What is PROTECT ENDPROTECT in SAPscript?

Hi SDN,
What is the significance of Protect & End-protect in Sapscripts?
Regards,
Rahul.

To allow you to define the areas to be protected against a page break on an individual basis, SAPscript provides the PROTECT.. ENDPROTECT command pair. If you enclose the text to be protected in these commands, then SAPscript will ensure that each line of this text is printed together on the same page. If the complete text fits in the space remaining on the current page, then it is printed on this page just as it would be if no PROTECT command had been used. If, however, the remaining space is not sufficient for the text, then the PROTECT command has the same effect as a NEW-PAGE command and text is printed on a new page.
Thus the PROTECT/ENDPROTECT commands may be regarded as a kind of conditional NEW-PAGE command, the condition being whether or not the lines enclosed between the two commands fit in the space remaining in the current main window.
Syntax:
/: PROTECT
/: ENDPROTECT
The text lines to be protected are enclosed between the two commands.
An ENDPROTECT command without a preceding PROTECT command has no effect.
If the terminating ENDPROTECT is missing, SAPscript assumes it at the end of the text.
PROTECT.. ENDPROTECT command pairs cannot be nested. If a second PROTECT command occurs before the first one has been terminated by an ENDPROTECT, it is ignored.
If the text enclosed by a PROTECT.. ENDPROTECT pair is itself too long for a single page, then a page break is generated immediately before the text and the text is printed in the normal way. It is then unavoidable that a page break will occur at some point within the text.
Hope dis helps
Reward all helpful answers

Similar Messages

  • Override Use of Protect-Endprotect Function when editing Standard Sapscript

    Hi abapers,
    I have made a copy of a standard form (F150_DUNN_01) and edited it according to the customers needs.  One problem I have encountered is the use of seperate elements, As you can see in the standard form, the table is output as one element and the total appears afterwards in another element.  As I am not editing the print control program I have added texts, etc. after the totals line but inside elements which I know are always output.  I have recently noticed that some of the elements are protected using the 'CONTROL_FORM' function in the print control program.
    This leads me to the problem, when I have between 10-15 records in the table the following elements (540 - 592) are printed on the following page.  I have read about the protect-endprotect statements but in my case it would be between 2 elements.
    I would like the totals line to appear along with the table and the rest can go on the next page.   Is it possible to use this method without editing the print control prorgam to call elements without protection?  Elements 581 - 592 are currently protected using the 'CONTROL_FORM' function in the print program.
    Here is a snippet of the MAIN window with some PROTECT statements used but not working as expected.
    /:           PROTECT
    /E           530
    T3            <BU>INV.NUM</>,,<BU>DATE</>,,<BU>INV.Amount</>,,<BU>DUE DATE</>,,
    =           <BU>NOTE</>
    T3                                                                                  
    /E           531
    /:           DEFINE &TDLINE& = ''
    /:           PERFORM GET_TEXT IN PROGRAM ZFII_F150_ROUTINE
    /:           USING &T001-SPRAS&
    /:           USING &MHND-BELNR&
    /:           USING &MHND-BUKRS&
    /:           USING &MHND-GJAHR&
    /:           CHANGING &TDLINE&
    /:           ENDPERFORM
    T3            &MHND-BELNR&,,&MHND-BLDAT&,,&MHND-WRSHB(C)&,,&MHND-FAEDT& ,,&TDLINE&
    /E           540
    /E           550
    AS           Inicio:      &T040A-TEXT1&
    /E           551
    AS           Fin:          &T040A-TEXT1&
    /E           570
    T3           Gtos.reclam.,,&F150D-WAERF&,,&F150D-MHNGF(C)&
    /E           581
    T3           ,,,,&ULINE(15)&
    T3           ,,&F150D-WAERF&,,&F150D-SUFPF(C)&
    /E           582
    T3           ,,&F150D-WAERF&,,&F150D-SUFPF(C)&
    /:           ENDPROTECT
    /E           591
    AS                                                                                  
    /:           CASE &MHNK-MAHNS&
    /:           WHEN '1'
    /:           INCLUDE ZFI_DUNN_MAIN5911 OBJECT TEXT ID ST LANGUAGE &T001-SPRAS&
    /:           WHEN '2'
    /:           INCLUDE ZFI_DUNN_MAIN5912 OBJECT TEXT ID ST LANGUAGE &T001-SPRAS&
    /:           WHEN '3'
    /:           INCLUDE ZFI_DUNN_MAIN5913 OBJECT TEXT ID ST LANGUAGE &T001-SPRAS&
    /:           ENDCASE
    T6                                                                                  
    /E           592
    T6                              ,,&F150D-WAERF&,,&F150D-SALFW(C)&
    Regards,
    Simon
    Edited by: Simon Kerr on Oct 4, 2010 12:14 PM

    Hi Vijay,
    Thanks for reply but it isn't work.
    I think there is no documentaion available in any languagein the SAP.
    So If possible give me any other reference by which I can search documentation.
    Or just check it at your end if available send it to me.
    Please try once again.
    I wnat documentation for function modules in the Function Group MBWL & J1IEXGM.
    both are used for MIGO.
    Thanks and Regards
    Dhanu

  • PROTECT-ENDPROTECT problem in SAP Script

    In SAP Script MAIN Window I have 10 different elements to print differet stuff related with each delivery line item.
    Like Material Number
    Material Description
    Long text [Has formatted text and I am reading that text and printed in some format some lines under material number and some under materail desc.]
    and other information required by client.
    Loop at Delivery item table.
    CALL FUNCTION 'CONTROL_FORM'
           EXPORTING
                command = 'PROTECT'.
    Print differnt elements.
    Loop at lond text internal table.
    print in proper format as I mentioned.
    endloop.
      CALL FUNCTION 'CONTROL_FORM'
           EXPORTING
                command = 'ENDPROTECT'.
    ENDLOOP.
    My problem is PROTECT ENDPROTECT is not working properly.
    It is printing only 1 item with other info on first page as there are enough space left to print minimum three items with details.
    on next page it is priting only 3-4 items as there are enough sapce to ptint at lease 10 items with details.
    The only good thing is it is not spliting the Item details and other text.[Main window on next page has bigger size]
    Any idea why PROTECT - ENDPOTECT not behaving properly.
    Thanks
    Aman
    Message was edited by: Amandeep  Singh

    Hello,
    Try to do like, Put PROTECT and ENDPROTECT in the SAPScript itself.
    Like
    Element 1
    Protect
    ..matnr....
    element 2
    ...desc....
    element 3 (long text)
    ...text
    ....text
    element 4
    endprotect
    call the element 4 in the loop statment, whenever required.
    Hope it will work.
    Regards,
    Naimesh.

  • PROTECT-ENDPROTECT IN SAP SCRIPT

    HOW DO WE USE PROTECT-ENDPROTECT TO MAKE SURE THAT THE OUTPUT DISPLAYED IN A VARIABLE WINDOW IS EITHER COMPLETE OR NOT PRINTED AT ALL.

    Check this Documentation,
    I have this full document if you want i will mail you..
    <b>PROTECT: Protect from page break</b>
    You can determine that a paragraph must not be separated by a page break in the style or layout set. If the attribute page protection is set, then all the lines of this paragraph are always output together on one page. This attribute is linked to the respective paragraph.
    It certainly does not make sense, to provide all the paragraphs with a page protection attribute to neutralize an unwanted page break. This event is much too dynamic for this and only results from the current text. Furthermore, it can also happen that you only want to protect parts of a paragraph from a page break. In principle, you could solve this problem using the command NEW-PAGE, by explicitly starting a new page before the affected parts of the text. However, this procedure is not very easy to make changes to. Assume that you have formatted your text using the NEW-PAGE command so that you have no unwanted
    page breaks. If you now insert new lines or delete existing ones, you would have to check all the NEW-PAGE commands inserted after this point in the text, as changes can result in the movement of page breaks. With the command pair PROTECT. ENDPROTECT, SAPscript offers you the option of individually defining protection from a page break. If you parenthesize the text in question using these commands, SAPscript automatically guarantees that all the lines it contains are printed together on one page. If the lines fit on the current output page, they are output there, in exactly the same way as if the PROTECT
    command was not used. If, however, the space is not sufficient, the PROTECT command then works as a NEW-PAGE and generates a form feed .For this reason, you can view PROTECT/ENDPROTECT as a conditional NEW-PAGE command, whose condition consists of whether the included lines fit into the current window MAIN or not.

  • Protect - endprotect in Smartform

    hi
    what is the similar statement for protect-endprotect in smartforms
    please help me out.
    regards
    padma

    HI
    here are two options for protection against line break:
    - You can protect a line type against page break.
    - You can protect several table lines against page break for output in the main area.
    Protection against page break for line types
    - Double-click on your table node and choose the Table tab page.
    - Switch to the detail view by choosing the Details pushbutton.
    - Set the Protection against page break checkbox in the table for the relevant line type.  Table lines that use this line type are output on one page.
    Protection against page break for several table lines
    - Expand the main area of your table node in the navigation tree.
    - Insert a file node for the table lines to be protected in the main area.
    - If you have already created table lines in the main area, you can put the lines that you want to protect again page break under the file using Drag&Drop. Otherwise, create the table lines as subnodes of the file.
    - Choose the Output Options tab page of the file node and set the Page Protection option.   All table lines that are in the file with the Page Protection option set are output on one page.
    In 4.6, Alternatively in a paragraph format use the Page protection attribute to determine whether or not to display a paragraph completely on one page. Mark it if you want to avoid that a paragraph is split up by a page break. If on the current page (only in the main window) there is not enough space left for the paragraph, the entire paragraph appears on the next page. 
    Regards
    PAVAN

  • How to write Protect endprotect concept in Smartforms

    hi
    can any one suggest me
    How to write Protect endprotect concept in Smartforms
    i have some content to coem without break in SMARTFORM
    how to do that
    Thanks & Regards
    kalyan
    <thread moved, has nothing to do with ABAP Objects. Please choose your forums more carefully in future>
    Edited by: Mike Pokraka on Sep 26, 2008 12:50 AM

    Hi,
    For 4.7 version if you are using tables, there are two options for protection against line break: 
    - You can protect a line type against page break.
    - You can protect several table lines against page break for output in the main area.
    Protection against page break for line types 
    - Double-click on your table node and choose the Table tab page. 
    - Switch to the detail view by choosing the Details pushbutton. 
    - Set the Protection against page break checkbox in the table for the relevant line type.  Table lines that use this line type are output on one page. 
    Protection against page break for several table lines 
    - Expand the main area of your table node in the navigation tree. 
    - Insert a file node for the table lines to be protected in the main area. 
    - If you have already created table lines in the main area, you can put the lines that you want to protect again page break under the file using Drag&Drop. Otherwise, create the table lines as subnodes of the file. 
    - Choose the Output Options tab page of the file node and set the Page Protection option.   All table lines that are in the file with the Page Protection option set are output on one page. 
    In 4.6, Alternatively in a paragraph format use the Page protection attribute to determine whether or not to display a paragraph completely on one page. Mark it if you want to avoid that a paragraph is split up by a page break. If on the current page (only in the main window) there is not enough space left for the paragraph, the entire paragraph appears on the next page. 
    Regards,
    Himanshu Verma

  • Protect-Endprotect Command

    Hoz exactly we use Protect-EndProtect command to avoide output text which should not spilt in two pages. Plz explain with example of Codes.
    Thanks.

    Hi
    It is used to protect the address or info to print in one page only
    If the space in one page is not sufficient it will print in the second page
    see the sample
    /:           PROTECT
    /:           ADDRESS PARAGRAPH AS
    /:             TITLE    &LFA1-ANRED&
    /:      NAME     &LFA1-NAME1&, &LFA1-NAME2&, &LFA1-NAME3&,
    /:             STREET   &LFA1-STRAS&
    /:             POBOX    &LFA1-PFACH&  CODE &LFA1-PSTL2&
    /:             CITY     &LFA1-ORT01&, &LFA1-ORT02&
    /:             POSTCODE &LFA1-PSTLZ&
    /:             COUNTRY  &LFA1-LAND1&
    /:             REGION   &LFA1-REGIO&
    /:             FROMCOUNTRY &T001-LAND1&
    /:           ENDADDRESS
    /:       ENDPROTECT
    Reward points if useful
    Regards
    Anji

  • Usage of protect endprotect in smartforms

    To control the Paragraph in a page we use protect endprotect in SAP SCRIPT. how to go about it in smartorms

    Syntax:
    /: PROTECT
    /: ENDPROTECT
    The lines to be protected lie between the two commands.
    An ENDPROTECT command without a preceding PROTECT command is ineffective.
    If the last ENDPROTECT is missing, it is implicitly assumed at the end of the text.
    PROTECT .. ENDPROTECT commands cannot be nested. If a second PROTECT command is recognized while another is active, the second is ignored.
    If the text between PROTECT and ENDPROTECT is so extensive that it would not fit on an empty page, then only one form feed is generated and the text is normally output. Thus, in this case, the section to be protected is separated by a page break.

  • What virus protection should i download for my macbook pro

    i just got my macbook pro and want to know what virus protection program should i download for free

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article.
    Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If Java is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.

  • What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    You've been infected by a scam trojan.  You don't need any anti-virus software on your Mac.  See the following about getting rid of the trojan.
    Trojan War
    If you discover a trojan program is running on your computer then look to the following information for assistance:
    1. A recent discussion on the Apple Support Communities: MacDefender Trojan.
    2. An excellent site devoted to Mac Malware: Macintosh Virus Guide
    3. Another site for removing MacDefende, et.al.: MAC Defender Rogue Anti-Virus analysis and Removal
    4. A new removal utility - MacDefenderKiller
    Removing strange software can be a task.  The following outlines various ways of uninstalling software:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a Startup item or a Log In item.  Startup items are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the Delete [-] button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, Easy Find, instead.  Download Easy Find at VersionTracker or MacUpdate.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Note that you must have this software installed before you install software you may need to uninstall.  Uninstallers won't work if you install them after the fact.  Here is a selection:
    AppZapper
    Automaton
    Hazel
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them and others at VersionTracker or MacUpdate.
    For more information visit The XLab FAQs and read the FAQs on removing software and dealing with spyware and malware.
    After removing all the components of the software you may have to restart the computer to fully disable the software.  This will be the case when removing software that has installed a daemon.  After the daemon has been removed you need to restart the computer to stop the daemon.  Alternatively, you can kill the daemon process using the Terminal application or Activity Monitor.

  • I have a macbook pro what virus protection should i install?

    I have a macbook pro, what virus protection should I install?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is protected by a LabVIEW Semaphore?

    I can't seem to find a lot of documentation on LabVIEW Sempahores. I was wondering whether there is any firm guarantee as to what is protected by a semaphore and what is not protected by a semaphore.
    The only example I could find seemed to indicate that calls to a SubVI are protected if they are made from within the confines of an acquired semaphore. I was wondering whether attempts to write to a local variable or to a global variable [from within the confines of an acquired semaphore] were also guaranteed to be protected.
    I've attached a sample VI which has four threads: Three of them try to write about 100 times per second, and the fourth tries to read what they've written about 1000 times per second.
    The three w
    riter threads write -1, 0, and 1, respectively, to each of three data structures: a local variable, a global variable, and a "functional global variable" within a SubVI.
    I was wondering whether there is any firm guarantee that all three of these kinds of writes are protected by semaphores, or if it's just the write to the SubVI that's protected.
    As an aside, the CPU time allotted to the three writer threads doesn't seem to be distributed very evenly; one thread will grab the CPU and hold onto it for much longer than it ought to [given that it should be awake for only about 1/100th of a second at a time]. Is there any way to force the CPU time to be distributed more evenly?
    PS: The attached VI does no error checking; I just wanted to throw together something that would demonstrate the questions I'm wondering about.
    Thanks!
    Attachments:
    semaphores.zip ‏62 KB

    The help files say that the code between Acquire and Release is protected. In your code you do not verify that the semaphore was actually acquired (no timeout and no error). I changed your VI to use a state machine structure for each "thread" and included error checking. The semaphore is only released if it was acquired (Help says an error may occur otherwise).
    I have found that the Synchronization functions and VIs require some experimentation to really understand how they work.
    Lynn
    Attachments:
    Semaphore_test2.vi ‏166 KB

  • Example using command protect & endprotect

    hii gem's
    im unable to find the difference when using protect...endprotect
    without tht bcoz im getting same output
    ex:
    /: protect
    PH  'THIS IS TEST'
    PH  'THIS IS TEST'
    /: NEW-PAGE
    PH 'THIS IS TEST'
    ENDPROTECT
    please give a example using command protect & endprotect
    THANK U
    REWARDS FOR GUD REPLY
    REGARDS
    JAIPAL

    Hi Jaipal,
    It is mainly used to prevent the page break
    menas whatever lines you wrote between these protect and endprotect they are always printed in a single page only and they won't split into two pages though there is no full space
    go to SE71 see any scripts pagewindows
    you will find a lot of examples
    /E           TOTAL_AMOUNT
    /:           PROTECT
    UL           &ULINE(71)&
    TO                                                                                  
    TO           ,,Total net value excl. tax &EKKO-WAERS&,,
                                        &KOMK- FKWRT&
    /:           IF &SUM-EURO-PRICE& NE '                0,00'
    /           ,,                          EURO,,&SUM-EURO-PRICE&
    /:           ENDIF
    /:           ENDPROTECT
    Reward points for useful Answers
    Regards
    Anji

  • What antivirus protection do I need for the iPad?

    I am seeing some unusual activity after receiving an email.  What antivirus protection should we be considering for the ipad2?

    None - there are no viruses for the iPad (or iPhone or iPod Touch), and therefore there are no antivirus apps available in the iTunes App Store

  • What virus protection do you recommend?

    What virus protection do you recommend for MacBook Pro?

    I simply recommend practicing safe browsing habits, such as not opening files or attachments from unverified sources and never provide your user name and password unless you're certain of what you're doing.
    Point in case: There is a malicious application currently floating around which goes by various different names, such as Mac Defender and Mac Security. When this piece of malware is downloaded and run on your computer, it will ask you to install it and you will be asked to provide your user name and password for it to gain access to your computer. By not providing this information, the malware is unable to cause any harm your computer.

Maybe you are looking for

  • How to change sold to party in sales order

    Hi We have the below requirment of changing sold to party after creation of sales order... Below is the scenario Once sales order is created,purchase requisition is created autamatically and purchase order is created with reference to the purchase re

  • BannerMaker not working after system update.

    Hello all, I am not trusting Apple now for system updates anymore, because the last couple of updates, after updating my system software, I have problems. I never have these issues with Windows. Getting to my point, I use BannerMaker (an app created

  • Can't uninstall itunes to upgrade to 6.0!!

    I used itunes for a few months now (version prior to 6.0) and i just got an ipod (5th generation). since this ipod requires 6.0, i put in the cd it came with to install it. During installation it says it "cant unistall previous version of itunes" and

  • How do you set headers in httpresponse using forte tool code in UDS

    I am attempting to download a file that is generated in forte (its a CSV). When the response gets back to the browser the save box has a cgi.exe type filename. Instead I would like to supply my own, to do this I think you need to set content-disposit

  • How can i save my recordings from the Vestax Spin DJ USB Controller onto my iPod

    When i record a mix, it does go onto my itunes library, however even after syncing my ipod, the recording wont transfer onto the ipod.  i also saved recording onto a playlist, so they are on the mac/itunes library but wont go on the ipod tuch