Question about ActionScript 3 for the basic website...

I have a basic website in flash with each 'page' on a separate keyframe in the timeline panel.

On my links page, I have buttons that must open URL in a new window... When I try to add the script to the buttons and publish, it loops through all my pages in a constant loop.

That's what I tried to do that does not work (add link to one of the buttons):

Stop();

Links_btn.addEventListener (MouseEvent.CLICK, fl_ClickToGoToAndPlayFromFrame_5);

function fl_ClickToGoToAndPlayFromFrame_5(event:MouseEvent):void

{

gotoAndPlay (5);

}

Stop();

This.facebook_link.addEventListener ("click", fl_ClickToGoToWebPage_5);

function fl_ClickToGoToWebPage_5() {}

window.open ("http://www.facebook.com/liebekunstart", "_blank");

}

Try to use the navigateToURL() instead of a cvommand of javascript for this second function of the button.  You should also keep things consistent and follow the coding of the first button... it is coded correctly.

facebook_link.addEventListener (MouseEvent.CLICK, fl_ClickToGoToWebPage_5);

function fl_ClickToGoToWebPage_5(event:MouseEvent) {}

navigateToURL (new URLRequest ("http://www.facebook.com/liebekunstart"), "_blank");

}

Note: stop(); is a command of the timeline, so you only need one by any image in which you want to stop.

Tags: Adobe Animate

Similar Questions

  • Question about using Lightroom for the second time.

    I used Lightroom 1 when it came out but stopped using it for a period of time. I deleted all preferences and the app. All photo in Lightroom folders were also deleted after that I moved the images. I had to reinstall Mac OS x, so I cleaned my HD and reinstalled. So I had a clean slate.


    In any case, I reinstalled Lightroom 1 so I could buy the upgrade of LR 2. Then I installed 2 LR. But what I don't understand is... my nameplate, preferences and other little things that I had set up in Lightroom 1 returned when I open Lightroom 2. Does anyone know how this is even possible, given what I mentioned above? No matter what help understand this would be greatly appreciated because I want to have a completely fresh start. Thank you.

    Jbshanks1

    As well as preferences, look in Application Support / Adobe/Lightroom.

    John

  • How about a readme for the new signing of RVS - 4000 IPS: 1.42 in firmware 1.3.2

    Hello

    How about a readme for the new Signature IPS 1.42 inside the new firmware to version 1.3.2 RVS-4000?

    Or am I just too fast and it comes out in a bit?

    Thank you

    Bruce

    Bruce,

    You are right.  He left this time by mistake.  We will solve it.  In the meantime, here's what it will be:

    RVS4000/WRVS4400N IPS Signature Release Note

    Version: 1.42 rules Total: 1097

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    Supported P2P application called BitTorrent up to version 5.0.8.
    Supported P2P application named uTorrent up to version 1.7.2.

    Version: 1.41 rules Total: 1098

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    -EXPLOIT the MS video control ActiveX Stack Buffer Overflow
    A buffer overflow vulnerability exists in Microsoft DirectShow.
    The defect is due to the way Microsoft Video ActiveX Control parses image files.
    An attacker can convince the user target to open a malicious web page to exploit
    This vulnerability.

    -EXPLOIT the Injection SQL Oracle database Workspace Manager
    Multiple SQL injection vulnerabilities exist in Oracle database server product.
    The vulnerabilities are due to inadequate sanitation of input parameters
    in the Oracle Workspace Manager component. A remote attacker with user valid
    credentials can exploit these vulnerabilities to inject and execute SQL code
    with lift is SYS or privilegesof WMSYS.

    Supported P2P application named uTorrent up to version 1.7.2.

    Content signature for 1.41
    ========================================================================
    Added new signature:
    1053635 video MS stack buffer overflow EXPLOIT control ActiveX-1
    1053636 video MS stack buffer overflow EXPLOIT control ActiveX-2
    1053632 EXPLOIT Oracle database Workspace Manager SQL Injection-1
    1053633 EXPLOIT Oracle database Workspace Manager-2 SQL Injection
    1053634 EXPLOIT Oracle database Workspace Manager SQL Injection-3

    Updated the signature:
    1051783 P2P Gnutella Connect
    1051212-P2P Gnutella Get file
    1051785 P2P Gnutella UDP PING 2
    1051997 P2P Gnutella Bearshare with UDP file transfer
    1052039 P2P Gnutella OK
    Get Foxy P2P file 1052637

    Signature removed:
    1050521 Worm.Klez.E1 - 1
    1050522 Worm.Klez.E1 - 2
    1050523 Worm.Klez.E1 - 3
    1050524 Worm.Klez.E2 - 1
    1050525 Worm.Klez.E2 - 2
    1050526 ¡v Worm.Klez.E2 3
    1050536 Worm.Blaster.B - 1
    1050537 Worm.Blaster.B - 2
    1050538 Worm.Blaster.B - 3
    1050539 Worm.Blaster.C - 1
    1050540 Worm.Blaster.C - 2
    1050541 Worm.Blaster.C - 3

    Number of rules in each category:
    ========================================================================
    Back/DDoS 51
    Buffer overflow: 241
    Access control: 92
    Scan: 41
    Trojan horse: 62
    Misc: 3
    P2P: 40
    Instant Messaging: 121
    VRU/worm: 410
    Web attacks: 37

    Version: 1.40 rules Total: 1091

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    1053406 FEAT MS IE HTML Embed Tag Stack Buffer Overflow (CVE-2008-4261)
    An error of border during the processing of a too long file name extension specified
    inside a "EMBED" tag can be exploited to cause a stack-based buffer overflow.

    1053421 USE MS IE XML Handling Remote Code Execution (CVE-2008-4844)
    The vulnerability is due to a use-after-free error when composed
    HTML elements are related to the same data source. This can be exploited to
    dereference of a pointer released by a specially designed HTML document memory

    Version 1.38

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support for P2P, BitTorrent and eMule applications.

    Version 1.33

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support application IM named AIM (http://dashboard.aim.com/aim) until
    version 6.5.

    2. support application IM called MSN (http://get.live.com/messenger) until
    version 8.1.

    3 PcShare is a Trojan tool that can remotely administer an attacked computer.

    4-CVE-2007-3039: the vulnerability is due to an error of limit in the
    Microsoft Message Queuing (MSMQ) service during the treatment of MSMQ messages.
    This can be exploited to cause a buffer overflow by sending specially
    packages designed for the MSMQ service.

    Version 1.32

    In this signature, we addressed the following peer-to-peer applications:

    1. named IM application PURPOSE up to version 6.5 support.
    2. press the request of IM named MSN until version 8.1.

    Version 1.31

    In this signature, we addressed the following peer-to-peer applications:

    1 P2P application called BitTorrent up to version 5.0.8 support.

    2. support the P2P application named uTorrent up to version 1.7.2.

    Version 1.30

    In this version, we have addressed the following vulnerabilities in Microsoft
    applications:

    1 SUBMISSION-24462: dereference of a pointer Null vulnerability exists in some versions
    Microsoft Office.  Remote attackers can trick users into visiting a
    specially designed web page.  The symptom includes a denial of
    condition of service for the process in question.

    2 Microsoft Security Bulletin MS07-027: Microsoft Windows support
    Services NMSA Session Description object ActiveX control does not reach
    restrict access to dangerous methods. This vulnerability could allow
    a remote attacker to execute arbitrary code on an affected system.

    Version 1.29

    In this version, we have addressed the following exploits/vulnerabilities and
    peer-to-peer applications:

    1 Microsoft Security Advisory (935423): there is one based on the stack
    in Microsoft Windows buffer overflow. The vulnerability is due
    for insufficient format validation when handling incorrect ANI
    file cursor or icon. A remote attacker can exploit this
    vulnerability of prompting grace target user to visit a malicious
    Web site by using Internet Explorer. A successful operation would be
    allow the execution of arbitrary code with the privileges of the
    currently logged in.

    2. support a named QQ instant messaging application blocking until the
    2007 Beta1 and Beta2 version.

    Version 1.28

    In this signature, we address the following exploits/vulnerabilities:

    Microsoft Security Bulletin MS07-014: there is a buffer overflow
    vulnerability in Microsoft Word. The vulnerability is created due to
    a flaw in the Table entry of the Section within the structure of Table data flow.
    An attacker could exploit this vulnerability by tricking a user to open
    a designed Word file. Exploitation of the vulnerability may result
    injection and execution of arbitrary code in the security context
    the user target.

    Microsoft Security Bulletin MS07-016: there is an alteration of the memory
    vulnerability in Microsoft Internet Explorer. The flaw is due to a bad
    posting lines of response in the responses from the FTP server. By persuading a user
    to visit a malicious website, an attacker could run arbitrary on code
    the target system with the privileges of the currently logged in user.

    Version 1.26

    In this signature, we addressed the following exploits/vulnerabilities:

    CVE-2006-5559: there is a memory corruption vulnerability in
    the ADODB. Connection ActiveX control in Microsoft Internet Explorer.
    The flaw is due to improper validation of the data provided to the
    Execute method. By persuading target the user to visit a malicious
    Web site, an attacker can cause the application process
    to terminate or possibly divert its flow of execution to arbitrary
    code.

    Version 1.25

    In this signature, we addressed the following exploits/vulnerabilities:

    Microsoft MS06-070 security bulletin: MS Windows 2000 Workstation
    Service (WKSSVC. (DLL) has a remote code execution vulnerability. One
    unauthenticated attacker could exploit this vulnerability to run
    arbitrary code with the privileges of the level system on Windows 2000 and
    Windows XP computers.

    Version 1.24

    In this signature, we addressed the following exploits/vulnerabilities:

    1 Microsoft Data Access Components (MDAC) has a remote code execution
    vulnerability in the RDS object. DataSpace ActiveX control.  A remote attacker
    could create a specially designed and host the malicious file on a
    Web site or send it to the victim through e-mail.  When the file is opened,
    the attacker can run arbitrary code on the victim's system.

    2. control WMI Object Broker ActiveX (WmiScriptUtils.dll) in Microsoft
    Visual Studio 2005 has a vulnerability that could allow a remote
    attacker to execute arbitrary code.

    3 Microsoft Internet Explorer has a type of heap buffer overflow vulnerability.
    A remote attacker could create a malicious web page containing COM objects
    Daxctle.OCX HTML when instantiated as an ActiveX control and the thing the
    victim to open the web page. By this attack, the attacker to execute
    arbitrary code on the victim's browser.

    Version 1.23

    In this version, we have addressed the following exploits/vulnerabilities:

    The vulnerability lies in some of the engines in Microsoft XML core
    Windows. It is the result of the failure of the engine to properly manage the
    bad arguments passed to one of the methods associated with the XML
    purpose of the request.

    Version 1.22

    In this version, we discussed the exploits/vulnerabilities as follows:

    Vagaa is a P2P that supports the network BitTorrent and eDonkey software.
    It can be downloaded from the two network. The software is mainly used in people's Republic of CHINA.
    There are some problems with this software because it didn't follow the official eMule Protocol.
    The question can be referenced on the wiki (http://en.wikipedia.org/wiki/Vagaa).
    Classify us Vagaa as eDonkey2000 program and allow admin users to disable in the user Web interface.

    Version: 1.21

    In this version, we have addressed vulnerabilities exploits as below:

    Microsoft Internet Explorer WebViewFolderIcon has a buffer overflow
    Vulnerability. A remote attacker could create a malicious Web page and
    trick the victim to open. By this attack, the attacker could cause buffer
    Overflow and crash the browser of the victim.

    Version: 1.20

    In this version, we discussed the exploits/vulnerabilities and applications
    as below:

    1 foxy is a P2P application that can search and download music and movies.
    Foxy follows most public Gnutella P2P protocol but still has its own
    signature under certain conditions. After the inclusion of the file Get Foxy P2P
    rule, we can perfectly detect and block the Foxy and it will be detected as Gnutella.
    Foxy can be blocked by deactivating Gnutella.

    2 Microsoft Internet Explorer 6.0 and 6.0SP1 have impaired memory
    vulnerability in the ActiveX component.  A remote attacker can create a
    malicious Web page and trick the victim to open the web page. By this attack.
    the attacker could cause the crash of the browser of the victim or to execute arbitrary code.

    3 Microsoft Internet Explorer has heap buffer overflow vulnerabilities
    Vector Markup Language (VML).  A remote attacker can create a malicious Web site
    page and the thing the victim to open the web page. By this attack, the attacker
    could cause the buffer overflow and execute arbitrary code on the victim's browser.

    Version: 1.19

    In this version, we have added a rule to meet cross-domain redirect
    Microsoft Internet Explorer vulnerability (MS06-042). The vulnerability
    is caused by the inappropriate use of URL redirection by the object.documentElement.outer
    HTML property. A remote attacker could create a malicious web page and
    trick the victim to open the web page. With this attack, the attacker could
    run arbitrary code on the victim's browser and get sensitive information.

    Version: 1.18

    In this version, we have added the 6 rules to facilitate the blocking of QQ, the most
    popular instant Messenger in China. There are several versions of QQ on the
    official download site. Currently, we can detect and block QQ until the
    Version 2006 Sp3 beta 2.

    Version: 1.17

    In this version, we discussed the exploits/vulnerabilities below:

    1. the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, server
    2003 and SP1 have a buffer overflow vulnerability. A remote attacker
    could exploit a server response designed to cause the buffer overflow and run
    arbitrary code on the victim's system.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Word XP and Word 2003 have a remote code execution vulnerability.
    A remote attacker could host a DOC file on a Web site. If successfully
    exploiting this vulnerability, remote attacker could execute arbitrary code
    with the privilege of the victim.

    Version: 1.16

    In this version, we discussed the exploits/vulnerabilities below:

    1 Microsoft Excel 2000, XP and 2003 Excel have a remote code execution
    vulnerability, due to an error in Excel when incorrect URL handling
    channels. A remote attacker could send a malicious .xls file of a victim
    in an email or host the file on a web site. When the operator successfully this
    vulnerability, a remote attacker to execute arbitrary code with the victim
    privileges.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Windows XP/NT/2000/2003 have a denial of service vulnerability.
    A remote attacker can send a malicious SMB packet causes the victim computers
    Crash.

  • I paid for the Basic program convert PDF to Word or Excel - how to operate?

    I paid for the Basic program convert PDF to Word or Excel Documents.  When I pull up the PDF I want to export and click the export in the tool bar it brings me back to to sign up for the service I already paid and received e-mail confirmation - help!

    1 make sure that you have done a "ExportPDF' or 'PDF Pack', not another thing.

    2. check that you sign with the SAME Adobe ID used to subscribe.

    3. If no, go to manage account on the Adobe website and make sure your subscription is active. (If you just pay it may take up to 48 hours for a reason any).

  • Sometimes a web page is displayed with only text and no picures. It is not always the same site and is not always the case. If I'm going to explore for the same website that always works

    Sometimes a web page is displayed with only text and no picures. It is not always the same site and is not always the case. If I'm going to explore for the same website that always works

    Hello

    Also try a Ctrl + F5 refresh. This allows to bring the content of the page again.

  • We know the answer slow printer. We use XP and it takes about five minutes for the printer to answer.

    We know the answer slow printer.  We use XP and it takes about five minutes for the printer to answer.

    Hello

    1. have you you can all changes on the computer before this problem?
    2. What is the brand and model of the printer?
    3. have you updated the printer driver?

    Try to run the fix it tool in the following article and check.
    Problems printing and printing errors
    http://support.Microsoft.com/mats/printing_problems/

  • It takes about 6 minutes for the computer to boot.

    * Original title: Windows 7 Starter

    It takes about 6 minutes for the computer to boot. I mounted early and disabled now needed to start programs.

    If it were my system:

    1. I'd be more suspicious of malware, run ADWcleaner and have a good program antivirus https://toolslib.net/downloads/viewdownload/1-adwcleaner/

    2. I would like to delete all programs that claim to make it work better, safer or faster computer.  The vast majority of them is actually malware

    3. I remove any "protection" software on your computer and let the only Antivirus product quality - more below...

    4. I would use the manufacturer of my disk drive hard testing program to ensure that it is not a failure

    5. I would like to be sure that none of the drives are more than 75% in use

    6. I would check my memory using the auditor memory Windows 7

    7. I would like to install and run Autoruns to check what is in the startup process

    8. AND, above all, focus on the applications installed.  Some of them are notorious resource hogs who insist on running at startup.

    9. I would like to delete startup programs/applications, unless I really need to start

      Common unbelievers that cause slow-start ups:

    • Garmin Express
    • Roxio anything
    • Skype
    • uTorrent
    • FrostWire
    • Trusteer
    • Dropbox
    • OneNote
    • EverNote
    • All Apple products
    • QuickBooks
    • Spotify
    • Pandora
    • AOL desktop
    • Some games, especially online ones

    What Antivirus buy?

  • I signed up for the basic acrobat reader conversion program, but he won't let me not convert PDF to Word.  I looked at troubleshooting tips and how advice but after I connect it just says this is not supported and directs me back to sign

    I signed up for the basic acrobat reader conversion program, but he won't let me not convert PDF to Word.  I looked at troubleshooting tips and how advice but after I connect it just says this is not supported and directs me back to register for the conversion program.  I would rather talk to someone, but I can't find a phone number or the option for a cat.  I have a PC.  Any help would be appreciated.

    Hi dianar30180588,

    Try to use the service to export to PDF Online https://cloud.acrobat.com/exportpdf

    Kind regards
    Nicos

  • Satellite C660-1F1 - Question about newer drivers and the speed of the memory

    Some of the drivers for this laptop are outdated compared to the most recent drivers on peripheral manufacters website. Is it safe to use these new drivers or is it recommended to stick with the old drivers that are on the Toshiba site?

    And second question: is it possible to make the fastest possible working memory supported? Don t BIOS options include options for the parameters of memory. Why the memory is running as low mhz in case of default? CPU - Z shows that the current frequency of dram is 532, 2 mhz. What is the maximum, it is at 667 mhz? Probably she can´t be 1 066 MHz as promised in the specs?

    Hi cryogenized,.

    > Some of the drivers for this laptop are outdated compared to the most recent drivers on peripheral manufacters website. Is it safe to use these new drivers or is it recommended to stick with the old drivers that are on the Toshiba site?
    Why you want to update your drivers? Do you expect a gain of performance with newer drivers?

    Way General, with official Toshiba drivers you are on the safe side because they are pre-tested. If you can make sure that they work properly and don t cause property damage. Install the other drivers happens on your own risk!

    > And second question: is it possible to make the fastest possible working memory supported? Don t BIOS options include options for the parameters of memory. Why the memory is running as low mhz in case of default? CPU - Z shows that the current frequency of dram is 532, 2 mhz. What is the maximum, it is at 667 mhz? Probably she can´t be 1 066 MHz as promised in the specs?
    The laptop is equipped with modules of DDR3 1066 MHz and the RAM speed is dependent on the FSB of the processor. If your CPU is throttling down, RAM modules will work also on low speed. On a high utilization of the processor (100%) the RAM modules must run with speed of 1066 MHz I think.

  • Protégé M200: Question about Vista TPM and the Bitlocker

    You want to know if I have a TPM chip to launch bitblocker on the M200 using Vista. Just call Toshiba Technical Support - the guy was totally distraught!

    If I don't have a TPM chip, then I can install it?

    Hello

    It is a good question. To my knowledge the Portege M200 does not support TPM but the Portege M400, R400 module and the R200

    But the Bitlocker, which is only available on the Vista Enterprise and ultimate can also be used without the TPM chip but then some functions are not available; for example, the SecureBoot.
    Without TPM only the OS volume encryption is available.
    In this case you can encrypts the entire Windows volume including both data and file system user, the file of hibernation, the page file and the temporary files.

    Using volume of BONE (HDD) encryption an encryption key will be generated. This key will be written to the USB and then the USB is required!

    AFAIK the Bitlocker requires 2 partitions. A partition must be created as needs at least 50 MB primary partition. I recommend a? about 1.5 GB
    The second big partition Vista can be installed.

    After the installation of Vista the Bitlocker must be enabled in Group Policy (units without secure TPM). This can be done using the command 'gpedit '.
    And then under models of administration-> windows components-> Bitlocker bitlocker function can be activated!

    Anyway, there is much information Bitlocker and I think you should also consult the Microsoft Web site for more information:
    BitLocker Windows Drive Encryption step-by-step guide

    I hope I could help a little

  • Question about consistent errors in the event viewer XP Home Edition

    I ran a program called VEW looking errors up to twenty in the XP Event Viewer.

    Here is the data for the analysis of files:

    V01c Vino event viewer run on Windows XP in English
    Report run at 28/01/2012 23:42:23

    Note: All dates below are in the format dd/mm/yyyy

    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    "System" Log - error Type
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Journal: "System" Date/time: 01/28/2012 22:48:06
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: "System" Date/time: 01/28/2012 22:47:40
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 01/28/2012 22:35:31
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 27/01/2012-22:49:54
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: "System" Date/time: 27/01/2012-22:37:21
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 27/01/2012-14:32:57
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 27/01/2012 03:38:23
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 25/01/2012-13:53:36
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: "System" Date/time: 25/01/2012-13:32:34
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 24/01/2012 23:35:59
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: "System" Date/time: 24/01/2012 23:21:10
    Type: error category: 0
    Event: 29 Source: W32Time
    The time provider NtpClient is configured to acquire time from one or more time sources, however none of the sources are currently accessible.  No attempt to contact a source will be for 14 minutes. NtpClient has no source of accurate time.

    Journal: "System" Date/time: 24/01/2012 23:21:10
    Type: error category: 0
    Event: 17 Source: W32Time
    Time provider NtpClient: an error has occurred during the DNS lookup of the manually configured peer 'time.nist.gov, 0x1 '. NtpClient will try the DNS lookup in 15 minutes. The error was: a socket operation was attempted to an unreachable host. (0 x 80072751)

    Journal: "System" Date/time: 24/01/2012 23:18:36
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 24/01/2012 02:15:46
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 24/01/2012-12:58:29 AM
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: "System" Date/time: 24/01/2012 00 h delighteth
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: 'System' time: 23/01/2012 23:26:32
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: 'System' time: 23/01/2012 23:26:19
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: 'System' time: 23/01/2012 23:02:41
    Type: error category: 0
    Event: 10005 Source: DCOM
    DCOM got error "% 1058" try to start the service NMIndexingService with arguments "" to start the server: {E8933C4B-2C90-4A04-A677-E958D9509F1A}

    Journal: 'System' time: 23/01/2012 18:28:49
    Type: error category: 0
    Event: 7023 Source: Service Control Manager
    Windows Driver Foundation - User-mode Driver Framework service terminated with the following error: a device attached to the system is not functioning.

    Journal: "System" Date/time: 24/01/2012 23:35:59

    Parameters of scanning has been:

    • System
    • Errors
    • 1-20 errors, valued at twenty.

    What are these errors and they are nothing to worry about?

    I have Nero 8 on this system and have an updated hosts file the running here: http://winhelp2002.mvps.org/hosts.htm

    Not sure, but I may have changed a network setting to activate the new hosts file work properly.

    Seen these errors for a while. system works well and smoothly.  No symptoms of malware or infection seen or found.  I would call these software errors as they seem does not affect the operation of the system.

    XP Home Edition SP3 P4 2.8 2 GB RAM

    Joe

    Oh yes :)

    I have never used the program VEW and don't think I will check it - I just look at the Event Viewer logs the old-fashioned way (manually) if I think that there is a problem, but that might just be the old me.

    It is true that XP Home doesn't have Group Policy Editor, but all policy settings are always available via the registry.

    Some malware will change your GP settings and cause problems.

    I have a little import registry will correct all the ones I know, so if someone has these symptoms, any flavor of XP, they are running, I'll just send the script because sometimes you will be not able to solve the problem, even if you have not the GP Editor.

    The registry always import work - and work well for XP Home or XP Pro.  If you have the symptoms and XP Home, what would you?   Start the import operation of the registry.

    If you're curious, off on my SkyDrive it is a spreadsheet Excel (Group Policy settings) who has all the parameters of GP and where they are in the registry.  I do not recommend start searching, but it is useful to know where things are if there is a problem.

    I would not allow the connection of a security XP stuff unless you think you're being attacked.  More and verbose logging slows things down.  My Event Viewer Security log is empty.

    Find the links to the Microsoft Support Engineer for the most part useless to actually solve a problem (because it help you with your problem), if someone has a question or point of Event Viewer, I usually just send them this:

    To view the logs in Event Viewer, click Start, settings, Control Panel, administrative tools, event viewer.

    A shortcut to the event viewer is to click on start, run and enter in the box:

    %SystemRoot%\system32\eventvwr.msc

    Click OK to launch the event viewer.

    The most interesting newspapers are usually the system and Application logs.

    Some newspapers such as security and Internet Explorer may be completely empty or have just a few items.  The default settings for XP wants do not connect all this activity, unless you need to solve a problem in these areas.  If you enable logging for them the papers fill up quickly and could adversely affect the performance of your system with all the extras (often unnecessary) activity.

    If you have Microsoft Office installed, it has its own newspapers, and they can be empty or occasional boring activity very little or, if there is no problem with your desktop applications.  It's normal.

    Not every event is a problem, some are informational messages that things work very well, and some are warnings.

    However, no event should defy reasonable explanation.

    Each event is sorted by Date and time.  Errors will be red Xs, warnings will have yellow! s.
    Informational messages have white is.  Not every error or warning event means that there is a serious question.

    Some are excusable at boot time when Windows starts.  Try to find only the events to the date and time around your problem.

    If you double-click on an event, it will open a window of properties with more information.  On the right are black up and down arrow keys to scroll through the open events. The third button that looks like two overlapping pages is used to copy the details of the event in your Windows Clipboard.

    When you find an interesting event that occurred at the time of your question, click on the third button at the top and arrows to copy the details and then you can paste the details (right click, paste or CTRL-V) the text in detail here for analysis.  Remove all personal information from your information after you paste If you are forced to do so.

    If you paste an event, it will look something like this annoying system startup event:

    Event type: Information
    Event source: Service Control Manager
    Event category: no
    Event ID: 7035
    Date: 14/07/2010
    Time: 17:54:18
    User: Jose
    Computer: computer

    Description:
    The Remote Access Connection Manager service was sent successfully a starting control.

    To get a fresh start on any log of the event viewer, you can choose to clear the log (the log backup is available), and then reproduce your problem, then just look at the events around your show and troubleshoot events that are happening when you have your question.

    You can search for events on the World Wide Web and get ideas.  It's where people events they see and then to the top of their questions, ideas and solutions:

    http://www.EventID.NET/

    If you find your event in the discussion, the first idea or discussion does not necessarily mean it is the "answer" to your situation, so read through all the ideas to find the one that sounds more like your situation.

  • Think about making one for the voice recording...

    I've heard great things about the new Sansa Clip +. However, I got a Sansa Express before. It was so horrible, it makes me a little skeptical on the Clip +. One of the most horrible attributes of the Express was the refresh database which came he started, taking over 7 minutes, if it didn't cut itself automatically to every time (I had to click a button to keep it close). But before all the music. For some strange reason, he would play only half of my music. Perhaps the tags have been stripped, very well. But he should be able to play without worrying, because it worked on my computer and other mp3 players.

    Sorry for snapping, but I am in desperate need of an mp3 player. I'm quite the cheap fellow; I also need a digital voice recorder voice that will work in 10-15 (never passed 20) feet. I have an old burner, but it is a consumer of battery. I can not connect to my PC.

    Now, on the mp3 player, it looks like the clip + has firmware similar to that of the Express, but cleaner and better. I saw the review and startup does not seem to be problamatic. However, I leave again I tested the voice recorder on my Express to a 15 ft. He picked up a bit of noise, but I had to max volume out to distinguish what has been recorded (which I couldn't still do).

    I really want the clip to be all around the device, I need, but he would need to work sufficiently to 15feet. I've heard so many comments, but virtually nothing about its features shortly. I really want to do, but Sansa has already failed me once...

    Hello Soy. You don't like how I answered your questions on the ABI plateau? Also, I'm very cheap, but decided to splurge on a Clip + even though I already had a rocket and a Clip. To be quite honest with you, voice recording is the function of quality lowest on the Clip + Clip and Fuze.

    I just tried to save it to my Clip + voice. I just tried two records in the sample. With the player only about 4 feet away, she picked up a lot of noise from a fan in the room. IMO to about 15 feet below the record would probably unintelligible if there is a fan noise or other noises in the room. The speech on the video recorder + works best at short distance from the speaker. Cut out from the rear of the speaker, it can make acceptable recordings.

    It is doubtful that you would get a great record with any player of mp3 of 15-20 feet away. The recorder I've mentioned, Member of the Board can be set to be very directional, but despite this, 15-20 feet away would be a mistake to get a decent record.

  • I have a Photosmart C7280 and s question about a decision of the network.

    I currently have two workstations connected to a router via ethernet cables.  They are connected to a single (not HP) printer with USB cable through a USB switch.  Two laptops to connect to the wireless router.  I could replicate the existing configuration with the C7280, but the idea of a network in which the laptops were allowed to participate is very attractive.  One of the laptop is running Windows version 7, the other computers running Linux.  If I go for an ethernet network, the laptops will be able to connect to the printer via the router?  If I go for a wireless network, desktop computers will be able to connect to the printer via their ethernet cables?  A couple of Wireless USB adapters are a possibility.

    I understand that you have questions about networking with your printer.

    Yes, wired network connections will be no problem to connect to a wifi connected printer.  Most routers bridge cable and wireless to work as a single network.  There are some routers between wired and wireless networks, but these are before any company grade routers and network equipment.

    A wired desktop computer will be able to print to a wireless printer as long as it is connected via the same router.  Conversely, a wireless computer can print to a printer connected Ethernet as long as it's the same router.

    I recommend using a network for the printer configuration, if possible, to avoid printing problems.  USB hubs have been known to cause printing problems, although this isn't always the case.

  • Question about network vMotion of the Ferguson VCP5 CERT Guide book.

    I'm studying for my VCP5-VTC, and I have a question.

    On page 154, a book that I read, it says network vMotion is a vDS ability but not vs.

    Can someone help me understand what is vMotion network?

    If it comes to vCenter linked mode, this means that the network vDSs are migrated between vCenters when the vCenter fails?


    I thought that most of the work made by the switch hidden on the CDS of the ESXi server that does not migrate anywhere. ?

    Thank you in advance for thinking about my question. I googled 'network vmotion' but most of the responses were in regards to VM vMotion.

    maintain the stats from the network for the movement of virtual machines between hosts

    Sorry I don't have an environment real stats

  • Time of CPU system (%) for the basic multi system

    Hello

    couple of questions about sub settings, measure processor or avg unique all the processorss and the processors use?
    for example I will receive alert time system CPU over 95% for the unique processors? or not

    Idle time (%) of the CPU
    Time CPU system (%)
    Time CPU user (%)

    couple of questions about sub settings, measure processor or avg unique all the processorss and the processors use?

    CPU utilization (%)
    For UNIX platforms, this measure represents the amount of CPU utilization in percentage of total CPU available processing power.

    http://docs.Oracle.com/CD/B28359_01/server.111/b28282/monitor.htm#CFAECIDG

Maybe you are looking for