crypto.engines.DESedeEngine;
    import org.bouncycastle.crypto.generators.DESedeKeyGenerator;
    import org.bouncycastle.crypto.modes.CBCBlockCipher;
    import org.bouncycastle.crypto.paddings.PaddedBufferedBlockCipher;
    import org.bouncycastle.crypto.params.DESedeParameters;
    import org.bouncycastle.crypto.params.KeyParameter;
    import org.bouncycastle.util.encoders.Hex;
    public class Blowfishexe {
    public static void main(String[] args) throws Exception {
    KeyGenerator kgen = KeyGenerator.getInstance("Blowfish");
              kgen.init(128);
              String keyfile="C:\\Encryption\\BlowfishKey.dat";
    SecretKey skey = kgen.generateKey();
    byte[] raw = skey.getEncoded();
    SecretKeySpec skeySpec = new SecretKeySpec(raw, "Blowfish");
              System.out.println("key"+raw);
                   byte[] keyBytes = skey.getEncoded();
                   byte[] keyhex = Hex.encode(keyBytes);
                   BufferedOutputStream keystream =
    new BufferedOutputStream(new FileOutputStream(keyfile));
                        keystream.write(keyhex, 0, keyhex.length);
    keystream.flush();
    keystream.close();
    Cipher cipher = Cipher.getInstance("Blowfish");
    cipher.init(Cipher.ENCRYPT_MODE, skeySpec);
              System.out.println("secretKey"+skeySpec);
    FileOutputStream fos=new FileOutputStream("C:\\Encryption\\credit11.txt");
              BufferedReader br=new BufferedReader(new FileReader("C:\\Encryption\\credit.txt"));
              String text=null;
              byte[] plainText=null;
              byte[] cipherText=null;
              while((text=br.readLine())!=null)
              System.out.println(text);
              plainText = text.getBytes();
              cipherText = cipher.doFinal(plainText);
              fos.write(cipherText);
              br.close();
              fos.close();
              cipher.init(Cipher.DECRYPT_MODE, skeySpec);
              FileOutputStream fos1=new FileOutputStream("C:\\Encryption\\BlowfishOutput.txt");
              BufferedReader br1=new BufferedReader(new FileReader("C:\\Encryption\\credit11.txt"));
              String text1=null;
              /*while((text1=br1.readLine())!=null)
                   System.out.println("text is"+text1);
                   plainText=text1.getBytes("UTF8");
                   cipherText=cipher.doFinal(plainText);
                   fos1.write(cipherText);
              br1.close();
              fos1.close();
    //byte[] encrypted = cipher.doFinal("This is just an example".getBytes());
              //System.out.println("encrypted value"+encrypted);*/
    Any one pls tell me how to slove my problem
    thanks in advance

    hi
    i got the solution. its working now
    but blowfish key ranges from 56 to448
    while i am writing the code as
    KeyGenerator keyGenerator = KeyGenerator.getInstance("Blowfish");
    keyGenerator.init(448);
    this code is generating the key upto 448 bits
    but coming to encoding or decode section key length is not accepting
    cipher.init(Cipher.ENCRYPT_MODE, key);
    Exception in thread "main" java.security.InvalidKeyException: Illegal key size or default parameters
    at javax.crypto.Cipher.a(DashoA12275)
    at javax.crypto.Cipher.a(DashoA12275)
    at javax.crypto.Cipher.a(DashoA12275)
    at javax.crypto.Cipher.init(DashoA12275)
    at javax.crypto.Cipher.init(DashoA12275)
    at Blowfish1.main(Blowfish1.java:46)
    i am getting this error
    what is the solution for this type of exception.
    thank you

  • Configuration Scenario for BPM Using Integration Scenario

    hi All,
    I Have an Scenario where i am using BPM. Most of the blog tells about manually creating all Configuration objects. I had created an Integration Scenario for this scenario by referring to the earlier threads available for same.
    Hoe to Create Integration Scenario for BPM Scenario
    Integration Scenario in BPM  and few more.
    My IS looks like
    Sender App Component - Integration Process - Receiver App Component
    Now when i am trying to create Configuration scenario for same using model configurator, i am getting Model as "Not Configurable"
    And when i click "Configurability Check" Button, i am getting below as status:
    Component view IS_POC_BPM: Connection from receivePayload to getABSPayload does not have an inbound service interface
    Component view IS_POC_BPM : Connection from sendABSPayload to getPayload has no outbound interface
    getABSPayload and sendABSPayload are actions for Abstract interfaces.
    IS_POC_BPM is the Integration Process Name.
    Also in Integration Scenario, when i create connection between sender action to BPM action there is no inbound interface coming. And viceversa.
    Please help me in identifying if i am doing any thing wrong in creating this scenario.
    Is it possible to create Configuration Scenario for BPM Using Integration Scenario?
    Thanks,
    Mayank
    Edited by: Mayank  Gupta on Apr 21, 2010 6:35 AM

    I think you shoudl refer the available Integration Scenarios created for BPMs in IR --> SAP BASIS --> http://sap.com/xi/XI/System/Patterns
    Sender template will have the Action with Outbound Service Interface and then in the BPM Template the action will have Inbound Interface.....then within the BPM itself this inbound will be mapped to Action with Abstract Interface
    may be after looking the Integration scenarios you will get more idea
    Regards,
    Abhishek.

  • Viewing a report using integrated security for connection to database

    PLEASE HELP!!
    I am able to connect to an SQL Server 2008 database from the Crystal Reports Designer using integrated security and can succesfully load the database to create my report with.  I provide the following parameters at connection;
    Connection string  =  jdbc:sqlserver://<hostname>:1433;databaseName=<dbname>;integratedSecurity=true
    Driver = com.microsoft.sqlserver.jdbc.SQLServerDriver
    HOWEVER, I do not know/cannot find how to then access the report using JRC in a JSP Web Viewer for Crystal Reports. 
    Any ideas experts??
    Regards
    Nick Hirst

    I'm having this same issue, but from the desktop app side. Did you ever find a solution?

  • Why do we use Integration Scenario in IR

    hi 2 all,
    i wanted to know why do we use Integration Scenarios and how to configure it ,i mean what are the steps for it
    Edited by: ujjwal kumar on Mar 11, 2008 11:19 AM

    Hi,
    The integration Scenario in IR will be useful for re-presenting the whole flow of the interface.
    If you do the itegration scenrio in Design time then you do not need to follow the stpes which is required in configuration like creating Aggrement,determination and all. you just need to import the scenario from integration repository that will avoid configure part.
    Usually during the audit time the auditor checks whether IS is designed or not? as that is the good practive to design ur scenario with IS.
    Companion Guide to Integration scenario
    /people/venkat.donela/blog/2006/02/17/companion-guide-to-integration-scenario
    It will be good loaction to get all the information about whole interface.
    You could either create or transport the same Integration scenario in ID.
    With the use of Integration scenario you could model the whole interface with all minute details
    It comes under best practices. So if you create the IS it will be very easy for you to understand the and designe the business flow. Morevere becomes very easy while creating/configuring the Integration Directory, you just need to import the design objects form IR.
    If you will not create IS, there is no harm. So it all depends upon client and also you.
    Thanks
    Swarup
    Edited by: Swarup Sawant on Mar 11, 2008 11:28 AM

  • The kerberos PAC verification failure when all users of only one RODC Site, trying to get access iis webpage of different site using Integrated Windows Authentication

    The kerberos PAC verification failure when all users of only one Site which having only one RODC server(A), trying to get access iis webpage of different site which having WDC server(B) using Integrated Windows Authentication. But when they accessing the
    website using IP address, it is not asking for credentials as I think it is using NTLM Authentication at that time which is less secure than Kerberos.
    Note that:- All user accounts and Computers of the RODC has been allowed cache password on the RODC. Nearest WDC for the RODC (A) is the WDC (B).
    The website is hosted on a windows server 2003 R2 and generating below system event log for those users of the RODC site :-
    Event Type: Error
    Event Source: Kerberos
    Event Category: None
    Event ID: 7
    Date:
    <var style="color:#333333;font-family:'Segoe UI', Arial, Verdana, Tahoma, sans-serif;font-size:13px;line-height:normal;">date</var>
    Time:
    <var style="color:#333333;font-family:'Segoe UI', Arial, Verdana, Tahoma, sans-serif;font-size:13px;line-height:normal;">time</var>
    User: N/A
    Computer:
    <var style="color:#333333;font-family:'Segoe UI', Arial, Verdana, Tahoma, sans-serif;font-size:13px;line-height:normal;">computer_name (the 2003 server)</var>
    Description: The kerberos subsystem encountered a PAC verification failure. This indicates that the PAC from the client<var style="color:#333333;font-family:'Segoe
    UI', Arial, Verdana, Tahoma, sans-serif;font-size:13px;line-height:normal;">computer_name</var> in realm <var
    style="color:#333333;font-family:'Segoe UI', Arial, Verdana, Tahoma, sans-serif;font-size:13px;line-height:normal;">realm_name</var> had
    a PAC which failed to verify or was modified. Contact your system administrator.
    This issue has been raised for last one week. Before that everything was fine. No Group Policy changed, Time also same.
    In this situation do I need to do Demotion of the RODC and re-promote it as RODC again  or is there any other troubleshooting to resolve it.
    Thanks in Advanced
    Souvik

     Hi Amy,
    Thanks for your response
    I noticed that Logon server could become incorrect again after user re-login or restart of a workstation.
    It seems root cause is different.  Need a permanent solution.
    The Workstations of the RODC site are getting IP from a DHCP server by automatic distribution of IP from a specific subnet for the site only.  The RODC is
    the Primary DNS server for the site.
    I have checked the subnet and it is properly bound with only with that AD site. The group of users and workstations are in the same site AD organisational Unit.
    Sometime I restarted the NET LOGON service and DNS server service on ther RODC server and sometime rebooted the server. But the Logon server issue has not fixed permanently.
    The internal network bandwidth of the site is better than the bandwidth to communicate with other site.  
    The server is Windows server 2008 R2 standard and hosting the below roles
    RODC
    DNS
    File server
    The server performance is Healthy in core times when maximum users usually logins. 
    Any further support would be much appreciated Amy
    Thanks
    Souvik

  • Failed to find algorighm ID from registry. Use default algorithm.

    Hello,
    I checked the smsdpmon.log on one of my Distribution Points and i saw the failure:
    Getting site code SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Getting algorithm ID SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Failed to find algorighm ID from registry. Use default algorithm. SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Getting DP Cert Type SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Getting this DP NALPath SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Unable to open Registry key Software\Microsoft\CCM. Return Code [80070002]. Client HTTPS state is Unknown. SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Start to evaluate ... SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Start to evaluate all packages ... SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Any one an idea what this means?
    THX

    Failed to find algorighm ID from registry. Use default algorithm. SMS_Distribution_Point_Monitoring 19.08.2014 11:55:00 11444 (0x2CB4)
    Just ignore that message. Not every yellow or red highlighted line does indicate a problem.
    Torsten Meringer | http://www.mssccmfaq.de

  • Using integrated security to access SQL Server database

    Hi,
    Currently we are using username/password combination to log in to a SQL Server database. These varaiables are defined as environment variables.
    For security reasons we now want to use integrated security of the SQL Server database. This way the connection will be with the NTUser the Nodemanager has been started with.
    Can this be done in Fort�?

    I do not think there is a way to pass the NT user's security authentication over to the DB in UDS.
    ka

  • Why does my Thinkpad W541 use Integrated graphics in WoW instead of the nVidia Quadro K1100m?

    I have seen reviews by many people on the W540/541 and they all said they were getting around 100 fps in WoW and even the guy in this video was able to play it on high-setitngs: http://www.youtube.com/watch?v=j0j045vg3W8 Don't get me wrong I use this device for mainly professional work, but every now and then I would like to be able to play a game on it or two. thanks!

    According to a number of contributors on a number of threads regarding the same subject, THIS IS BY DESIGN.
    If you want to force use the K1100m on the W541, it will need to be (a) on an external monitor and (b) controlled through a dock, rather than via the video connectors on the laptop itself.  According to "the specs", the laptop screen is always handled by the Intel Graphics... no matter whether the W540/W541 BIOS is set to "basic" or "advanced" graphics mode.
    According to the following description of how graphics works in W540/W541 and newer machines (which is that Optimus Mode is always active, although you can select "basic mode" or "advanced mode"), you simply MUST use Optimus Mode and cannot disable Intel Graphics as you could with the W530.
    Now I'd always thought that in theory for the laptop screen you can use nVidia Control Panel (3D settings) to specify which programs you want to get nVidia graphics for when those programs' windows have focus).  But my experience (granted, with the W530 and not with W540/W541) is that nVidia graphics kick in (and take over for Intel graphics) reliably only when the firmware determines that graphics performance requirements justify it.
    Strangely, the description of Optimus Driver behavior (below) makes no mention of the NVidia graphics ever kicking in for the laptop screen, but I thought that was how it worked.  Confusing and contradictory descriptions, seemingly.  You'd think that gaming applications would be just such an example of "graphics performance demands nVidia graphics", but your thread subject suggests that nVidia is NOT kicking in (I assume you're running on your laptop screen, and have probably tried to go to nVidia Control Panel to request nVidia graphics when you run WoW), which would be consistent with the written descriptions but very definitely annoying.  On the W530, Optimus behavior had the K1000m definitely kicking in on the laptop screen when needed.
    So apparently by design Optimus is always active on W540/W541 and newer machines. You can´t actually disable the integrated GPU at all and force the use of the discrete graphics, as you can on the W530 for the K1000m nVidia graphics via its BIOS. Here is the description of Optimus Drivers for W541, which describes Standard vs. Advanced mode, and by implication how the new W540/W541 BIOS design works:
    STANDARD and ADVANCED MODE
    In Standard mode, all dock displays uses Integrated Graphics as display output
    and is limited to a maximum of 3 displays including Computer's LCD.
    While in Advanced mode, all dock displays uses Discrete Graphics as display
    output and it increases the maximum number of displays to 6 including Computer's LCD.
    ThinkPad W540, W541 (Standard Mode)
    Intel HD Graphics
    - (Computer's LCD)
    - Computer's analog VGA connector
    - Computer's DisplayPort connector
    - Docking Station's analog VGA connector
    - Docking Station's DVI connector(s)
    - Docking Station's DisplayPort connector(s)
    - Docking Station's HDMI connector
    NVIDIA Quadro K2100M or NVIDIA Quadro K1100M
    - No display is connected to this display adapter.
    ThinkPad W540, W541 (Advanced Mode)
    Intel HD Graphics Family
    - (Computer's LCD)
    - Computer's analog VGA connector
    - Computer's DisplayPort connector
    NVIDIA Quadro K2100M or NVIDIA Quadro K1100M
    - Docking Station's analog VGA connector
    - Docking Station's DVI connector(s)
    - Docking Station's DisplayPort connector(s)
    - Docking Station's HDMI connector

  • Error while using 3DES algorithm

    Hi All,
    i am trying to decrypt and encrypt the data using 3DES algorithm.i am facing following problem.find below what exaclty i have done:
    SQL> variable x varchar2(100);
    SQL> exec :x := 'how r u Anwar';
    PL/SQL procedure successfully completed.
    X
    how r u Anwar
    SQL> create or replace procedure crypt1( p_str in out varchar2 )
    2 as
    3 l_data varchar2(255);
    4 begin
    5 l_data := rpad( p_str, (trunc(length(p_str)/8)+1)*8, chr(0) );
    6 dbms_obfuscation_toolkit.DESEncrypt
    7 ( input_string => l_data,
    8 key_string => 'MagicKey',
    9 encrypted_string=> p_str );
    10 end;
    11 /
    Procedure created.
    SQL> create or replace procedure decrypt1( p_str in out varchar2 )
    2 as
    3 l_data varchar2(255);
    4 begin
    5 dbms_obfuscation_toolkit.DESDecrypt
    6 ( input_string => p_str,
    7 key_string => 'MagicKey',
    8 decrypted_string=> l_data );
    9
    10 p_str := rtrim( l_data, chr(0) );
    11 end;
    12 /
    Procedure created.
    SQL> set autoprint on;
    SQL> exec crypt1( :x );
    PL/SQL procedure successfully completed.
    X
    5??V????? ??
    SQL> exec decrypt1( :x );
    BEGIN decrypt1( :x ); END;
    ERROR at line 1:
    ORA-28232: invalid input length for obfuscation toolkit
    ORA-06512: at "SYS.DBMS_OBFUSCATION_TOOLKIT_FFI", line 0
    ORA-06512: at "SYS.DBMS_OBFUSCATION_TOOLKIT", line 153
    ORA-06512: at "UJAPAN.DECRYPT1", line 5
    ORA-06512: at line 1
    X
    5??V????? ??
    Any idea or thought would be appreciable.
    Thanks n advance
    Anwar

    From the top of my head (without checking the docs) I think that the string to be obfuscated must have a length of a multitude of 8 bytes. You might need some padding to get it to the right length.
    cu
    Andreas

  • To create interface using Integration Repostiory and Integration Directory

    How To create interface using Integration Repostiory and Integration Directory for Java appln???

    Hi,
    Are u talking about Java based applications. If so, one of the way is to go with Java Proxies.
    Go thru these for more:https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/a068cf2f-0401-0010-2aa9-f5ae4b2096f9
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/f272165e-0401-0010-b4a1-e7eb8903501d
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/d06315a6-e66e-2910-039c-ba8bbbd23702
    Rgds,Moorthy

  • How to check does my notebook use integrated or AMD graphic card?

    How to check does my notebook use integrated or AMD graphic card? Some games show me that they use integrated card: http://img849.imageshack.us/img849/4125/98ab1c28dc9f4b51b537435.png ?
    This question was solved.
    View Solution.

    Hello,
    First click in Start Menu, Control Painel in the up right side click in Category and left in Small Icons.
    Search Device Manager.
    Display Adapters.
    Which is your Operation System ?
    Windows 7?
    If yes.
    Click with the right clickpad in the desktop and select Display.
    Screen Resolution you can see how graphic your used or change if you want to.
    Att Cristian
    If this answer help you click in Kudos to tanks.
    Tanks
    If this answer help you click in Kudos to tanks.
    If you don't have more question click in Accept as Solution to close this case.
    Best Regards Cristian Derick.
    Senior Support Analyst.

  • How to use integration event

    Hi
    i am facing issue when using integration event to get the modified value of account type in accounts. i have made a workflow on accounts at event of "when modified record save" which is using queue of "Default Queue". I have a also made custom .Net application which is using wsdl of "integration event" . But i can't read the modified value of account type through integration event when an account modified . Can any one guide me in this regards ?

    Hi,
    I have a WSDL file and i woudl know how to process for updating an account.
    I am pragramming in php. I have donne a function to connect to my Oracme crm domaine url.
    Thanks for your help
    lansar

  • How to trigger EBP program when used integration ITS?

    Hi,Everyone,
        I used integration ITS,and now,i design a pushbutton in screen at ITS,But,how to triggered to EBP Program?
        Who know that.
        Thanks
    BestRegards
    Andy
    Edited by: andy zhou on Jul 25, 2008 10:15 AM

    Hi,
    for these kinds of issues,
    foirst check if a uefull event already exists in the system
    for this you first actiave the event trace: SWELS.
    Then you change the info record.
    And then you read the event log with SWEL.
    If there's no event, you may eventually have to create it in an exit with SAP_WAPI_CREATE_EVENT fm
    Kind regards, Rob Dielemans

Maybe you are looking for

  • How to exit out of birthday calendar and see my personalized calendar

    Hi, Might be a dumb question but ever since I upgraded to Maverick, I can't see my own personalized calendar. I launch the calendar and all I can see is the holiday calendar or the birthday calendar and i'm not allowed to make changes to either so th

  • Ipod recovery does not work

    Hey, My iPod touch can not be restored.(He is in recovery mode) Time and again the error-2009th What can I do? there are no USB devices connected, itunes I updated to 10.3 but still the error keeps coming back 2009th Please help as soon as possible!

  • How to conet my PC to the aiport

    I have a aiport III and i want to conect from my PC (windows) to it, who can I do it?

  • How to avoid multiple if else using design patterns.

    Hi, Which design patterns is used to avoid lot of if else in our code . Say for example if the user press 1 the out put should be one, if he press 2 it should be two like this upto 10. So we need to include lot of if-else part. How to avoid the multi

  • Sounds in the display - Macbook pro Retina 15"

    I had a problem on Macbook pro retina 15 "after 7 months of use. If you gently shake the laptop horizontally, then something starts to hang out in the display. If you press on the screen and shake - sound disappears! What could it be?? Tell me please