@Recource(name = "java:/ConnectionFactory")
to
@Recource(lookup = "java:/ConnectionFactory")
regedit
, and then click OK. In Windows Vista/7, simply type regedit
in Start Search and hit Enter.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon
DefaultUserName
entry, type the user name to log on with, and then click OK.DefaultUserName
registry value name is not found, create a new String Value (REG_SZ)with value name as DefaultUserName
.DefaultPassword
entry, type the password for the user account under the value data box, and then click OK.DefaultPassword
value, create a new String Value (REG_SZ) with DefaultPassword
as the value name.DefaultPassword
string is specified, Windows automatically changes the value of the AutoAdminLogon
registry key from 1 (true) to 0 (false) to turn off the AutoAdminLogon
feature.DefaultDomainName
has to be specified as well, else Windows will prompt for invalid user name with the user name displayed as .\username
. To do so, double click on DefaultDomainName
, and specify the domain name of the user account. If it’s local user, specify local host name.DefaultDomainName
does not exist, create a new String Value (REG_SZ) registry key with value name as DefaultDomainName
.AutoAdminLogon
entry, type 1
in the Value Data box, and then click OK.AutoAdminLogon
entry, create a new String Value (REG_SZ) with AutoAdminLogon
as the value name.AutoLogonCount
key.AutoLogonChecked
key.Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,02,00,00,00,38,00,38,e0,00,00,00,00
Host bigrouter
HostName 192.168.0.1
KexAlgorithms diffie-hellman-group1-sha1
sudo ip tunnel add tun0 mode ipip remote xxx.xxx.xxx.xxx local yyy.yyy.yyy.yyy
sudo ip addr add 10.1.252.6/30 dev tun0
sudo ip link set up dev tun0
interface Tunnel173
ip address 10.1.252.5 255.255.255.252
tunnel source xxx.xxx.xxx.xxx
tunnel destination yyy.yyy.yyy.yyy
tunnel mode ipip
keepalive 15
exit
log debug;
path pre_shared_key "/etc/racoon/psk.txt";
listen {
adminsock "/var/run/racoon/racoon.sock" "root" "operator" 0660;
}
remote xxx.xxx.xxx.xxx {
exchange_mode main;
initial_contact on;
proposal_check obey;
proposal {
encryption_algorithm 3des;
hash_algorithm md5;
authentication_method pre_shared_key;
dh_group modp1024;
}
}
sainfo address yyy.yyy.yyy.yyy/32 4 address xxx.xxx.xxx.xxx/32 4 {
lifetime time 1800 seconds;
encryption_algorithm 3des;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
pfs_group 2;
}
#!/usr/sbin/setkey -f
flush;
spdflush;
spdadd yyy.yyy.yyy.yyy/32 xxx.xxx.xxx.xxx/32 ipencap -P out ipsec
esp/transport/yyy.yyy.yyy.yyy-xxx.xxx.xxx.xxx/require;
spdadd xxx.xxx.xxx.xxx/32 yyy.yyy.yyy.yyy/32 ipencap -P in ipsec
esp/transport/xxx.xxx.xxx.xxx-yyy.yyy.yyy.yyy/require;
crypto isakmp key keymaster address yyy.yyy.yyy.yyy
crypto map VPN-CM 173 ipsec-isakmp
set peer yyy.yyy.yyy.yyy
set transform-set VPN
set pfs group2
match address IPSEC-173
exit
ip access-list extended IPSEC-173
permit ipinip host xxx.xxx.xxx.xxx host yyy.yyy.yyy.yyy
end
$ sudo debugfs -R 'ncheck 393094' /dev/sda2 2>/dev/null
sudo apt-get install dkms
tar -xf psmouse-alps-dst-X.X.tbz
sudo mv usr/src/psmouse-alps-dst-X.X/ /usr/src/psmouse-alps-dst-X.X/
sudo dkms add psmouse/alps-dst-X.X
sudo dkms autoinstall
sudo rmmod psmouse && sudo modprobe psmouse