Pages

Thursday, July 25, 2013

FileZilla Client 3.6.0.2 Setup - Recording by ObserveIT

Screen video recording was taken by ObserveIT User Activity Session Recording. http://www.observeit.com

1. FileZilla Client 3.6.0.2 Setup - Time : 9:17:51 PM

clip_image009

2. FileZilla Client 3.6.0.2 Setup - Time : 9:17:55 PM

 

clip_image010

3. FileZilla Client 3.6.0.2 Setup - Time : 9:17:57 PM

 

clip_image012

4. FileZilla Client 3.6.0.2 Setup - Time : 9:18:00 PM

clip_image014

5. FileZilla Client 3.6.0.2 Setup - Time : 9:18:01 PM

clip_image015

6. FileZilla Client 3.6.0.2 Setup - Time : 9:18:04 PM

 

clip_image017

7. FileZilla Client 3.6.0.2 Setup - Time : 9:18:09 PM

 

clip_image019

8. Welcome to FileZilla - Time : 9:18:19 PM

 

clip_image020

9. FileZilla - Time : 9:18:19 PM

 

clip_image022

Tuesday, July 23, 2013

hidden menu in Blackberry Z10

There is a hidden menu in Blackberry Z10. This hidden menu will bring up the diagnostic screen utility on your Z10 device.

This is how to do it:

1. Open the browser and type escreen:// IMG_20130330

  1. this will bring up the diagnostic screen  IMG_20130331
  2. from your pc/or other browser open  http://dl.dropbox.com/u/9610464/HelpScreen.html and enter the data from diagnostic screen, choose 30 days so you dont have to going back and forth to input the information everytime you open the escreenescreen
  3. Bring out the z10 virtual keyboard (by swiping two finger from the bottom of the screen to the middle area of your bb screen) and just type the “KEY”  from the step
  4. The hidden Menu is opened

IMG_20130329 IMG_20130332

BlackBerry Curve Secret Codes

Hidden Functions (HOLD ALT)

CodeFunction
ALT+NMLLChanges the signal meter from the standard bars to a decibel display, entering the code again will revert back to the bars
ALT+LSHIFT+HThe Techinical information menu, if you are trying to get support or help you will probably need the information displayed here
ALT+VALDValidates the address book, can only be used in the address book
ALT+RBLDForces the address book to rebuild, can only be used in the address book
*#06#Displays the IMEI (home screen)
ALT+RBVSUsed in the browser to view the page source code, useful if you are developing applications
ALT+LGLGDisplays the devices event log, if you are struggling to get BES/BIS working the information here can be very useful
ALT+SHIFT+DELSoft reset a blackberry device, this is not a format or hard reset. Just a reboot
  


Smart System Codes (Type these in a message box for example while composing a new e-mail)

CodeFunction
MYVERDisplays the Software Version and Model Number of the device
LDLocal Date is displayed
LTLocal Time is displayed
MYSIQDisplays the device owner information
MYPINDevice PIN is displayed


Other Codes


CodeFunction
ALT+LEFTCAPSDisplays the Language Selection Screen
LOLOUse on the Date/Time screen to display the network date and time
ALT+VIEWDisplays the ID's in the messages menu
ALT+THMNUse in the themes menu to disable themes
ALT+THMDUse in the theme menu to return to the default blackberry theme
ALT+SMONEnables the simulated WLAN wizard (WLAN Menu)
ALT+SMOFDisables the simulated WLAN wizard (WLAN Menu)
BUYRDisplay data and voice usage, enter at the status screen (options>status)
TESTPerforms a full device test, enter at the status screen (options>status)


Sim Card Shortcuts (no ALT required, found under Options>Advanced>Sim Card)

CodeFunction
MEP1Enable/Disable Sim personalization
MEP2Enable/Disable Network personalization
MEP3Enable/Disable Network subset personalization
MEP4Enable/Disable Service provider personalization
MEP5Enable/Disable Corporate personalization
MEPDMEP Information Display - Shows Status

Sunday, July 21, 2013

Windows 7 and Windows 8 Secret Keys and more

From Desktop

Windows Key + Tab : Aero
[press Tab to cycle between
Windows]
Windows Key + E : Windows Explorer is launched.
Windows Key + R : Run
Command is launched.
Windows Key + F : Search
(which is there in previous Windows versions too)
Windows Key + X : Mobility Center
Windows Key + L : Lock Computer (It is there from the earlier versions as well)
Windows Key + U : Launches Ease of Access
Windows Key + P : Projector
Windows Key + T : Cycle Super Taskbar Items
Windows Key + S : OneNote Screen Clipping Tool
[requires OneNote]
Windows Key + M : Minimize All Windows
Windows Key + D : Show/Hide Desktop
Windows Key + Up :
Maximize Current Window
Windows Key + Down :Restore Down/Minimize
Current Windows
Windows Key + Left : Tile Current Window to the Left
Windows Key + Right : Tile Current Windows to the Right
[Continue pressing the Left and Right keys to rotate the window as well]
Windows Key + # (# is any number) : Quickly Launch a
new instance of the
application in the Nth slot on the taskbar. Example Win+1
launches first pinned app, Win+2 launches second, etc.
Windows Key + = : Launches the Magnifier
Windows Key + Plus : Zoom in
Windows Key + Minus : Zooms out
Windows Key + Space : Peek at the desktop


 From Windows Explorer

Alt + Up : Go up one level
Alt + Left/ Right : Back/Forward
Alt + P : Show/hide
Preview Pane


 Task Modifiers

Shift + Click on icon :
Open a new instance
Middle click on icon :
Open a new instance
Ctrl + Shift + Click on
icon : Open a new instance with Admin privileges
Shift + Right-click on
icon : Show window menu (Restore / Minimize / Move /
etc). Note: Normally you can
just right-click on the
window thumbnail to get this menu.
Shift + Right-click on
grouped icon : Menu with Restore All / Minimize All /
Close All, etc.
Ctrl + Click on grouped
icon : Cycle between the windows (or tabs) in the group.

Nokia Lumia Hidden Secret Codes and Tricks

*#06#                for checking the IMEI (International Mobile Equipment Identity).
*#7780#            reset to factory settings.
*#67705646#    This will clear the LCD display (operator logo).
*#0000#            To view software version.
*#2820#            Bluetooth device address.
Screenshot of a typical Nokia S60 user interface.
Screenshot of a typical Nokia S60 user interface

*#746025625#              Sim clock allowed status.
#pw+1234567890+1#   Shows if sim have restrictions.
*#92702689#                 Takes you to a secret menu where you may find some of the information below:
 1. Displays Serial Number.
 2. Displays the Month and Year of Manufacture
 3. Displays (if there) the date where the phone was purchased (MMYY)
 4. Displays the date of the last repair – if found (0000)
 5. Shows life timer of phone (time passes since last start)


Before proceeding, if you have not read HOW TO DELETE AN UNDELETABLE FILE IN YOUR INBOX (SYMBIAN USERS s60), HOW TO READ ANY DELETED MESSAGES ON NOKIA S60/70/80 PHONE!!, FORMATTING A SERIES 60 PHONES (FULL FORMAT) can still read it now.
This is the most recent/ updated list of Nokia codes and it should work on most of the Nokia devices.
*3370#     Activate Enhanced Full Rate Codec (EFR) – Your phone uses the best sound quality but talk time is reduced my approx. 5%
#3370#    Deactivate Enhanced Full Rate Codec (EFR)
*4720#    Activate Half Rate Codec – Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
#4720#    Deactivate Half Rate Codec.
S60 5th edition idle screen. Bottom left "...
S60 5th edition idle screen. Bottom left “button” brings up a virtual number pad, to compensate for removal of actual numerical keys

*#0000#    Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type.
*#9999#    Phones software version if *#0000# does not work.
*#06#    When checking International Mobile Equipment Identity (IMEI Number).
#pw+1234567890+1#     Provider Lock Status. (Use the “*” button to obtain the “p,w” and “+” symbols).
#pw+1234567890+2#    Lock Network Status. (Use the “*” button to obtain the “p,w” and “+” symbols).
#pw+1234567890+3#    Country Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
#pw+1234567890+4#    SIM Card Lock Status. (use the “*” button to obtain the “p,w” and “+” symbols).
*#21#         Allows you to check the number that “All Calls” are diverted to.
*#2640#     Display the security code in use.
*#30#         Lets you see the private number.
*#43#         Allow you to check the “Call Waiting” status of your phone.
*#61#         Allow you to check the number that “On No Reply” calls are diverted to.
*#62#         Allow you to check the number that “Divert If Unreachable (no service)” calls are diverted to.
*#67#         Allow you to check the number that “On Busy Calls” are diverted to.
*#67705646#       It Remove operator logo on 3310 and 3330.
Colour photo showing Nokia 2310 mobile phone b...
showing Nokia 2310 mobile phone battery compartment and SIM socket. IMEI number has been removed

*#73#                 Reset phone timers and game scores.
*#746025625#   Displays the SIM Clock status, if your phone supports this power saving feature “SIM Clock Stop Allowed”, it means you will get the best standby time possible.
*#7760#             Manufactures code.
*#7780#             Restore factory settings.
*#8110#             Software version for Nokia 8110.
*#92702689#     Displays – Serial Number, Date Made, Purchase Date, Date of last repair (0000 for no repairs), Transfer User Data. To exit this mode you need to switch your phone off then on again.
*#94870345123456789#
Deactivate the PWM-Mem.
**21*number#
Turn on “All Calls” diverting to the phone number entered.
**61*number#
Turn on “No Reply” diverting to the phone number entered.
**67*number#
Turn on “On Busy” diverting to the phone number entered.
12345
This is the default security code.
Press and hold #
Lets you switch between lines.

Monday, July 15, 2013

Apple Hidden iPhone Secret Codes and Tricks

*#06# - It is use to show IMEI of any phone means it will work on any Smartphone or mobile of any brand.
*#21# - It gives information about the configuration of forwarding (calls, voice and data.)
*#30# - Its functions is to report you either you enable / disabled status of calling line presentation.
*#33# - This secret of iPhone will give you a list with multiple configurations like (call, sms, data, fax, sms, etc) and show whether they are enabled or not.
*#43# - usually use to verify status of call waiting like sms, data, sync data, etc. in your iPhone.
*#61# - Checking of number of missed calls.
*#62# - verifies the number for forwarding calls in case of none of service is available.
*#67# - check the numbers for forwarding calls if your iPhone is busy.
*#76# - By typing this number will give you information about your line presentation enabled or disabled status.
*225# – This code is only available for prepaid lines in order to show the accounts bill balance.
*646# - Tel you information of the minutes remained in your account and only valid for only Postpaid ones.
*777# - You can know detailed information of account balance of prepaid iPhones
*3282# - Get know about the use of data information.
*3001#12345#* - it is use to reveal internal setting like Open the "Field Test" of the iPhone which enables us to learn many advanced data network from our iPhone. GSM, Wireless, 3G ... everything will be exposed here.

Friday, July 12, 2013

Hidden Android Secret Codes For Samsung, HTC, Motorola, Sony, LG And Other Devices

*#06# – IMEI number

*#0*# – Enter the service menu on newer phones like Galaxy S III

*#*#4636#*#* – Phone information, usage statistics and battery

*#*#34971539#*#* – Detailed camera information

*#*#273282*255*663282*#*#* – Immediate backup of all media files

*#*#197328640#*#* – Enable test mode for service

*#*#232339#*#* – Wireless LAN tests

*#*#0842#*#* – Backlight/vibration test

*#*#2664#*#* – Test the touchscreen

*#*#1111#*#* – FTA software version (1234 in the same code will give PDA and firmware version)

*#12580*369# – Software and hardware info

*#9090# – Diagnostic configuration

*#872564# – USB logging control

*#9900# – System dump mode

*#301279# – HSDPA/HSUPA Control Menu

*#7465625# – View phone lock status

*#*#7780#*#* – Reset the /data partition to factory state

*2767*3855# – Format device to factory state (will delete everything on phone)

##7764726 – Hidden service menu for Motorola Droid

Thursday, July 11, 2013

IBM Security Identity Manager : Troubleshooting and support

Troubleshooting installation and configuration problems

This section describes solutions for installation and configuration problems.
Before you install IBM® Security Identity Manager Server:
  • Read the troubleshooting tips in the "Installation Guide" and the "Configuration Guide".
  • Review the known problems and solutions in the IBM Security Identity Manager Information Center. Some of the topics in the "Installation Guide" and the "Configuration Guide" are repeated in this section.
  • Configure IBM Tivoli® Common Reporting to run on non-default ports if it is installed on the same system as IBM Security Identity Manager version 6.0 prerequisites. The default ports of IBM Tivoli Common Reporting are likely to conflict with ports of the installed products, which causes the IBM Tivoli Common Reporting installation to fail.

Tuesday, July 9, 2013

Responsibilities SOD Matrix for Oracle AIM




 

Legend

 
1. Individuals who audit or authorize transactions should be different from those that initiate or capture transactions.
2. The responsibilities of piloting should be separated from responsibilities that have write access to transactions since the pilot can change the way the software handles certain transactions
3. Segregation of duties in order to avoid the junction of the allocation of access to operating data
4. People who manage human resources should not be able to create access codes and granting responsibilities.
5. Access to the files people are reserved to the staff of HRD.



 

 

List of transactions

WMD Resp. Security MO
CAP Compliance Officer
CAP Entry Clerks
CAP Clerk bank details
CAP transfers Clerk
MO CAP Pilot
CAP Attendant disbursements
CAP accounts payable supervisor
AE Developer
El Resp. the partitioning MO
IE Users
FA Capital Officer
FA Asset Management
FA Resp. Capital
IRM Analyst Budget Web ADI
IRM Financial Analyst Web ADI
GL Budget Analyst
GL Financial Analyst
GL Approver
GL Driver MO
LSA DA Transmitter / Receive.
LSCD Checker Reports costs
PO Buyer Agent
PO Agent to file a supplier MO
PO Acquisitions Coordinator
PO Questioner mandated purchases
PO MO Driver
PO Resp. Tracking purchases mandated
HR Resp. of records of
HR Driver MO

Oracle Best Practices for the Identity and Access Management and Compliance Journey

Since the passage of SOX in 2002, practical experience in the field has yielded several recommended best practices for implementing IAM systems to enable SOX compliance.

 

 

Oracle recommends the following:

 

Understand requirements.

By developing a better understanding of compliance requirements, how compliance affects IT, and how IT in general and IAM specifically can help support governance and compliance, companies can establish efficient, cost-effective, and sustainable programs that address all of these complex requirements within a holistic compliance framework.

 

Recognize information technology’s critical role.

In many companies, IT has evolved to become the critical backbone behind almost every operation, but many people still view technology as a cost rather than an investment or asset. By understanding the key roles that IT plays in support of compliance, enterprises can maximize the value of their technology investment.

 

Understand the role of identity and access management.

IAM plays a critical role in compliance with SOX requirements, particularly in the areas of minimizing risk, automating processes, preventing fraud, and providing comprehensive auditing and reporting. However, it does not automatically satisfy all SOX requirements. Recognizing the value and the limitations of IAM in the entire spectrum of SOX compliance is essential.

 

Think program, not project.

SOX compliance is a journey, not a short-term event. Companies must begin to approach compliance as a long-term program, not a single project. An effective and holistic compliance program should also incorporate governance and risk management. Because of new higher standards, boards of directors and executives must be knowledgeable about, and assume liability for, everything going on within the enterprise.

 

Develop a strategy.

The only way to address the wide spectrum of compliance requirements effectively is to integrate them into a common compliance strategy intertwined with the business itself. A business-driven, risk-based, and technology-enabled compliance strategy can help create enterprise value by rationalizing unnecessary complexities, driving consistency and accountability across the enterprise, and identifying opportunities for a possible enhancement of operational performance and information quality.

 

Establish a governance process.

Compliance efforts affect a broad spectrum of an enterprise.

Stakeholders from many organizations, often with conflicting priorities, have stakes in the outcomes of a compliance strategy. The governance process must provide representation from the impacted functional areas of the organization. A governance board should have appropriate representation from IT, security, audit, application owners, human resources, and business process owners. The board should be accountable for the project objectives and be vested with authority to make program decisions. The board should be empowered to

• Establish a statement of purpose for the program

• Promote and give visibility to the program throughout the larger organization

• Act as a mechanism for quickly making decisions regarding program scope, issues, and risks

• Monitor the program health on an ongoing basis

 

Implement your strategy in phases.

By segmenting the overall solution into manageable parts, an organization can realize quick, visible business benefits and progressively realize overall program objectives in an orderly, measurable way. Implementing in manageable phases also makes it easier to battle issues such as scope creep or requirements drift.

 

Give real-time visibility.

Real-time views into the functioning of controls across these systems and across the enterprise, through job-specific dashboards or portal views, can provide insight into compliance status, progress, and risks. Effective communications with all stakeholders is essential.

 

Unify disparate compliance efforts.

Many companies are beginning to realize the potential of technology to support sustained compliance and are actively looking to combine existing fragmented, reactive, and inefficient governance and compliance efforts into a single sustainable compliance program. Bringing together governance, risk, and compliance (GRC) management under a holistic framework can result in a centralized compliance organization with the understanding, structure, and ability to help optimize the company’s compliance efforts in a sustainable, strategic, and cost-effective manner.

 

Assess progress and adjust as necessary.

Each phase of the progressive implementation of the compliance strategy will yield more in-depth understanding about the compliance process as it pertains to the specific enterprise. Implementing methods of continual process improvement will yield progressively refined results.

Oracle-AIM: Key Identity And Access Management And Compliance Enablers

Section

Title

IDENTITY AND ACCESS MANAGEMENT AND

COMPLIANCE ENABLERS

ORACLE IDENTITY AND ACCESS

MANAGEMENT PRODUCTS

302

Corporate Responsibilities

for Financial Reports

Provide automated reports

Oracle Waveset

• Oracle Identity Analytics

401

Disclosures in Periodic

Reports

Provide automated reports.

Oracle Waveset

• Oracle Identity Analytics

404

Management Assessment

of Internal Controls

• Assign and control user access rights.

• Enforce SoD policies.

• Adjust user access rights when

responsibilities change.

• Revoke user access upon termination.

• Provide uniform access policy.

• Manage access based on business

roles.

• Manage allocation of user credentials.

• Verify access rights.

• Conduct periodic compliance

assessments.

• Trigger comprehensive workflow

processes to assess compliance.

• Enforce secure access policies.

• Provide automated reports.

Oracle Waveset

• Oracle Identity Analytics

• Oracle OpenSSO

• Oracle Directory Server

Enterprise Edition

409

Real Time Issuer

Disclosures

Conduct periodic compliance

assessments.

• Provide automated reports

Oracle Waveset

• Oracle Identity Analytics

802

Criminal Penalties for

Altering Documents

• Revoke user access upon termination.

• Provide automated reports

• Oracle Waveset

• Oracle Identity Analytics

902

Attempts and Conspiracies

to Commit Fraud Offenses

Enforce SoD policies

• Oracle Waveset

• Oracle Identity Analytics