Two OWB customers

Hello, I installed the OWB 11.2.0 customer and I can access perfectly OWB repository from an external server which is installed the same version. But I have a question.

Now, I want to access one another deposit of another external to the machine is version 10.2.0.1 my machine (I had installed 11.2.0 customer owb),.
I read that the client must be the same as the server.

On my machine cannot exist two different OWB customers.

How can I do?


Best regards.

Why not? I have clients 10.2 and 11.2 on my PC that connect to their DBs 10.2 and 11.2.

Tags: Business Intelligence

Similar Questions

  • Standard procedure to maintain two OWB application on the same database?

    I have several States. I want to deploy all the mapping of OWB States in a single server.

    My question is, do maintain us separate owbowner for each State? I need to create different workspace for each State. So, I can keep all the workspace in one owner owb? OR should I have each owner owb for every State?

    Please suggest.

    Hi Shrinika,
    I see no reason for the implementation of different 'States' mapping sepparate with workspaces.
    It is perhaps best to implement for each 'State' with sepparate project or the same module (in the same project) in the same workspace.

    At least in the case of multiple spaces of work/projects (for each ' State') you will have problem with integration of maps in unique processflow...

    Kind regards
    Oleg

  • A VCS - C with two clients of course to the two different VCS - E (traversal servers)

    Hello

    Can I have a WHAT VCS - C connected to two different VCS-E?

    So, I will configure two 'route customers' VCS - C each pointing to VCS - E, and each VCS-E will have a 'crossing server' set up.

    Hello Jose,.

    Yes, it is possible, you can have several customer experience (and also servers traversal) on each VCS.

    Jens: there is an abundance of deployments where this would be wise. A cluster can have meaning where you need a logic of instance, which is be of multiple physical boxes.

    We have customers who need an environment safe, so that they have a VCS - E for outbound communications, generic endpoints and then VCS-control a VCS-E for another network to terminate VPN connections internal who couldn't talk directly inside.

    There was one other poster here recently where a company had a VCS - E + C Setup, the other

    C only, so that they could use a VCS-E talk to each other.

    But even in the same network where you want to cluster, but you cannot due to

    various geolocations with much delay between the sites...

    And so now ;-)

  • Cram session for the establishment of remote vpn access

    Our 'VPN guy' has recently left the company, and we demand to implement the remote access VPN 2 for two different customers very soon. I did a lot of lan connection database and things with cisco switches/routers, so I'm familiar w / cli, but I've never actually set up a virtual private network. I'm going to have to become a competent REALLY fast. Does anyone know of a good place for me to start (list of control/walkthru/whatever!) learn how to configure ipsec VPN for remote access? Of course, I did some research on cisco.com, but can't seem to find any guide "definitave" VPN remote access.

    A vpn will use a router in 1751, and the other will use a 831. In both cases we will use the cisco vpn client and radius authentication and authorization.

    I understand how VPNS work pretty well, but I am always a little scared...

    Take a look at this technology cisco.com guides.

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a00800946b7.shtml

    I used this as a base for my client connections.

  • ASA L2L VPN UP with incoming traffic

    Hello

    I need help with this one, I have two identical VPN tunnel with two different customers who need access to one of our internal server, one of them (customer) works well, but the other (CustomerB) I can only see traffic from the remote peer (ok, RX but no TX). I put a sniffer on ports where the ASA and the server are connected and saw that traffic is to reach the server and traffic to reach the ASA of the server then nothing...

    See the result of sh crypto ipsec his below and part of the config for both clients

    ------------------

    address:

    local peer 100.100.100.178

    local network 10.10.10.0 / 24

    local server they need access to the 10.10.10.10

    Customer counterpart remote 200.200.200.200

    Customer remote network 172.16.200.0 / 20

    CustomerB peer remote 160.160.143.4

    CustomerB remote network 10.15.160.0 / 21

    ---------------------------

    Output of the command: "SH crypto ipsec its peer 160.160.143.4 det".

    address of the peers: 160.160.143.4
    Tag crypto map: outside_map, seq num: 3, local addr: 100.100.100.178

    outside_cryptomap list of allowed access host ip 10.10.10.10 10.15.160.0 255.255.248.0
    local ident (addr, mask, prot, port): (10.10.10.10/255.255.255.255/0/0)
    Remote ident (addr, mask, prot, port): (10.15.160.0/255.255.248.0/0/0)
    current_peer: 160.160.143.4

    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
    #pkts decaps: 827, #pkts decrypt: 827, #pkts check: 827
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, comp #pkts failed: 0, #pkts Dang failed: 0
    success #frag before: 0, failures before #frag: 0, #fragments created: 0
    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0
    #pkts not his (send): 0, invalid #pkts his (RRs): 0
    #pkts program failed (send): 0, #pkts decaps failed (RRs): 0
    #pkts invalid prot (RRs): 0, #pkts check failed: 0
    invalid identity #pkts (RRs): 0, #pkts invalid len (RRs): 0
    #pkts incorrect key (RRs): 0,
    #pkts invalid ip version (RRs): 0,
    replay reversal (send) #pkts: 0, #pkts replay reversal (RRs): 0
    #pkts replay failed (RRs): 0
    #pkts min frag mtu failed (send): bad frag offset 0, #pkts (RRs): 0
    #pkts internal err (send): 0, #pkts internal err (RRs): 0

    local crypto endpt. : 100.100.100.178, remote Start crypto. : 160.160.143.4

    Path mtu 1500, fresh ipsec generals 58, media, mtu 1500
    current outbound SPI: C2AC8AAE

    SAS of the esp on arrival:
    SPI: 0xD88DC8A9 (3633170601)
    transform: esp-3des esp-md5-hmac no compression
    running parameters = {L2L, Tunnel}
    slot: 0, id_conn: 5517312, crypto-card: outside_map
    calendar of his: service life remaining (KB/s) key: (4373959/20144)
    Size IV: 8 bytes
    support for replay detection: Y
    Anti-replay bitmap:
    0xFFFFFFFF to 0xFFFFFFFF
    outgoing esp sas:
    SPI: 0xC2AC8AAE (3266087598)
    transform: esp-3des esp-md5-hmac no compression
    running parameters = {L2L, Tunnel}
    slot: 0, id_conn: 5517312, crypto-card: outside_map
    calendar of his: service life remaining (KB/s) key: (4374000/20144)
    Size IV: 8 bytes
    support for replay detection: Y
    Anti-replay bitmap:
    0x00000000 0x00000001

    -The configuration framework

    ASA Version 8.2 (1)

    !

    172.16.200.0 customer name

    name 10.15.160.0 CustomerB

    !

    interface Ethernet0/0

    nameif outside

    security-level 0

    IP 100.100.100.178 255.255.255.240

    !

    interface Ethernet0/1

    nameif inside

    security-level 100

    10.10.10.0 IP address 255.255.255.0

    !

    outside_1_cryptomap list extended access allowed host ip 10.10.10.10 customer 255.255.240.0

    inside_nat0_outbound_1 list extended access allowed host ip 10.10.10.10 customer 255.255.240.0

    inside_nat0_outbound_1 list extended access allowed host ip 10.10.10.10 CustomerB 255.255.248.0

    outside_cryptomap list extended access allowed host ip 10.10.10.10 CustomerB 255.255.248.0

    NAT-control

    Overall 101 (external) interface

    NAT (inside) 0-list of access inside_nat0_outbound_1

    NAT (inside) 101 0.0.0.0 0.0.0.0

    Route outside 0.0.0.0 0.0.0.0 100.100.100.177

    Route inside 10.10.10.0 255.255.255.0 10.10.10.254 1

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    card crypto outside_map 1 match address outside_1_cryptomap

    card crypto outside_map 1 set pfs

    peer set card crypto outside_map 1 200.200.200.200

    card crypto outside_map 1 set of transformation-ESP-3DES-SHA

    card crypto outside_map 3 match address outside_cryptomap

    peer set card crypto outside_map 3 160.160.143.4

    card crypto outside_map 3 game of transformation-ESP-3DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    crypto ISAKMP policy 20

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    crypto ISAKMP ipsec-over-tcp port 10000

    attributes of Group Policy DfltGrpPolicy

    Protocol-tunnel-VPN IPSec svc

    internal customer group strategy

    Customer group policy attributes

    Protocol-tunnel-VPN IPSec svc

    internal CustomerB group strategy

    attributes of Group Policy CustomerB

    Protocol-tunnel-VPN IPSec

    tunnel-group 160.160.143.4 type ipsec-l2l

    tunnel-group 160.160.143.4 General-attributes

    Group Policy - by default-CustomerB

    IPSec-attributes tunnel-group 160.160.143.4

    pre-shared key xxx

    tunnel-group 200.200.200.200 type ipsec-l2l

    tunnel-group 200.200.200.200 General attributes

    Customer by default-group-policy

    IPSec-attributes tunnel-group 200.200.200.200

    pre-shared key yyy

    Thank you

    A.

    Hello

    It seems that the ASA is not Encrypting traffic to the second peer (However there is no problem of routing).

    I saw this 7.x code behaviors not on code 8.x

    However you can do a test?

    You can change the order of cryptographic cards?

    card crypto outside_map 1 match address outside_cryptomap

    peer set card crypto outside_map 1 160.160.143.4

    map outside_map 1 set of transformation-ESP-3DES-MD5 crypto

    card crypto outside_map 3 match address outside_1_cryptomap

    card crypto outside_map 3 set pfs

    peer set card crypto outside_map 3 200.200.200.200

    card crypto outside_map 3 game of transformation-ESP-3DES-SHA

    I just want to see if by setting the peer nonworking time to be the first, it works...

    I know it should work the way you have it, I just want to see if this is the same behavior I've seen.

    Thank you.

    Federico.

  • sqldeveloper. Fake OCI.available

    I am trying to configure Oracle SQL Developer 4.0.1.14 to use an Oracle 11.2.0.4 client moment and the driver OIC/thickness in order to reset the passwords expired within the password expiration time.  I set the location of the instant client in the dialogue Panel Tools\preferences\Database\advanced.  Use Oracle Client and use OIC/thickness pilot boxes are checked.  The location of the tnsnames.ora file is also entered.  Connection targets are Oracle databases Oracle 10.2.0.4 and 11.2.0.3.  There are two other customers Oracle installed on the desktop of Windows XP SP3.

    Test the moment Client located in C:\app\oracle\product\11.2.0\instantclient-basic-nt-11.2.0.4.0\instantclient_11_2
    Test client directory... Ok
    JDBC Oracle driver loading tests... Ok
    Try to check the version of the Oracle JDBC driver... Ok
    Driver version: 11.2.0.3.0
    Test test load native OCI library... Ok
    Success!

    Despite the apparent success of the OIC, I searched the Oracle installation directories, but I find no oci.sym file in any Oracle home as suggested by the following link.

    http://www.thatjeffsmith.com/archive/2014/01/Oracle-SQL-Developer-4-and-the-Oracle-client/

    When I validate the configuration via the tab Help\About\properties changes, the sqldeveloper.oci.available parameter shows always false.

    What must happen before sqldeveloper.oci.available becomes true?

    Some good ideas here

    Re: ORA-12705: cannot access NLS data or invalid environment specified files

  • Limitation of SQLFire for join queries

    Hello

    I have 2 tables of partition as shown below

    CREATE TABLE CUSTOMERS (
     CUST_NO INT NOT NULL,
     CUST_NAME VARCHAR(100) NOT NULL,
     CUST_PRIMARY CHAR(1) NOT NULL
       CONSTRAINT CUST_PRIMARY_CONSTRAINT
       CHECK (CUST_PRIMARY IN ( 'Y', 'N')),
     CUST_CATEGORY VARCHAR(20) NOT NULL,
     CUST_DOB TIMESTAMP NOT NULL,
     PRIMARY_CUST_NO INT NOT NULL,
     RELATIONSHIP_WITH_PRIMARY VARCHAR (20) NULL,
     GENDER CHAR(1) NULL 
       CONSTRAINT CUST_GENDER_CONSTRAINT
       CHECK (GENDER IN ( 'M', 'F')),
     CONSTRAINT CUSTOMERS_PK PRIMARY KEY (CUST_NO),
     CONSTRAINT CUST_CATEGORY_FK
      FOREIGN KEY (CUST_CATEGORY) REFERENCES CUSTOMER_CATEGORIES (CUST_CATEGORY_CODE) ON DELETE RESTRICT,
     CONSTRAINT RELATIONSHIP_FK
      FOREIGN KEY (RELATIONSHIP_WITH_PRIMARY) REFERENCES RELATIONSHIP (RELATIONSHIP_CODE) 
    ) PARTITION BY COLUMN (PRIMARY_CUST_NO) REDUNDANCY 1 PERSISTENT 'PERSONAL_INSURANCE' ASYNCHRONOUS;
    


    and

    CREATE TABLE CLAIMS (
     CLAIM_ID INT NOT NULL ,
     POLICY_NO INT NOT NULL,
     CUST_NO INT NOT NULL,
     CLAIM_RECEIVED_DATE TIMESTAMP NULL,
     TOTAL_AMT_CLAIM DECIMAL(10,2) NOT NULL,
     TOTAL_AMT_CLEARED DECIMAL(10,2) NULL,
     CLAIM_STATUS VARCHAR(20) NULL,
     CONSTRAINT CLAIMS_PK PRIMARY KEY (CLAIM_ID),
     CONSTRAINT POLICY_ID_FK
      FOREIGN KEY (POLICY_NO) REFERENCES POLICIES (POLICY_NO) ON DELETE RESTRICT,
     CONSTRAINT CLAIMS_CUST_NO_FK
      FOREIGN KEY (CUST_NO) REFERENCES CUSTOMERS (CUST_NO) ON DELETE RESTRICT, 
     CONSTRAINT CLAIM_STATUS_FK
      FOREIGN KEY (CLAIM_STATUS) REFERENCES CLAIM_STATUS (CLAIM_STATUS_CODE) ON DELETE RESTRICT
    ) PARTITION BY COLUMN (CUST_NO) COLOCATE WITH (CUSTOMERS) REDUNDANCY 1 
    PERSISTENT 'PERSONAL_INSURANCE' ASYNCHRONOUS;
    

    I have data in the CLIENT as shown below:


    Header 1 Header 2 Header 3 Header 4 Header 5 Heading 6 Heading 7 8 header
    1405005HaydenNGROUP1980-12-121405003xxxM
    1405006EllaNGROUP1980 12-241405003YYYF


    and in the CLAIMS of table

    Header 1 Header 2 Header 3 Header 4 Header 5 Heading 6 Heading 7
    501410970114050051991-01-122200022000CLAIM_PROCESSED
    500110970114050062010-01-0290008000CLAIM_ACCEPTED


    and I table of POLICIES, which is replicated

    It is when I run a query to join between the CUSTOMER and CLAIMS using the below query, I get 2 results:

    select a.*, b.* from insurance.claims a, insurance.customers b
    where  a.cust_no=b.cust_no and a.policy_no= 109701

    But when I run a query to join between the CUSTOMER and CLAIMS using the below query, I get empty results:

    select a.*, b.* from insurance.claims a, insurance.customers b
    where  a.cust_no=b.cust_no and a.policy_no= 109701 and a.cust_no=1405005


    Why is that I don't get 1 result when I add CUST_NO for the where condition, is it because that CUST_NO is not part of the primary key in the table of CLAIMS (or) it's because CUSTOMERS are partitioned using different columns.

    The syntax of COLÓCATE, not used I think data related same customer (CUST_NO) in both tables must be collocated and join should work.

    Can anyone share some light on the limitations of joins in SQLFire.

    Without the support of join distributed in sqlfire now, it will be necessary for some tables to replicate. Finally, Sqlfire will support distributed join.

    For your particular case, is it possible to partition on policy_no on the tables of POLICY and CLAIMS and replicate the CUSTOMERS table? In this configuration, you can join p.policy_no = claims.policy_no and let p.cust_no = customers.primary_cust_no or claims.cust_no = customers.cust_no. Is this enough? Otherwise, you may need to replicate the two tables (customers and political) as claims may develop.

  • Baffled by vCenter

    Is there a document of presentation of VCenter, so I can get a clear understanding of the correct deployment architecture. We run a host with VMware Server (on WIN2K3 Ent.) and a second with ESXi time using the free license - I have two VMware customers running (VM and VM Infrastructure Server). What I can't understand, is if vCenter takes the place of the client for the management of the virtual computer. My goal is to try to manage my virtual disk space and set up a way to backup my VM to a San. I made snapshots in which I discovered can be annoying, so I would save my VM before I remove the screenshots with free licenses and instant, it can be almost impossible, especially with the ESXi server.

    As you can see I'm still pretty unclear what I need to have running to accomplish this task. I watched some of the backup of the product and a few support ESXi and don't seem to not require vCenter to run - this can be an easier path. Not really sure which way to go.

    Thanks in advance, this site has been really helpful so far...

    Mike

    Yes it does, you can also export OVF I think and import directly from the VI Client...

    http://www.VMware.com/download/converter/

    Duncan

    VMware communities user moderator

    -

  • Wrap the XDCAM MOV to MP4 files?

    Howdy...

    I have a bunch of XDCAM EX Mac MOV files I want to re - wrapping to MP4 files without transcoding, so I can use them on Windows without using the QuickTime plugin.

    Anyone know how this can be done? Ideally in a batch job stream?

    Thank you!

    Best,

    Ben

    Fo' sho' you can... Well, not back to MP4. I don't have a figure that one out, but I have a solution to roll them up as MXF, which makes them very well run on a Windows machine (Premiere Pro, anyway) without any purchased software:

    1. Download this file: xdcamfix.zip
    2. Extract the EXE and BAT files in the same folder as the SBDAs.
    3. Double-click the .BAT file.
    4. Profits.

    No problem, let me know... but so far, two satisfied customers can't be wrong.

  • 'Access denied' in ASA - registry permssion issue?

    Hi all

    We use version 9.3.1.
    All of the client machines are extremely locked in this environment and users have minimum rights.
    For example, they do not have access to the Control Panel, can not install software such as Winzip, etc., due to the strict policy of the company.
    Some users require that the console of ASA and the Financial Reporting Studio installed on their machines.
    The console and the studio were installed successfully by an administrator and the admin user can connect to both.
    However, when users log on to the PC and open the console of the AAS or studio EN they get an error "access denied". Users do not have access to Event Viewer, so I can not give more im afraid.
    I think that this error is caused by the fact that Hyperion tries to write to the user doesn't have access to a registry key.
    By default users have write access to HKEY_CURRENT_USER but do not have write access to the HKEY_LOCAL_MACHINE key.

    Now if I remember correctly one of the conditions is to have write access to the registry HKEY_LOCAL_MACHINE\Software\Hyperion Solutions key.
    I would like confirmation that this is the case. I had a look at the doc guides and admin install without success.

    I guess it's a registry problem since if I connect to a PC problem, I can open two heavy customers. The only difference between the profiles of users and mine, is that I have some admin rights on my roaming profile.

    Thanks for your help.
    SEB

    Hi Seb,

    I suspect it is a registry permissions problem.
    Service console Regional access lots of keys, in terms of updating and creation of key here is a few examples.

    Create the key > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication
    Set value > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name
    Set value > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\ID

    Create the key > HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
    Create the key > HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters

    Set value > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seed

    A good test would download something like regmon, starts on a computer that receives questions and then start the console of Regional service, you should be able to see all of the attempts failed at the registry.

    I expect that Financial Reporting Studio written also in a number of keys as well.

    See you soon

    John
    http://John-Goodwin.blogspot.com/

  • How we concatinate two fields in OWB?

    I call source table EMPLOYEE. There are two fields name and surname of the employee table. The target table is DIM_EMPLOYEE.

    I need concatinate FIRST_NAME and LAST_NAME when copying data from EMPLOYEE to DIM_EMPLOYEE.

    What a transformation I use here to accomplish the tasks?

    Any help is appreciated.

    Thank you and as always this forum is useful and hellpful.

    Concerning

    Hello
    instead use Expression operator, of the transformation link FIRST_NAME and LAST_NAME group attributes of this operator and for the output of entry attribute specify expression as

    FIRST_NAME || LAST_NAME
    

    (it is preferable to use the expression builder that correctly adds the name of Group of entry attributes)

    [url http://download.oracle.com/docs/cd/B28359_01/owb.111/b31278/ref_data_flow_opers.htm#i1175750] Any operator expression

    Kind regards
    Oleg

  • Need help do two options available for customers to choose

    I have two options for a customer to choose and I need to be able to choose option 1 with a checkbox and initials or option 2 with a checkbox and original but at the moment it allows the customer to check both areas on the two original boxes and so at the end of the day I know not which option the customer chooses.  Is there a way to fix this?

    Hi lauraf65347853,

    Please use the fields of Radio button instead of field check box.

    Feel free to contact us if you have queries or concern.

    Kind regards
    Nicos

  • Potential security breach: (Audio)? Relayed by the customer between two periods of external investigation of data

    I began to see the Skype to accept compatible streams recently and captured data using Wireshark. I see data sent to an IP address to my port 3619 and sent again to a different IP address. The packets have the same length inbound and outbound at about 16 Kbps. For example:

    96022 543. [removed for privacy] 223.176.238.160 192.168.2.105 SKYPE 242 Audio Unk: 4

    96023 543. [removed for privacy] 192.168.2.105 41.79.217.119 SKYPE 242 Audio Unk: 3

    543 96024. [removed for privacy] 223.176.238.160 192.168.2.105 SKYPE 79 Audio

    96025 543. [removed for privacy] 192.168.2.105 41.79.217.119 SKYPE 79 Unk Audio: 5

    This is the hex data for the first two images:

    0000 00 00 00 01 00 06 10 0d 7f 9B 00 08 00 08 00 a4...

    0010 45 00 00 e2 46 25 00 00 2 c 11 b6 83 df ee b0 e. a0... F%..,.......
    0020 c0 a8 02 69 05 77 0e 23 00 this f2 1 c fb 4 d f2... dc i.w. #... M.
    0030 58 1 a 25 1 d 53 0d 36 cf a8 d4 37 10 9 X.% b2 f1 e5. ART.6. 7...
    0040 ed a9 cb 8 9th e4 has e8 57 21 99 f6 9 b 83 71 7 c df... | W!... q
    {[0050 65 5 d 7 d ca bd 2 c fe d2 25 b2 73 f3 4 d 9 a 39 8] e}..,... %. s.M.9.
    0060 14 91 57 ca 35 of 8f 1f fc FC 29 34 2A e4 bc ba... W.5......). 4
    {0070 62 34 21 90 85 8 c 6 93 7 b8 61 07 7 d d d be 25 ff b4!... l.}. a.}. %.
    0080 73 d8 5A 07 73 70 b7 f7 f0 7 c 76 fd 9 d 1f 08 ee s.Z...s.p | v...
    0090 ae c6 55 78 30 f2 1A dd 6 62 22 8f 1e eb b1 3f... "Ux0... nb"...?
    00 a 0 2d 50 7f e1 dc 0e 4 c 13 31 df 89 7f 8f 1 d 5f 4F - P... L.. 1... _N
    [00b 0 a7 0d fb a7 d4 3 a 20 d9 5 d 07 fe 58 68 2d... f5 d9:.] ... X.h.-
    00C 0 ad 53 ef 6th 78 ea d1 d3 this 77 a7 1 d 29 4 9 c b2. S.n.x... w...) N
    0 79 53 eb 97 00D 4 c 13 19 69 48 06 88 21 95 c6 yS e9 8f... L... i.H.. !...
    84 24 9F 96 CBS 00e0 6th 1 d 41 69 3 c f7 46 fb 9 d e5 40. $... n... AI<>
    00f0 d1 c6...

    and

    0000 00 04 00 01 00 06 49 b3 3f e0 this 33 64 00 08 00... ? I have... 3D...
    0010 45 00 00 e2 1f b7 40 00 40 11 54 7 c c0 a8 02 69 E... @. @. T |...
    (29 0020 d9 of the 4f 77 0e 23 47 00 6f this 48 73 5f 3d f2 f8) O.w. #oG... HS. _ =.
    0030 58 1 a 25 1 d 53 0d 36 cf a8 d4 37 10 9 X.% b2 f1 e5. ART.6. 7...
    0040 ed a9 cb 8 9th e4 has e8 57 21 99 f6 9 b 83 71 7 c df... | W!... q
    {[0050 65 5 d 7 d ca bd 2 c fe d2 25 b2 73 f3 4 d 9 a 39 8] e}..,... %. s.M.9.
    0060 14 91 57 ca 35 of 8f 1f fc FC 29 34 2A e4 bc ba... W.5......). 4
    {0070 62 34 21 90 85 8 c 6 93 7 b8 61 07 7 d d d be 25 ff b4!... l.}. a.}. %.
    0080 73 d8 5A 07 73 70 b7 f7 f0 7 c 76 fd 9 d 1f 08 ee s.Z...s.p | v...
    0090 ae c6 55 78 30 f2 1A dd 6 62 22 8f 1e eb b1 3f... "Ux0... nb"...?
    00 a 0 2d 50 7f e1 dc 0e 4 c 13 31 df 89 7f 8f 1 d 5f 4F - P... L.. 1... _N
    [00b 0 a7 0d fb a7 d4 3 a 20 d9 5 d 07 fe 58 68 2d... f5 d9:.] ... X.h.-
    00C 0 ad 53 ef 6th 78 ea d1 d3 this 77 a7 1 d 29 4 9 c b2. S.n.x... w...) N
    0 79 53 eb 97 00D 4 c 13 19 69 48 06 88 21 95 c6 yS e9 8f... L... i.H.. !...
    84 24 9F 96 CBS 00e0 6th 1 d 41 69 3 c f7 46 fb 9 d e5 40. $... n... AI<>
    00f0 d1 c6...

    Here's Skype data only on these images:

    1 0000 c fb 4 d f2 58 1 a 25 1 d 53 0d 36 cf a8 f1 d4 e5... M.X.%. ART.6.
    0010 37 10 9th ed a9 b2 9th e4 cb 8 has df 7 57 21 99 7 c e8... | W!
    {[0020 9 b 83 71 and 5 d 65 f6 7 d ca bd 2 c fe d2 25 b2 73 f3... q] e}..,... per cent .s.
    0030 4 d 9 a 39 8 14 91 57 ca 35 of 8f 1f fc FC 29 M9 ba... W.5......)
    0040 bc 34 e4 2 a 62 34 21 90 85 8 c d 6 93 7 61 07 d b8. {* 4 b4!... l.}. one.
    {0050 7 d be 25 ff 73 5A f0 f7 07 73 70 76 fd 7 c b7 d8}. %. s.Z...s.p | v.
    0060 9 d 1f 08 ee ae 55 78 30 f2 1A dd 6 62 22 8f c6... "Ux0... nb.
    0070 1st eb b1 3f 2d 50 7f e1 4 c 13 31 df 7f, 8f 0e dc? -P.... L.. 1...
    0080 89 1 d 5f 4th a7 fb a7 d4 3 a 20 d9 5 d 07 fe 58 0d... _N.....: .].. X
    0090 d9 68 f5 2d 53 ef ad 6 78 ea d1 d3 this 77 b2 9 c .h.-. S.n.x... w...
    00 a 0 a7 1 d 29 4th 79 53 97 eb 13 19 69 48 e9 8f 4 c 06) NyS... L... i.H.
    00b 0 88 21 95 c6 84 24 9F 96 CBS 6th 1 d 41 69 3 c f7 fb. ! ...$...n.. AI<>
    0 46 40 d1 c6 F e5 9 d 00C... @..

    and

    0000 f8 5f 3d f2 58 1 a 25 1 d 53 0d 36 cf a8 f1 d4 e5. _ =. X.%. ART.6.
    0010 37 10 9th ed a9 b2 9th e4 cb 8 has df 7 57 21 99 7 c e8... | W!
    {[0020 9 b 83 71 and 5 d 65 f6 7 d ca bd 2 c fe d2 25 b2 73 f3... q] e}..,... per cent .s.
    0030 4 d 9 a 39 8 14 91 57 ca 35 of 8f 1f fc FC 29 M9 ba... W.5......)
    0040 bc 34 e4 2 a 62 34 21 90 85 8 c d 6 93 7 61 07 d b8. {* 4 b4!... l.}. one.
    {0050 7 d be 25 ff 73 5A f0 f7 07 73 70 76 fd 7 c b7 d8}. %. s.Z...s.p | v.
    0060 9 d 1f 08 ee ae 55 78 30 f2 1A dd 6 62 22 8f c6... "Ux0... nb.
    0070 1st eb b1 3f 2d 50 7f e1 4 c 13 31 df 7f, 8f 0e dc? -P.... L.. 1...
    0080 89 1 d 5f 4th a7 fb a7 d4 3 a 20 d9 5 d 07 fe 58 0d... _N.....: .].. X
    0090 d9 68 f5 2d 53 ef ad 6 78 ea d1 d3 this 77 b2 9 c .h.-. S.n.x... w...
    00 a 0 a7 1 d 29 4th 79 53 97 eb 13 19 69 48 e9 8f 4 c 06) NyS... L... i.H.
    00b 0 88 21 95 c6 84 24 9F 96 CBS 6th 1 d 41 69 3 c f7 fb. ! ...$...n.. AI<>
    0 46 40 d1 c6 F e5 9 d 00C... @..

    I checked that these packages had been sent by the process of Skype. The change of IP addresses from time to time and sometimes it there streaming in all. I was not on any Skype call during this period. I have a file pcapng I can provide private these packages with over 200 k. I checked many of the IP addresses and found that all the ones I checked were on blacklists of some sort, so it may be the zombie PCs using Skype on other PC to transmit information or calls.

    I use Skype 4.3.0.37 on Ubuntu 14.04 (updated). I checked the Skype updates, and he says I'm on the latest version. I tried to go through the process of reporting of security vulnerabilities and I had the choice to post here or wait for 20 minutes to chat with someone...

    Please contact me directly. I make sure that my contact information on my Skype profile is up-to-date.

    HTH

    -Leo

    I never said I could say what username was seen providing the past, I said that I could tell the IP addresses. That's all that is needed to find potentially vulnerable customers without the additional chore of scanning random IP.

    In any case, I have already recommended that we spend our communication elsewhere. Is not not be able to control how traffic passed to third parties unsecured is a deal breaker for us.

    Thank you very much for your answers. My question has been answered and my obviously concerns do not match that of Microsoft, so I end up in a dead end with this service.

  • RN4220 and the FOURTH all losses of data for TWO years

    Hello team NTGR and customers.

    I want to tell you a failstory.

    Two years ago, I was looking for a BIG SIN store backups of my data from the company.

    I have already had several old Pro RND 6 boxes and selected 4220 x 12 4 hard drives of WD RE CT.

    price was 10 k $ without hard drives.

    only since the beginning, I faced OS6 RND and problems. You can read about it here

    https://community.NETGEAR.com/T5/ReadyNAS-in-business/this-is-not-enterprise-devices-5-months-of-sup...

    (topic has been pruned don't know why).

    and here

    https://community.NETGEAR.com/T5/ReadyNAS-in-business/MPIO-slow-speed/TD-p/964959

    and now I've lost my data once more. the FOURTH TIME! EACH MONTH I LOSE ALL MY DATA.

    slapping admin page and no SMB/iSCSI access to all my 25 TB of data.

    It's lost, complete and 100% lost.

    hate you, NETGEAR.

    do something crazy House and nothing more.

    I obliged thanks NTGR for help - this time was not data loss and only three days spent to solve the problem.

  • Is it possible to use the same password for two computers through quickbooks?

    We have two computers that are connected to each other through quickbooks and we must be able to get our e-mails from computers. Is this possible? We need to send invoices to the customers of a computer and the other is used for accounting and payroll.

    Original title: you can use the same password for two computers if they are already linked through quickbooks?

    Hi JayneB,

     

    (1) are you referring to the password of the user account?
    (2) who is the operating system installed on the computer?

     

    Method-

    I would like you to contact the Quickbooks support for assistance.

    Check out the link-

     

    QuickBooks support

     

    Hope this helps!

     

Maybe you are looking for