A data in the very important document, which I just changed in deleted email

I can't believe bad luck indredible, a very long project that I worked on for weeks in an e-mail to aol using Firefox browser - I managed to complete my joy yesterday but incredibly to is did not last long - somehow all except 2 periods highlighted and deleted

Y at - it a hope of recovery?  I didn't delete email, data that made up the e-mail have been removed.

If this project exist right in the email? Maybe save this email as a project? I don't use a Mac, but I know that if I work in Outlook, the emails I create are saved as drafts until I send them. Someone who is familiar with email Mac would have to answer your question otherwise.

Tags: Mac OS & System Software

Similar Questions

  • receive the message: the operation selected in thunderbird did not trying to delete emails

    When you try to delete e-mail messages, a message came:-l' selected in Thunderbird operation has failed. The e-mail server for the account of [email protected] responded [TRYCREATE] there is not (Gmail) / bin.
    I tried the suggestion in aid to not be able to delete emails, but I have done it wrong or it did not. Any suggestions please.

    Thank you, Toad Hall, I found the subscription folder and everything has been checked, but when I went to tools > account settings was not there, unless I'm looking in the wrong place. Unfortunately, I am not computer and find it hard to understand certain things, when I left the school that they had just spent the abacus. I appreciate your time and assistance but trying to find tools > account settings > server settings, I think I must be looking in the wrong place. The only place where I found tools was clicking on the three bars in the upper right corner of Thunderbird, and account settings he had only undesirable parameters not a bin folder. As I said I am not applied to the computer, once again, thanks for trying.

  • Transfer of application data (in the XP of Document settings) to Vista

    • I just got the new Dell with Vista and wanted to copy the mail Thunderbird profile (contain all previous emails) which was located in the Application Data folder (in Document settings) of my previous XP on the new computer Vista. Of course, it is very important for me to get Thunderbird running in the new PC. I can't locate the Application Data folder in Vista to do. Is that someone can help me to locate the location of the "Application Data" folder in Vista or maybe new name of the folder that the Thunderbird profile is run in Windows Vista?

    Application data is located in C:\Users\Change Data.  You may need to show hidden and system files go to start / Control Panel / folder Options / View / and check the button to see the system and hidden files.  I don't know if this is where Thunderbird is headed as I am not familiar with this program.  Please post if it does not help and I will refer you to a forum where they can potentially help you with the installation of Thunderbird and to transfer old data at the same time so what is expected here does not work.

    Your best bet to transfer files and settings from XP to Vista is to use Easy Transfer.  You will need to re - install Thunderbird and all your other programs as there is no way to transfer programs from one computer to another (even with 3rd-party programs) without the help of an upgrade installation (which is not possible in this case).  Here are the procedures: http://www.windowsnetworking.com/articles_tutorials/Migrating-Vista-using-Windows-Easy-Transfer.html and here is another article that may be useful (it covers more than a simple easy transfer but if you scroll down the article you will come to this article and it is very informative): http://technet.microsoft.com/en-us/library/cc748915 (WS.10) .aspx.

    I hope this helps.

    Good luck! Lorien - MCSA/MCSE/network + / A +.

  • check the entry of duplicate data in the block record multi, which is a required field

    Hi all
    I have a situation where I have to check duplicate data entry (on a domain, which is a field, i.e. mandatory. it cannot be ignored by the user without entering a value) in key-in data in a Multi Record block.

    With regard to the reference I used logic, such as
    1 > trigger in a when-validate-Record of this block I assign the value of the current element in the variable of type array (collection type)
    as this trigger every time I leave this record, so its by assigning the value of the current time. And this process continues

    then
    2 > wrote in a when-validate-item trigger of the corresponding element (i.e., the relaxation is at the element level), where he compares the value of the current item and the value stored in the variable of type table trigger when-validate-Record (type of collection). If the value of the current element is mapped to a value stored in the variable of type table I shows following message ("Duplicate Record") raise_form_trigger default


    This code works very well for the double value of this record multi field check

    The problem is that if the user enters the value of this field and then go to the next field, enter the value in this field, and then press 'Enter Query' icon, Validate bolt trigger fires. As a result first when - validate record fires, that stores this value, and then when-validate-point fire, so it shows message duplicate record


    Please give me a code or a logical sense to solve this problem



    Any other logic to solve this problem is also welcome

    If you query the data and it shows two unique values in the block, then it should work as expected. But if you don't ask and just open form and try to insert the record and then for the first record it does not display this message of duplication. For this, you can write your own query to check the duplication of table.

    For the image of the form, you can use any image download site. A search on google.

    -Clément

  • Some applications store data in the folder my documents...

    Is it possible to transfer the files resulting to my library folder or to a single folder off the beaten path?

    Otherwise, I guess I could create my own 'My Documents' folder.

    Some programs store information in the Documents folder. Some may be moved and others not. If you do not want a mixture, then you should probably create your own 'My Documents' folder.

  • I just lost a very important document that has not been saved. How can I get it back

    Only, I had an important deleted document and can't find it to refresh it.  It says last modified today, but I can't refresh is

    Hello

    try this program to recover deleted files

    http://www.Piriform.com/Recuva

  • Pump data to the directory import

    Hello!!!

    I have a slight problem with datapump. I try to import a complete database of an export that I copied to a new server.

    Windows Server 2003 R2 SP2 64-bit and EE Oracle 10.2.0.4

    I run this:

    Impdp system/dacnai directory is dumpfile 'Z:\backup\Backup_Docark' = DOCARK_FULL. DMP logfile = IMP_FULL.log full = y

    But it does not work. It does not recognize the directory (I also tried without the '). What I am doing wrong? I can't do it!

    Thank you!

    Looks like you should use impdp NETWORK_LINK clause.

    In doing so, you import the network and don't need a dump of the file at all.

    ------------

    Sybrand Bakker

    Senior Oracle DBA

  • Hi, I need Chris Cox to discuss a very important document.

    Thank you

    Please let me know how I can get in touch with him.

    You can start with ccox at adobe dot com.

  • Accidentally deleted important document and I have cleaned the disc up, can not find the document

    Ive cleaned my drive then all deleted recycle bin etc restore points and I can not find important document I can remember now accidentally delete would get it later but I forgot and now it gone.is it any chance to get back somehow? Maybe a miracle lol. ? x

    Hello

    Try this free program to try to recover files deleted/sec

    the more you use your computer the least likely you are to find the lost files because they will be replaced by more recent work

    http://www.Piriform.com/Recuva

  • Dates of the EXIF - how add/edit using exiv2... is there a better way?

    Hello world!

    INTRO: I'm new to Lightroom. I went through a few books and a lot of tutorial on lynda and youtube, so I feel very uncomfortable with the LR 5 import process. This post and the issue is a matter of pre-importation / organizational.

    I have more than 30,000 photos old, digitized (scanned) which dates back to the 1950s. Of course, most are taken with older, analog devices. They are now organized in folders by date.

    AIM: I want to import those pictures into LR and be able to find the dates of metadata (Capture Date & time).

    PROBLEM: Of course, scanned old (or even more recent manipulated) pictures often do not have the correct creation date of EXIF information. Worse, many (or most) of these old images don't even have a date field EXIF!

    What I've LEARNED: Immediately to use exiv2 file name or name file evix2 - pt indicates whether it is or is not info date for the photo. Otherwise, exiv2 - pt filename shows nothing. If there is a date field EXIF, it will be shown.

    For all these pictures with no date field, if I import them into Lightroom, there is of course no date information that is displayed in the Panel (by default or EXIF) metadata, and you can change the date (because the field is not there).

    If exiv2 - pt filename indicates the field of Exif.Image.DateTime, then in Lightroom, you will see the time of Capture and Date of Capture fields, and you will see an icon to the right of these dates, which allows you to change this date.

    Exiv2 - pt filename if no IS NOT this Exif.Image.DateTime field, you can ADD this domain by using the command line:

    "" exiv2 - M ' Exif.Image.DateTime 1965:01:25 15:45 Ascii value "file name (or whatever your time/date).

    Now, if you import this image in LR, you will find the fields Date of Capture and capture in metadata > default Panel... AND you can change them if necessary. In other words, the command above-M exiv2 added the date field EXIF than LR needs to search by date.

    WHAT is MY point of VIEW, AND WHAT the QUESTION is? I have no problem using exiv2 for add/edit an EXIF DateTime field creating a folder at a time prior to importation in LR. This will allow me to search on these date fields *.

    My question is this: is there an easier way?

    Surely there must be dozens (hundreds?) of thousands of photographers 'old' like me who have found old photos with incorrect fields EXIF creation date or missing the date on the ground completely (in which case, as I said earlier, can not be added/edited using LR, PS, FileMultiTool, Graphic Converter, etc..).

    I realize that I could look at images based on file names or file, or I could enter dates in tags, but these methods to find images are not nearly as practical the use of metadata. So, if I know that an image was taken in June 1962, then I would like to that metadata EXIF to have this info so that I can get on this subject. Have no field of EXIF date or have a date field that is incorrect is useless.

    I would love a LOT YOUR FEEDBACK! If there is a way easier or better, I'd love to help you! It is has so many photographers experienced on this forum, and more than probably a lot of them have old photos with the date fields incorrect or missing EXIF they brought in LR.

    Thank YOU! I'll appreciate really any help you can offer.

    David

    * there are other EXIF date fields that can be changed using exiv2: Exif.Photo.DateTimeOriginal , Exif.Photo.DateTimeDigitized , etc. But the main date that LR uses to search for files is described above.



    P.S. I also tried jhead-filename ds1965:01:25 (or whatever your date) to change the date. This only works IF there is already a date field this EXIF. Otherwise, jhead will report an error and not create a. Exiv2 - M will create the field.


    When I put the date and time for about 10 pictures, menu option assigned LR (seemingly random) time to each of them. Why LR do this? I can see perhaps compensate for each photo in 1 second (00, 01, 02,...), but simply assign random times makes no sense at all. At least in testing, I have just done, LR did not pass during the same amount, but totally affected times (randomly?) to each photo.

    Normally, when you change the time of the capture of several photos, LR shifts each picture the difference between the time that you register and the time of the most selected photo.

    I suspect you're tripping over a bug known to the LR with digital photos that are EXIF:DateTime but not EXIF:DateTimeOriginal.  In this case, LR indicates a time below the thumbnail, but uses the other for its internal capture time.  In this case, things can get very confusing.  The best way to clean, it's to make sure that all your photos are EXIF:DateTimeOriginal before you import it.

  • Possible Hijack, System get "changed" or perhaps "partially virtualized" virus strange very important situation

    I have a problem with 2 computers and its kind of a large.  Hard to know where to start so I'll keep it short, but I think it may concern even Microsoft, because it involves the use of what I believe to be false "terms of service" or small print and I knew even where the source of this problem is, but I really need help! Myself and others use laptops we bought together.  We live in a family, but laptops, a TOSHIBA and a HP/COMPAQ F700 satellite, as well as what I call a wireless router belong to the USA! We are connected through this wireless device, a PRISM which is perhaps a bit older, but of course seems to work, it is plugged into a modem cable motorola belonging to someone else in the House.  To make things moving along, he came to our attention that A: our systems periodically change without our permission, by that I mean that the toshiba that was purchased at walmart brand new, came with an Intel Celeron, and I think THAT the wireless card IS an atheros brand.  I KNOW that was the case with the Compaq regarding the wireless adapter, and Compaq was bought at a rent to own store and came with a 1 GB ram AMD processor.  For some reason, we are under some form of control Admin, and our system is changing periodically on BOTH computers to say his family chipset intel and our wireless adapters will go to realtek USB 2.0, once again on BOTH computers.  When this happens, our user accounts admin, that we had as an administrator user accounts AND I have unlocked the hidden via the cmd prompt and hold SHIFT + ENTER thing, will be signed in some way limit our ability to do things.  LAST FEW DETAILS, I promise you: the so-called matrix memory of intel as magically appeared with software RAID of surveillance and we saw our event logs, which we prob didn't know existed, being transferred by a remote user, and we have never consulted the remote adjustment, except in order to turn them off, as well as file sharing options.  However they continue to change when this happens.  Yesterday, to finish that, I found strange things after doing a thing of complete system repair, not for the first time, this time on the compaq.  After the repair, which seemed fine at first, I was embarrassed to find a few shortcuts readme present in the recently amended on the start menu folder.  I followed them to the folder locations that led me to the prog. files, THE SIMS 2, and various subfolders with S.W.R. claiming to be from MICROSOFT and don't mention any particular O.S. except with reference to .NET and some virtualization programs that we noticed the menu running task.  OH, I shouldn't forget that with the processor changes in both pc, THEY BOTH now say that they ar x 86 client or PC workstation and a recent attempt on the repair of the system or pressing f8 on the toshiba somehow led me to a weird command prompt which began with X : ??  I'm prob a few things set aside even if it is really long, but the SIMS 2 folder is very disturbing because a person who lives here once gave us a CD on an old computer that has not been used for at least 3 years and we have certainly not installed this game WE NEITHER of these new computers.  I SUSPECT SOME things but don't know what to do.  I TRIED to get our product off the coast of the TOSHIBA key but was said previously by a repairman it seems to have BEEN DELETED!  The records in question, according to me, are always on both pc and we executed the software suggested, including microsoft security databases, s.s.and destroy, and the malewarebytes thing, as well as to have a repair shop gives us some tips. They said several things, like the toshiba tried to boot from the drive cd/DVD, then boot pxe or something and someone had changed the wake on lan option, and maybe other things I do not remember.  OK SORRY FOR ALL this THAT REALLY, but I wanted to make sure that I gave as much information as possible because we never wanted our PC clone, virtualized, or something like that, whatever realtek usb 2.0 is, it's another icon of the wireless connection in the tray on the lower right AND THE COMPAQ is REMAINED CONNECTED WITH the off switch wireless?  Help!

    Thank you for your gracious reply. It certainly sounds to me like your computers are compromised. As I said, the only way to fix now is to restore as long as the plant once more after you back up your data and then set them up by the suggestions below. It costs you nothing but time. I'll also give you my general information on the configuration of the network wireless safely. Unfortunately, you must have control of the wireless router to do this. If you do not, then consider doing your own Internet connection and wireless router. Addition to the steps of General safety below, make sure that file/printer sharing is DISABLED.

    The result of all this is to keep on the front of your mind is that security, physical access to a machine trumps all. If you do not trust the people with whom you live and/or people who visit them, you have to keep the computer with you or in a locked environment that no one else can enter. And of course the locks can be chosen. Or find the best people to live with. I understand that this is not possible in your real world, but I'm telling you all the options.

    Computer security - any computer running an operating system is accessible by a person with 1) physical access; (2) time; (3) jurisdiction; (4) tools of. There are a few things you can do to make it a little more difficult but:

    1. define a password in the BIOS that must be entered before starting the operating system. Also to set the supervisor password in the BIOS so the BIOS configuration cannot be entered without it.

    2. starting at the BIOS, change the order of boot to hard drive first.

    3. set strong passwords on all accounts, including the built-in XP administrator account (it is disabled by default in Vista).

    4. If you leave your own account connected, use Windows key + L to lock the computer (or set the screen/power economy saver) when you step away from the computer and require a password to use.

    5. do the other accounts of users limited in XP Home, regular user accounts in XP Pro. All users must be on a Standard account in Vista with an administrator account (called something like 'Tech' or 'CompAdmin') only used for purposes of elevation.

    6. If more than one person uses the computer user set permissions/restrictions:

    If you have XP/Vista/Windows 7 Home, you don't have the built-in ability to create fine-grained limits. In XP and Vista, you can use the Security Console or MVP Doug Knox or the program MS SteadyState to set restrictions as you wish. SteadyState now supports Vista but not Windows 7. Mr. Knox security console may still work in Win7.

    http://www.dougknox.com
    http://www.Microsoft.com/Windows/products/winfamily/SharedAccess/default.mspx
    Information about SteadyState - http://aumha.net/viewtopic.php?t=27570
    SteadyState support - http://social.microsoft.com/forums/en-US/windowssteadystate/threads/
    SteadyState How - to (not supported in Windows 7 still) - http://www.howtogeek.com/howto/6520/windows-steadystate/

    Please understand that these are technical answers to what is essentially a technical problem and there are ways around these precautions. It is a problem of family / interpersonal which cannot be solved by technical means.

    Establishing a safe wireless router - have a computer connected to the router with an ethernet cable. Examples given are for a Linksys router. See the manual of your router or the router mftr's Web site. for the parameters by default if you don't have a Linksys. Open a browser such as Internet Explorer or Firefox and in the address bar type:

    http://192.168.1.1 [Enter] (it is default IP address of the router, which varies from router to router then check your manual)

    This will bring you to the login screen of the router. The default username is blank and the Linksys default password is "admin" without the quotes. Enter this information. You are now in the configuration of the router utility. Your configuration utility may be slightly different from mine. The first thing to do is to change the password by default because everyone knows the default passwords for different routers.

    Click the Administration link at the top of the page. Enter your new password. MAKE A NOTE SOMEWHERE THAT YOU WILL NOT LOSE. Re-enter the password to confirm it, and then click Save settings at the bottom of the page. The router will reboot and show you the box of connection again. Do not fill in the user name and put it in your new password to enter the configuration utility.

    Now, click on the link wireless at the top of the page. Change the network name (SSID) wireless by default to something, you'll recognize. I suggest that my clients not use their surname as the SSID. For example, you might want to name your network wireless network "CastleAnthrax" or similar. ;-)

    Click on save settings and when you get the prompt that your changes were successful, click the wireless security link which is just beside the Basic Wireless Settings link (where you changed your SSID). Most computers purchased during the last 4 years have the wireless hardware that will support WPA2-Personal (also known as WPA2-PSK). This is the desired encryption level. If your wireless hardware is older, use WPA. Don't use WEP, because who is easily broken within minutes. So go ahead and set the Security Mode WPA2-Personal. Do this and enter a password. For example, you could use the password ' here be dragons, beware you scurvy dogs! The password is what you enter on all computers that are allowed to connect to the wireless network. MAKE A NOTE SOMEWHERE THAT YOU WILL NOT LOSE.

    At this point, your router is set up and if the computer that you use to configure the router will normally connect wireless, disconnect the ethernet cable and wireless of the computer should see your new network. Enter the password that you have created (exactly as you wrote it with all capital letters and punctuation) to join the network and start surfing.

    If you want to develop me on this or have any other questions, feel free to ask. MS - MVP - Elephant Boy computers - don't panic!

  • Is it possible to recreate a link to or to access data from the Delta after the original disk has been changed?

    I did something very stupid, but didn't know what I was doing until it was done. Now I need help.

    I had a server doesn't go down (Windows 2008), no backups. He had two logical drives on two separate VMDK. I decided to mount the drive on a new server and move all data from the old disk (VMDK) to the new computer virtual server. Once done, I realized that the data that I had moved across was 6 months old. Further investigation, I found a car delta for this drive. I reassembled the old VMDK on the old server and carried out a repair. This brought to the top of the old server, but I had moved all the data on the data disk to the new server and so the data on the drive of delta were more visible. My question of course, is "How can I get the data on the disc of delta, which is actually 6 months worth. Does anyone have a miracle solution?

    set the virtual disk cloned on a virtual machine to help. "

    Use an existing virtual machine, change the settings and add/get cloned like an extra virtual drive virtual drive. If I understand your initial post, you have initially with the disc of the parent base.

    André

  • I'll lose data from the drive of the partition during recovery?

    Hi all

    If I use the toshiba recovery CD to format my system, I'll lose data from the disks partition as well or just the C:?

    Hi Justin

    Well, what recovery CD you want to use?
    As much as I know several months Toshiba uses a new version of the CD recovery called Reco.
    You will find the settings option and there you can choose the option when you want to recover the operating system. I think that the first partition is erased.

    The old version of the recovery CD has supported two different options: standard and expert mode. Here it is important to use the expert mode if you want to choose the partition where the OS must be installed

  • Error message on Windows XP, "Windows-Delayed Write failed, windows was unable to save all the data for the file.

    I use windows xp as the operating system. I bought the new 3G huawei data card. While surfing internet, between a pop-up is displayed

    «Windows-delayed write failed, windows was unable to save all data in the file C:\Documents and settings\new\Local Settings\Application Data\Google\Chrome\User Data\Default\Session Storage\004285.log.» The data has been lost. This error can be caused by a failure of your computer hardware.

    After this computer freezes and I have to restart my computer. Please help me how to fix this problem.

    The error basically says that he tried to write something on your hard drive and for some reason that unfinished write operation.  This could indicate a bad sector on your hard disk, damaged disk or a problem with your hardware.

    Whenever a problem involving a disk read or write appears, my first approach is to perform a verify operation of the disc to the hard drive.  Even if this is not your problem, it is a step of good routine maintenance. Run the disk check with the "/ R" or "Repair" option.  Note that the real disk check will be presented at the next reboot, will run until Windows loads completely, cannot be interrupted and can take more than a few hours to run depending on the size of your hard drive, the quantity and type found corruption and other factors.   It is better to perform during the night or when you won't need your computer for several hours.

    'How to perform disk in Windows XP error Cherking'

    <>http://support.Microsoft.com/kb/315265/en-us >

    HTH,

    JW

  • Return the latest data of the transaction, based on the transaction dates.

    Thank you I am a little dense here, and I've searched, read and tried out a few different solutions I've seen give around the place. However; I think I'm more fighting with the naming conventions and the logic of other persons requests you to mine understanding (hoping here!)

    I have a huge table that contains a record for each transaction that has an effect on our inventory (yup - LARGE table!)

    For a given transaction type "CHC" (fresh), I want to return the part code, the Transaction Date and the costs of Transaction for TWO LAST changes.

    Because its to be used for tracking updates to the cost of the materials and further for the calculation of the continuous effect of these, I just need the two for now.

    Thus,.

    The table is I50F

    The required columns are

    I50PART - [Code part | http://forums.oracle.com/forums/]
    I50TDAT - [Date of the Transaction | http://forums.oracle.com/forums/]
    I50UCOST - [price changed to | http://forums.oracle.com/forums/]
    I50TRNS - [Type of Transaction - we want just that CHC]

    Examples of data (including columns fair that we are interested in)
    I50PART              I50TDAT             I50UCOST         I50TRNS 
    
    BACCA001             08/03/2006 07:34:51 0.08829          CHC     
    BACCA001             25/07/2007 08:26:30 0.10329          CHC     
    BACCA001             10/04/2008 16:29:02 0.10639          CHC     
    BACCA003             20/06/2006 12:22:30 0.16814          CHC     
    BACCA003             25/07/2007 08:26:54 0.17024          CHC     
    BACCA003             10/04/2008 13:30:12 0.17535          CHC     
    BACCA004             28/08/2007 15:46:03 0.06486          CHC     
    BACCA004             28/08/2007 15:49:15 0.06328          CHC     
    BACCA004             30/10/2008 09:22:40 0.06952          CHC     
    BACCA004             13/01/2009 09:09:07 0.06867          CHC     
    BACCA005             25/07/2007 08:27:24 0.06715          CHC     
    BACCA005             10/04/2008 15:45:14 0.06916          CHC     
    BACCA005             30/10/2008 09:05:17 0.07453          CHC     
    BACCA005             13/01/2009 09:06:49 0.07275          CHC     
    Take a part in isolation, BACCA005;

    I am interested in two past reviews.

    It is logical that there are two records by part of output at this stage, as it is possible that the power decide they want the last 3 or 4 or whatever (I'm sure everyone has similar experiences with beancouters)

    Is this A) easy and B) relatively effective. There are 2.4 million records in the table.


    If I was stupid and not included is not enough information, you please poke me [metaphorically] in my eyes, and I'm going to pad a little.

    Thank you very much for reading - and even more so if you can help!

    See you soon

    J

    Analytical functions FTW!

    with I50F as (select 'BACCA001' I50PART, to_date('08/03/2006 07:34:51', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.08829 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA001' I50PART, to_date('25/07/2007 08:26:30', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.10329 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA001' I50PART, to_date('10/04/2008 16:29:02', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.10639 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA003' I50PART, to_date('20/06/2006 12:22:30', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.16814 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA003' I50PART, to_date('25/07/2007 08:26:54', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.17024 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA003' I50PART, to_date('10/04/2008 13:30:12', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.17535 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA004' I50PART, to_date('28/08/2007 15:46:03', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06486 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA004' I50PART, to_date('28/08/2007 15:49:15', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06328 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA004' I50PART, to_date('30/10/2008 09:22:40', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06952 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA004' I50PART, to_date('13/01/2009 09:09:07', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06867 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA005' I50PART, to_date('25/07/2007 08:27:24', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06715 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA005' I50PART, to_date('10/04/2008 15:45:14', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.06916 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA005' I50PART, to_date('30/10/2008 09:05:17', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.07453 I50UCOST, 'CHC' I50TRNS from dual union all
                  select 'BACCA005' I50PART, to_date('13/01/2009 09:06:49', 'dd/mm/yyyy hh24:mi:ss') I50TDAT, 0.07275 I50UCOST, 'CHC' I50TRNS from dual)
    select I50PART, I50TDAT, I50UCOST, I50TRNS
    from   (select I50PART, I50TDAT, I50UCOST, I50TRNS, row_number() over (partition by I50PART order by I50TDAT desc) rn
            from   I50F
            where  I50TRNS = 'CHC')
    where  rn <= 2
    order by I50PART, I50TDAT desc;
    
    I50PART  I50TDAT               I50UCOST I50
    -------- ------------------- ---------- ---
    BACCA001 10/04/2008 16:29:02     .10639 CHC
    BACCA001 25/07/2007 08:26:30     .10329 CHC
    BACCA003 10/04/2008 13:30:12     .17535 CHC
    BACCA003 25/07/2007 08:26:54     .17024 CHC
    BACCA004 13/01/2009 09:09:07     .06867 CHC
    BACCA004 30/10/2008 09:22:40     .06952 CHC
    BACCA005 13/01/2009 09:06:49     .07275 CHC
    BACCA005 30/10/2008 09:05:17     .07453 CHC
    

Maybe you are looking for