How good/bad is Reg Zooka?

How good/bad is Reg Zooka and other registry cleaners? Do I still need to do anything in the registry? I read mixed reviews.

There is NO SUCH THING as a 'good' registry cleaner - they are ALL, without exception, snake oil and dangerous.

Tags: Windows

Similar Questions

  • my chart of airport utility is no longer showing how good (or bad), the connection is. It started when I installed el available hotfix captain.any

    My airport extreme is no longer show how good or bad connection lies in the graphical utility from the airport. With the help of 27 "

    iMAC on El Captian.

    It's an El Capitan bug that should be fixed in the 10.11.2 recent update.  That is what you have installed on your Mac?

  • How to mark clips in the browser as good, bad or ugly so I can see at a glance is it ha been used?

    I'm trying to find a way to mark the clips in the PP 2015 cc. Have not yet found a way.

    Check the column "of opportunity" in the project window. Which shows clips and assets that have been used

    You can create a custom column if you want or you can use the labels you choose.

  • How good is mac scan

    I was wondering what is a commodity good spam. Have opions on scan mac?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • How to install crack.reg

    I have a piece of software that requires me to install 'crack.reg' to my records before launching.
    How to do that please?

    Yes, but it doesn't seem quite as something visible.

    If you have the .reg file, you could just double-click it and it would be added to the registry after you inviting. However, a registry entry called 'crack' doesn't exactly sound very good.

  • How good my connection to video call?

    Hello

    I have a bad internet connection because of high costs and other things, anyway...

    Is this enough for a good video call?

    It's the same connection that uses the other party

    I don't think you can expect good quality with these specifications of Internet video calls. Especially the very low download speed is the limiting factor.

  • How to merge a .reg file

    I followed the instructions on what to do to fix the error msg "No current running Genuine Windows".  Using method C.

    I copied and pasted the following text:

    C method: Add the registry key

    1 copy the entry as on a Notepad and save the text file to Profilelist.reg below
    2 merge profilelist.reg
    3. restart the server and now try to activate it, it should work fine.
    ---------------------------------------------------------------------------------------------------------------------------------------------------
    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18]

    'Flags' = dword:0000000 c
    "State" = DWORD: 00000000
    "RefCount" = DWORD: 00000001
    "Sid" = hex: 01, 01, 00, 00, 00, 00, 00, 05, 12, 00, 00, 00
    "ProfileImagePath" = hex (2): 25, 00, 73, 00, 79, 00, 73, 00, 74, 00, 65, 00, 6 d, 00, 72, 00, 6f,
    00, 6f, 00, 74, 00, 25, 00, 5 c 00, 73, 00, 79, 00, 73, 00, 74, 00, 65, 00, 6 d, 00, 00, 32, 33, 00,------.
    5 c, 00, 63, 00, 6f, 00, 6F, 00, 66, 00, 69, 00, 67, 00, 5 c 00, 73, 00, 79, 00, 73, 00, 74, 00, 65,.
    00, 6 d, 00, 70, 00, 6f 72, 00, 00, 66, 00, 69, 00, 6 c, 00, 65, 00, 00, 00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-19]
    "ProfileImagePath" is hex (2): 43, 00, 3 a, 00 5 c 00, 57, 00, 69, 00, 6F, 00, 64, 00, 6f, 00, 77,------.
    00,73,00, 5 c, 00, 53, 00, 65, 00, 72, 00, 76, 00, 69, 00, 63, 00, 65, 00, 50, 00, 72, 00, 6f, 00,------.
    66,00,69,00 6 c 00, 65, 00, 73, 00, 5 c, 00, 4 c, 00 6f 00, 63, 00, 61, 00, 6 c, 00, 53, 00, 65,.
    00,72,00,76,00,69,00,63,00,65,00,00,00
    "Flags" = DWORD: 00000000
    "State" = DWORD: 00000000

    [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-20]
    "ProfileImagePath" is hex (2): 43, 00, 3 a, 00 5 c 00, 57, 00, 69, 00, 6F, 00, 64, 00, 6f, 00, 77,------.
    00,73,00, 5 c, 00, 53, 00, 65, 00, 72, 00, 76, 00, 69, 00, 63, 00, 65, 00, 50, 00, 72, 00, 6f, 00,------.
    66,00,69,00 6 c 00, 65, 00, 73, 00, 5 c, 00 4F 00, 65, 00, 74, 00, 77, 00, 6f, 72, 00, 00, 6 b------.
    00,53,00,65,00,72,00,76,00,69,00,63,00,65,00,00,00
    "Flags" = DWORD: 00000000
    "State" = DWORD: 00000000

    The instructions State: copy entry as a Notepad and save the text file to Profilelist.reg below
    2 merge profilelist.reg
     
    After that I pasted into Notepad and saved it as Profilelist.reg
     
    I DON'T KNOW HOW TO MERGE PROFILELIST. REG
     
    Can you help me?

    Double-click the newly saved Profilelist.reg file.

  • How a bad information address, distributed by Apple's SIRI in our region of Central Okanagan, British Colombia, Canada?

    It has come to my attention that Apple's SIRI makes people wrongly resources for services of abortion here in Kelowna, BC Canada.  How can I get Apple to fix the problem and make the necessary corrections?

    By contacting Apple directly and NOT post on the forums of technical support to the user.

    Also, Siri has to do with iWeb is an application to create websites?

    < published by host >

  • Pavilion 550-a17c: how good are the graphics?

    Hello, I am looking to buy a new computer and I am looking for one that will be able to run modern games such as Grand Theft Auto V (GTA V), H1Z1, Hardline Battlefield, perhaps Mod of Garry's (Gmod) and any other game that will be released in a future that seems interesting to me. I have seen that this particular computer has all of the minimum requirements for GTA V, but the only thing I don't know is the graphics card, it's good enough to meet the minimum requirement or even recommended requirement? Please help, if this video card work it will save me $400 on a computer that I know will work. Thank you!

    NitroTY19,

    If your still around, I hope you see this. DO NOT BUY this device. There is NO graphic slot.

    There no PCIEx16.  Look at the photo of the motherboard and the description.

  • cards - idea idea good/bad-gifts iTunes?

    My children asked for iTunes gift cards, but I don't want to buy proprietary format files, I only want to buy MP3s, I'm looking for more information.  Assistance from the iTunes store is incredibly useless until I have create a funded account (IE, give them my credit card number, which will not happen)- so I can't get any useful information.  In principle, I'm ready to quit smoking right now, but I'll ask you a few questions - you people were always very useful!

    Can I download MP3s from iTunes or I can only convert the files to the MP3 format after I buy the Apple?

    If you can not buy MP3s, it is a conversion of simple menu item in the iTunes software?

    I think that Amazon gift might be one better idea, other thoughts?

    Thank you.

    Fortunately, iTunes brought to DRM-free music a few years ago.

    Personally, I don't like the iTunes software and how Apple tries to control my computer.  When I buy, it tends to be Amazon - deals on complete albums, without complication.

  • Westinghouse LCM-22w2 monitor-how good do driver for the model that has no driver

    I have a Westinghouse LCM-22w2 widescreen I am trying to use on my desktop Gateway 4610.  When I plug it in I just get a white screen.  I checked the site Web of Westinghouse, and there is no driver available for this older model.  It has the screen resolution of 1680 x 1050.  Currently, my hardware device for monitor Manager is generic PnP monitor and the graphics card is the Radeon X 1300/X 1550 series.  Anyone know how to get this form to work on my computer

    Hi Lance,.

    Thanks for the updates.

    As I mentioned in the previous post, the problem is related to compatibility, it can affect the audio and other settings with the monitor.

    However; You can also refer to the gateway support and install the latest version of the sound card drivers and check.

    If the problem persists, you will need to get in touch with The Westinghouse support for assistance.

    Let us know if you need help with Windows related issues. We will be happy to help you.

  • My Sony vaio keeps dropping the wireless signal. Then I have to reset the wireless adapter how Goode

    How can I get the wireless signal to stop falling and have to be paid

    Hello

    What is the model # computer? Check the following link to locate the model #:

    http://eSupport.Sony.com/us/p/support-info.pl?info_id=264#notebook

    When the question did it first start?

    Try the steps listed on the following links to solve the problem of Lan Wireless:

    Wi - Fi signal reduction

    How to troubleshoot a wireless network connection.

    If my post answered your question, please mark it as an "accepted Solution".

  • Practice good/bad workaround or does it not matter...?

    Hello

    I have a project that requires some shared actions to hide. / show something and needed a quick fix to hide 1 9 show I've done as follows... (keep in mind, I use CP7 not 8)

    I copied my slide show 20 of hide1 from another project, that maintains the connection between the buttons and images etc, but because it was too much for my other project, I just put things on the slide not copied displlay output etc and then renamed those I wan to designate in the new project and everything works fine However, if wer do this is this bad practice as any other editor CP further down the track, a need to modify the project, might think it is a mess and mish mash with ttoo much (well hidden) object in the slide and may make it more difficult for them.

    My initial thoughts on which is while it can look a bit of a waste, my approach to any existing project is to deconstruct to see exactly what is happening, but a few others could just look at it as a real pain. (I did this way that I couldn't change a shared in CP7 action)

    So, I was just wäntig to ask this question to the community and get feedback on your thoughts on this approach...? (I hope I have explained this properly and is understandable, etc.)

    See you soon

    Sabine

    Each shared action exists also as model in the drop-down list that begins with white in the advanced Actions dialog box. I'll make a copy of the description of the action and its parameters, because you have to reenter those.

    Open the template that you want to change. You will have to fill in the parameters (no matter what) and can make changes. Then save it again as a shared action. The biggest problem is that you need to refill all the descriptions.

    The file size is only a problem for the raw file, never for the published file. And from my experience, I know that using a common action repeatedly to replace the double tip action lets you save on the size of the file. More shared stocks have descriptions, that is not the case for advanced actions. I used to add some text containers in the work area to have a description of the variables and advanced actions.

  • General documentation on apps that are eligible for the good/bad VM

    Hi, I am an administrator of the virtual machine, and my work wants to put servers with scripts on them customized VM.  The problem is, the script runs every 15 minutes and uses all CPUS that he while he runs... either 1 or 8 cores!

    I'm trying to convince them that they are not good candidate for the VM for obvious reasons... If I have 8 instances of cpu one of these servers on a dual processor quad core server... I won't be able to safely put something else on it!  while I could put 100 moderately used it web servers and be well!  It would be such a waste.

    The problem is that they want documentation that pollers States are not good for VM, or only apps which CPU are not good candidates.

    Does anyone know whether or not this kind of doc exists?  If Yes please let me know

    any input would be appreciated.

    Thank you

    Raymond Golden

    VCP3, VCP4, MCSA,Net, was DRY.

    This presentation is a bit old, but still gives you an idea:

    http://download3.VMware.com/VMworld/2006/tac4054.PDF

    The VMware Capacity Planner (avaiable for VMware partners only) will create a report of your servers physical and if they are good candidates.

    Lars

  • How good my trigger &amp; Create Sequence are written review my excerpt from PL/SQL

    I have a CustomerHistory table.

    Here's a sequence I created for the table:
    CREATE SEQUENCE customerhistory_id_seq
    START WITH 90
    INCREMENT BY 10
    MAXVALUE 90000
    NOCYCLE
    NOCACHE;
    I created a trigger example the primary key of the history table:

    CREATE OR REPLACE TRIGGER cushistory_bef_insert
    BEFORE INSERT ON CustomerHistory
    FOR EACH ROW
    BEGIN
          SELECT customerhistory_id_seq.NEXTVAL INTO :NEW.CustomerHistoryID
          FROM DUAL;
    END;
    /
    After each update, or delete, insert the old record in the history table:
    CREATE OR REPLACE TRIGGER cushistory_aft_upddel
    AFTER UPDATE OR DELETE ON CUSTOMER
    FOR EACH ROW
    BEGIN
          IF UPDATING THEN
                INSERT INTO CustomerHistory
                         *
                (
                     SELECT
                             :OLD.c.customerID,
                             :OLD.c.firstname,
                           :OLD.c.lastname,
                           :OLD.c.email,
                             .
                             .
                             .
                             :OLD.mr.roomtype,
                             .
                             .
                             .
                             :OLD.b.checkout,
                             'UPDATE',
                             SYSDATE
                   FROM Customer c JOIN CustomerFamilyMember cf ON c.customerID = cf.customerID
                         JOIN Phone p ON c.customerID = p.customerID
                         JOIN ThirdParty t ON c.thirdpartyid = t.thirdpartyID
                         JOIN BookedRoom b ON c.customerID = b.CustomerID
                         JOIN MotelRoom mr ON b.roomID = mr.roomID
                         JOIN Motel m ON mr.motelID = m.motelID
              );
         
          ELSIF DELETING THEN
          
                INSERT INTO CustomerHistory
                         *
                (
                     SELECT
                             :OLD.c.customerID,
                             :OLD.c.firstname,
                           :OLD.c.lastname,
                           :OLD.c.email,
                             .
                             .
                             .
                             :OLD.mr.roomtype,
                             .
                             .
                             .
                             :OLD.b.checkout,
                             'DELETE',
                             SYSDATE
                   FROM Customer c JOIN CustomerFamilyMember cf ON c.customerID = cf.customerID
                         JOIN Phone p ON c.customerID = p.customerID
                         JOIN ThirdParty t ON c.thirdpartyid = t.thirdpartyID
                         JOIN BookedRoom b ON c.customerID = b.CustomerID
                         JOIN MotelRoom mr ON b.roomID = mr.roomID
                         JOIN Motel m ON mr.motelID = m.motelID
              );
         
          END IF;
    END;
    /
    1 are structured correctly 3 pl/sql code snippets?
    2. in the last example, which is an alternative using the JOIN? If know join 5 tables is not a good
    long term solution. Any idea?

    Hello

    Here are the bugs I find in your code.
    Please view the description of test table and features for more information.

    1 cushistory_aft_upddel is a level trigger line on client.
    Querying the table inside the trigger would give the error table mutation.

    ERROR at line 1:
    ORA-04091: table XXXXX.CUSTOMER is mutating, trigger/function may not see it
    ORA-06512: at "XXXXX.TEST_TRG", line 2
    ORA-04088: error during execution of trigger 'XXXXX.TEST_TRG'
    

    The only way you can acccess them using: old.col_name and: new.col_name.

    2 table the customer is the only updated and so the new and the old mke sense only for the customer table. the old.b.col_name and old. XXX.col_name for all other tables mean nothing and will result in error;

    Here is an excerpt of small test with tahe customer table and another table called check_in. You can extend the same thing for your problem.

    sql> create table customer(
      2    cust_id number,
      3    cust_name varchar2(20));
    
    Table created.
    
    sql> create table check_in(
      2    cust_id number,
      3    check_in date,
      4    check_out date
      5  );
    
    Table created.
    
    sql> create table cust_history(
      2    cust_id number,
      3    cust_name varchar2(20),
      4    check_in  date,
      5    check_out date);
    
    sql> insert into customer values (100, 'Rajesh');
    
    1 row created.
    
    sql> insert into customer values (200, 'kumar');
    
    1 row created.
    
    sql> insert into check_in values (100, sysdate-2, null);
    
    1 row created.
    
    sql> insert into check_in values (200, sysdate-3, null);
    
    1 row created.
    
    sql> commit;
    
    Commit complete.
    
     create or replace trigger test_trg
     after update on customer for each row
     begin
       insert into cust_history
       select :old.cust_id,
              :old.cust_name,
              ci.check_in,
              ci.check_out
         from check_in ci
         where ci.cust_id = :old.cust_id;
     end;
     /
    
    sql> select * from customer;
    
       CUST_ID CUST_NAME
    ---------- --------------------
           100 Rajesh
           200 kumar
    
    sql> select * from check_in;
    
       CUST_ID CHECK_IN  CHECK_OUT
    ---------- --------- ---------
           100 25-DEC-09
           200 24-DEC-09
    
    sql> select * from cust_history;
    
    no rows selected
    
    sql> update customer set cust_name = 'Rajesh2' where cust_id = 100;
    
    1 row updated.
    
    sql> commit;
    
    Commit complete.
    
    sql> select * from customer;
    
       CUST_ID CUST_NAME
    ---------- --------------------
           100 Rajesh2
           200 kumar
    
    sql> select * from cust_history;
    
       CUST_ID CUST_NAME            CHECK_IN  CHECK_OUT
    ---------- -------------------- --------- ---------
           100 Rajesh               25-DEC-09
    

    You can use the other tables to select as I used the check_in above. You don't need to access the customer table that you have values in the: old. and: new. variables for them.

    Thank you
    Rajesh.

    Published by: Rajesh Chamarthi on December 26, 2009 21:30 added example.

Maybe you are looking for