A friend's XP user and in a care home for now & about to use a "dongle" Mi-Fi for its banking services
Hello
How to secure my friend uses the Windows XP for its banking services while she is in a nursing home? (This could be short term or permanent, unknown still.) She has not used the Toshiba laptop to come to 6 months. I don't know if it uses Norton or MacAfee, but it is certainly one of those who, for the security of the computer or if it is still up-to-date. She madeall her banking online as she was unable to leave the House for 3 years before its passage from 4 months in the hospital. The social worker arranged so that she could 'buy' a dongle MI-fi of 3G to use to access the internet (the social worker did not know that was what she had bought) so she can pay for her care. He has not been in place, but that nobody had heard of a MI-Fi, but I received a lot of help on that my service provider forum on wide band/phone who understand a little better now. Any suggestion security would be very welcome.
The laptop is still loaded up during his stay in the hospital and used it for about an hour when it came out in April only to be re-admitted 7 hours later due to a fall.
Your friend probably should buy a device for 'mobile broadband' rather than a 'MiFi'-, but your description of "MiFi dongle" suggests that it is perhaps what she actually still.
A MiFi device is a wireless router that connects to the Internet via cell phone. See http://en.wikipedia.org/wiki/MiFi because it creates a wifi "hotspot" anyone with wifi capability can connect to it unless it is configured with a strong password WPA2. Most of MiFi devices must support WPA2, but computer XP your friend may or may not. If your friend's computer does not support WPA2, use WPA. Do not use WEP and never set up an unsecured wireless connection.
The alternative to a MiFi device is a mobile broadband that connects directly to the computer with the USB and acts as a direct connection to the Internet via the cell phone network. See, for example, http://store.virginmedia.com/virgin-media-mobile/mobile-broadband/mobile-broadband.html
Mobile broadband is more secure than MiFi because it does not use a wireless connection. This may seem a little confusing, because it is, of course, wireless, but in terms of connections of the computer, "wireless" means a particular technology. The distinction is similar to a 'wireless phone' that you can run on your home but needs to be to have a "borne" connected to your ordinary phone wire and a 'mobile' (what we call 'mobile phone' to the United States) telephone that connects wireless everywhere.
As much as the computer itself is concerned, your friend probably evolve into a laptop with Windows 7 or Windows 8. I understand that it is an additional expense, but Windows XP is no longer supported by Microsoft and will make it more vulnerable to attack no matter how it is connected to the Internet.
Tags: Windows
Similar Questions
-
I have Windows 7 Professional. Used it on my PC and then I had to buy a new Dell computer, as my old PC blew the motherboard. The new Dell came with 8.1 if I want to install 7 on my wife's computer, as it did in Win98. When I did this it called my disabled factory or pirated disk. How can I take my PC off the product key and got my other PC for its use?
If Windows 7 Professional is pre-installed on your Dell computer, it cannot be transferred. If it is a license purchased at a retail store, he transfer rights.
A computer running Windows 98 is perhaps not powerful enough to run Windows 7.
* 1 gigahertz (GHz) or faster 32-bit (x 86) or 64-bit (x 64) processor
* 1 gigabyte (GB) of RAM (32-bit) or 2 GB RAM (64-bit)
* 16 GB of disk space available (32-bit) or 20 GB (64-bit)
* Peripheral figure DirectX 9 with WDDM 1.0 or higher driver
How to transfer a retail license.
Click Start, type: CMD
Right-click on CMD
Click on run as administrator
At the command prompt, type: slmgr.vbs - upkPress enter, this will uninstall the product key of the computer and to the evaluation mode, you are now free to use it on another computer. If you experience problems, try to activate by phone:
Activate Windows 7 manually:
1. click on start and in the search for box type: slui.exe 42. press enter on your keyboard
3. Select your country.
4. Select the telephone activation option and brace yourself for a real person. -
creating users and roles of WL server for an application that is secured by security ADF
Greetings
I have an application that uses the security of adf, pre-deployment I created the users and roles to grant access or permissions to certain pages in mid CA. the thing is that I need to know if its possible to create users and roles through my the weblogic Server console and that roles and users can have permissions in my app I try but the only thing that works is authentication... I can not pass authorization
Thanks for your helpIt should work very easily.
What you have to do is give the domain name as domain (default myrealm) weblogic, this step you already have you're abe to authenticate.
Now in jazn-"Data.xml", there are 2 types of roles. Application role & business role. Select business roles when assigning permissions. These should also be the same roles myrealm.
You can also use the application role and have a relationship between the application role & business role.
Only the care you need to take are to deploy the application in the EAR file, deployed a flag there migrate suite security users and security groups object. Deselect it.
When you use the user groups and migrate the Application roles.Vincent
-
If there is no photographers out there. I would also like to know if you save as .tif for them. I wasn't sure that customers could get files printed everywhere .tif that they wanted (as they can with jpg). Let me know how save you for them.
The jpg file sizes can vary significantly - depending on the topic and you choose the quality setting.
Flat images, like a snowy on a cloudy day, landscape will compress much more than an animated image, as trees, sunny with lots of details.
When you save a jpg file, you can choose quality on a scale between 0 a 12, where 12 gives the highest quality and the least compression.
You will see the size of the file in the dialog box options Jpg, and you can also preview to see how the jpg will look.
Having said that, the file size is not really an indicator of the quality or resolution - dimensions in pixels are.
But if the file will print, use a high quality setting, like 10 or 12.
-
Should I have fms and how easy is live for users?
Hello world
I'm just studying the requirements for a new project and I wanted to ask you a few questions about FMS if you would be kind enough. The site I am building at will (among others) stream video that has been downloaded (mainly by the admin of the site), but also potentially by users and I need a solution for this. Also (ideally) the site will be live broadcasts every now and then that users can watch. As a result, my questions are:
-Probably, we'll need to add an encoding software on the site to convert different formats of file in FLV FMS can play them (because it does not include the conversion features)?
-We would use a relatively powerful dedicated server, it suggests generally that you install FMS on a completely different server or it can run on your primary server (as long as you are not in the service of the ridiculous amounts of video at the same time).
-Do I have that right to say that if we use FMS so it won't work on the iphone or the ipad the lack of flash support? Is this also true if we use video h.264 rather than FLV files? I understand that even with h264s that it won't work not because the player is flash and therefore it can not read the drive, despite bein able to read the video format. Is there a way around this?
-FMS can be used to allow users to record directly to the output of their webcam in the correct format for a future (not live) broadcast (like the functionality of my Webcam on youtube) or should it be done through flash media encoder and then saved?
-Am I right in thinking that to stream live video, you must use Flash Media Encoder and then connect you to the FMS? Is it easy to install media encoder to point to a FMS specfiic (IE is it possible to use it as a solution for the upper limbs to spread or is the installation of the complicated FME)? Is it all to build website so someone can disseminate via their browser and webcam and then have transcode via FMS?
Thank you very much for your help/info in advance, we appreciate it really heavily,
Dave
-I've read php ffmpeg conversion that was an option I was looking at, although presumaby this i would need a separate server because the encoding is pretty processor intensive? Are there other options (even if you have to buy a separate software that is running on the server, this wouldn't be a problem)
Yes. See our Rhozet carbon coder and Sorenson Squish.
-Am I right to say that you can use an encoder based flash embedded on your site to encode the videos but only using h.263, which is the worst quality (I know it's what you say below but I just wanted to clarify). Assuming that we were happy to allow encoding in a file of quality slightly lower then is - it possible through FMS or that require other software?
A flash application can encode only from the camera (for live broadcasting). So, if you want to publish from a webcam for FMS, Flash will do the job. If you want to re - encode an existing video file, flash won't do.
-
Friends in the Forum, this issue was developed by several users and still no correct answer that actually works. How can I make my pdf files show an oreview rather generic logo Adobe?
Thanks in advance
Not possible with Acrobat Reader DC.
-
There should be a limitation or personal parental control on hotspot. Children feel obliged to allow their friends to use their hotspot. And the parents who pay for it!
This is a user to user support forum, so there is really nothing anyone here can do for you, I'm afraid.
However, you can send your comments Apple
-
Find my phone turned off and still can not activate for new user
Hello
I bought a 6 s 64 GB Iphone to a friend yesterday and immediately restored to use for my part, but now it asks me to enter the my friend apple ID to activate, even tought "find my phone" was not enabled on this device. The thing is that my friend can't access his account from apple, since he is unable to access his e-mail account so that he can not give me the papers.
I'll double check the IMEI on this site https://www.icloud.com/activationlock/ and it tell me that activation lock is off and the unit is ready to be used by a new user.
Can you help me with this? I can give you the IMEI of the device
Did you reset all data and settings? (Reset) And could you give me more information about the popup? It asks for your Apple ID friends inside to find my iPhone, or is it a notification system?
-
Create the new user and remote access
Hello, I create a new user from the admin panel. Now, I want to ask how my friend will have access to my nas also. He tries to connect from https://readycloud.netgear.com/ but it does not connect!
I want to create some users and they can have access to my files from ther House. How can I do?
I sin ready 102.
Thank you
Hi h_tsopelas,
Please check this articleReadyCLOUD.
I hope this helps!
Kind regards
BrianL
NETGEAR community -
Hi there, my friend fixed my computer and can't update or anything without a pop - up message saying I need a password? How can I retrieve this?
Original title: locked
Hello
I suggest that you ask your friend what password they put on your computer.
_______________________________________________
It is all of the information that we are authorized to issue in these Forums.
"What to do if you forget your Windows password"
http://Windows.Microsoft.com/en-us/Windows7/what-to-do-if-you-forget-your-Windows-password
"If you forget the administrator password, and you do not have a password reset disk or another administrator account, you will not be able to reset the password. If there is no other user account on the computer, you will not be able to log on Windows and you need to reinstall Windows. »
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
http://support.Microsoft.com/kb/189126/en-us
Tools third password
Some third-party companies claim to be able to bypass the password that have been applied to files and features that use Microsoft programs. For legal reasons, we cannot recommend or endorse any of these companies. If you want to help to break or reset a password, you can locate and contact a third party company for this help. You use these third-party products and services at your own risk.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Microsoft prohibits any help given in these Forums for you help bypass or "crack" passwords lost or forgotten.
Here's information from Microsoft, explaining that the policy:
_______________________________________________________
To reinstall the operating system:
You can contact your computer manufacturer and ask them to send you a set of recovery disks.
They should do this for a small fee.
And if you have never received a recovery disk when you bought your computer, there should be a recovery on the drive Partition hard reinstall Windows how much you bought your computer.
The recovery process can be started by pressing a particular combination of the key or keys at startup. (Power on / start)
Maybe it's F10, F11, Alt + F10, etc., depending on the manufacturer.
Ask them to the proper key sequence.
See you soon.
-
User and role are the object?
Dear all,
1. There are many object as a TABLE, INDEX, VIEW...
We can change to help change the ddl statement.
So, can we say user is also a database object or not.
because we can change the user using ddl statement and corresponding information stored in the data dictionary.
2. we know that ALTER is a privilege of the object, and we can also change the DBA user. then we can say user is an object?
3 is an object?
Thanks in advance,
Alain Coppey.
1. There are many object as a TABLE, INDEX, VIEW...
We can change to help change the ddl statement.
So, can we say user is also a database object or not.
because we can change the user using ddl statement and corresponding information stored in the data dictionary.
2. we know that ALTER is a privilege of the object, and we can also change the DBA user. then we can say user is an object?
3 is an object?
Yes - users and roles are objects. But they are SYSTEM objects and not contained in a schema.
See the section 'Introduction to schema objects' Oracle documentation
http://docs.Oracle.com/CD/B28359_01/server.111/b28318/schema.htm#i22627
The first section lists the schema objects - objects belonged to a schema
The following section lists the system objects, or non-schema,
Other types of objects are also stored in the database and can be created and manipulated with SQL, but are not contained in a schema:
- Contexts
- Directories
- Settings files (
PFILE
s) and server parameter files (SPFILE
s) - Profiles of school boards
- Roles
- Rollback segments
- Storage spaces
- Users
You won't find the schema objects not listed in the views that display information of schema object, but there are other views system for them.
So if it is an "interview" questions answers just YES and refer them to this link above. Or you can use this link for the 'sql elements' doc section if you prefer:
http://docs.Oracle.com/CD/E11882_01/server.112/e41084/sql_elements007.htm
Schema objects
Other types of objects are also stored in the database and can be created and manipulated with SQL, but are not contained in a schema:
Contexts
Directories
Editions
Restore points
Roles
Rollback segments
Storage spaces
Users
In this reference, each object type is described in the Chapter 10 , Chapter 19, in the section dedicated to the statement that creates the database object. These statements begin with the keyword
CREATE
. For example, for the definition of a cluster, see CREATE CLUSTER.In this link, unlike the other one, Oracle uses explicitly the terms "run things" and "objects" by referring to the items in the list above.
A simple NET search for "objects nonschema oracle 11g" returns this link as the first result.
The documentation is your friend! Some info may be harder to find, but the docs usually include information for ALL Oracle basic terms and functionality.
-
Ask local users and creates local users
I am trying to automate the creation of a Local user in ESXi using the Perl SDK.
I know how to extract a list of users with permissions to the host.
My $userAccounts = $authorizationMgr-> RetrieveAllPermissions;
for my {$user (@$userAccounts)}
If ($user-> eq main $add_user) {}
# The user exist
If ($user-> roleId = $add_roleId) {}
Print "user already exists with correct role, OK\n";
Exit 0
} else {}
Print STDERR "user exists but with wrong roleId.\n";
Print STDERR "request for role = (". ")" $add_role. (''), got (";"
{for(@$roleList)}
If ($user-> roleId eq $_-> roleId) {}
Print STDERR $_-> name. ») \n » ;
}
}Exit 1;
}
}
}But it is possible for an account to be included in the local users and groups, but not have any assigned permissions.
Does anyone know how query if the local account exist? In vSphere Client when connected directly to a host of local users and groups tab displays this info, I am lookling access in Perl.
Also I was trying to create a local user account and have no chance
Code:
My $accountManager = Vim::get_view (mo_ref = > $service_content-> contact).
$accountManager-> CreateUser (user = > {id = > 'Inventory2', password = > "aBc!}) ({56hh', description = > 'Inventory2'});Output:
Should HostAccountSpec for the argument of the 'user '. (eval 17) line 100
VimService::get_arg_string ('HASH (0x1f49c160)', 'user', 'HostAccountSpec') called at (eval 17) line 132
VimService::build_arg_string ('ARRAY (0x1f085fc0)', 'HASH (0x1f085f40)') called at (eval 17) line 4163
VimService::CreateUser ('VimService = HASH (0x1f214220)', '_this', 'ManagedObjectReference is HASH (0x1f2db240)', 'user', 'HASH (0x1f49c160)') called at /usr/lib/perl5/5.8.8/VMware/VICommon.pm line 1693
ViewBase::invoke ('HostLocalAccountManager = HASH (0x1f49c760)', 'CreateUser', ' user', 'HASH (0x1f49c160)') called at (eval 36) line 4
HostLocalAccountManagerOperations::CreateUser ('HostLocalAccountManager = HASH (0x1f49c760)', 'user', 'HASH (0x1f49c160)') called at vmware_user_add.pl line 151I think I made a stupid mistake by calling the method.
Thanks for any help you can give.
-Daniel
To list the users, you must use the managed object userDirectory rather http://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.wssdk.apiref.doc%2Fvim.UserDirectory.html and use RetrieveUserGroups
Joint a quick example is called listUsers.pl
VI-admin@vMA51:~ >./listUsers.pl--vesxi51-1--username root of the server
Enter the password:
Name: administrator
Group: 0
Main: rootName: DCUI user
Group: 0
Main: dcuiName: Account administration VMware VirtualCenter
Group: 0
Main: vpxuserName: ESXi user
Group: 0
Main: vslauserName: william
Group: 0
Principal: williamFor your CreateUser() method, you do not pass in the type of such expect property indicated in the reference on the http://pubs.vmware.com/vsphere-51/index.jsp?topic=%2Fcom.vmware.wssdk.apiref.doc%2Fvim.host.LocalAccountManager.AccountSpecification.html API, which is a HostAccountSpec of vSphere
It should be:
My $userSpec = HostAccountSpec-> new (id-online 'Inventory2', password-online "aBc! 56hh", description =>"Inventory2");
$accountManager-> CreateUser (user-online $userSpec);
The QAnywhere vSphere is your friend
Good luck
-
What is the use of the network user and 4 asm disks in oracle rac 11 g 2?
Friends,
Separate server DNS:
bones of DNS: OEL 5.7
RAC1
OS: OEL 5.7 64bits
DB: 11.2.0.3 64-bit
Rac2
OS: OEL 5.7 64bits
DB: 11.2.0.3 64-bit
4 disks are shared between rac1 and rac2... and I configured using the oracleasm successfully...
above all 3 nodes are in virtual box 4.1.1.8
I'm installing oracle 11 g 2 cars in the configuration node above the 2.
I'm partially by following this link http://www.oracle-base.com/articles/11g/oracle-db-11gr2-rac-installation-on-oracle-linux-6-using-virtualbox.php
up to
runcluvfy.sh stage pre - crsinst - n rac1, rac2-verbose
is success... now I got a question... What is the use of the network user?
because after checking above... it installs through the user oracle... of the complete notes he has no use for the user to this network...
can someone tell me the use of the network user?
of course I ask only this person who wrote this installation... to get a quick answer, I ask you here...
I hope that someone will clarify my doubt to the success of this installation in a few hours...
I have already created users and groups below... in each node
Node1
[root@rac1 ~]# id oracle uid=200(oracle) gid=500(oinstall) groups=500(oinstall),505(dba),502(asmdba),504(oper) [root@rac1 ~]# id grid uid=201(grid) gid=500(oinstall) groups=500(oinstall),501(asmadmin),502(asmdba),503(asmoper) [root@rac1 ~]#
and on the shared drive... He created 4 disks... I saw in the paper... 3 is normal and 5 for the top... but 4?[root@rac2 ~]# id oracle uid=200(oracle) gid=500(oinstall) groups=500(oinstall),505(dba),502(asmdba),504(oper) [root@rac2 ~]# id grid uid=201(grid) gid=500(oinstall) groups=500(oinstall),501(asmadmin),502(asmdba),503(asmoper) [root@rac2 ~]#
Thank you and best regards,OraDB wrote:
Thanks for the link...
So how about storage shared... it's 4 disc are necessary for normal redundancy? or 3 is sufficient according to the documentation.Thank you
Before you answer, you must reflect on what is to say NORMAL redundancy? As long as you can keep your total drive less than the size of a full disk, you'll be fine... If it becomes higher than that and you have a failure, you now will have a major problem trying to recover a defective unit. The documentation is for a minimum configuration, however, you generally have to be smarter than the documentation. You must configure really redundant N + 1. Whatever size you need, configure always a plus. So, if you need the space of 2 devices, set up 3. If you need the space of 3, Setup 4. And if you start using the appliance + 1, add another. Always keep N + 1.
In what concerns the grid + oracle user in most of the stores of this level of "termination" is total nonsense. Unless you have a DBA who makes GI and a DBA who data bases etc... It's a moot point. I'd say it's a complete waste of time and energy in all cases. I have it configured with grid + oracle user and I configured with just the oracle user. The multi-user method can sometimes become confused when you try to find something like the other user. YMMV.
-
ORA-01017: name of user and password invalid when using the TNS Alias
Friends,
I have this strange problem in 11 G R2. When I use tnsalias and connect using sqlplus username/password@TNS it shows ORA-01017: name of user and password invalid. But the same works with ORACLE_SID. See below.
My understanding is that both connections use a TNS alias, but then does not work. Any help is appreciated.-bash-3.00$ uname -a SunOS ibs-ash-sr147 5.10 Generic_144489-06 i86pc i386 i86pc -bash-3.00$ env | grep ORACLE ORACLE_SID=DB1 ORACLE_BASE=/project/oracle/orabase ORACLE_HOME=/project/oracle/orabase/product/11.2.0/dbhome_1 -bash-3.00$ tnsping DB TNS Ping Utility for Solaris: Version 11.2.0.1.0 - Production on 17-JUN-2011 12:23:12 Copyright (c) 1997, 2009, Oracle. All rights reserved. Used parameter files: /project/oracle/orabase/product/11.2.0/dbhome_1/network/admin/sqlnet.ora Used TNSNAMES adapter to resolve the alias Attempting to contact (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP)(HOST = crs-scan)(PORT = 1521)) (CONNECT_DATA = (SERVER = DEDICATED) (SERVICE_NAME = DB))) OK (0 msec) -bash-3.00$ sqlplus IRES_USER@DB SQL*Plus: Release 11.2.0.1.0 Production on Fri Jun 17 12:30:22 2011 Copyright (c) 1982, 2009, Oracle. All rights reserved. Enter password: Connected to: Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production With the Partitioning, Real Application Clusters, Automatic Storage Management, OLAP, Data Mining and Real Application Testing options SQL> show parameter sec_case_sensitive_logon NAME TYPE VALUE ------------------------------------ ----------- ------------------------------ sec_case_sensitive_logon boolean TRUE Disconnected from Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production With the Partitioning, Real Application Clusters, Automatic Storage Management, OLAP, Data Mining and Real Application Testing options -bash-3.00$ sqlplus IRES_USER/U9$bvs#ir@DB SQL*Plus: Release 11.2.0.1.0 Production on Fri Jun 17 12:34:30 2011 Copyright (c) 1982, 2009, Oracle. All rights reserved. ERROR: ORA-01017: invalid username/password; logon denied Enter user-name: ^C
Thanks in advance,
SSN
Published by: SSNair on June 17, 2011 05:43After sqlplus apostrophes and try
http://download.Oracle.com/docs/CD/B28359_01/server.111/b28320/initparams211.htm
-
Hello
I have about 200 computers I want to push the next to parameter
allow and remember the java plugin for firefox for all users
is it possible to do this via a script or configuration file?
You must create two files in the Firefox program folder.
- local - settings.js file in the defaults\pref folder where you will find the channel - prefs.js
- mozilla.cfg in the main folder of the Firefox program
Maybe you are looking for
-
Contact ID has stopped working
After the 9.3.1 update my ID of more Touch iPhone 6s has stopped working. All my fingerprints have been deleted and it won't let me add them. The option is grayed out.
-
Can satellite P105 - I change my Windows Vista Home to ultimate?
Hello I have a version of Windows Vista Edition family on my Satellite P105 and he can't not works fine on all my installed software... I would like to format the laptop again, but I'm ready to install the Windows Vista ULTIMATE version... so I was w
-
Norton 360 v4.0 only 15 days rest
I have 15 days left on my account if I type in the new product code now I will lose the last 15 days
-
I tried the proposed to the c: drive, but it is to the top of internet Explorer does not connect. What should I do now?
-
With the help of Windows 7 several times the cursor turns into a black comb and then randomly to the default arrow. It doesn't seem to do anything, but it is annoying at least. Any ideas on what causes it, how to stop it, etc.