Why do i need a recovery pass to sync my bookmarks??????

I need to use my bookmarks, even if i don't have my PC close to me. It's totally pointless to impose to all users the recovery key system. I don't need full encrypted data, i need fast and easy access!!!!!! I need my bookmarks accessible to me everywhere I am!!! "print and keep the recovery key in a safe place" my ass.... Obviously it's in a safe place, Three damned thousand kilometers away from me!!!!
The only option i have it's to erase all my data and start again. Yes, i will start again, but using another browser!!!!!
I'm so pissed of with that, i'm leaving Firefox for good.
''moderator edited the title of this thread for clarity''

If someone else has access to the computer where Sync already is set up, they can generate a pair code for you to add the device you're using where you are now. See: [[How do I add a device to Firefox Sync?]]
If you want to access saved data from any random device, then as you've discovered, Sync is not the right service to use for that. You could use a third party service like Xmarks, or if you don't need two-way sync, export your bookmarks to an HTML file and host it somewhere convenient to you like your Dropbox, Google Docs, a website you control, or as an email attachment.

Similar Messages

  • Why do I need to create playlists to sync audiobooks correctly?

    When I try to just sync audiobooks to my iPod, I get a jumble of tracks. I have to create each audiobook as a playlist, and then add the playlists. Also, I had to designate each audiobook as such (instead of music) but in the grid view, each one was still categorized as music and it was impossible to change them. Only in list view could I change each track and have it "stick." I have been messing with syncing my iPod for over an hour now, when it should be an easy procedure.

    Unfortunately, organazing audiobooks is a bit trickier than it needs to be.  See this excellent article from another forum member turingtest2 for more information and tips.
    Audiobooks on iPods
    B-rock

  • Why do I need to pass params. to getConnection when using OracleDataSource?

    Hi,
    I've been experimenting with Tomcat 5.5 and using Oracle proxy sessions. After many false starts, I finally have something working, but I have a question about some of the code.
    My setup:
    In <catalina_home>/conf/server.xml I have this section:
    <Context path="/App1" docBase="App1"
    debug="5" reloadable="true" crossContext="true">
    <Resource name="App1ConnectionPool" auth="Container"
    type="oracle.jdbc.pool.OracleDataSource"
    driverClassName="oracle.jdbc.driver.OracleDriver"
    factory="oracle.jdbc.pool.OracleDataSourceFactory"
    url="jdbc:oracle:thin:@127.0.0.1:1521:oddjob"
    username="app1" password="app1" maxActive="20" maxIdle="10"/>
    </Context>
    In my App directory, web.xml has:
    <resource-ref>
    <description>DB Connection</description>
    <res-ref-name>App1ConnectionPool</res-ref-name>
    <res-type>oracle.jdbc.pool.OracleDataSource</res-type>
    <res-auth>Container</res-auth>
    </resource-ref>
    And finally, my java code:
    package web;
    import oracle.jdbc.pool.OracleDataSource;
    import oracle.jdbc.driver.OracleConnection;
    import javax.naming.*;
    import java.sql.SQLException;
    import java.sql.ResultSet;
    import java.sql.Statement;
    import java.util.Properties;
    public class ConnectionPool {
    String message = "Not Connected";
    public void init() {
    OracleConnection conn = null;
    ResultSet rst = null;
    Statement stmt = null;
    try {
    Context initContext = new InitialContext();
    Context envContext = (Context) initContext.lookup("java:/comp/env");
    OracleDataSource ds = (OracleDataSource) envContext.lookup("App1ConnectionPool");
    message = "Here.";
    if (envContext == null)
    throw new Exception("Error: No Context");
    if (ds == null)
    throw new Exception("Error: No DataSource");
    if (ds != null) {
    message = "Trying to connect...";
    conn = (OracleConnection ) ds.getConnection("app1","app1");
    Properties prop = new Properties();
    prop.put("PROXY_USER_NAME", "xxx/yyy");
    if (conn != null) {
    message = "Got Connection " + conn.toString() + ", ";
              conn.openProxySession(OracleConnection.PROXYTYPE_USER_NAME,prop);
    stmt = conn.createStatement();
    //rst = stmt.executeQuery("SELECT 'Success obtaining connection' FROM DUAL");
    rst = stmt.executeQuery("SELECT count(*) from sch_header");
    if (rst.next()) {
    message = "# of NJ schools: " + rst.getString(1);
    rst.close();
    rst = null;
    stmt.close();
    stmt = null;
    conn.close(); // Return to connection pool
    conn = null; // Make sure we don't close it twice
    } catch (Exception e) {
    e.printStackTrace();
    } finally {
    // Always make sure result sets and statements are closed,
    // and the connection is returned to the pool
    if (rst != null) {
    try {
    rst.close();
    } catch (SQLException e) {
    rst = null;
    if (stmt != null) {
    try {
    stmt.close();
    } catch (SQLException e) {
    stmt = null;
    if (conn != null) {
    try {
    conn.close();
    } catch (SQLException e) {
    conn = null;
    public String getMessage() {
    return message;
    My question concerns this line of code:
    conn = (OracleConnection ) ds.getConnection("app1","app1");
    Why do I need to pass in the user name/password? Other examples, that I see simply have:
    conn = (OracleConnection ) ds.getConnection();
    But when I use this code, I get the following error:
    java.sql.SQLException: invalid arguments in call
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:112)
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:146)
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:208)
         at oracle.jdbc.driver.T4CConnection.logon(T4CConnection.java:236)
         at oracle.jdbc.driver.PhysicalConnection.<init>(PhysicalConnection.java:414)
         at oracle.jdbc.driver.T4CConnection.<init>(T4CConnection.java:165)
         at oracle.jdbc.driver.T4CDriverExtension.getConnection(T4CDriverExtension.java:35)
         at oracle.jdbc.driver.OracleDriver.connect(OracleDriver.java:801)
         at oracle.jdbc.pool.OracleDataSource.getPhysicalConnection(OracleDataSource.java:297)
         at oracle.jdbc.pool.OracleDataSource.getConnection(OracleDataSource.java:221)
         at oracle.jdbc.pool.OracleDataSource.getConnection(OracleDataSource.java:165)
         at web.ConnectionPool.init(ConnectionPool.java:32)
    ... more follows, but I trimmed to keep posting shorter :-)
    Is there anyway that I can avoid having to pass the user/password to getConnection()? It seems that I should be able to control the user/password used to establish the connection pool directly in the server.xml file and not have to supply it again in my java code. In earlier experiments when I was using "import java.sql.*" and using it's DataSource, I can use getConnection() without having to pass user/password, but then the Oracle Proxy methods don't work.
    I'm a java newbie so I guess that I should be happy that I finally figured out how to get proxy connections working. However it seems that I am missing something and I want this code to be as clean as possible.
    If anyone can point me to a better method of using connection pools and proxy sessions, I would appreciate it.
    Thanks,
    Alan

    Hi,
    Thanks for the replies.
    Avi, I'm not really sure what you are getting at with the setConnectionProperties. I looked at the javadoc and saw that I can specify user/password, but since I'm using a connection pool, shouldn't my Datasource already have that information?
    Maro, your comment about not having set the user/password for the Datasource is interesting. Are you referring to setting it in the server.xml configuration file? As you can see I did specify it in addition to setting the URL. In my code example, I'm not having to respecify the URL, but maybe I have a typo in my config file that is causing the username/password not to be read properly??
    The other weird thing is that I would have expected to see a pool of connections for user App1 in V$SESSION, but I see nothing. If I use a utility to repeatedly call a JSP page that makes use of my java example, then I do see v$session contain brief sessions for App1 and ADAVEY (proxy). The response time of the JSP seems much quicker than I would have expected if there wasn't some sort of physical connection already established though. Maybe this is just more evidence of not having my server.xml configured properly?
    Thanks.

  • My email address is ***********, Apple ID I forgot my password, why not send links that Reset Pass on my email, I need help than why? Contact Us By Email me back with ***********, Thanks

    My email address is ***********, Apple ID I forgot my password, why not send links that Reset Pass on my email, I need help than why? Contact Us By Email me back with ***********, Thanks
    <E-mails Edited by Host>

    You are not addressing Apple here. This is a user-supported technical support forum. If you have tried to restore your Apple ID using iForgot, then try contacting iTunes Customer Service.

  • Hard Drive Failure on HP DV 6000 Pavilion laptop Windows-XP​sp3 OS - Need Data Recovery Help

    Hard Drive Failure on HP DV 6000 Pavilion laptop - Need Data Recovery Help
    HP Pavilion DV 6108 NR, RG365UA, purchased in late 2006 at Best Buy, with Windows XP, upgraded to Service Pack 3. It has a Fujitsu hard disk, 60 gigabyte, partitioned into C: and a Recovery D:.
    Windows tries to boot up, but goes to blue screen with the message: "Unmountable Boot Volume" for one second, then just keeps recycling until I force a shutdown.
    BIOS Phoenix, hard drive test result: " #1-08 Fail "
    I ran a disk analysis/recovery program on the Cdrive and it seemed to show the directory structure intact, and it was able to recover some files. I was using the free one from Seagate (which only recovers small files). The second pass didn't run so well, and during the third run the program said I should not proceed further, and I should contact a professional disk recovery company.
    However, the D drive seems to be intact, so, I wonder if the disk is corrupted or just some aspect of the logical C drive is bad.
    How can I get the D: to run the recovery software on it? The recovery disks, made by Best Buy, only proceed to the R / F / Q option screen, and when I press R, I get a blue screen every time.
    Tapping the F10 key during startup gets me nowhere. Ditto the F11 key.
    I dont care about the hard disk; it is the data (files, docs, images, etc)  that I want.
    I contacted HP to order recovery disks but they are no longer available for my computer.
    Any suggestions would be greatly appreciated!
    Jon
    This question was solved.
    View Solution.

    Update...
    I found a website that offers the following:
    http://www.computersurgeons.com/p-13442-recovery-k​it-435422-001-for-hp-model-number-dv6108nr.aspx
    Recovery Kit 435422-001 For HP Model Number dv6108nr
    Price: $27.00
    Recovery Kit Set (An Entire Image of the Computer hard drive when the computer was new)
    But I wonder how useful it would be. Early XP , no doubt. And if my hard disk problem is a mechanical fault, would any recovery disk even work? The disks made by Best Buy when I bought mine new in 2006 don't do anything more than go to the R /F/ Q screen and then goes to a blue screen when I press R (to recover the OS and apps and data files). And, as I wrote, it is the data that I want, not the disk drive.

  • Why do I need to Clone a drive partition...

    ...if I'm installing a new OS to another one??
    I've got Panther--my current, albeit outdated, boot OS--installed on one partition of my Dual G4 (and yes, the limitations of this computer is one reason I'm not on Leopard yet)--and trying to install Tiger onto the 2nd partition (which will hopefully tide me over until I upgrade to a new iMac or Powerbook w/ Leopard). I don't have much experience upgrading to a new OS while one is working, so hopefully the older/current one will act as a backup safeguard if the newer one acts up.
    Anyway, I haven't been able to install it yet--for whatever reason, it's not progressing beyond "Verifying Destination Volume," and I can't seem to verify the partition in Disk Utility due to Authentication issues, but that's ANOTHER issue--but unless that directly relates, I can't figure out WHY everyone keeps telling me that I should clone either drive (using Carbon Copy).
    I already have all the important PERSONAL files from the current boot partition--and everything on the 2nd partition I'm trying to install to--backed up onto an external.
    So why do I need to clone either drive?? Just trying to clarify here...

    phasmatrope:
    I installed the new OS, Tiger, last night (which was actually fairly easy too... although it DIDN'T ask me if I wanted to do a Clean Upgrade, or an Archive & Install, which I'd heard were both options, which DOES worry me somewhat... but I suppose that's another post). It seems to be working fine thus far.
    It is hard to tell exactly what installation option was used in your installation, but it you are satisfied that your installation is working as it should, I don't think you need to be concerned about it.
    I figure in a few weeks, I may try deleting the clone from my partition (how long I should wait though, and whether or not I'll need to erase the drive entirely
    So long as your installation is working well, and all your data that you backed up has been restored, and you are sure you will not be losing anything of value, you may delete the clone/backup...but wait until I respond to another of your questions.
    what I'm wondering is: can I copy other material to that drive in the meantime without any problem?? After all, it IS a 300GB drive, and since I'd only cloned the 37 or so GB of my old boot partition there, I should be able to fit the 45 GB that are on the second partition onto there.
    I suggest that you partition your 300 GB external HDD so that it can accomodate all your needs.
    • Partition your HDD so that one partition is approximately the size of your internal HDD. Then you can clone your new installation to that partition, and make regular backups to that partition.
    • You can create a second partition to accomodate the material of the second partition of the drive you clone. Give yourself sufficient room for expansion.
    • Create other partitions one possibly just for scratch, saving odds and ends or whatever.
    Here is a step-by-step procedure for partitioning:
    Formatting, Partitioning Erasing a Hard Disk Drive
    Warning! This procedure will destroy all data on your Hard Disk Drive. Be sure you have an up-to-date, tested backup of at least your Users folder and any third party applications you do not want to re-install before attempting this procedure.
    Formatting an External HDD
    Connect external HDD to computer
    Turn on external HDD
    Start up computer and log in
    Go to Applications > Utilities > Disk Utility and launch DU.
    Select your HDD (manufacturer ID) of drive to be partitioned in left side bar.
    Select number of partition in pull-down menu above Volume diagram.
    (Note 1: One partition is normally preferable for an internal HDD. External HDDs usually have more than one. See Dr. Smoke’s FAQ Backup and Recovery for tips on partitioning external HDD
    Note 2: For more partitions than one, after you have selected the number of partitions you can adjust the size of the partition by selecting the top partition and typing in the size; then move down if more adjustments need to be made..)
    Type in name in Name field (usually Macintosh HD)
    Select Volume Format as Mac OS Extended (Journaled)
    Click Partition button at bottom of panel.
    Select Erase tab
    Select the sub-volume (indented) under Manufacturer ID (usually Macintosh HD).
    Check to be sure your Volume Name and Volume Format are correct.
    Optional: Select on Security Options button (Tiger) Options button (Panther & earlier).
    Select Zero all data. (This process will map out bad blocks on your HDD. However, it could take several hours. If you want a quicker method, don't go to Security Options and just click the Erase button.)
    Click OK.
    Click Erase button
    Quit Disk Utility.
    Please do post back with further questions or comments.
    Cheers
    cornelius

  • My iPhone 5S says it's disabled and to connect to iTunes, iTunes says it needs 4 digit pass code. I tried to restore it but device wasn't recognised. Any ideas? I only got it yesterday.

    My iPhone 5S says it's disabled and to connect to iTunes, iTunes says it needs 4 digit pass code. I tried to restore it but device wasn't recognised. Any ideas? I only got it yesterday.

    How did the passcode get on the phone to begin with, if you "only got it yesterday"? Regardless, to remove it, you'll have to force the phone into recovery mode, as described here, & restore it:
    http://support.apple.com/kb/ht1808
    This will remove the passcode.

  • Why do i need udev+udisks+udisks2+gvfs installed to dynamic mount?

    hi there,
    yes, i have used the search function on that, but still have unanswered questions.
    1.
    why do i need udev+udisks+udisks2+gvfs installed to dynamically mount internal (ntfs, ext4) partitions ?
    If one these packages is missing, mounting an internal drive with "pcmanfm" is not possible.
    I know how to static mount these drives via "fstab", but i want to mount them when i need the access.
    2.
    why are my removable devices not automatically mounted in "pcmanfm" when plugged in?
    I have another OS (Lubuntu) running and this automatically recognizes when a cd is inserted or a usb stick is plugged in.
    I have tried to install the package "gvfs-afc" and rebooted, still no usb stick to see. But when i enter:
    sudo blkid -c /dev/null
    The usb stick is listed as "sdb1"
    I am using 64bit arch linux 3.9.3-1 with openbox+lxde.

    jasonwryan wrote:
    You don't. You need udev for a whole lot of other stuff, so leave that aside. To automount removable media, you can just use udisks and a helper like ud{iskie,evil}.
    For an ntfs partition, you will also need that driver.
    Comparing it with the Lubuntu; I am sure there is a lot more cruft preinstalled that makes this happen. In Arch, you just install what you need.
    The udev page has the details.
    so i have uninstalled the gvfs+udisks2 packages, rebooted and installed udevil-git and rebooted again.
    No partition is shown in the filemanager now. I really dont get it. The udev wiki says udev needs rules but my "/etc/udev/rules.d" folder is empty.
    The udisks wiki says that udisks and udisks2 are incompatible and that only one is needed and that udisks2 should be installed for gnome systems and udisks for xfce, but i have lxde installed. So it is not working with udisks and lxde (pcmanfm), when i try to install udisks2 additionally, it also does not work. Uninstalling udisks is also not possible because of the dependancy to libfm and so on...
    Here is my /etc/udevil/udevil-user-harry.conf:
    # udevil configuration file /etc/udevil/udevil.conf
    # This file controls what devices, networks, and files users may mount and
    # unmount via udevil (set suid).
    # IMPORTANT: IT IS POSSIBLE TO CREATE SERIOUS SECURITY PROBLEMS IF THIS FILE
    # IS MISCONFIGURED - EDIT WITH CARE
    # Note: For greater control for specific users, including root, copy this
    # file to /etc/udevil/udevil-user-USERNAME.conf replacing USERNAME with the
    # desired username (eg /etc/udevil/udevil-user-jim.conf).
    # Format:
    # OPTION = VALUE[, VALUE, ...]
    # DO NOT USE QUOTES except literally
    # Lines beginning with # are ignored
    # To log all uses of udevil, set log_file to a file path:
    #log_file = /var/log/udevil.log
    # Approximate number of days to retain log entries (0=forever, max=60):
    log_keep_days = 10
    # allowed_types determines what fstypes can be passed by a user to the u/mount
    # program, what device filesystems may be un/mounted implicitly, and what
    # network filesystems may be un/mounted.
    # It may also include the 'file' keyword, indicating that the user is allowed
    # to mount files (eg an ISO file). The $KNOWN_FILESYSTEMS variable may
    # be included to include common local filesystems as well as those listed in
    # /etc/filesystems and /proc/filesystems.
    # allowed_types_USERNAME, if present, is used to override allowed_types for
    # the specific user 'USERNAME'. For example, to allow user 'jim' to mount
    # only vfat filesystems, add:
    # allowed_types_jim = vfat
    # Setting allowed_types = * does NOT allow all types, as this is a security
    # risk, but does allow all recognized types.
    # allowed_types = $KNOWN_FILESYSTEMS, file, cifs, smbfs, nfs, curlftpfs, ftpfs, sshfs, davfs, tmpfs, ramfs
    allowed_types = $KNOWN_FILESYSTEMS, file, ntfs, vfat
    # allowed_users is a list of users permitted to mount and unmount with udevil.
    # Wildcards (* or ?) may be used in the usernames. To allow all users,
    # specify "allowed_users=*". UIDs may be included using the form UID=1000.
    # For example: allowed_users = carl, UID=1000, pre*
    # Also note that permission to execute udevil may be limited to users belonging
    # to the group that owns /usr/bin/udevil, such as 'plugdev' or 'storage',
    # depending on installation.
    # allowed_users_FSTYPE, if present, is used to override allowed_users when
    # mounting or unmounting a specific fstype (eg nfs, ext3, file).
    # Note that when mounting a file, fstype will always be 'file' regardless of
    # the internal fstype of the file.
    # For example, to allow only user 'bob' to mount nfs shares, add:
    # allowed_users_nfs = bob
    # The root user is NOT automatically allowed to use udevil in some cases unless
    # listed here (except for unmounting anything or mounting fstab devices).
    allowed_users = harry, root
    # allowed_groups is a list of groups permitted to mount and unmount with
    # udevil. The user MUST belong to at least one of these groups. Wildcards
    # or GIDs may NOT be used in group names, but a single * may be used to allow
    # all groups.
    # Also note that permission to execute udevil may be limited to users belonging
    # to the group that owns /usr/bin/udevil, such as 'plugdev' or 'storage',
    # depending on installation.
    # allowed_groups_FSTYPE, if present, is used to override allowed_groups when
    # mounting or unmounting a specific fstype (eg nfs, ext3, file). For example,
    # to allow only members of the 'network' group to mount smb and nfs shares,
    # use both of these lines:
    # allowed_groups_smbfs = network
    # allowed_groups_nfs = network
    # The root user is NOT automatically allowed to use udevil in some cases unless
    # listed here (except for unmounting anything or mounting fstab devices).
    allowed_groups = storage
    # allowed_media_dirs specifies the media directories in which user mount points
    # may be located. The first directory which exists and does not contain a
    # wildcard will be used as the default media directory (normally /media or
    # /run/media/$USER).
    # The $USER variable, if included, will be replaced with the username of the
    # user running udevil. Wildcards may also be used in any directory EXCEPT the
    # default. Wildcards will not match a /
    # allowed_media_dirs_FSTYPE, if present, is used to override allowed_media_dirs
    # when mounting or unmounting a specific fstype (eg ext2, nfs). For example,
    # to cause /media/network to be used as the default media directory for
    # nfs and ftpfs mounts, use these two lines:
    # allowed_media_dirs_nfs = /media/network, /media, /run/media/$USER
    # allowed_media_dirs_ftpfs = /media/network, /media, /run/media/$USER
    # NOTE: If you want only the user who mounted a device to have access to it
    # and be allowed to unmount it, specify /run/media/$USER as the first
    # allowed media directory.
    # IMPORTANT: If an allowed file is mounted to a media directory, the user may
    # be permitted to unmount its associated loop device even though internal.
    # INCLUDING /MNT HERE IS NOT RECOMMENDED. ALL ALLOWED MEDIA DIRECTORIES
    # SHOULD BE OWNED AND WRITABLE ONLY BY ROOT.
    allowed_media_dirs = /media, /run/media/$USER
    # allowed_devices is the first criteria for what block devices users may mount
    # or unmount. If a device is not listed in allowed_devices, it cannot be
    # un/mounted (unless in fstab). However, even if a device is listed, other
    # factors may prevent its use. For example, access to system internal devices
    # will be denied to normal users even if they are included in allowed_devices.
    # allowed_devices_FSTYPE, if present, is used to override allowed_devices when
    # mounting or unmounting a specific fstype (eg ext3, ntfs). For example, to
    # prevent all block devices containing an ext4 filesystem from being
    # un/mounted use:
    # allowed_devices_ext4 =
    # Note: Wildcards may be used, but a wildcard will never match a /, except
    # for "allowed_devices=*" which allows any device. The recommended setting is
    # allowed_devices = /dev/*
    # WARNING: ALLOWING USERS TO MOUNT DEVICES OUTSIDE OF /dev CAN CAUSE SERIOUS
    # SECURITY PROBLEMS. DO NOT ALLOW DEVICES IN /dev/shm
    allowed_devices = /dev/*
    # allowed_internal_devices causes udevil to treat any listed block devices as
    # removable, thus allowing normal users to un/mount them (providing they are
    # also listed in allowed_devices).
    # allowed_internal_devices_FSTYPE, if present, is used to override
    # allowed_internal_devices when mounting or unmounting a specific fstype
    # (eg ext3, ntfs). For example, to allow block devices containing a vfat
    # filesystem to be un/mounted even if they are system internal devices, use:
    # allowed_internal_devices_vfat = /dev/sdb*
    # Some removable esata drives look like internal drives to udevil. To avoid
    # this problem, they can be treated as removable with this setting.
    # WARNING: SETTING A SYSTEM DEVICE HERE CAN CAUSE SERIOUS SECURITY PROBLEMS.
    # allowed_internal_devices =
    # allowed_internal_uuids and allowed_internal_uuids_FSTYPE work similarly to
    # allowed_internal_devices, except that UUIDs are specified instead of devices.
    # For example, to allow un/mounting of an internal filesystem based on UUID:
    # allowed_internal_uuids = cc0c4489-8def-1e5b-a304-ab87c3cb626c0
    # WARNING: SETTING A SYSTEM DEVICE HERE CAN CAUSE SERIOUS SECURITY PROBLEMS.
    # allowed_internal_uuids =
    # forbidden_devices is used to prevent block devices from being un/mounted
    # even if other settings would allow them (except devices in fstab).
    # forbidden_devices_FSTYPE, if present, is used to override
    # forbidden_devices when mounting or unmounting a specific fstype
    # (eg ext3, ntfs). For example, to prevent device /dev/sdd1 from being
    # mounted when it contains an ntfs filesystem, use:
    # forbidden_devices_ntfs = /dev/sdd1
    # NOTE: device node paths are canonicalized before being tested, so forbidding
    # a link to a device will have no effect.
    forbidden_devices =
    # allowed_networks determines what hosts may be un/mounted by udevil users when
    # using nfs, cifs, smbfs, curlftpfs, ftpfs, or sshfs. Hosts may be specified
    # using a hostname (eg myserver.com) or IP address (192.168.1.100).
    # Wildcards may be used in hostnames and IP addresses, but CIDR notation
    # (192.168.1.0/16) is NOT supported. IP v6 is supported. For example:
    # allowed_networks = 127.0.0.1, 192.168.1.*, 10.0.0.*, localmachine, *.okay.com
    # Or, to prevent un/mounting of any network shares, set:
    # allowed_networks =
    # allowed_networks_FSTYPE, if present, is used to override allowed_networks
    # when mounting or unmounting a specific network fstype (eg nfs, cifs, sshfs,
    # curlftpfs). For example, to limit nfs and samba shares to only local
    # networks, use these two lines:
    # allowed_networks_nfs = 192.168.1.*, 10.0.0.*
    # allowed_networks_cifs = 192.168.1.*, 10.0.0.*
    allowed_networks = *
    # forbidden_networks and forbidden_networks_FSTYPE are used to specify networks
    # that are never allowed, even if other settings allow them (except fstab).
    # NO REVERSE LOOKUP IS PERFORMED, so including bad.com will only have an effect
    # if the user uses that hostname. IP lookup is always performed, so forbidding
    # an IP address will also forbid all corresponding hostnames.
    forbidden_networks =
    # allowed_files is used to determine what files in what directories may be
    # un/mounted. A user must also have read permission on a file to mount it.
    # Note: Wildcards may be used, but a wildcard will never match a /, except
    # for "allowed_files=*" which allows any file. For example, to allow only
    # files in the /share directory to be mounted, use:
    # allowed_files = /share/*
    # NOTE: Specifying allowed_files_FSTYPE will NOT work because the fstype of
    # files is always 'file'.
    allowed_files = *
    # forbidden_files is used to specify files that are never allowed, even if
    # other settings allow them (except fstab). Specify a full path.
    # Note: Wildcards may be used, but a wildcard will never match a /, except
    # for "forbidden_files = *".
    # NOTE: file paths are canonicalized before being tested, so forbidding
    # a link to a file will have no effect.
    forbidden_files =
    # default_options specifies what options are always included when performing
    # a mount, in addition to any options the user may specify.
    # Note: When a device is present in /etc/fstab, and the user does not specify
    # a mount point, the device is mounted with normal user permissions using
    # the fstab entry, without these options.
    # default_options_FSTYPE, if present, is used to override default_options
    # when mounting a specific fstype (eg ext2, nfs).
    # The variables $USER, $UID, and $GID are changed to the user's username, UID,
    # and GID.
    # FOR GOOD SECURITY, default_options SHOULD ALWAYS INCLUDE: nosuid,noexec,nodev
    # WARNING: OPTIONS PRESENT OR MISSING CAN CAUSE SERIOUS SECURITY PROBLEMS.
    default_options = nosuid, noexec, nodev, noatime
    default_options_file = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, ro
    # mount iso9660 with 'ro' to prevent mount read-only warning
    default_options_iso9660 = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, ro, utf8
    default_options_udf = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID
    default_options_vfat = nosuid, noexec, nodev, noatime, fmask=0022, dmask=0022, uid=$UID, gid=$GID, utf8
    default_options_msdos = nosuid, noexec, nodev, noatime, fmask=0022, dmask=0022, uid=$UID, gid=$GID
    default_options_umsdos = nosuid, noexec, nodev, noatime, fmask=0022, dmask=0022, uid=$UID, gid=$GID
    default_options_ntfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, utf8
    default_options_cifs = nosuid, noexec, nodev, uid=$UID, gid=$GID
    default_options_smbfs = nosuid, noexec, nodev, uid=$UID, gid=$GID
    default_options_sshfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, nonempty, allow_other
    default_options_curlftpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, nonempty, allow_other
    default_options_ftpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID
    default_options_davfs = nosuid, noexec, nodev, uid=$UID, gid=$GID
    default_options_tmpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID
    default_options_ramfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID
    # allowed_options determines all options that a user may specify when mounting.
    # All the options used in default_options above must be included here too, or
    # they will be rejected. If the user attempts to use an option not included
    # here, an error will result. Wildcards may be used.
    # allowed_options_FSTYPE, if present, is used to override allowed_options
    # when mounting a specific fstype (eg ext2, nfs).
    # The variables $USER, $UID, and $GID are changed to the user's username, UID,
    # and GID.
    # If you want to forbid remounts, remove 'remount' from here.
    # WARNING: OPTIONS HERE CAN CAUSE SERIOUS SECURITY PROBLEMS - CHOOSE CAREFULLY
    allowed_options = nosuid, noexec, nodev, noatime, fmask=0022, dmask=0022, uid=$UID, gid=$GID, ro, rw, sync, flush, iocharset=*, utf8, remount
    allowed_options_nfs = nosuid, noexec, nodev, noatime, ro, rw, sync, remount, port=*, rsize=*, wsize=*, hard, proto=*, timeo=*, retrans=*
    allowed_options_cifs = nosuid, noexec, nodev, ro, rw, remount, port=*, user=*, username=*, pass=*, password=*, guest, domain=*, uid=$UID, gid=$GID, credentials=*
    allowed_options_smbfs = nosuid, noexec, nodev, ro, rw, remount, port=*, user=*, username=*, pass=*, password=*, guest, domain=*, uid=$UID, gid=$GID, credentials=*
    allowed_options_sshfs = nosuid, noexec, nodev, noatime, ro, rw, uid=$UID, gid=$GID, nonempty, allow_other, idmap=user, BatchMode=yes, port=*
    allowed_options_curlftpfs = nosuid, noexec, nodev, noatime, ro, rw, uid=$UID, gid=$GID, nonempty, allow_other, user=*
    allowed_options_ftpfs = nosuid, noexec, nodev, noatime, ro, rw, port=*, user=*, pass=*, ip=*, root=*, uid=$UID, gid=$GID
    # mount_point_mode, if present and set to a non-empty value, will cause udevil
    # to set the mode (permissions) on the moint point after mounting If not
    # specified or if left empty, the mode is not changed. Mode must be octal
    # starting with a zero (0755).
    # mount_point_mode_FSTYPE, if present, is used to override mount_point_mode
    # when mounting a specific fstype (eg ext2, nfs).
    # NOT SETTING A MODE CAN HAVE SECURITY IMPLICATIONS FOR SOME FSTYPES
    mount_point_mode = 0755
    # don't set a mode for some types:
    mount_point_mode_sshfs =
    mount_point_mode_curlftpfs =
    mount_point_mode_ftpfs =
    # Use the settings below to change the default locations of programs used by
    # udevil, or (advanced topic) to redirect commands to your scripts.
    # When substituting scripts, make sure they are root-owned and accept the
    # options used by udevil (for example, the mount_program must accept --fake,
    # -o, -v, and other options valid to mount.)
    # Be sure to specify the full path and include NO OPTIONS or other arguments.
    # These programs may also be specified as configure options when building
    # udevil.
    # THESE PROGRAMS ARE RUN AS ROOT
    # mount_program = /bin/mount
    # umount_program = /bin/umount
    # losetup_program = /sbin/losetup
    # setfacl_program = /usr/bin/setfacl
    # validate_exec specifies a program or script which provides additional
    # validation of a mount or unmount command, beyond the checks performed by
    # udevil. The program is run as a normal user (if root runs udevil,
    # validate_exec will NOT be run). The program is NOT run if the user is
    # mounting a device without root priviledges (a device in fstab).
    # The program is passed the username, a printable description of what is
    # happening, and the entire udevil command line as the first three arguments.
    # The program must return an exit status of 0 to allow the mount or unmount
    # to proceed. If it returns non-zero, the user will be denied permission.
    # For example, validate_exec might specify a script which notifies you
    # of the command being run, or performs additional steps to authenticate the
    # user.
    # Specify a full path to the program, with NO options or arguments.
    # validate_exec =
    # validate_rootexec works similarly to validate_exec, except that the program
    # is run as root. validate_rootexec will also be run if the root user runs
    # udevil. If both validate_exec and validate_rootexec are specified,
    # validate_rootexec will run first, followed by validate_exec.
    # The program must return an exit status of 0 to allow the mount or unmount
    # to proceed. If it returns non-zero, the user will be denied permission.
    # Unless you are familiar with writing root scripts, it is recommended that
    # rootexec settings NOT be used, as it is easy to inadvertently open exploits.
    # THIS PROGRAM IS ALWAYS RUN AS ROOT, even if the user running udevil is not.
    # validate_rootexec =
    # success_exec is run after a successful mount, remount, or unmount. The
    # program is run as a normal user (if root runs udevil, success_exec
    # will NOT be run).
    # The program is passed the username, a printable description of what action
    # was taken, and the entire udevil command line as the first three arguments.
    # The program's exit status is ignored.
    # For example, success_exec might run a script which informs you of what action
    # was taken, and might perform further actions.
    # Specify a full path to the program, with NO options or arguments.
    # success_exec =
    # success_rootexec works similarly to success_exec, except that the program is
    # run as root. success_rootexec will also be run if the root user runs udevil.
    # If both success_exec and success_rootexec are specified, success_rootexec
    # will run first, followed by success_exec.
    # Unless you are familiar with writing root scripts, it is recommended that
    # rootexec settings NOT be used, as it is easy to inadvertently open exploits.
    # THIS PROGRAM IS ALWAYS RUN AS ROOT, even if the user running udevil is not.
    # success_rootexec =
    I have no idea what to do next, the only way it works, is the combination i mentioned in the title of this post. Any suggestion to solve that problem?

  • ORA-01195:  online backup of file 65 needs more recovery to be consistent

    Hi,
    I was doing a clone by taking the hot backup from prod to dev. The backup was good. And then I created the control file, Then I passed the command
    recover database until cancel using backup controlfile;
    It asked for the archived logs files. I supplied them until current time.
    Then I canceled.
    That's when I got this error
    ORA-01547: warning: RECOVER succeeded but OPEN RESETLOGS would get error below
    ORA-01195: online backup of file 65 needs more recovery to be consistent
    ORA-01110: data file 65: '/d10/oradata/dwdev/kt01.dbf'
    ORA-01112: media recovery not started
    What am I doing wrong? I have not yet passed the command "Alter database open resetlogs"
    Should I do more logswitches in prod and pass those files to dev ? Or should I just put the kt tablespace in backup mode and copy the data files?

    Which set of archivelogs did you copy over to apply ? All the archivelogs from the first ALTER TABLESPACE ... BEGIN BACKUP to the archivelogs subsequent to the last ALTER TABLESPACE ... END BACKUP ?
    In the cloned datadabase, what messages do you see in the alert.log on having issued the RECOVER DATABASE command ? Does it complain about the datafiles being fuzzy ? Which archivelogs does it show as having been applied ?
    Can you check the log sequence numbers for the duration of the Backup PLUS ArchiveLogs subsequent to the Backup ?

  • Why do we need to code  loop statement in both PBO and PAI in Table control

    Hi friends,
    i have 2 questions-
    Q1-why do we need to code a loop and endloop statement in both PBO and PAI in Table control,sometimes even empty as well?
    Q2-what r d dynpro keywords?

    Hi,
    It is required to pass information from internal table to table control so we loop it in PBO and to get the updated information back, we loop in PAI and update internal table content.
    To get more knowledge on Table controls check these threads -
    table control
    Table Control
    Hope this helps.
    ashish

  • Why do we need to Register a class ?

    When the class is already present in jar file then still why do we need to load the class and use it. The jar file is included in the lib and would be available for the environment.
    If any better explanation is provided will be very useful
    Thanking you in advance

    I assume you are talking about JDBC drivers over here. In general, otherwise you do not need to register classes.
    In JDBC, this has to do with how DriverManager works.
    When you load a driver class using the Class.forName(...) block, you are effectively executing the driver's static block.
    The static block has some code in it to register the class with the DriverManager by calling the static method DriverManager.register(Driver d).
    When your client code attempts to connect to a database by passing a JDBC-URL, the DriverManager iterates through the registered drivers and calls acceptsURL() on each of the drivers. The first driver to return a value of true gets to try connecting to the database.

  • Why do we need system reserved partition

    Hi,
    From windows vista and above MS has come up with an additional 100mb system reserved partition. I read about it on several places over the web that, this partition is used for BCD store.
    There are several other filse/folders( en-US, cs-cz, ja-JP, memset.exe) inside other than the BCD store, what do these folders keep and what purpose do they serve. Is it mandatory to have them here, as I tried to delete some of them and didn't face any problem
    while booting.
    Thanks in advance

    The System Reserved partition contains boot files, bitlocker files (if enabled) and things needed for recovery purposes. The idea is that, (ideally) this partition is separate from the OS and that a recovery partition is present. If something were to happen
    to the OS, you would still be able to boot to recovery (repair your computer) as the bootloader is not in the OS partition. Is it not required to install Windows with that partition.
    When a computer boots, it will attempt to boot the first active partition. In the case there are no active partitions, it will attempt to boot the first partition. This is why the System Reserved partition is supposed to be the first partition. On a GPT
    disk, it is possible to have the System partition be the second (with none marked active) and the OS will still boot, so I'm sure there is more to it than that, but maybe it gives you an idea.
    The directories are certainly not empty. You would need to use the attribute switch to specify system or hidden files in order to see them with DIR.

  • Why do I need ODBC ?

    Ok, I setup successfully an Oracle database and I can access it e.g. through SQLplus.
    Later I could access this database from inside a program like CSharp or Java.
    For that I could code:
    OracleConnection con = new OracleConnection(connectionstring);
    Into this connectionstring I can put all relevant information to access the DB like username, password, Databasename.
    So why do I need to define an ODBC source in menu
    Programs->Administrative Tools->Data Source (ODBC)
    Where do I find a good, quick and easy introduction to ODBC setup?
    Peter

    Just re-posting the reply I had when this was in the Database - General forum...
    Generally, you're not required to create a DSN, you can generally pass in whatever information you'd like in the connection string. Some third party tools prefer (or require) an ODBC DSN to connect rather than trying to build a driver-specific connection string for every driver out there. If you need to configure various non-default options in the ODBC driver, it's also useful to have that centralized rather than trying to keep those options straight in the connection string.
    User DSN's are visible to the current user, System DSN's are visible to all users on the system. Ignore file DSN's
    Was there a follow-up question you wanted to ask here?
    Justin

  • Why do I need ODBC definitions ?

    Ok, I setup successfully an Oracle database and I can access it e.g. through SQLplus.
    Later I could access this database from inside a program like CSharp or Java.
    For that I could code:
    OracleConnection con = new OracleConnection(connectionstring);
    Into this connectionstring I can put all relevant information to access the DB like username, password, Databasename.
    So why do I need to define an ODBC source in menu
    Programs->Administrative Tools->Data Source (ODBC)
    What is the difference between User DSN, System DSN und File DSN in ODBC source definitions?
    Where do I find a good, quick and easy introduction to ODBC setup?
    Peter

    First, you may want to post this question in the ODBC forum, if only for proper categorization...
    Generally, you're not required to create a DSN, you can generally pass in whatever information you'd like in the connection string. Some third party tools prefer (or require) an ODBC DSN to connect rather than trying to build a driver-specific connection string for every driver out there. If you need to configure various non-default options in the ODBC driver, it's also useful to have that centralized rather than trying to keep those options straight in the connection string.
    User DSN's are visible to the current user, System DSN's are visible to all users on the system. Ignore file DSN's
    Justin

  • TS4431 Why do I need 4.7 GB of storage to upload a 995 MB iOS 8.0.2?

    Why do I need 4.7 GB of storage to upload a 995 MB iOS 8.0.2?
    <Re-Titled By Host>

    Once the file has been downloaded, it has to be unpacked (unzipped, dearchived, whatever term you want to use), and it requires that extra space for that purpose. 
    My personal suggestion is to use a computer with iTunes to download and install the update, as OTA updates occasionally result in Recovery mode due to errors.

Maybe you are looking for

  • K8N NEO2 Platinum rebooting

    Hi all,just got myself a 64bit MSI K8N NEO2 Platinum board & a 3200+,am happy with it but a couple of days ago i got a blue screen with a long message that i didnt have time to read before the pc rebooted,after the reboot i checked the event viewer l

  • What is the diffrence between Row id and primary key ?

    dear all my question is about creating materialized views parameters (With Rowid and With Primary kry) my master table contains a primary key and i created my materialized view as follow: CREATE MATERIALIZED VIEW LV_BULLETIN_MV TABLESPACE USERS NOCAC

  • Vendor Master (Purchasing) Field selection change

    I'm trying to change a field in the vendor master (Field=Industry/BRSCH).  I would like to change this only for specific Purchase Orgs.  But the config only seems to allow me to change by Account groups, Company code or activity/ transaction code. Is

  • J2EE Development Component - How to change vendor name

    Hi, While creating a  new J2EE Development Component, I didn't change vendor name and have created complete application, Now I want to update vendor name, can you please help me out how vendor name can be changed in existing application. Thanks

  • Change iCal default alert.

    Is it possible to change the default alert in iCal to email with Mac OS X Lion?