If you're lucky enough to have a Samsung Smart TV or Blu-ray player, then here's neat trick to change your TV/player's app store to another region/country, so you can install the other country's apps onto your device. This means that an Australian purchased Samsung TV or Blu-ray player can have its app region changed so that you can install the Netflix or the BBC iPlayer app, and all through a simple, reversible remote control trick. Requirements: • A Samsung C, D, E or F series Smart TV; or • A Samsung Smart Blu-ray Player • An Unblock-Us account or an equivalent DNS based geo-unblocker Before We Get Started There are a couple of things you need to be aware of before we start. In the “Watching Instantly on your TV or Computer” section, click “Activate a Netflix Ready Device” and enter the activation code from Step 1. If you do not. After setting up your account and activating your Blu-ray player, browse to Instant under the Your Queue tab and add movies to the queue. BD-C6900 How To Activate VUDU From Internet@TV. Press the Internet@TV button on the Blu-ray remote to launch Internet@TV and. Product requires service. ![]() ![]() Due to the way Samsung apps work, you can only have one region's apps installed at any one time. So this means you cannot have both the ABC iView app and the Netflix app installed at the same time. Note that all changes are reversible, so you can change app regions back and forth as many times as you wish, and that this is not something that would void your warranty or anything like that (since this is a remote control trick). You will also need a DNS based geo-unblocker service, like, to take advantage of the newly installed apps. Step 1: Change DNS Settings Before we change the app region, let's set up the Samsung TV or Blu-ray player's DNS settings to that of Unblock-Us, or whatever service you are using. The screenshots below were taken on a E series plasma TV, so the precise instructions may be slightly different for your particular TV or Blu-ray player, but it should be clear enough anyway. First, press the 'Menu' button on your remote (or however you get into the 'Settings' section of your TV/Blu-ray player). Samsung: Network Settings - IP Settings Here is where we'll change the DNS settings to that provided by Unblock-Us (or the DNS geo-unblocker of your choice). For Unblock-Us users, you can find out which DNS server IP address you need to input by going to (the dynamically loaded DNS IP address listed on this page is the best one that Unblock-Us has chosen for you based on your location - use the 'Primary' DNS address listed). Enter in the DNS address in the highlighted section shown in the photo below. You may need to change the DNS mode to 'Manual' before you're allowed to do this on certain devices. Samsung: Network Settings - DNS Setting Press 'OK' and finish up the network settings wizard to conclude this part of the guide. Step 2: Remote Trick Now we get to the fun part (well, relatively speaking anyway). Start up your Samsung TV's Smart Hub by pressing the Smart Hub button on your remote (or however you get into it). On certain Blu-ray players, this means going into the 'Internet@TV' section, or basically where you access and install apps. And on other players, simply changing the DNS settings above will prompt the app store to update to a new country, and so you can skip the steps below. For F series Smart TVs, the instructions are a bit different - so go to to find out how to change app regions. Otherwise, continue with the instructions below. Samsung: Smart Hub Now that we're at the Smart Hub or the app store screen, we need to use the remote code to access the country change screen. You need to press the following keys in order, with a half a second delay between each button press: 'FWD 2 8 9 RWD' (that's fast-forward, followed by the 2 key, the 8 key, the 9 key and then the Rewind key). The photo below shows the fast-forward and rewind buttons on the E series remote. Note that Blu-ray players will also have the chapter forward and chapter back buttons, which look similar, but you have to press the foward/rewind buttons.
0 Comments
![]() Lol i won the game like severl months ago and im lvl 99 i can't remeber wot switchs? Put more detail and ill answer your question better also shame tht u can't network i could kill everything (i love the music) sometimes when it asks you to do something and it won't let you there are couple of thing; 1.you are to low level. 2.you must complet something else. Begin the world by getting rid of the Heartless present, consisting of the easily-defeated Luna Bandits and Shadows. A scene will interrupt a while into. Jan 30, 2009 This has been annoying me.okay.so I'm trying to activate the switches in Agrabah. I do the thunder and fire switches easily, but I can't activate. Dec 17, 2013. Have to fight jafars shadow thing and then activate the switches. Kingdom hearts 2. In agrabah on the second visit because I can't seem to. 3.it requiers you to kill somebody or something. Oh when you get to the main place kingdom hearts when you fight dragon heres a tip for you, don't charge up waste of time and you die, fly round like a mad man/women and shoot these missles faster and easier way. P.s his the twin or half person (i don't remember name) his in twilight town when you fight him hear my warning his no laughing matter! He has over 10 life bars and more and he killed me in 2 hits even at lvl 99! Get to lvl 99 get best weapon (it tht enchantier thing) get materials fight him i did man he died so fast i didn't relise he died lol! Wait i know wot tht is!!! It requiers a spell the fire spell requies the fire / ice if fire dopesn't work do it weakness it requiers spells for differnt ones! Sometimes they don't need spell just a spell which hurts them i used magnatuide on the thing severl times and it exploaded, kill them in the time and you willl survie, sometimes they change colours e.g earth,fire,ice,water and so on follow the pattern and you will do it If you have any more problems then mail me and ill be happy to help you out with anything you are stuck on. • Tell us some more • Upload in progress • Upload failed. Please upload a file larger than 100 x 100 pixels • We are experiencing some problems, please try again. ![]() • You can only upload files of type PNG, JPG or JPEG. • You can only upload files of type 3GP, 3GPP, MP4, MOV, AVI, MPG, MPEG or RM. • You can only upload photos smaller than 5 MB. • You can only upload videos smaller than 600 MB. • You can only upload a photo (png, jpg, jpeg) or video (3gp, 3gpp, mp4, mov, avi, mpg, mpeg, rm). • You can only upload a photo or video. • Video should be smaller than 600 MB/5 minutes • Photo should be smaller than 5 MB •. ![]() • • • • • About lsof lsof lists information about open files on the system, including which has the file open. An 'open file' is any file on disk, named pipe, network socket, Unix socket, or device which is open by a process. Lsof syntax lsof [ -?abChKlnNOPRtUvVX ] [ -A A ] [ -c c ] [ +c c ] [ +|-d d ] [ +|-D D ] [ +|-e s ] [ +|-f [cfgGn] ] [ -F [f] ] [ -g [s] ] [ -i [i] ] [ -k k ] [ +|-L [l] ] [ +|-m m ] [ +|-M ] [ -o [o] ] [ -p s ] [ +|-r [t[m ]] ] [ -s [p:s] ] [ -S [t] ] [ -T [t] ] [ -u s ] [ +|-w ] [ -x [fl] ] [ -z [z] ] [ -Z [Z] ] [ -- ] [ names] Options -? -h These two equivalent options select a usage (help) output list. Lsof displays a shortened form of this output when it detects an error in the options supplied to it, after it has displayed messages explaining each error. -a causes list selection options to be ANDed, as described above. -A A is available on systems configured for AFS whose AFS kernel code is implemented via dynamic modules. It allows the lsof user to specify A as an alternate name list file where the kernel addresses of the dynamic modules might be found. -b causes lsof to avoid kernel functions that might block — namely, lstat, readlink, and. -c c selects the listing of files for processes executing the command that begins with the characters of c. Mostly used for troubleshooting network connection related issues, lsof is a powerful and too-little-known application. If you're familiar with general Linu. FreeBSD Install lsof To Displays Information About Files Open to Unix. List open files, lsof, lsof command, make command, open. Install and Activate Bash. ![]() Multiple commands may be specified, using multiple -c options. They are joined in a single ORed set before participating in AND option selection. If c begins with a ' ^', then the following characters specify a command name whose processes are to be ignored (excluded). If c begins and ends with a slash (' /'), the characters between the slashes are interpreted as a regular expression. Shell meta-characters in the regular expression must be quoted to prevent their interpretation by the shell. The closing slash may be followed by these modifiers: b the regular expression is a basic one. I ignore the case of letters. X the regular expression is an extended one (default). The simple command specification is tested first. If that test fails, the command regular expression is applied. If the simple command test succeeds, the command regular expression test isn't made. This may result in 'no command found for regex:' messages when lsof's -V option is specified. +c w defines the maximum number of initial characters of the name, supplied by the UNIX dialect, of the UNIX command associated with a process to be printed in the COMMAND column. The lsof default is nine. Note that many UNIX dialects do not supply all command name characters to lsof in the files and structures from which lsof obtains command name. Often dialects limit the number of characters supplied in those sources. For example, Linux 2.4.27 and Solaris 9 both limit command name length to 16 characters. If w is zero (' 0'), all command characters supplied to lsof by the UNIX dialect will be printed. If w is less than the length of the column title, 'COMMAND', it will be raised to that length. -C disables the reporting of any path name components from the kernel's name cache. +d s causes lsof to search for all open instances of directory s and the files and directories it contains at its top level. +d does NOT descend the directory tree, rooted at s. The +D D option may be used to request a full-descent directory tree search, rooted at directory D. Processing of the +d option does not follow within s unless the -x or -x l option is also specified. Nor does it search for open files on file system mount points on subdirectories of s unless the -x or -x f option is also specified. Note: the authority of the user of this option limits it to searching for files that the user has permission to examine with the system function. -d s specifies a list of file descriptors (FDs) to exclude from or include in the output listing. The file descriptors are specified in the comma-separated set s — e.g., ' cwd,1,3', ' ^6,^2'. ![]() ![]() There should be no spaces in the set. The list is an exclusion list if all entries of the set begin with ' ^'. It is an inclusion list if no entry begins with ' ^'. ![]() Nov 04, 2008 List Open Files. Select your preferred way to display the comments and click 'Save settings' to activate your. The lsof command. Lsof is a command meaning 'list open files', which is used in many Unix-like systems to report a list of all open files and the processes that opened them. Mixed lists are not permitted. A file descriptor number range may be in the set as long as neither member is empty, both members are numbers, and the ending member is larger than the starting one — e.g., ' 0-7' or ' 3-10'. Ranges may be specified for exclusion if they have the ' ^' prefix — e.g., ' ^0-7' excludes all file descriptors 0 through 7. Multiple file descriptor numbers are joined in a single ORed set before participating in AND option selection. When there are exclusion and inclusion members in the set, lsof reports them as errors and exits with a non-zero return code. +D D causes lsof to search for all open instances of directory D and all the files and directories it contains to its complete depth. Processing of the +D option does not follow within D unless the -x or -x l option is also specified. Nor does it search for open files on file system mount points on subdirectories of D unless the -x or -x f option is also specified. Note: the authority of the user of this option limits it to searching for files that the user has permission to examine with the system function. Further note: lsof may process this option slowly and require a large amount of dynamic to do it. This is because it must descend the entire directory tree, rooted at D, calling stat for each file and, building a list of all the files it finds, and searching that list for a match with every open file. When directory D is large, these steps can take a long time, so use this option prudently. -D D directs lsof's use of the device cache file. The use of this option is sometimes restricted. -D must be followed by a function letter; the function letter may optionally be followed by a path name. Lsof recognizes these function letters:? Report device cache file paths b build the device cache file i ignore the device cache file r read the device cache file u read and update the device cache file The b, r, and u functions, accompanied by a path name, are sometimes restricted. When these functions are restricted, they will not appear in the description of the -D option that accompanies -h or -? Option output. Function reports the read-only and write paths that lsof can use for the device cache file, the names of any environment variables whose values lsof will examine when forming the device cache file path, and the format for the personal device cache file path. When available, the b, r, and u functions may be followed by the device cache file's path. The standard default is.lsof_hostname in the home directory of the real user ID that executes lsof, but this could have been changed when lsof was configured and compiled. The output of the -h and -? Options show the current default prefix — e.g., '.lsof'. The suffix, hostname, is the first component of the host's name returned by gethostname. When available, the b function directs lsof to build a new device cache file at the default or specified path. The i function directs lsof to ignore the default device cache file and obtain its information about devices via direct calls to the kernel. The r function directs lsof to read the device cache at the default or specified path, but prevents it from creating a new device cache file when none exists or the existing one is improperly structured. The r function, when specified without a path name, prevents lsof from updating an incorrect or outdated device cache file, or creating a new one in its place. The r function is always available when it is specified without a path name argument; it may be restricted by the permissions of the lsof process. When available, the u function directs lsof to read the device cache file at the default or specified path, if possible, and to rebuild it, if necessary. This is the default device cache file function when no -D option has been specified. +| -e s exempts the file system whose path name is s from being subjected to kernel function calls that might block. The +e option exempts, lstat and most readlink kernel function calls. The -e option exempts only stat and lstat kernel function calls. Multiple file systems may be specified with separate +| -e specifications and each may have readlink calls exempted or not. This option is currently implemented only for Linux. CAUTION: this option can easily be mis-applied to other than the file system of interest, because it uses path name rather than the more reliable device and inode numbers. Device and inode numbers are acquired via the potentially blocking stat kernel call and are thus not available, but see the +| -m m option as a possible alternative way to supply device numbers. Use this option with great care and fully specify the path name of the file system to be exempted. When open files on exempted file systems are reported, it may not be possible to obtain all their information. Therefore, some information columns will be blank, the characters 'UNKN' preface the values in the TYPE column, and the applicable exemption option is added in parentheses to the end of the NAME column. Some device number information might be made available via the +| -m m option. +| -f [ cfgGn] f by itself clarifies how path name arguments are to be interpreted. When followed by c, f, g, G, or n in any combination it specifies that the listing of kernel file structure information is to be enabled (' +') or inhibited (' -'). Normally a path name argument is taken to be a file system name if it matches a mounted-on directory name reported by, or if it represents a block device, named in the mount output and associated with a mounted directory name. When +f is specified, all path name arguments will be taken to be file system names, and lsof will complain if any are not. This can be useful, for example, when the file system name (mounted-on device) isn't a block device. This happens for some CD-ROM file systems. When -f is specified by itself, all path name arguments will be taken to be simple files. Thus, for example, the ' -f -- /' arguments direct lsof to search for open files with a ' /' path name, not all open files in the ' /' (root) file system. Be careful to make sure +f and -f are properly terminated and aren't followed by a character (e.g., of the file or file system name) that might be taken as a parameter. For example, use ' --' after +f and -f as in these examples. $ lsof +f -- /file/system/name $ lsof -f -- /file/name The listing of information from kernel file structures, requested with the +f [ cfgGn] option form, is normally inhibited, and is not available in whole or part for some dialects — e.g., /proc-based Linux kernels below 2.6.22. When the prefix to f is a plus sign (' +'), these characters request file structure information: c file structure use count (not Linux) f file structure address (not Linux) g file flag abbreviations (Linux 2.6.22 and up) G file flags in hexadecimal (Linux 2.6.22 and up) n file structure node address (not Linux) When the prefix is minus (' -') the same characters disable the listing of the indicated values. File structure addresses, use counts, flags, and node addresses may be used to detect more readily identical files inherited by child processes and identical files in use by different processes. Lsof column output can be sorted by output columns holding the values and listed to identify identical file use, or lsof field output can be parsed by an or post-filter, or by a -F f specifies a character list, f, that selects the fields to be output for processing by another program, and the character that terminates each output field. Each field to be output is specified with a single character in f. The field terminator defaults to NL, but may be changed to NUL (000). When the field selection character list is empty, all standard fields are selected (except the raw device field, security context and zone field for compatibility reasons) and the NL field terminator is used. When the field selection character list contains only a zero ('0'), all fields are selected (except the raw device field for compatibility reasons) and the NUL terminator character is used. Other combinations of fields and their associated field terminator character must be set with explicit entries in f. When a field selection character identifies an item lsof does not normally list — e.g., PPID, selected with -R — specification of the field character — e.g., ' -FR' — also selects the listing of the item. When the field selection character list contains the single character '?' , lsof will display a help list of the field identification characters. Escape the '?' Character as your shell requires. -g [ s] excludes or selects the listing of files for the processes whose optional process group IDentification (PGID) numbers are in the comma-separated set s — e.g., ' 123' or ' 123,^456'. Note There should be no spaces in the set. PGID numbers that begin with ' ^' (negation) represent exclusions. Multiple PGID numbers are joined in a single ORed set before participating in AND option selection. However, PGID exclusions are applied without ORing or ANDing and take effect before other selection criteria are applied. The -g option also enables the output display of PGID numbers. When specified without a PGID set that's all it does. -i [ i] selects the listing of files any of whose Internet address matches the address specified in i. If no address is specified, this option selects the listing of all Internet and x.25 (HP-UX) network files. If -i4 or -i6 is specified with no following address, only files of the indicated IP version, IPv4 or IPv6, are displayed. An IPv6 specification may be used only if the dialects supports IPv6, as indicated by ' [46]' and ' IPv[46]' in lsof's -h or -? Sequentially specifying -i4, followed by -i6 is the same as specifying -i, and vice-versa. Specifying -i4, or -i6 after -i is the same as specifying -i4 or -i6 by itself. Multiple addresses (up to a limit of 100) may be specified with multiple -i options. A port number or service name range is counted as one address. They are joined in a single ORed set before participating in AND option selection. An Internet address is specified in the form (Items in square brackets are optional): [4|6][ protocol][@ hostname| hostaddr][: service| port] 46 specifies the IP version, IPv4 or IPv6 that applies to the following address. ' 6' may be be specified only if the UNIX dialect supports IPv6. If neither ' 4' nor ' 6' is specified, the following address applies to all IP versions. Protocol is a protocol name — TCP, UDP hostname is an Internet host name. Unless a specific IP version is specified, open network files associated with host names of all versions will be selected. Hostaddr is a numeric Internet IPv4 address in dot form; or an IPv6 numeric address in colon form, enclosed in brackets, if the UNIX dialect supports IPv6. When an IP version is selected, only its numeric addresses may be specified. Service is an /etc/services name — e.g., smtp — or a list of them. Port is a port number, or a list of them. IPv6 options may be used only if the UNIX dialect supports IPv6. To see if the dialect supports IPv6, run lsof and specify the -h or -? (help) option. If the displayed description of the -i option contains ' [46]' and ' IPv[46]', IPv6 is supported. IPv4 host names and addresses may not be specified if network file selection is limited to IPv6 with -i 6. IPv6 host names and addresses may not be specified if network file selection is limited to IPv4 with -i 4. When an open IPv4 network file's address is mapped in an IPv6 address, the open file's type will be IPv6, not IPv4, and its display will be selected by ' 6', not ' 4'. At least one address component — 4, 6, protocol, hostname, hostaddr, or service — must be supplied. The ' @' character, leading the host specification, is always required; as is the ':', leading the port specification. Specify either hostname or hostaddr. Specify either service name list or port number list. If a service name list is specified, the protocol may also need to be specified if the TCP, UDP, and UDPLITE port numbers for the service name are different. Use any case — lower or upper — for protocol. Service names and port numbers may be combined in a list whose entries are separated by commas and whose numeric range entries are separated by minus signs. There may be no embedded spaces, and all service names must belong to the specified protocol. Since service names may contain embedded minus signs, the starting entry of a range can't be a service name; it can be a port number, however. Here are some sample addresses: -i6 IPv6 only TCP:25 TCP and port 25 @1.2.3.4 Internet IPv4 host address 1.2.3.4 @[ 3ffe:1ebc::1]:1234 Internet IPv6 host address 3ffe:1ebc::1, port 1234 UDP:who UDP who service port:513 TCP, port 513 and host name lsof.itap:1-10,smtp,99 TCP, ports 1 through 10, service name smtp, port 99, host name foo:1-smtp TCP, ports 1 through smtp, host bar:time either TCP, UDP or UDPLITE time service port -K selects the listing of tasks of processes, on dialects where task reporting is supported. If help output — i.e., the output of the -h or -? Options — shows this option, then task reporting is supported by the dialect. When -K and -a are both specified and the tasks of a main process are selected by other options, the main process will also be listed as though it were a task, but without a task ID. -k k specifies a kernel name list file, k, in place of /vmunix, /mach, etc. -k is not available under on the IBM RISC/System 6000. -l inhibits the conversion of user ID numbers to login names. It is also useful when login name lookup is working improperly or slowly. +| -L [ l] enables (' +') or disables (' -') the listing of file link counts, where they are available — e.g., they aren't available for sockets, or most and pipes. When +L is specified without a following number, all link counts will be listed. When -L is specified (the default), no link counts will be listed. When +L is followed by a number, only files having a link count less than that number will be listed (no number may follow -L). A specification of the form ' +L1' will select open files that have been unlinked. A specification of the form ' +aL1 ' will select unlinked open files on the specified file system. For other link count comparisons, use field output ( -F) and a post-processing script or program. +| -m m specifies an alternate kernel memory file or activates mount table supplement processing. The option form -m m specifies a kernel memory file, m, in place of /dev/kmem or /dev/mem — e.g., a crash dump file. The option form +m requests that a mount supplement file be written to the standard output file. All other options are silently ignored. There will be a line in the mount supplement file for each mounted file system, containing the mounted file system directory, followed by a single space, followed by the device number in ' 0x' format — e.g., / 0x801 lsof can use the mount supplement file to get device numbers for file systems when it can't get them via or lstat. The option form +m m identifies m as a mount supplement file. Note: the +m and +m m options are not available for all supported dialects. Check the output of lsof's -h or -? Options to see if the +m and +m m options are available. +| -M Enables ( +) or disables ( -) the reporting of portmapper registrations for local, and UDPLITE ports, where port mapping is supported. The default reporting mode is set by the lsof builder with the HASPMAPENABLED #define in the dialect's machine.h header file; lsof is distributed with the HASPMAPENABLED #define deactivated, so portmapper reporting is disabled by default and must be requested with +M. Specifying lsof's -h or -? Option will report the default mode. Disabling portmapper registration when it is already disabled or enabling it when already enabled is acceptable. When portmapper registration reporting is enabled, lsof displays the portmapper registration (if any) for local TCP, UDP or UDPLITE ports in square brackets immediately following the port numbers or service names — e.g., ':1234[name]' or ':name[100083]'. The registration information may be a name or number, depending on what the registering program supplied to the portmapper when it registered the port. When portmapper registration reporting is enabled, lsof may run a little more slowly or even become blocked when access to the portmapper becomes congested or stopped. Reverse the reporting mode to determine if portmapper registration reporting is slowing or blocking lsof. For purposes of portmapper registration reporting lsof considers a TCP, UDP or UDPLITE port local if it is found in the local part of its containing kernel structure; or if it is located in the foreign part of its containing kernel structure and the local and foreign Internet addresses are the same; or if it is located in the foreign part of its containing kernel structure and the foreign Internet address is INADDR_LOOPBACK ( 127.0.0.1). This rule may make lsof ignore some foreign ports on machines with multiple interfaces when the foreign Internet address is on a different interface from the local one. Portmapper registration reporting is supported only on dialects that have RPC header files. Some Linux distributions with GlibC 2.14 do not have them. When portmapper registration reporting is supported, the -h or -? Help output will show the +| -M option. -n inhibits the conversion of network numbers to host names for network files. Inhibiting conversion may make lsof run faster. It is also useful when host name lookup is not working properly. -N selects the listing of NFS files. -o directs lsof to display file offset at all times. It causes the SIZE/OFF output column title to be changed to OFFSET. Note: on some UNIX dialects lsof can't obtain accurate or consistent file offset information from its kernel data sources, sometimes just for particular kinds of files (e.g., socket files). The -o and -s options are mutually exclusive; they can't both be specified. When neither is specified, lsof displays whatever value (size or offset) is appropriate and available for the type of the file. -o o defines the number of decimal digits ( o) to be printed after the ' 0t' for a file offset before the form is switched to ' 0x.' An o value of zero (unlimited) directs lsof to use the ' 0t' form for all offset output. This option does NOT direct lsof to display offset at all times; specify -o (without a trailing number) to do that. -o o only specifies the number of digits after ' 0t' in either mixed size and offset or offset-only output. Thus, for example, to direct lsof to display offset at all times with a decimal digit count of 10, use: -o -o 10 or -oo10 The default number of digits allowed after ' 0t' is normally 8, but may have been changed by the lsof builder. Consult the description of the -o o option in the output of the -h or -? Option to determine the default that is in effect. -O directs lsof to bypass the strategy it uses to avoid being blocked by some kernel operations — i.e., doing them in forked child processes. While use of this option will reduce lsof startup overhead, it may also cause lsof to hang when the kernel doesn't respond to a function. Use this option cautiously. -p s excludes or selects the listing of files for the processes whose optional process IDentification (PID) numbers are in the comma-separated set s — e.g., ' 123' or ' 123,^456'. There should be no spaces in the set. PID numbers that begin with ' ^' (negation) represent exclusions. Multiple process ID numbers are joined in a single ORed set before participating in AND option selection. However, PID exclusions are applied without ORing or ANDing and take effect before other selection criteria are applied. -P inhibits the conversion of port numbers to port names for network files. Inhibiting the conversion may make lsof run a little faster. It is also useful when port name lookup is not working properly. +| -r [ t[ m ]] puts lsof in repeat mode. There lsof lists open files as selected by other options, delays t seconds (default fifteen), then repeats the listing, delaying and listing repetitively until stopped by a condition defined by the prefix to the option. If the prefix is a ' -', repeat mode is endless. Lsof must be terminated with an interrupt or quit signal. If the prefix is ' +', repeat mode will end the first cycle no open files are listed — and of course when lsof is stopped with an interrupt or quit. When repeat mode ends because no files are listed, the process exit code will be zero if any open files were ever listed; one, if none were ever listed. Lsof marks the end of each listing: if field output is in progress (the -F, option has been specified), the default marker is ' m'; otherwise the default marker is ' ========'. The marker is followed by a NL character. The optional ' m' argument specifies a format for the marker line. The characters following ' m' are interpreted as a format specification to the function, when both it and the localtime function are available in the dialect's C library. Consult the strftime documentation for what may appear in its format specification. Note that when field output is requested with the -F option, cannot contain the NL format, '%n'. Note also that when contains spaces or other characters that affect the shell's interpretation of arguments, must be quoted appropriately. Repeat mode reduces lsof startup overhead, so it is more efficient to use this mode than to call lsof repetitively from a shell script, for example. To use repeat mode most efficiently, accompany +| -r with specification of other lsof selection options, so the amount of kernel memory access lsof does will be kept to a minimum. Options that filter at the process level — e.g., -c, -g, -p, -u — are the most efficient selectors. Repeat mode is useful when coupled with field output (see the -F, option description) and a supervising or script, or a. -R directs lsof to list the Parent Process IDentification number in the PPID column. -s [ p: s] s alone directs lsof to display file size at all times. It causes the SIZE/OFF output column title to be changed to SIZE. If the file does not have a size, nothing is displayed. When followed by a protocol name ( p), either TCP or UDP, a colon (':') and a comma-separated protocol state name list, the option causes open TCP and UDP files to be excluded if their state name(s) are in the list ( s) preceded by a ' ^'; or included if their name(s) are not preceded by a ' ^'. When an inclusion list is defined, only network files with state names in the list will be present in the lsof output. Thus, specifying one state name means that only network files with that lone state name will be listed. Case is unimportant in the protocol or state names, but there may be no spaces and the colon (':') separating the protocol name ( p) and the state name list ( s) is required. If only TCP and UDP files are to be listed, as controlled by the specified exclusions and inclusions, the -i option must be specified, too. If only a single protocol's files are to be listed, add its name as an argument to the -i option. For example, to list only network files with TCP state LISTEN, use: -iTCP -sTCP:LISTEN Or, for example, to list network files with all UDP states except Idle, use: -iUDP -sUDP:Idle State names vary with UNIX dialects, so it's not possible to provide a complete list. Some common TCP state names are: CLOSED, IDLE, BOUND, LISTEN, ESTABLISHED, SYN_SENT, SYN_RCDV, ESTABLISHED, CLOSE_WAIT, FIN_WAIT1, CLOSING, LAST_ACK, FIN_WAIT_2, and TIME_WAIT. Two common UDP state names are Unbound and Idle. The -o (without a following decimal digit count) and -s option (without a following protocol and state name list) are mutually exclusive; they can't both be specified. When neither is specified, lsof displays whatever value — size or offset — is appropriate and available for the type of file. Since some types of files don't have true sizes (sockets, s,, etc.) lsof displays for their sizes the content amounts in their associated kernel buffers, if possible. -S [ t] specifies an optional time-out seconds value for kernel functions (lstat, readlink, and stat) — that might otherwise deadlock. The minimum for t is two; the default, fifteen; when no value is specified, the default is used. -T [ t] controls the reporting of some TCP/TPI information, also reported by, following the network addresses. In normal output the information appears in parentheses, each item except TCP or TPI state name identified by a keyword, followed by ' =', separated from others by a single space: QR= QS= SO= SS= TF= WR= WW= Not all values are reported for all UNIX dialects. Items values (when available) are reported after the item name and ' ='. When the field output mode is in effect (See OUTPUT FOR OTHER PROGRAMS) each item appears as a field with a ' T' leading character. -T with no following key characters disables TCP/TPI information reporting. -T with following characters selects the reporting of specific TCP/TPI information: f selects reporting of socket options, states and values, and TCP flags and values. Q selects queue length reporting. S selects connection state reporting. W selects window size reporting. Not all selections are enabled for some UNIX dialects. State may be selected for all dialects and is reported by default. Help output for the -T option will show what selections may be used with the UNIX dialect. When -T is used to select information (i.e., it is followed by one or more selection characters) the displaying of state is disabled by default, and it must be explicitly selected again in the characters following -T. In effect, then, the default is equivalent to -Ts. For example, if queue lengths and state are desired, use -Tqs. Socket options, socket states, some socket values, TCP flags and one TCP value may be reported (when available in the UNIX dialect) in the form of the names that commonly appear after SO_, so_, SS_, TCP_ and TF_ in the dialect's header files — most often, and. Consult those header files for the meaning of the flags, options, states and values. ' SO=' precedes socket options and values; ' SS=', socket states; and ' TF=', TCP flags and values. If a flag or option has a value, the value will follow an ' =' and the name -- e.g., ' SO=LINGER=5', ' SO=QLIM=5', ' TF=MSS=512'. The following seven values may be reported: name reported description (common symbol) KEEPALIVE keep alive time ( SO_KEEPALIVE) LINGER linger time ( (SO_LINGER)) MSS maximum segment size ( (TCP_MAXSEG)) PQLEN partial listen queue connections QLEN established listen queue connections QLIM established listen queue limit RCVBUF receive buffer length ( (SO_RCVBUF)) SNDBUF send buffer length ( (SO_SNDBUF)) -t specifies that lsof should produce terse output with process identifiers only and no header; e.g., so that the output may be to -t selects the -w option. -u s selects the listing of files for the user whose login names or user ID numbers are in the comma-separated set s; e.g., ' abe', or ' 548,root'. There should be no spaces in the set. Multiple login names or user ID numbers are joined in a single ORed set before participating in AND option selection. If a login name or user ID is preceded by a ' ^', it becomes a negation — i.e., files of processes owned by the login name or user ID will never be listed. A negated login name or user ID selection is neither ANDed nor ORed with other selections; it is applied before all other selections and absolutely excludes the listing of the files of the process. For example, to direct lsof to exclude the listing of files belonging to root processes, specify ' -u^root' or ' -u^0'. -U selects the listing of UNIX domain socket files. -v selects the listing of lsof version information, including: revision number; when the lsof binary was constructed; who constructed the binary and where; the name of the compiler used to construct the lsof binary; the version number of the compiler when readily available; the compiler and loader flags used to construct the lsof binary; and system information, typically the output of 's -a option. -V directs lsof to indicate the items it was asked to list and failed to find — command names, file names, Internet addresses or files, login names, NFS files, PIDs, PGIDs, and UIDs. When other options are ANDed to search options, or compile-time options restrict the listing of some files, lsof may not report that it failed to find a search item when an ANDed option or compile-time option prevents the listing of the open file containing the located search item. For example, ' lsof -V -a -d 999' may not report a failure to locate open files at ' ' and may not list any, if none have a file descriptor number of 999. A similar situation arises when HASSECURITY and HASNOSOCKSECURITY are defined at compile time and they prevent the listing of open files. +| -w Enables ( +) or disables ( -) the suppression of warning messages. The lsof builder may choose to have warning messages disabled or enabled by default. The default warning message state is indicated in the output of the -h or -? Disabling warning messages when they are already disabled or enabling them when already enabled is acceptable. The -t option selects the -w option. -x [ fl] may accompany the +d and +D options to direct their processing to cross over and|or file system mount points encountered when scanning the directory ( +d) or directory tree ( +D). If -x is specified by itself without a following parameter, cross-over processing of both symbolic links and file system mount points is enabled. Note that when -x is specified without a parameter, the next argument must begin with ' -' or ' +'. The optional ' f' parameter enables file system mount point cross-over processing; ' l', symbolic link cross-over processing. The -x option may not be supplied without also supplying a +d or +D option. -X This is a dialect-specific option. AIX: This IBM AIX RISC/System 6000 option requests the reporting of executed text file and shared library references. WARNING: because this option uses the kernel readx() function, its use on a busy AIX system might cause an application process to hang so completely that it can neither be killed nor stopped. By default use of readx() is disabled. On AIX 5L and above lsof may need setuid-root permission to perform the actions this option requests. The lsof builder may specify that the -X option be restricted to processes whose real UID is root. If that has been done, the -X option will not appear in the -h or -? Help output unless the real UID of the lsof process is root. The default lsof distribution allows any UID to specify -X, so by default it will appear in the help output. When AIX readx() use is disabled, lsof may not be able to report information for all text and loader file references, but it may also avoid exacerbating an AIX kernel directory search kernel error, known as the Stale Segment ID bug. The readx() function, used by lsof or any other program to access some sections of kernel virtual memory, can trigger the Stale Segment ID bug. It can cause the kernel's dir_search() function to believe erroneously that part of an in-memory copy of a file system directory has been zeroed. Another application process, distinct from lsof, asking the kernel to search the directory — e.g., by using open — can cause dir_search() to loop forever, thus hanging the application process. Linux: This Linux option requests that lsof skip the reporting of information on all open TCP, UDP and UDPLITE IPv4 and IPv6 files. This Linux option is most useful when the system has an extremely large number of open TCP, UDP and UDPLITE files, the processing of whose information in the /proc/net/tcp* and /proc/net/udp* files would take lsof a long time, and whose reporting is not of interest. Use this option with care and only when you are sure that the information you want lsof to display isn't associated with open TCP, UDP or UDPLITE socket files. Solaris 10 and above: This Solaris 10 and above option requests the reporting of cached paths for files that have been deleted — i.e., removed with. The cached path is followed by the string ' (deleted)' to indicate that the path by which the file was opened has been deleted. Because intervening changes made to the path — i.e., renames with or — are not recorded in the cached path, what lsof reports is only the path by which the file was opened, not its possibly different final path. -z [ z] specifies how Solaris 10 and higher zone information is to be handled. Without a following argument — e.g., no z — the option specifies that zone names are to be listed in the ZONE output column. The -z option may be followed by a zone name, z. That causes lsof to list only open files for processes in that zone. Multiple -z z option and argument pairs may be specified to form a list of named zones. Any open file of any process in any of the zones will be listed, subject to other conditions specified by other options and arguments. -Z [ Z] specifies how SELinux security contexts are to be handled. It and ' Z' field output character support are inhibited when SELinux is disabled in the running Linux kernel. Without a following argument — e.g., no Z — the option specifies that security contexts are to be listed in the SECURITY-CONTEXT output column. The -Z option may be followed by a wildcard security context name, Z. That causes lsof to list only open files for processes in that security context. Multiple -Z Z option and argument pairs may be specified to form a list of security contexts. Any open file of any process in any of the security contexts will be listed, subject to other conditions specified by other options and arguments. Note that Z can be A:B:C or *:B:C or A:B:* or *:*:C to match against the A:B:C context. -- The double minus sign option is a marker that signals the end of the keyed options. It may be used, for example, when the first file name begins with a minus sign. It may also be used when the absence of a value for the last keyed option must be signified by the presence of a minus sign in the following option and before the start of the file names. Names These are path names of specific files to list. Are resolved before use. The first name may be separated from the preceding options with the ' --' option. If a name is the mounted-on directory of a file system or the device of the file system, lsof will list all the files open on the file system. To be considered a file system, the name must match a mounted-on directory name in output, or match the name of a block device associated with a mounted-on directory name. The +| -f option may be used to force lsof to consider a name a file system identifier ( +f) or a simple file ( -f). If name is a path to a directory that is not the mounted-on directory name of a file system, it is treated just as a regular file is treated — i.e., its listing is restricted to processes that have it open as a file or as a process-specific directory, such as the root or current working directory. To request that lsof look for open files inside a directory name, use the +d s and +D D options. If a name is the base name of a family of multiplexed files — e. G, AIX's /dev/pt[ cs] — lsof will list all the associated multiplexed files on the device that are open — e.g., /dev/pt[ cs] /1, /dev/pt[ cs] /2, etc. If a name is a UNIX domain socket name, lsof will usually search for it by the characters of the name alone — exactly as it is specified and is recorded in the kernel socket structure. See the next paragraph for an exception to that rule for Linux. Specifying a relative path — e.g.,./file — in place of the file's absolute path — e.g., /tmp/file — won't work because lsof must match the characters you specify with what it finds in the kernel UNIX domain socket structures. If a name is a Linux UNIX domain socket name, in one case lsof is able to search for it by its device and inode number, allowing name to be a relative path. The case requires that the absolute path -- i.e., one beginning with a slash (' /') be used by the process that created the socket, and hence be stored in the /proc/net/unix file; and it requires that lsof be able to obtain the device and node numbers of both the absolute path in /proc/net/unix and name via successful system calls. When those conditions are met, lsof will be able to search for the UNIX domain socket when some path to it is is specified in name. Thus, for example, if the path is /dev/log, and an lsof search is initiated when the working directory is /dev, then name could be./log. If a name is none of the above, lsof will list any open files whose device and inode match that of the specified path name. If you have also specified the -b option, the only names you may safely specify are file systems for which your mount table supplies alternate device numbers. Multiple file names are joined in a single ORed set before participating in AND option selection. AFS AFS (the Andrew File System, a distributed, networked filesystem) is supported by lsof for these dialects (and AFS versions): • AIX 4.1.4 (AFS 3.4a) • HP-UX 9.0.5 (AFS 3.4a) • Linux 1.2.13 (AFS 3.3) • Solaris 2.[56] (AFS 3.4a) It may recognize AFS files on other versions of these dialects, but has not been tested there. Depending on how AFS is implemented, lsof may recognize AFS files in other dialects, or may have difficulties recognizing AFS files in the supported dialects. Lsof may have trouble identifying all aspects of AFS files in supported dialects when AFS kernel support is implemented via dynamic modules whose addresses do not appear in the kernel's variable name list. In that case, lsof may have to guess at the identity of AFS files, and might not be able to obtain volume information from the kernel that is needed for calculating AFS volume node numbers. When lsof can't compute volume node numbers, it reports blank in the NODE column. The -A A option is available in some dialect implementations of lsof for specifying the name list file where dynamic module kernel addresses may be found. When this option is available, it will be listed in the lsof help output, presented in response to the -h or -? Because AFS path lookups don't seem to participate in the kernel's name cache operations, lsof can't identify path name components for AFS files. Security lsof has three features that may cause security concerns. First, its default compilation mode allows anyone to list all open files with it. Second, by default it creates a user-readable and user-writable device cache file in the home directory of the real user ID that executes lsof. The list-all-open-files and device cache features may be disabled when lsof is compiled. Third, its -k and -m options name alternate kernel name list or memory files. Restricting the listing of all open files is controlled by the compile-time HASSECURITY and HASNOSOCKSECURITY options. When HASSECURITY is defined, lsof will allow only the root user to list all open files. The non-root user may list only open files of processes with the same user IDentification number as the real user ID number of the lsof process (the one that its user logged on with). However, if HASSECURITY and HASNOSOCKSECURITY are both defined, anyone may list open socket files, provided they are selected with the -i option. When HASSECURITY is not defined, anyone may list all open files. Help output, presented in response to the -h or -? Option, gives the status of the HASSECURITY and HASNOSOCKSECURITY definitions. Creation and use of a user-readable and user-writable device cache file is controlled by the compile-time HASDCACHE option. For security considerations it is important to note that in the default lsof distribution, if the real user ID under which lsof is executed is root, the device cache file will be written in root's home directory — e.g., / or /root. When HASDCACHE is not defined, lsof does not write or attempt to read a device cache file. When HASDCACHE is defined, the lsof help output, presented in response to the -h, -D?, or -? Options, will provide device cache file handling information. When HASDCACHE is not defined, the -h or -? Output will have no -D option description. Before you decide to disable the device cache file feature — enabling it improves the performance of lsof by reducing the startup overhead of examining all the nodes in /dev (or /devices) — read the discussion of it in the DCACHE file of the lsof distribution and the lsof FAQ. WHEN IN DOUBT, YOU CAN TEMPORARILY DISABLE THE USE OF THE DEVICE CACHE FILE WITH THE -Di OPTION. When lsof user declares alternate kernel name list or memory files with the -k and -m options, lsof checks the user's authority to read them with access. This is intended to prevent whatever special power lsof's modes might confer on it from letting it read files not normally accessible via the authority of the real user ID. Output This section describes the information lsof lists for each open file. Lsof only outputs printable (declared so by isprint) 8 bit. Non-printable characters are printed in one of three forms: the C ' [bfrnt]' form; the control character ' ^' form (e.g., ' ^@'); or hexadecimal leading ' x' form (e.g., ' xab'). Space is non-printable in the COMMAND column (' x20') and printable elsewhere. For some dialects — if HASSETLOCALE is defined in the dialect's machine.h header file — lsof will print the extended 8 bit characters of a language locale. The lsof process must be supplied a language locale environment variable (e.g., LANG) whose value represents a known language locale in which the extended characters are considered printable by isprint. Otherwise lsof considers the extended characters non-printable and prints them according to its rules for non-printable characters, stated above. Consult your dialect's setlocale man page for the names of other environment variables that may be used in place of LANG — e.g., LC_ALL, LC_CTYPE, etc. Lsof's language locale support for a dialect also covers wide characters — e.g., UTF-8 — when HASSETLOCALE and HASWIDECHAR are defined in the dialect's machine.h header file, and when a suitable language locale has been defined in the appropriate environment variable for the lsof process. Wide characters are printable under those conditions if iswprint reports them to be. If HASSETLOCALE, HASWIDECHAR and a suitable language locale aren't defined, or if iswprint reports wide characters that aren't printable, lsof considers the wide characters non-printable and prints each of their 8 bits according to its rules for non-printable characters, stated above. Consult the answers to the 'Language locale support' questions in the lsof FAQ. The FAQ section gives its location. For more information. Lsof dynamically sizes the output columns each time it runs, guaranteeing that each column is a minimum size. It also guarantees that each column is separated from its predecessor by at least one space. COMMAND contains the first nine characters of the name of the UNIX command associated with the process. If a non-zero w value is specified to the +c w option, the column contains the first w characters of the name of the UNIX command associated with the process up to the limit of characters supplied to lsof by the UNIX dialect. If w is less than the length of the column title, ' COMMAND', it will be raised to that length. If a zero w value is specified to the +c w option, the column contains all the characters of the name of the UNIX command associated with the process. All command name characters maintained by the kernel in its structures are displayed in field output when the command name descriptor (' c') is specified. PID is the Process IDentification number of the process. TID is the task IDentification number, if a task reporting is supported by the dialect and a task is being listed. If help output — i.e., the output of the -h or -? Options — shows this option, then task reporting is supported by the dialect. A blank TID column indicates a process — i.e., a non-task. ZONE is the Solaris 10 and higher zone name. This column must be selected with the -z option. SECURITY-CONTEXT is the SELinux security context. This column must be selected with the -Z option. Note that the -Z option is inhibited when SELinux is disabled in the running Linux kernel. PPID is the Parent Process IDentification number of the process. It is only displayed when the -R option has been specified. PGID is the process group IDentification number associated with the process. It is only displayed when the -g option has been specified. USER is the user ID number or login name of the user to whom the process belongs, usually the same as reported. However, on Linux USER is the user ID number or login that owns the directory in /proc where lsof finds information about the process. Usually that is the same value reported by ps, but may differ when the process has changed its effective user ID. FD is the File Descriptor number of the file or: cwd current working directory; L nn library references (AIX); err FD information error (see NAME column); jld jail directory (FreeBSD); ltx shared library text (code and data); M xx hex memory-mapped type number xx. M86 DOS Merge mapped file; mem memory-mapped file; mmap memory-mapped device; pd parent directory; rtd root directory; tr kernel trace file (OpenBSD); txt program text (code and data); v86 VP/ix mapped file; FD is followed by one of these characters, describing the mode under which the file is open: r for read access; w for write access; u for read and write access; space if mode unknown and no lock character follows; - if mode unknown and lock character follows. The mode character is followed by one of these lock characters, describing the type of lock applied to the file: N for a Solaris NFS lock of unknown type; r for read lock on part of the file; R for a read lock on the entire file; w for a write lock on part of the file; W for a write lock on the entire file; u for a read and write lock of any length; U for a lock of unknown type; x for an SCO OpenServer Xenix lock on part of the file; X for an SCO OpenServer Xenix lock on the entire file; space if there is no lock. The FD column contents constitutes a single field for parsing in post-processing scripts. TYPE is the type of the node associated with the file — e.g., GDIR, GREG, VDIR, VREG, etc. How to enable / disable Packet Data? And last, check/unchecked Use packet data to enable/disable. Android Phones how to packet data. Understand how your data is being used and follow these easy data management tips and tricks to get the biggest bang from your 3 Gigs of high speed data. ![]() ![]() GPRS (General Packet Radio Service), a packet based, offers data rates from 56 up to 115 Kbps. It can be compared with current GSM (Global System for Mobile Communications) systems 9.6 Kbps. GPRS services offer an array of services on your mobile phone such as downloading MP3 ringtones, Polyphonic ringtones, Wallpapers, Color logos, Animations, Videos, Games etc. Some mobile phone SIM come equipped with GPRS. In case, if you don’t have GPRS equipped mobile SIM, you can activate on your cell phone from your service provider. To Activate GPRS: Call to active GPRS in your mobile phone Or Write “GPRS” in your mobile message box and send it to 53733 To Activate GPRS: The Trump (Prepaid) customers can avail this facility by sending SMS to 444 in the format 'ACT GPRS' for activation. The SMS sent to '444' is charged @ Rs.2/- per SMS The Dolphin (Postpaid) customers can avail this facility by sending SMS to 555 (toll free) in the format 'GPRS' for activation or call 1503. To Activate GPRS: Send an SMS to 55100 Or From R-Menu, you can also get the GPRS settings. ![]() ![]() ![]() For activation, you just have to click on R-Menu and then go to get settings. Then select GPRS settings. To Activate GPRS: Just send a text message “internet” and send it to 52270 and save the settings as default on your mobile. After that, log on to the internet browser of your mobile phone and go to settings option and select “DOCOMO internet” APN (Access Point Name) to avail benefits of these pack. To Activate GPRS: SMS ACT VL to 111 (toll free) to activate Vodafone live! And browse GPRS on your handset. Or SMS ACT VMC199 to 111 (toll free) to activate Vodafone Mobile Connect and browse the Internet on your laptop. Internationally, you can access GPRS across 250 operators in 96 countries. While Roaming internationally GPRS is charged at a flat rate of Rs5.50 / 10KB. Though, there are some networks where GPRS usage is completely free. To Activate GPRS: By default SIM is provisioned with internet at the time of purchase. To get Internet settings SMS 'ALL” to 58355 or contact at 121 to get the setting from customer care executive. To Activate GPRS: • Call Mobile Assist at 198 (toll-free) for service requests and complaints. For enquiries call 800 (toll free) or call from a landline. (Effective 1st April 10 calls to 198 & 800 will be toll free). The following are the configuration of Data Internet for Etisalat and Du in the UAE. To set up manually in Android, follow the path PATH: Settings > Connections > Mobile Networks > Access Point Names > Data package > Tap on each option to change. ![]() ![]() ![]() We still don't know your make and model number of laptop. Anyhow, I read this. Sometimes software is used in HP models to disable the switch and the wireless network card.so look into this: 'What you have to do is: go to Mobility Center (via control panel or right-click energy icon on systray) and click on turn wireless ON button! You may have to tap your wireless touch switch once again to enable it over hardware, BUT IT MIGHT WORK. Here, it did! (switching batteries, powering the laptop without battery, driver update, all that stuff, didn`t work for me. ![]() Setting up Mobile Broadband (WWAN). Wi-Fi and Bluetooth on or off. 13 Responses to Setting up Mobile Broadband (WWAN) on HP Elitebook 8560p. View full HP EliteBook 8530p specs on CNET. HP EliteBook 8530p - 15.4' - Core 2 Duo P8600 - Vista Business / XP Pro downgrade - 2 GB RAM - 250 GB HDD Series Specifications. Bluetooth 2.0 EDR, Ethernet, Fast Ethernet, Gigabit Ethernet, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n (draft). ![]() The light at the top of the keyboard is the button. It does not look like a button. Press it and wait as much as two seconds for the color to change. You will then need to re-establish a connection to the wireless router. Click on the wireless icon next to or near the clock in the task tray of your screen. Choose a connection from the list that appears. This is from a different thread and different model, but worth a try. I have seen it on a Toshiba after looking for hours for a stupid switch. I tried that, but its still orange. I think it is because Bluetooth drivers are not installed. In hp laptop, the wifi button stays orange. I have tried the following 1. In device manager, check network adapter properties, it is enabled there. Restore BIOS to default 3. Pressing fn and f12 keys while windows is booting up. Installed the hp wireless assistant but it says 'the device has been disabled by wireless button and cannot be enabled' I need some help in this regard. Thanks Thanks, I disabled using Device manager, network adapter properties and then re-enabled using properties, it turned my wifi back on. Autodesk 3DS Max 2017 Crack + Product Key Free Trial Version Download Autodesk 3DS Max 2017 Crack is Perfect and Professional 3D modeling and animation software developed by Autodesk. It is a Composing tools that permit artists as well as designers to speedily ramp up for production. It is a Complete solution to create awesome type of graphics, game & animation. This software allows you to solve the most complex design problems. 3DS Max 2017 Product key offers advanced 3D modeling tools such as lightning and illumination,particles, sculpting,brushing, textures, painting, character-modeling, object simulation and so much more to discover in the features. Autodesk 3DS Max 2017 Serial number in short is a Complete professional cinema house by which you could easily create movies and learn movie making and many more things related to media production. It also contain the ability to Customize, extend, along with integrate 3ds Max into present pipelines with support for C++ and.NET. ![]() ![]() Runs on all Microsoft windows operating system such as 7/8 XP / Vista / 64 & 32bit. Vray For 3ds Max 2017 Crack Features: • Super Enhancements Option. • It is so easy to use and simply install. • Populate Crowd Animation Feature. • Character Animation and Rigging. • For Film, Video Games, and Other DCC. • It has ability to mesh and surface modeling. • For Windows 7/8 Professional 64-Bit. • You can texture your models via the traditional UV texture maps and bump maps. • Easily position and orient content and efficiently create parametric and organic objects. ![]() Autodesk 3Ds max 2017 System Requirements: Operating System: Windows-XP| 7| 8| Vista Processor: Intel Pentium 4 Or AMD 64 Processor. RAM: 4 GB Of RAM Hard desk: Minimum 4 GB Screen Resolution: 1024X768 Autodesk 3Ds max 2017 Serial Number: • 45 • 06 • 69 • 68 Autodesk 3DS Max 2017 Crack Serial Number Product Key. ![]() I'm not trying to illegally steal a copy of this software. I had a serial number, then lost it. And, I only need this software for a kind of *.3dr import. So, I need a serial number. They are set up like this: XXX-XXXXXXXX I've tried randomizing it, but it's like trying to win the lottery. I'm not trying to illegally steal a copy of this software. I had a serial number, then lost it. Found 7 results for 3d Studio Max 7.0. The word 'keygen' means a small program that can generate a cd key, activation number, license code, serial number. 3d Studio Max 7 Crack mac os sierra vmware workstation my outlook lokks different change to traditional adobe master cc. 3DS MAX 7.0 activation key, 3DS MAX 7.0. Serialkey preview: 4521 1654 2165 1564 2165 4932 4932 OR 51 OR Serial-29 C. Added:; Downloaded: 0 times; Rating: 30%; Submitted by: anonymous; Full download: 3D_Studio_Max_7.rar. Please input captcha to take your serial number. 3D Studio Max 7 serial number. And, I only need this software for a kind of *.3dr import. So, I need a serial number. They are set up like this: XXX-XXXXXXXX I've tried randomizing it, but it's like trying to win the lottery. So is there a serial number I can use somewhere? • Tell us some more • Upload in Progress • Upload failed. Please upload a file larger than 100x100 pixels • We are experiencing some problems, please try again. • You can only upload files of type PNG, JPG, or JPEG. • You can only upload files of type 3GP, 3GPP, MP4, MOV, AVI, MPG, MPEG, or RM. • You can only upload photos smaller than 5 MB. • You can only upload videos smaller than 600MB. • You can only upload a photo (png, jpg, jpeg) or a video (3gp, 3gpp, mp4, mov, avi, mpg, mpeg, rm). • You can only upload a photo or a video. • Video should be smaller than 600mb/5 minutes • Photo should be smaller than 5mb •. Northern Strike. Battlefield 2142. Activate Battlefield 2142: Deluxe Edition Origin CD Key on your EA Origin account to download the game and play. For the Deluxe Edition of Battlefield 2142 (Battlefield 2142 + Battlefield 2142: Northern Strike expansion pack); You can activate the cd-key and install the game directly from here:. It was just wishful thinking that EA had fixed the game to work again, it's completely broken though as it requires you to login/create a Gamespy account which of course no longer works because Gamespy is gone. You have to use an alternate method to get the game to work. Most people are not going to take the time to hunt down this solution and even fewer are going to bother with implementing it. Of course being a Battlefield game it's no easy task to make a patch for the game. Puzzling why they would go through the effort to add it to Origin like this. Update: This does work, there is one server setup with 36 player capacity. My nostalgia goggles fogged up pretty quickly though, this game really does need an update. ![]() If you want to run in 1080P or 1920 x 1080 resolution and your machine supports it. You can add +widescreen 1 to your desktop icon 'target' Mine looks like this: 'D: Games Origin Battlefield 2142 Deluxe BF2142.exe' +menu 1 +fullscreen 1 +widescreen 1 It takes a long time for this game to start, like 20 seconds looking at a black screen and then the intro movies start. More tweaks here: • • • • •. Dear EA, I have just bought BF2142 Deluxe Edition (in Budapest/Hungary) but I cannot find any possibility to activate the Northern strike expansion. For Battlefield 2142 on the PC, a GameFAQs message board topic titled 'Getting northern strike to work.' Explore Battlefield's history with videos and trailers for Battlefield 2142, EA and DICE's award-winning first-person-shooter. ![]() ![]() ![]() ![]() Hi guys, I'm in a bit of a pickle here. So, I traveled to South America a few days ago and since I wanted to be in touch with my family in zones with no internet access, I figured I'd buy a GoPhone, a AT&T SIM card and some credit to top up (I read that roaming it's supported on more than a 100 countries, an my destination was on the list) When I arrived, and to my surprise, I wasn't able to register the phone by calling at the 611 number, so after locating an internet hotspot I registered it using it's website: I registered the Phone with the IMEI, and the SIM card with the ICCID number, and it all went well. I got my wireless number and the temporal password, I was able to add a 'GoPhone refill and go' of 25$ and even choose the International Long Distance Package. But, when I tried to login in to my account, it says that the system will send me a new temporal password through a SMS to my phone, this SMS doesn't arrive. I still can't call 611 from the phone, although I do have cellphone reception, all 5 bars actually. So, I'm stuck. ![]() Do I have the phone active? What am I doing wrong? I just want to be able to receive and send SMS with it, when I travel to the country side. MadMarzo wrote: I called to 800.901.9878 for help, they didn't know their own plans and coverage! AT&T Prepaid Phone, tablets, and plans on AT&T's nationwide network. No annual contract & no credit check. Pick a plan on your terms. Activate your device. Dec 27, 2016. I just purchased a GoPhone as a gift for someone in the hospital who does not have a AT&T account. I also bought a $30 refill card. Read the full step by step guide for AT&T Go Phone activation which is a prepaid phone service by AT&T named as GoPhone. To activate your gophone follow the ste. AT&T Go Phone Prepaid Cellphone Plan. AT&T Go phone has a wide range of options with both monthly unlimited plans for smartphones and basic. Activation Fee. They ended telling me that the roaming plans that AT&T offers are only for Mexico and Canada, and that the other countries listed in the roaming support are the ones you can call FROM the US using AT&T, but not recive calls or SMS from the US to an AT&T phones when traveling in those countries, wich is NOT TRUE, as explained in this simple brochure The only roaming ATT offers for prepaid service is Mexico and Canada. With a postpaid plan, your ATT phone can roam in all of those countries. I have no idea how you found that brochure as it appears to be way out of date but regardless, nowhere in that brochure does it suggest it was for prepaid service. You seem to have assumed that on your own. In fact, one of the items in the brochure specifically states 'Before traveling, an International Roaming feature must be activated on your account.' Had you attempted to do that on your gophone account, I'm sure you would have realized it was not available. So did you even look at the gophone plans before buying the phone and sim card? MadMarzo wrote: I called to 800.901.9878 for help, they didn't know their own plans and coverage! They ended telling me that the roaming plans that AT&T offers are only for Mexico and Canada, and that the other countries listed in the roaming support are the ones you can call FROM the US using AT&T, but not recive calls or SMS from the US to an AT&T phones when traveling in those countries, wich is NOT TRUE, as explained in this simple brochure The only roaming ATT offers for prepaid service is Mexico and Canada. With a postpaid plan, your ATT phone can roam in all of those countries. I have no idea how you found that brochure as it appears to be way out of date but regardless, nowhere in that brochure does it suggest it was for prepaid service. You seem to have assumed that on your own. In fact, one of the items in the brochure specifically states 'Before traveling, an International Roaming feature must be activated on your account.' Had you attempted to do that on your gophone account, I'm sure you would have realized it was not available. So did you even look at the gophone plans before buying the phone and sim card? ![]() Ready to activate your phone? Note: If you purchased a phone or SIM card from or T-Mobile.com, it will arrive activated with a Pay As You Go plan with 30 minutes of talk or 30 texts (or any combination of the two that adds up to 30).* To start your service, simply slip your SIM card into your device. Be sure to to this account before your introductory minutes and texts run out. Need more help? For more information about installing your SIM card, making payments, porting in an existing number, or changing to a different plan, see the. * Tourist Plan SIM Kits do not come pre-activated. General Terms: $10 SIM Starter Kit may be required. Sufficient balance required to use service. Domestic use only; additional charges apply for international use. Calls rated on a per-minute basis. Partial minutes rounded up. No data roaming. For up to 180 days after activation, devices purchased and/or activated at certain locations will only work on the T-Mobile network with the SIMs included at activation. ![]() ![]() Recharge a Mobile in Cameroon Cameroon. Recharge a mobile in Cameroon. Send a gift to your loved one back at home, recharge her mobile credit directly from your home. Guide to Activating. The phone you wish to activate, and an airtime card (or credit. Go to Tracfone.com and look for the orange button towards. PAYG Credit Expiry SIM Card Cancellation Phone. Make at least one airtime credit. There is some discretion for Orange to re-credit any lost balance but. Bring Your Own Device: Check your warranty and contract with your carrier to see what conditions apply to unlocking your device. If you are in Cameroon, then it is common to get updates from your telecom company about special offers during week ends, festive periods among others. It is never easy to save some of these messages. Some people find it too expensive to call because of the lack of information (Bonus news). In this post we will be updating you with all the promotion codes for calls, messages and internet in Cameroon for MTN, Orange and Nexttel Cameroon. Also feel free to contact us or comment if you have a special subscription code for calls. MTN Promotions for Calls, Sms and Internet 1. To get access to MTN freedom, dial *702# With this bundle, you can benefit from unlimited sms, airtime,interent and free social media browsing(Facebook, whats app,twitter and google plus) for up to 30days. To activate MTN easy booster, dial *167#. This tariff offers 100 percent bonus to calls and sms to MTN mobile numbers. To have free calls between 11PM and 5 a.m(MTN 4ME), Dial *123*1# 4.Get a new MTN Sim card and receive 500 SMS, free calls and benefit from 100 percent bonus for every refill( December 2015). Orange Promotions for Calls, sms and Internet 1. To Get bonus for your internation calls, Dial #131*4# 2. To get access to Orange Plenty, dial # 141# 3. To call for 15f per minute, dial #131*3# 4. With 50 FCFA, benefit communicate on whats app,twitter and Facebook by dialing #195*3# 5.To enjoy facebook with no interent, dial #186# Make sure you send your Facebook email and password to 8986 You will be able to update your status,reply to comments and chats. You will not be able to post photos. 6.Get a new Orange sim card and benefit from free calls every week end. 50 percent discount when ever you recharge your account. Dial #131*1# to subscribe to unlimited SMS. You have to choose per day, per week or per month subscription. You can win a smart phone whenever you call. To subscribe, dial #131*7*2# 9. Nexttel Promotions for Calls, sms and Internet 1. To get up to 400 percent discount, for calls, SMS and internet, subscribe to the ECO -PACK by dialing *805# 2.To have unlimited calls from Saturday to Sunday, dial *860*24# 3. Dial *804* number*1# to register your favorite number. You can have up to 12 favorite numbers, 6 nexttel favorite numbers and 6 other numbers from the other companies. 4 You can multiply your credit by 5 using the following codes 100F =500F bonus using *860*21#, 200F =1000F bonus using *860*22# 500F=2500F bonus using *860*23#. Dial *860*24# to get unlimited calls and sms evey week end. The cost is 300 FCFA. To get 25000 FCFA for 2000 FCFA, Dial *860*28# 7. To have 800 FCFA at 250 F. Dial *860*25# 8. To get 1800 FCFA Bonus for 500FCFA, dial *860*26# If you are in Cameroon, share with us any other subscription code you are using and the advantages. Make use of the bonus code and share. To make calls to nexttel numbers at 15F per minute, dial *805*2# before any recharge. 2016 Nexttel Promotions 10. Hello, here is the latest Nexttel promotion for 2016. With 300 FCFA, Get unlimited Calls and SMS to Nexttel numbers. The code to use is *860*24# 11. To get 4 times your credit, Dial *805# before any recharge. This means if your recharge 250 FCFA, airtime, you will get 1000 FCFA. You can use this credit to call all networks in Cameroon. These are the subscription codes we have as of now. Please feel free to share other codes in the comments or send them via email. ![]() Activating Business Functions in SAP ERP can be a challenging task. Since the effects are often irreversible, it is very important for SAP consultants to understand what a Business Function is, what it does and how to handle the activation of business functions. What is a Business Function in SAP ERP? Let’s first discuss what Business Functions actually are. ![]() Since the introduction of Enhancement Packages (EHPs), SAP has been delivering incremental packages of functionality to its customers. Most of this functionality is not immediately active, but can be activated by the customers instead. This gives SAP’s ERP customers the possibility to choose which changes they want to implement at which point in time. These incremental packages of functionality are called Business Functions. SAP usually ships several hundred business functions with each Enhancement Package (EHP). If you want to activate a Business Function but cannot find it, the cause is usually that you don’t have the EHP it comes with installed in your system. To check that, you can open System -> Status and check the Component Version field. By the way: According to a study done by SAP consulting company, he most-used business function of them all is the “New GL” – the new General Ledger in the Financials Module. How to Activate a SAP Business Function ATTENTION: This can be potentially damaging to your SAP system. We do not accept any liability for damage caused by actions described here. Make sure you know what you are doing when activating a Business Function in SAP, and never try it out directly in Production. Let’s have a look at how to actually perform the task of activating a SAP Business Function. There are two ways to get where you want to go: • Either you can use transaction SWF5 (“SWF” stands for the “Switch Framework” in SAP) • Or you can go into customizing ( SPRO) and select the path Activate Business Functions. Only business functions for which you have implemented the EHPs (component version) are available here. If you are doing this in a Production SAP system, make sure the system is locked for all other users and all batch jobs are disabled. You will need the SAP_ALL authorization to activate business functions. Now: • Find the business function you want to activate in the list. • Check the “Planned State” checkbox in the corresponding row. • Click Activate Changes. The system will now start a batch job to activate the business function. This can take between 10 minutes and 2 hours to complete. You can check on the completion via transaction SM37. Once the job has completed, the Business Function is activate and the functionality it contains is available. If you are in a Production SAP system, you can now reactivate the system for the users and enable batch jobs again. Pitfalls and Caveats When Activating Business Functions The most important thing to know about Business Functions is something I’ve said before: Most Business Functions cause irreversible changes to your system. If you choose to activate a business function, you should make sure you’ve read up on it thoroughly and know the exact effects it causes. There are a few reversible business functions (they are marked with a double arrow in transaction SWF5) but even they can not be reversed in a Production system, so this is nothing you should play around with. Make sure to read and implement all SAP notes related to a business function. Failure to implement these notes can cause unexpected results and dumps. Make sure that you have adjusted code that expects standard functionality to work a certain way. Function modules. Switch Framework SAP ERP (ECC 6. All enhancements offered by Enhancement Framework can be switched by the Switch Framework.0) Fundament: Enhancement Framework is the solution of SAP NetWeaver 7.Switch Framework Enables Optional Activation of Business Functions With. A proposal of interesting business functions could be triggered by SAP free of charge using SAP Business Function Prediction process. General, whereas the Logistics Extension Sets of R/3 4.7 used worked similar and you still can activate the value added services or the direct store delivery backend function in your ERP. Keep in mind to also check batch input jobs and other customized functionality. Make sure to check cloned SAP programs and update them if necessary. And finally: Make sure to test thoroughly. If Something Went Wrong: How To Deactivate SAP Business Functions Deactivating Business Functions should be the last resort in case something went wrong, and is only possible in development and test systems. Reversible SAP Business Functions are marked with the “” arrow in SWF5. In a test or development system, a Business Function can be deactivated by unchecking the Planned State checkbox and choosing “Activate”. Hopefully, this blog post gives you a good overview about what Business Functions are and how to work with them. First of all I would advise you to please check the note 1049251. Prerequisite for activation o Unable to deactivate Before you activate Enterprise Extensions, note it is not possible to deactivate these extensions. Furthermore, not every Enterprise Extension is compatible with every Industry Extension. If you have activated an industry solution (known as a 'Business Function Set') in your system, refer to the notes on how to activate the industry to find out if there are any restrictions regarding specific Enterprise Extensions. O Required release SAP Enterprise Core Component 6.0 is required. - There is no other way to de-activate it. The only thing is to restore the system back, when this business function was not active. - It is not possible to activate the business function during the upgrade. - This is a switch and it has to be manually click the Business function to activate it and once it is active there is no way to deactivate it. - Advise is to restore the system from the back up when this business function was not active. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
February 2018
Categories |