@Recource(name = "java:/ConnectionFactory")
to
@Recource(lookup = "java:/ConnectionFactory")
regedit, and then click OK. In Windows Vista/7, simply type regedit in Start Search and hit Enter.HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\WinlogonDefaultUserName entry, type the user name to log on with, and then click OK.DefaultUserName registry value name is not found, create a new String Value (REG_SZ)with value name as DefaultUserName.DefaultPassword entry, type the password for the user account under the value data box, and then click OK.DefaultPassword value, create a new String Value (REG_SZ) with DefaultPassword as the value name.DefaultPassword string is specified, Windows automatically changes the value of the AutoAdminLogon registry key from 1 (true) to 0 (false) to turn off the AutoAdminLogonfeature.DefaultDomainName has to be specified as well, else Windows will prompt for invalid user name with the user name displayed as .\username. To do so, double click on DefaultDomainName, and specify the domain name of the user account. If it’s local user, specify local host name.DefaultDomainName does not exist, create a new String Value (REG_SZ) registry key with value name as DefaultDomainName.AutoAdminLogon entry, type 1 in the Value Data box, and then click OK.AutoAdminLogon entry, create a new String Value (REG_SZ) with AutoAdminLogon as the value name.AutoLogonCount key.AutoLogonChecked key.Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
"Scancode Map"=hex:00,00,00,00,00,00,00,00,02,00,00,00,38,00,38,e0,00,00,00,00
Host bigrouter
HostName 192.168.0.1
KexAlgorithms diffie-hellman-group1-sha1
sudo ip tunnel add tun0 mode ipip remote xxx.xxx.xxx.xxx local yyy.yyy.yyy.yyy
sudo ip addr add 10.1.252.6/30 dev tun0
sudo ip link set up dev tun0
interface Tunnel173
ip address 10.1.252.5 255.255.255.252
tunnel source xxx.xxx.xxx.xxx
tunnel destination yyy.yyy.yyy.yyy
tunnel mode ipip
keepalive 15
exit
log debug;
path pre_shared_key "/etc/racoon/psk.txt";
listen {
adminsock "/var/run/racoon/racoon.sock" "root" "operator" 0660;
}
remote xxx.xxx.xxx.xxx {
exchange_mode main;
initial_contact on;
proposal_check obey;
proposal {
encryption_algorithm 3des;
hash_algorithm md5;
authentication_method pre_shared_key;
dh_group modp1024;
}
}
sainfo address yyy.yyy.yyy.yyy/32 4 address xxx.xxx.xxx.xxx/32 4 {
lifetime time 1800 seconds;
encryption_algorithm 3des;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
pfs_group 2;
}
#!/usr/sbin/setkey -f
flush;
spdflush;
spdadd yyy.yyy.yyy.yyy/32 xxx.xxx.xxx.xxx/32 ipencap -P out ipsec
esp/transport/yyy.yyy.yyy.yyy-xxx.xxx.xxx.xxx/require;
spdadd xxx.xxx.xxx.xxx/32 yyy.yyy.yyy.yyy/32 ipencap -P in ipsec
esp/transport/xxx.xxx.xxx.xxx-yyy.yyy.yyy.yyy/require;
crypto isakmp key keymaster address yyy.yyy.yyy.yyy
crypto map VPN-CM 173 ipsec-isakmp
set peer yyy.yyy.yyy.yyy
set transform-set VPN
set pfs group2
match address IPSEC-173
exit
ip access-list extended IPSEC-173
permit ipinip host xxx.xxx.xxx.xxx host yyy.yyy.yyy.yyy
end
$ sudo debugfs -R 'ncheck 393094' /dev/sda2 2>/dev/null
sudo apt-get install dkms
tar -xf psmouse-alps-dst-X.X.tbz
sudo mv usr/src/psmouse-alps-dst-X.X/ /usr/src/psmouse-alps-dst-X.X/
sudo dkms add psmouse/alps-dst-X.X
sudo dkms autoinstall
sudo rmmod psmouse && sudo modprobe psmouse