How to check who has my password?

Hello
Someone has changed my password to the user in the instance of R12. How can I find who has changed?

Concerning
Arizuddin

Hello

You can check the LAST_UPDATED_BY and LAST_UPDATE_DATE columns. For users of the application, all details in the APPLSYS. Table FND_USER.

eTRM
http://ETRM.Oracle.com/

APPS audit
Re: APPS audit

Kind regards
Hussein

Tags: Oracle Applications

Similar Questions

  • Where to check who has changed the password of Admin of HSS and what the new password

    Hello world

    I use Hyperion 11.1.2.1.

    Can you please tell what newspapers reveal that changed the password of Admin of HSS and what is the new password.

    Even though I know how to reset the password of admin HSS but for security reasons I want to know which user changed the password of HSS.

    -Sun

    If it was the default password admin account then it's probably the admin account that has changed, you can run reports to audit in Shared Services, but to be honest, they are pretty useless, in the HSS database there is a table named CSS_USERS and a column called updatedby which will show the user who has made changes to the account updatedtimestamp last and column to indicate when

    See you soon

    John

    http://John-Goodwin.blogspot.com/

  • How to check who is using my wireless network?

    I just want to be sure that no one is using my wireless network... I know I did a password to get access to it, but is their way to check if its working?

    In addition, when I went under network settings

    I found something that is called gateway residential... don't remember really see it, but when I go in there, it shows something called teredo... and it has an IP different than my router... no idea what it could be?

    Disabling Wireless SSID Broadcast will arrange this?  making it not visible by anyone but me?

    If you are using WPA or WPA2 and a strong password, nobody is your wireless network, except you.  Anyone who has the skills, computer power supply, time and determination to break into such a system is busy breaking in banks, not your home router.   Then don't worry about this.

    You can check that your router is using WPA or WPA2 and your password by:

    (1) connecting your router 192.168.1.1 and ranging in the wireless section and check that the WPA or WPA2 encryption is turned on and that your password is entered.

    (2) you can check that the router is working by connecting wireless using the password.

    (3) you can check that you have connected to your router first getting a wireless Internet connect, then unplug your router and check that the Internet suddenly not working.

    "teredo tunneling" is a way to move to IPv6 info from an IPv4 router.  Don't worry about this.

    Do not "SSID Broadcast" set to 'off '.  With modern methods of piracy, that old thing of security is now worthless.  Furthermore many wireless adapters have problems connecting to routers that broadcast their SSID not, so it might cause you problems of network.   If you are using WPA or WPA2 and a strong password, who cares if someone sees your SSID?   Without your password, they cannot connect wirelessly to your router.

    I mean, strong password, at least 24 characters random, including uppercase, lowercase and numbers.  Although I recommend 24, or 12 is almost impossible to crack.

  • How to check who is log on

    Hello
    My question is: how to check which is log on? in forms

    I want to know who is log on my trigger if it starts block instance

    If "login" then...


    concerning

    Try this in the desired trigger:

    someVariable := GET_APPLICATION_PROPERTY (USERNAME);
    
  • How to determine who has access to the training

    Hello

    I have an iomega StorCenter ix4 - 300 d set up as a network drive with several users who have permission to access. From time to time some of the scripts are unable to access one of the drives inside. For me, it seems that when that happens someone in my network uses extensively this player (the blue led continues to blink). Is there a way to determine who is using the drive or what resources are being accessed?

    Thank you very much for the help.

    Hi pegazik,

    The event log indicates if users log in to the device and make changes. There is not a way to show what is being accessed.

  • How recover recently who has send the sms and recently send e-mail address?

    Hello

    I want to combile all numbers recently called, recently send sms number and recently send e-mail address.

    I did get it back recently called numbers but I don't get how to recover the recently send sms numbers and email address.

    can someone tell me please how to Thatcher?

    You can read the messages in the sent folder and choose the e-mail addresses, the messages have been sent.  Or you could implement a SendListener, to capture and store the addresses of e-mail messages recently sent e-mail.

  • Noticed on my desk that there is an unknown name and it has a password. I don't know who he is. This is my computer at home. I have just upgraded to Windows 7 pro.

    Noticed on my desk that there is an unknown name and it has a password. I don't know who he is.  This is my computer at home. I have just upgraded to Windows 7 pro.  How can I get rid of this name or why it is there?

    http://answers.Microsoft.com/en-us/Windows/Forum/Windows_7-security/what-is-the-sacnetdriveuser01-account/06dce3b0-075a-484A-846C-f38820bccbdc?msgId=1fa00f4e-75d0-44bd-B25C-44de55241b38

  • Apple password has changed.  Now Apple TV doesn't let me sign in. (recognition of PW). Other devices can connect.  Anyone who has a solution?

    Apple password has changed.  Now Apple TV doesn't let me sign in. (recognition of PW). Other devices can connect.  Anyone who has a solution?

    Connect to what? Your WiFi network? Your shared lib itunes from your computer? ITunes online services?

  • How to check if your x230t has a backlit keyboard?

    How to check if your x230t has a backlit keyboard?

    Hello

    When I bought my x230t, the seller said that the model of backlit keyboard. but now when I press the "FN + SPACE key" nothing happens. I installed all the drivers (I think). So I wanted to ask you if you still pilots or any other software for the keyboard backlit to work?

    And how do I check if my model has a backlit keyboard?

    Best regards, Tastro


  • How to know who and how to contact the manufacturer because of passwords forget bio

    How to know who and how to contact the manufacturer because of passwords forget bio

    Hello

    I suggest you to go through Microsoft's strategy in the following Microsoft article.

    Microsoft's strategy concerning lost or forgotten passwords:
    http://support.Microsoft.com/kb/189126

    For any assistance regarding related BIOS passwords, you must contact your computer manufacturer.

    Hope the information is useful.

  • Administrator account has no password - how to fix this?

    I help fix a Windows XP Pro computer for a friend.  He got divorced and remove his ex-wife and son of user accounts.  However, as I understand it, there is a problem.  When you go into control panel > users there are now 2 users... Administrator and Greg (also a Director)... or has a password associated with it.   When the computer restarts the two icons seem to choose user... no password is required to continue.

    I think that something is wrong.  Should not the administrator user account has a password, even if other users are not?   Is not a security feature?   I guess someone has been playing with the accounts and that damn, but I don't know how to fix it.

    What we want to do, it's the computer starts without clicking on a user icon or use a password.  The user administrator account shouldn't like to be in the background?  Read somewhere that if you go in Mode safe that the original administrator with password user account will be there.    Huh?

    Tips are welcome.
    Thank you.

    It is not * necessary * that you have any password on your system.  It's * sage * have accounts level administrative camps, each with a password and use a non-adminitsrative level account for everyday tasks.

    I don't know what you read and where you read - but given your operating system - it is incorrect.  Combinations of name of user and password in Mode safe are the same as in normal mode.  In Windows XP Professional, you can see and use the built-in secure and normal mode administrator account.  It's Windows XP Home Edition, where you can only login as administrator integrated mode without failure.

    Really, you MUST assign a password to all accounts.  You really should create a new user to be used every day (not administrator).  You can set up an automatic connection to one of these accounts - I recommend the non-admin.

  • How to check the windows firewall has the stealth mode on and how he check actaully work

    I have windows 8.1 with all updated.

    Can someone tell me how to check the firewall windows has stealth mode?

    Also, can someone tell me how I could actually check that, if it is then how can I check that it actually works against someone trying to find open ports to exploit?

    Rich

    Go to GRC.com here https://www.grc.com/lt/leaktest.htm

    Read how to use it here https://www.grc.com/lt/howtouse.htm

    Run the LeakTest

  • How to check if a key has been used

    Hi all

    Is there a way to determine whether a key has been used in a SQL statement?

    Example of
    I received a call from a developer said that their request was going very slow

    I checked what oracle was doing

    He was using an index with 5 distinct values on a table with a number of lines of 9.2 million

    Selectivity is very bad.

    Then I discovered after talking to the Director it was a hint to use the (silly) hints

    Once we had the suspicion that he did a scan of Table full and actually ran much faster.

    However, when I was watching the SQL text in v$ sql and v$ sqlarea he had no way of knowing if we used a hint

    IE, I saw: / * + RULE * / in the code.

    Does anyone know how to check (from the DB), if an indication is used in a sql statement?

    And if the indication is used, what is the indicator.

    Thank you

    G.

    You can use the following to see the execution plan with the outline and see advice

    Select * from table (dbms_xplan.display_cursor (null, null, 'schema'));

    select  /*+   rule  */  sum(id) from     t1 where     flag = 0
    
    Plan hash value: 2170464548
    
    ------------------------------------------------
    | Id  | Operation                    | Name    |
    ------------------------------------------------
    |   0 | SELECT STATEMENT             |         |
    |   1 |  SORT AGGREGATE              |         |
    |   2 |   TABLE ACCESS BY INDEX ROWID| T1      |
    |*  3 |    INDEX RANGE SCAN          | T1_FLAG |
    ------------------------------------------------
    
    Outline Data
    -------------
    
      /*+
          BEGIN_OUTLINE_DATA
          IGNORE_OPTIM_EMBEDDED_HINTS
          OPTIMIZER_FEATURES_ENABLE('10.2.0.1')
          RBO_OUTLINE
          OUTLINE_LEAF(@"SEL$1")
          INDEX(@"SEL$1" "T1"@"SEL$1" ("T1"."FLAG"))
          END_OUTLINE_DATA
      */
    
    Predicate Information (identified by operation id):
    ---------------------------------------------------
    
       3 - access("FLAG"=0)
    
    Note
    -----
       - rule based optimizer used (consider using cbo)
    

    HTH

    Kind regards

    Jagdeep Seven

  • Has anything recently changed how the check of the Image on the forms?

    Has anything recently changed how the check of the Image on the forms?


    Problem

    In these few days we noticed the verification of the Image on our forms does not preclude the submission form when the values do not match.

    Form design

    To create our forms, we use the procedure described here: http://www.thrise.com/blog/create-business-catalyst-WebForms.htm . Basically, we create the form with all the fields we want to, including the verification of Image ({module_captchav2}) outside the BC. We then put the code form on a page in British Colombia and tap the Actions button then choose optimize the content.  This creates a Web form (Site Manager > Web Forms).

    The form will not work correctly: we could submit the form and get an email and Image verification would prevent the submission form if the values don't match.

    Test
    We have confirmed on two other sites, forms correctly thwarting form submission when the captcha does not match are now allowing these forms to submit (emails are always received).

    When we create a form in British Colombia, verification of the Image fact work. So we guess something changed with what happens when the button optimize content or how the check of the Image. 


    Although some not, we believe that we used to display the field of captcha with the other fields of the form when you look at the form in British Colombia (Site Manager > Web Forms), but we don't see it now.

    img3.png

    Notes

    JQuery validation check required fields, including the field of Captcha, are not empty.

    We create forms using the procedure described above, because we want to use controls of sensitive form of the Bootstrap instead layout table tags generated during the construction of the form in British Colombia.  Be able to generate startup code, while the form of construction in British Colombia would be ideal.

    We believe that if we were to display the captcha field with the other fields in the form when you look at the form in British Colombia (Site Manager > Web Forms) that the Image verification will not work correctly.

    Verification of image above refers to the choices under the Site Management > forms > misc. However, when you look at the page in the browser it actually says 'Enter verification word in the box below.

    img1.png

    img2.png

    Here is an example of an already optimized form on my site in sandbox (feel free to submit the form): http://robertstastyvittles.mybizzuka.com/contact-us

    Thank you

    sepyh

    This guide, that I personally would not follow because it neglects several key elements you need for BC forms work properly, I'm surprised that has no mention of the use case or notes of those somehow.

    -Because you have carved in the script BC for the captcha form part you will not get a correct script error on submit for the captcha. This is the first problem there.

    D ' other hand you him have not set to force validation captcha on the form in the admin. Under Site Settings > Captcha is where that option life.

    Nothing has changed in British Colombia for the captcha feature, your missing just parameters and code to make it work as expected.

  • I have a protected PDF file. I have the password. How to convert to Word?  The export tool will fail because it has a password (even if the doc is open)

    I have a protected PDF file. I have the password. How to convert to Word?  The export tool will fail because it has a password (even if the doc is open)

    Hi stupiddonkey,

    You will need to remove the password from the file (using Acrobat, not reader) before you can convert it to Word. To do this, choose file > properties, and then click the Security tab choose no security in the context menu of the security method and enter the password when you are prompted.

    Best,

    Sara

Maybe you are looking for