For free CD Burning Software visit www.sorceforge.net
www.burnatonce.com
For free Programming Material visit www.burnatonce.com
For free SMS Visit www.way2sms.com
For PC Technical Problems www.computing.net
For System Registry Tips visit www.pctools.com/guides/registry
For Electronics Circuits www.aaroncake.net/circuits
For Antivirus Software www.avast.com
For latest Linux www.distrowatch.com
Thursday, October 25, 2007
Monday, October 15, 2007
Book Online Air/Rail/Bus Tickets
http://www.cleartrip.com/
http://www.yatra.com/
http://www.britishairways.com/
http://home.airindia.in/SBCMS/WebPages/Home.aspx
http://www.flyairdeccan.net/AirDeccan.htm
http://www.jetairways.com/
http://www.jetairways.com/
http://www.goair.in/
www.indianrail.gov.in/
http://www.indiatransit.com/
http://apsrtc.gov.in/
http://www.yatra.com/
http://www.britishairways.com/
http://home.airindia.in/SBCMS/WebPages/Home.aspx
http://www.flyairdeccan.net/AirDeccan.htm
http://www.jetairways.com/
http://www.jetairways.com/
http://www.goair.in/
www.indianrail.gov.in/
http://www.indiatransit.com/
http://apsrtc.gov.in/
Monday, September 24, 2007
Friday, September 14, 2007
Internet A to Z
A - Aplets are collections of programs and libraries.
B - A blog is a website where entries are written in chronological order and commonly displayed
in reverse chronological order.
C - Cookies A message given to a Web browser by a Web server. The browser stores the
message in a text file. The message is then sent back to the server each time the
browser requests a page from the server.
D - Domain Name A name that identifies a computer or computers on the internet. These
names appear as a component of a Web sites.
E - e-Mail The term "e-mail" (as a noun or verb) applies both to the Internet e-mail system
based on the Simple Mail Transfer Protocol (SMTP).
F - Firewall A firewall is a set of related programs, located at a network gateway server, that
protects the resources of a private network from users from other networks.
G - Google It is a Search Engine to search user requirements.
H - Hacking a clever or quick fix to a computer program problem; a clumsy or inelegant solution
to a problem; or a modification of a program or device to give the user access to
features that were otherwise unavailable to them.
I - Integrated chip In electronics, an integrated circuit (also known as IC, microcircuit,
microchip, silicon chip, or chip) is a miniaturized electronic circuit (consisting
mainly of semiconductor devices, as well as passive components) that has
been manufactured in the surface of a thin substrate of semiconductor
material.
J - Junk mail - Unwanted mails appeared in your inbox.
K - Kludge a kludge is an awkward or clumsy (but at least temporarily effective) solution to a
programming or hardware design or implementation problem.
L - Linux is not only Operating System which creates resolution in software socialism. Now a
days everything is possible in Linux.
M - MP3 Heart beats of the World.
O - Online which indicates the internet connectivity.
P - Popup Unexpected guest appeared on Web when you are browsing ha ha ha…
Q - Quad speed Providing highly reliable internet hosting since 2001.
R - Real Audio is a proprietary audio format developed by RealNetworks. It uses a variety of
audio codecs, ranging from low-bitrate formats that can be used over dialup
modems, to high-fidelity formats for music.
S - Surfing is nothing but a hours of swimming in the Net Ocean.
T - TCP/IP The Internet protocol suite is the set of communications protocols that implement
the protocol stack on which the Internet and most commercial networks run. It has
also been referred to as the TCP/IP protocol suite, which is named after two of the
most important protocols in it: the Transmission Control Protocol (TCP) and the
Internet Protocol (IP), which were also the first two networking protocols defined.
Today's IP networking represents a synthesis of two developments that began in
the 1970s, namely LANs (Local Area Networks) and the Internet, both of which
have revolutionized computing.
U - URL Abbreviation of Uniform Resource Locator, the global address of documents and other
resources on the World Wide Web. The first part of the address indicates what protocol
to use, and the second part specifies the IP address or the domain name where the
resource is located.
V - Virus - is a computer program that can copy itself and infect a computer without permission
or knowledge of the user.
W - WWW ( World Wide Web) is a system of interlinked, hypertext documents accessed via the
Internet.
X - X-Windows (commonly X11 or X) is a networking and display protocol which provides
windowing on bitmap displays. It provides the standard toolkit and protocol to build
graphical user interfaces (GUIs) on Unix-like operating systems and OpenVMS, and is
supported by almost all other modern operating systems.
Y - Yahoo - First Search Engine in the Web World and now competitor of Google.
Z - Zip modem - is a Protocol which transfers files through internet.
Thanking You…
B - A blog is a website where entries are written in chronological order and commonly displayed
in reverse chronological order.
C - Cookies A message given to a Web browser by a Web server. The browser stores the
message in a text file. The message is then sent back to the server each time the
browser requests a page from the server.
D - Domain Name A name that identifies a computer or computers on the internet. These
names appear as a component of a Web sites.
E - e-Mail The term "e-mail" (as a noun or verb) applies both to the Internet e-mail system
based on the Simple Mail Transfer Protocol (SMTP).
F - Firewall A firewall is a set of related programs, located at a network gateway server, that
protects the resources of a private network from users from other networks.
G - Google It is a Search Engine to search user requirements.
H - Hacking a clever or quick fix to a computer program problem; a clumsy or inelegant solution
to a problem; or a modification of a program or device to give the user access to
features that were otherwise unavailable to them.
I - Integrated chip In electronics, an integrated circuit (also known as IC, microcircuit,
microchip, silicon chip, or chip) is a miniaturized electronic circuit (consisting
mainly of semiconductor devices, as well as passive components) that has
been manufactured in the surface of a thin substrate of semiconductor
material.
J - Junk mail - Unwanted mails appeared in your inbox.
K - Kludge a kludge is an awkward or clumsy (but at least temporarily effective) solution to a
programming or hardware design or implementation problem.
L - Linux is not only Operating System which creates resolution in software socialism. Now a
days everything is possible in Linux.
M - MP3 Heart beats of the World.
O - Online which indicates the internet connectivity.
P - Popup Unexpected guest appeared on Web when you are browsing ha ha ha…
Q - Quad speed Providing highly reliable internet hosting since 2001.
R - Real Audio is a proprietary audio format developed by RealNetworks. It uses a variety of
audio codecs, ranging from low-bitrate formats that can be used over dialup
modems, to high-fidelity formats for music.
S - Surfing is nothing but a hours of swimming in the Net Ocean.
T - TCP/IP The Internet protocol suite is the set of communications protocols that implement
the protocol stack on which the Internet and most commercial networks run. It has
also been referred to as the TCP/IP protocol suite, which is named after two of the
most important protocols in it: the Transmission Control Protocol (TCP) and the
Internet Protocol (IP), which were also the first two networking protocols defined.
Today's IP networking represents a synthesis of two developments that began in
the 1970s, namely LANs (Local Area Networks) and the Internet, both of which
have revolutionized computing.
U - URL Abbreviation of Uniform Resource Locator, the global address of documents and other
resources on the World Wide Web. The first part of the address indicates what protocol
to use, and the second part specifies the IP address or the domain name where the
resource is located.
V - Virus - is a computer program that can copy itself and infect a computer without permission
or knowledge of the user.
W - WWW ( World Wide Web) is a system of interlinked, hypertext documents accessed via the
Internet.
X - X-Windows (commonly X11 or X) is a networking and display protocol which provides
windowing on bitmap displays. It provides the standard toolkit and protocol to build
graphical user interfaces (GUIs) on Unix-like operating systems and OpenVMS, and is
supported by almost all other modern operating systems.
Y - Yahoo - First Search Engine in the Web World and now competitor of Google.
Z - Zip modem - is a Protocol which transfers files through internet.
Thanking You…
Need free Web space?
Wednesday, August 29, 2007
Wanna download free Mobile Softwares?
Thursday, August 23, 2007
FORMAT UR HARD DISK BY USING FDISK
Instructions to give any Windows system a clean install.
The following instructions were written to FDISK and FORMAT a 12 GB hard drive.You can of course use these same instructions for any size hard drive.Your hard drive size, the number and size of the partitions you want will be different of course.Just by changing the % numbers you can adjust the partition sizes.You can also change the number of partitions by adjusting the numbers.
I strongly suggest you backup your important filesbefore using the instructions on this page.
FDISK is a powerful tool. It can do severe damage to your data if you tell it to do the wrong thing. So make sure, at each step along the way, that you read the information it gives you. If it prompts you for information, make sure that you understand what it's asking for before responding. Depending on how your system is configured, FDISK may give you additional prompts that will not show up in the steps I'm describing. So, before you type in something that I've told you to type, make sure that it's really asking you what I'm describing that it should be asking you at that point. With that out of the way, here's the best attempt I can give at instructions:
The first thing you're going to need is a boot floppy disk. A floppy disk is a disk that you can successfully start your computer into DOS from, and that has the necessary drivers to let you access your CD-ROM drive. Make sure that it works, and lets you successfully read CDs before proceeding. If it turns out that there's a problem with this disk, you'll be in deep trouble later on. In the COMMAND directory of your Windows directory at C:\WINDOWS\COMMAND,( unless you've rearranged things ), you will find the files FDISK.EXE and FORMAT.COM. If these two files are not on your startup disk copy them from the command directory onto your boot floppy disk.
You are about to erase your entire hard disk. Make sure that you have backups of your files, and that you have all the CDs that you will need to reinstall things once you're done.
Place your boot floppy into the drive and reboot your computer.
( choose: Start Computer with CD-ROM support if prompted )
You should wind up at the A:\> MS-DOS prompt. Again, make absolutely, positively sure that you can access your CD-ROM at this point by typing DIR E: ( or whatever drive letter your CD-ROM drive has ), and and pressing ENTER. If you can now see a list of files on the CD you know it works.At the A:\> prompt, type FDISK and press ENTER. You will see a very long message, telling you that "Your computer has a disk larger than 512 MB", and asking if you wish to enable large disk support. ( "Large disk support" means "FAT32" ) Answer Y to enable large disk support.You will see the main FDISK Options menu, and the Enter choice: prompt. It will tell you Current fixed disk drive: 1 in other words, unless you tell it otherwise, it's going to operate on disk 1, the first disk it's found on the system. Since there's only one hard drive on your system ( Make sure this is true ), this is what you want to do.You want to start out by deleting the existing partition from the disk. To do that, type in 3 the Delete partition or Logical DOS drive option and press ENTER.A menu will appear, asking you what sort of partition to delete. Enter 1 Delete Primary DOS partition and press ENTER. A list of partitions will appear; there will probably only be one partition there. It will ask you what primary partition to delete; choose 1 the only one listed, and press ENTER. To make absolutely sure that you know what you're doing, it may prompt you to type in the volume label for the partition, which will be listed in the partition list. If the Volume Label column is blank, then the volume label is blank too, so just press ENTER.It will tell you Partition deleted, or words to that effect, and send you back to the main menu.Now you want to create a new partition.To do that, choose option 1 Create DOS partition or logical DOS drive and press ENTER.It will prompt you for what sort of partition to create; choose option 1 Create Primary DOS partition and press ENTER.It will prompt you Do you wish to use the maximum available size for a Primary DOS partition and make the partition active (Y/N)?No, you don't;that would put you right back where you started with one partition the size of the whole hard drive. So choose N and press ENTER. It will show you the total space on the drive, and prompt you Enter size in MBytes or percent of drive space (%): You want this first partition to take up one quarter of the drive space, so type in 25% ( make sure to include the percent sign ), and press ENTER.( If you would like a different partition size, just adjust the % number )It should tell you Partition created; drive letters changed or added, or words to that effect. If it sends you back to the main FDISK Options menu, great; if it doesn't, just press the Esc key until you're back there.
Before we go any farther, let's make this partition the active partition. That is the one that the system will try to boot from.Choose option 2, Set active partition, and press ENTER.It will show you a list of partitions which should only include one partition, the one you just created and ask you what partition to set as the active one. Choose 1 ( the number of the partition you just created ), and press ENTER. It will tell you that it's made that partition active, and prompt you to press Escape to go back to the main menu. Do that. Now it's time to create the extended partition, the partition that will contain the remaining three partitions. Choose option 1 Create DOS partition or Logical DOS drive again.When it prompts you for what type of partition to create, choose option 2 Create Extended DOS partition and press ENTER.If it prompts you Do you wish to use the maximum available size?, then press Y you do. Otherwise, if it prompts you to enter a size, enter the maximum value it allows. For example, if it tells you that the maximum possible size is 12843 MBytes, enter 12843 with no percent sign and press ENTER.FDISK should tell you that it's created the partition. Press Esc to return to the FDISK Options menu, if it doesn't send you there on its own. Now it's time to fill up that extended partition you just created, by making three logical partitions to fill it. Again, choose option 1 Create DOS partition or logical DOS drive and press ENTER.This time, when it asks you what type of partition to create, choose option 3 Create Logical DOS drive(s) in the Extended DOS Partition and press ENTER.It will prompt you to Enter logical drive size in MBytes or percent of disk space once again. Type in 33% with the percent sign and press ENTER.( Remember; if your want a different size, the % number you enter is the percent of the "extended" partition )It will create the first logical partition, and immediately prompt you to Enter logical drive size... again. This time, type in 50% with the percent sign, and press ENTER. It's 50% this time because half of the remaining is one third of what you started with.( Again, if changing the numbers from what I list the % number is the percent of the "extended" partition )It will create the second logical partition, and prompt you once again to "Enter logical drive size..." This time, look above the prompt, to where it says "Maximum space available for logical drives is (some number) MBytes". Type in the number of MBytes shown there, without a percent sign, and press ENTER.It will create the third logical partition, and tell you that All available space in the Extended DOS partition is assigned to logical drives in other words, you've filled the entire space, just as you wanted to do. Press Escape to continue. Believe it or not, you have now successfully partitioned your drive.Press Escape once more to exit FDISK. It will give you one last warning, telling you that you must restart the computer for the changes to take effect. Press Escape one more time.You should now be back at the A:\> prompt. Press Ctrl-Alt-Delete to restart the computer. Again, let it boot from the boot floppy.When it gets back to the A:\> prompt, type FORMAT C: to format the primary partition. When that finishes, type FORMAT D:, then FORMAT E:, then FORMAT F:, to format the remaining partitions.( If you varied the number partitions from what I list, remember to format "every" partition )
You should now have a nice clean hard drive, with four 3GB partitions, ready to install your operating system of choice. Celebrate with your beverage of choice.
--------If you have read this far, and just want one or two partitions--------
For one large drive / partition: go to the step; "...Do you wish to use the maximum available size?", And press Y you do. Format the drive and you're done.Enter 50% for 2 partitions: You must follow one more step, setting the "maximum available size?" to 100%. Format those 2 partitions and you are done.Why I you show making 4 partitions and not another number? Some users would never think of dividing a hard drive, others like the security and organization that can be found using multiple partitions.To partition; and/or the number of partitions are up to you.
The following instructions were written to FDISK and FORMAT a 12 GB hard drive.You can of course use these same instructions for any size hard drive.Your hard drive size, the number and size of the partitions you want will be different of course.Just by changing the % numbers you can adjust the partition sizes.You can also change the number of partitions by adjusting the numbers.
I strongly suggest you backup your important filesbefore using the instructions on this page.
FDISK is a powerful tool. It can do severe damage to your data if you tell it to do the wrong thing. So make sure, at each step along the way, that you read the information it gives you. If it prompts you for information, make sure that you understand what it's asking for before responding. Depending on how your system is configured, FDISK may give you additional prompts that will not show up in the steps I'm describing. So, before you type in something that I've told you to type, make sure that it's really asking you what I'm describing that it should be asking you at that point. With that out of the way, here's the best attempt I can give at instructions:
The first thing you're going to need is a boot floppy disk. A floppy disk is a disk that you can successfully start your computer into DOS from, and that has the necessary drivers to let you access your CD-ROM drive. Make sure that it works, and lets you successfully read CDs before proceeding. If it turns out that there's a problem with this disk, you'll be in deep trouble later on. In the COMMAND directory of your Windows directory at C:\WINDOWS\COMMAND,( unless you've rearranged things ), you will find the files FDISK.EXE and FORMAT.COM. If these two files are not on your startup disk copy them from the command directory onto your boot floppy disk.
You are about to erase your entire hard disk. Make sure that you have backups of your files, and that you have all the CDs that you will need to reinstall things once you're done.
Place your boot floppy into the drive and reboot your computer.
( choose: Start Computer with CD-ROM support if prompted )
You should wind up at the A:\> MS-DOS prompt. Again, make absolutely, positively sure that you can access your CD-ROM at this point by typing DIR E: ( or whatever drive letter your CD-ROM drive has ), and and pressing ENTER. If you can now see a list of files on the CD you know it works.At the A:\> prompt, type FDISK and press ENTER. You will see a very long message, telling you that "Your computer has a disk larger than 512 MB", and asking if you wish to enable large disk support. ( "Large disk support" means "FAT32" ) Answer Y to enable large disk support.You will see the main FDISK Options menu, and the Enter choice: prompt. It will tell you Current fixed disk drive: 1 in other words, unless you tell it otherwise, it's going to operate on disk 1, the first disk it's found on the system. Since there's only one hard drive on your system ( Make sure this is true ), this is what you want to do.You want to start out by deleting the existing partition from the disk. To do that, type in 3 the Delete partition or Logical DOS drive option and press ENTER.A menu will appear, asking you what sort of partition to delete. Enter 1 Delete Primary DOS partition and press ENTER. A list of partitions will appear; there will probably only be one partition there. It will ask you what primary partition to delete; choose 1 the only one listed, and press ENTER. To make absolutely sure that you know what you're doing, it may prompt you to type in the volume label for the partition, which will be listed in the partition list. If the Volume Label column is blank, then the volume label is blank too, so just press ENTER.It will tell you Partition deleted, or words to that effect, and send you back to the main menu.Now you want to create a new partition.To do that, choose option 1 Create DOS partition or logical DOS drive and press ENTER.It will prompt you for what sort of partition to create; choose option 1 Create Primary DOS partition and press ENTER.It will prompt you Do you wish to use the maximum available size for a Primary DOS partition and make the partition active (Y/N)?No, you don't;that would put you right back where you started with one partition the size of the whole hard drive. So choose N and press ENTER. It will show you the total space on the drive, and prompt you Enter size in MBytes or percent of drive space (%): You want this first partition to take up one quarter of the drive space, so type in 25% ( make sure to include the percent sign ), and press ENTER.( If you would like a different partition size, just adjust the % number )It should tell you Partition created; drive letters changed or added, or words to that effect. If it sends you back to the main FDISK Options menu, great; if it doesn't, just press the Esc key until you're back there.
Before we go any farther, let's make this partition the active partition. That is the one that the system will try to boot from.Choose option 2, Set active partition, and press ENTER.It will show you a list of partitions which should only include one partition, the one you just created and ask you what partition to set as the active one. Choose 1 ( the number of the partition you just created ), and press ENTER. It will tell you that it's made that partition active, and prompt you to press Escape to go back to the main menu. Do that. Now it's time to create the extended partition, the partition that will contain the remaining three partitions. Choose option 1 Create DOS partition or Logical DOS drive again.When it prompts you for what type of partition to create, choose option 2 Create Extended DOS partition and press ENTER.If it prompts you Do you wish to use the maximum available size?, then press Y you do. Otherwise, if it prompts you to enter a size, enter the maximum value it allows. For example, if it tells you that the maximum possible size is 12843 MBytes, enter 12843 with no percent sign and press ENTER.FDISK should tell you that it's created the partition. Press Esc to return to the FDISK Options menu, if it doesn't send you there on its own. Now it's time to fill up that extended partition you just created, by making three logical partitions to fill it. Again, choose option 1 Create DOS partition or logical DOS drive and press ENTER.This time, when it asks you what type of partition to create, choose option 3 Create Logical DOS drive(s) in the Extended DOS Partition and press ENTER.It will prompt you to Enter logical drive size in MBytes or percent of disk space once again. Type in 33% with the percent sign and press ENTER.( Remember; if your want a different size, the % number you enter is the percent of the "extended" partition )It will create the first logical partition, and immediately prompt you to Enter logical drive size... again. This time, type in 50% with the percent sign, and press ENTER. It's 50% this time because half of the remaining is one third of what you started with.( Again, if changing the numbers from what I list the % number is the percent of the "extended" partition )It will create the second logical partition, and prompt you once again to "Enter logical drive size..." This time, look above the prompt, to where it says "Maximum space available for logical drives is (some number) MBytes". Type in the number of MBytes shown there, without a percent sign, and press ENTER.It will create the third logical partition, and tell you that All available space in the Extended DOS partition is assigned to logical drives in other words, you've filled the entire space, just as you wanted to do. Press Escape to continue. Believe it or not, you have now successfully partitioned your drive.Press Escape once more to exit FDISK. It will give you one last warning, telling you that you must restart the computer for the changes to take effect. Press Escape one more time.You should now be back at the A:\> prompt. Press Ctrl-Alt-Delete to restart the computer. Again, let it boot from the boot floppy.When it gets back to the A:\> prompt, type FORMAT C: to format the primary partition. When that finishes, type FORMAT D:, then FORMAT E:, then FORMAT F:, to format the remaining partitions.( If you varied the number partitions from what I list, remember to format "every" partition )
You should now have a nice clean hard drive, with four 3GB partitions, ready to install your operating system of choice. Celebrate with your beverage of choice.
--------If you have read this far, and just want one or two partitions--------
For one large drive / partition: go to the step; "...Do you wish to use the maximum available size?", And press Y you do. Format the drive and you're done.Enter 50% for 2 partitions: You must follow one more step, setting the "maximum available size?" to 100%. Format those 2 partitions and you are done.Why I you show making 4 partitions and not another number? Some users would never think of dividing a hard drive, others like the security and organization that can be found using multiple partitions.To partition; and/or the number of partitions are up to you.
Needa a Legal Help?
www.indialawsite.com
www. lawadiv.com
india law portal www.indiacorporateadvisor.com
www.indiaitlaw.com
www.lawsinindia.com
www.lawyersonclick.com
www.Vakilno1.com
www.TaxnYou.com
www.indiapropertylaws.com
www.lawchips.com
www.laws4india
www.legalaidindia.com
www.cyberlawindia.com
www.vakilbabu.com
www.indialawinfo.com
www.manupatra.com
www.lawguru.com
www. lawadiv.com
india law portal www.indiacorporateadvisor.com
www.indiaitlaw.com
www.lawsinindia.com
www.lawyersonclick.com
www.Vakilno1.com
www.TaxnYou.com
www.indiapropertylaws.com
www.lawchips.com
www.laws4india
www.legalaidindia.com
www.cyberlawindia.com
www.vakilbabu.com
www.indialawinfo.com
www.manupatra.com
www.lawguru.com
SAP IDES Installation Procedure for SAP Install on W2k server
Procedure for installation on W2k server with sp3.
Installation Of SAP 4.6b
System Requirements.
P-III System 1024 MB or 512 MB RAM Minimum 60GB HDD 40 GB Hdd (2GB for WinNT & 38 GB for oracle & SAP) 10 GB Hdd for CD dumps. CDROM drive. Network Card
C:\ - 10GB - Windows 2000 Server - NTFS D:\ - 40GB - Oracle & SAP - NTFS E:\ - 10GB - CD Dumps - NTFS F:\ - CDROM Drive
Install Windows 2000 server in first 10GB partition Computer Name - SAPSRV IP Address - 192.168.1.2 Subnet Mask - 255.255.255.0 Work Group - TEKSOFT Complete the installation & Restart.
Install Service Pack 3 Install All the Drivers Install IE6 SP1
Create two Users as mentioned bellow
Start -> Programs -> Administrative Tools -> Computer Management -> Local Users and Groups -> Users -> New User
a. First user name TEKADM Give password, disable the already enabled option & enable "Password Never Expires & user cannot change the password option "
b. Second user name SAPServiceTEK Give password, disable the already enabled option & enable "Password Never Expires & user cannot change the password option "
Add the two Users to Administrators Group
Change hostfile
Open C:\Winnt\System32\driver\ect\host file in Notepad & add IP Address and Computer Name in The bottom of file. Save & Exit.
Change the Virtual Memory
C: Min - 512MB Max - 1024MB
D: Min - 2048MB Max - 2560MB
Change the File and Printer sharing properties to “ Maximize through
Logon as TEKADM Insert SAP-Oracle CD & Select F:\NT\i386\setup & click enter Location of oracle D:\orant & click enter Accept path change & click enter Oracle 8 enterprise edition & click enter (Oracle 8.1.7 will not be supported by SAP Kernel 4.6B) (Oracle 8.1.7 will be supported by SAP Kernel 4.6C only)
After completion of oracle Stop the service "Oracle TNSlistner 80" Select F:\NT\i386\Patchs\8.0.5.2.2\setup & click enter Accept the defaults & complete the installation. Restart the system.
Dump all the export CDs (6 CDs) into E:\dump\db1 - export CD 1 E:\dump\db2 - export CD 2 E:\dump\db3 - export CD 3 (To dump type as E:\dump\db1>Xcopy /e f: & enter) E:\dump\db4 - export CD 4 E:\dump\db5 - export CD 5 E:\dump\db6 - export CD 6
Insert Kernel CD
Select F:\46bker\NT\i386\NTPATCH\R3dllins & click enter This will install patch for NT.
Restart the system.
Logon as TEKADM From kernel CD F:\NT\common\r3setup & enter Enter the following
System Name - TEK (must be 3 Letters Capital) Location - C:\users\Tekadm\install (it comes by default) Accept to restart the machine.
Logon on as TEKADM Copy the file "db_ides.r3s" from DB1\IDES\NT\ORA\DB_IDES.R3S (18KB files size) to C:\users\tekadm\install
Start r3setup from C:\users\tekadm\install\r3setup & enter Select "central.r3s" file & enter & Follow as mentioned bellow
System Name - TEK Instance no. - 00 Accept Defaults Directory of SAP system -change to D: RAM of the sys. - Accept the default Location of the KERNEL CD - F: Port no. - 3600 Enter the password of TEKADM two times Enter the password of SAPServiceTEK two times Start the installation. This will come upto
Select C:\users\tekadm\install\r3setup & enter Select "db_ides.r3s" & enter System Name - TEK Instance no. - 00 Accept Defaults Select WE8DEC (default for r/3 4.x system) & enter Oracle dir. - D:
Location of SAP Database specific files
SAP Database Drive
SAPARCH D SAPBACKUP D SAPCHECK D SAPREORG D SAPTRACE D & enter
Location of Oracle Data files
Oracle Data directory drive
SAPDATA1 D SAPDATA2 D SAPDATA3 D SAPDATA4 D SAPDATA5 D SAPDATA6 D & enter
Location Database LOG files
Dir. for LOG files Drive
ORIGLOGA D ORIGLOGB D & enter
Location Mirrored Database LOG files (Change from D to C)
Dir. for LOG files Drive
MIRRLOGA C MIRRLOGB C & enter
Accept the default RAM & enter
Location of export CDs dump
CD name Location Copy destination
KERNEL F:\46bker EXPORT1 E:\dump\db1\1 EXPORT2 E:\dump\db2\2 EXPORT3 E:\dump\db3\3 EXPORT4 E:\dump\db4\4 (Clear this field) EXPORT5 E:\dump\db5\5 EXPORT6 E:\dump\db6\6 & enter
Enter the Password of TEKADM No. of parallel process - 1 Start installation.
Wait for 14 to 15 Hrs & installation will come Upto 91% & will ask for SAPr3 password. Enter the password of TEKADM & enter
This will come upto 95% Open SAP Management Console from desktop & Right click "TEK" & start the service. Wait for the service to start & will change from yellow to green. Come to the r3setup screen & click next. This will bring upto 100% & the installation is over. Exit the r3setup & stop the "TEK"service & Restart the system.
POST INSTALLATION TASKS
After SAP installation, install SAPGUI in the server. (CD 9) Restart the system
Open SAP Management Console & start the sap service.
Start the Sap Frontend from the start\programs\sap frontend\sapsrv.
Logon as Client 000 User name DDIC
Password 19920706 Language en
* Note : Clear this field This means if you already have the CD's copied on the the harddrive you don't need to copy them again..
CD Title------CD Location-----------CD copy to this location kernel--------Dump location1-------clear , don't re copy cd1-----------Dump2--------- -------clear, this field cd2-----------........3-----------------clear cd3-----------.........4----------------clear
WebLogic Portlets for SAP Installation Guide
This document explains how to install the BEA WebLogic Portlets for SAP application.
The BEA WebLogic Portlets for SAP application integrates BEA WebLogic Portal with the SAP R/3 4.6C System.
This guide contains the following sections:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Installation Prerequisites for BEA WebLogic Portlets for SAP
This section contains the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Hardware Requirements
The server should have the following configuration:
· Pentium 4, 1GHz or higher
· 1 GB RAM or more
· 40GB HDD
Software Requirements
The following software must be installed on the server:
· BEA WebLogic Platform 8.1 SP2 or higher
· SAP Version 4.6 C Patch Level 44
· One of the following databases should be available:
· Oracle 8i or higher
· MS SQL Server 2000 SP2
· Internet Explorer 6 or higher
Administrator Privileges
You must have BEA WebLogic Platform administrator privileges in order to install and configure the BEA WebLogic Portlets for SAP application.
Licensing and Encryption
The WebLogic Platform software cannot be used without a valid license. You can purchase licenses for the entire WebLogic Platform product or for individual components. For information about the licenses available for WebLogic Platform, contact your sales representative or visit the BEA corporate Web site at http://www.bea.com.
About 128-Bit Encryption
Secure sockets layer (SSL) encryption software is available with two levels of encryption: 56-bit and 128-bit. Licenses for the 128-bit client version of SSL are available in the United States and Canada. With proper authorization, customers outside the United States and Canada may also acquire licenses with 128-bit encryption enabled.
A WebLogic Platform license comes with 56-bit encryption enabled by default. Enabling 128-bit encryption for SSL requires that a 128-bit encryption license be present in the license.bea file of the target BEA Home directory before you install the WebLogic Platform software.
Installing BEA WebLogic Portlets for SAP
This section includes the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Before you start the BEA WebLogic Portlets for SAP installation, make sure you meet the Error! Hyperlink reference not valid..
Installing BEA WebLogic Portlets for SAP
BEA WebLogic Portlets for SAP can be installed on both Unix and Windows operating systems using graphical-mode installation.
Graphical-Mode Installation on Windows System
To start the installation on Windows system:
1.Log in to the Windows system.
2.Insert the BEA WebLogic Portlets for SAP CD-ROM into the CD-ROM drive.
3.Navigate to the folder and run the installation file SAPportlets_win_811.exe.
4.The program prepares your system for the installation task, as shown in Error! Hyperlink reference not valid..
Figure 1 Installation Initialization Screen
5.The Introduction screen appears, as shown in Error! Hyperlink reference not valid.. Click Next to continue.
Figure 2 Introduction Screen
6. In the Choose Installation Folder screen (as shown in Error! Hyperlink reference not valid.), specify the path of the installation directory or click Choose to select the \bea\weblogic directory. This is the path where BEA WebLogic Portlets for SAP will be installed. Click Next to continue.
Note: If a folder other than \bea\weblogic is selected then you need to manually copy the templates files from \workshop\templates to \bea\weblogic\workshop\templates.
Figure 3 Choose Installation Folder Screen
7.The Pre-Installation Summary screen displays your installation preferences, as shown in Error! Hyperlink reference not valid.. Click Install to continue.
Figure 4 Pre-installation Summary Screen
8.The Installing BEA WebLogic Portlets for SAP Installation Setup screen displays the progress of the installation, as shown in Error! Hyperlink reference not valid..
Figure 5 Installation Setup Screen
9.The Install Complete screen confirms that BEA WebLogic Portlets for SAP was installed successfully, as shown in Error! Hyperlink reference not valid.. Click Done to complete the installation.
Figure 6 Install Complete Screen
Graphical-Mode Installation on Unix System
To start the installation on Unix system:
1.Log in to the Unix system.
2.Mount the BEA WebLogic Portlets for SAP CD-ROM into the CD-ROM drive.
3.Open a command-line shell.
4.Go to the CD-ROM directory and navigate to the folder for the installation program SAPportlets_solaris_811.bin.
5.Invoke the procedure by entering the following command:
./SAPportlets_solaris_811.bin
6.The program prepares your system for the installation task, as shown in Error! Hyperlink reference not valid..
Figure 7 Installation Initialization Screen
7.The Introduction screen appears, as shown in Error! Hyperlink reference not valid.. Click Next to continue.
Figure 8 Introduction Screen
8.In the Choose Installation Folder screen (as shown in Error! Hyperlink reference not valid.), specify the path of the installation directory or click Choose to browse for the path where you want to install BEA WebLogic Portlets for SAP. Click Next to continue.
Note: If a folder other than /bea/weblogic is selected then you need to manually copy the templates files from /workshop/templates to /bea/weblogic/workshop/templates.
Figure 9 Choose Installation Folder Screen
10.The Pre-Installation Summary screen displays your installation preferences, as shown in Error! Hyperlink reference not valid.. Click Install to continue.
Figure 11 Pre-installation Summary Screen
11.The Installing BEA WebLogic Portlets for SAP screen displays the progress of the installation, as shown in Error! Hyperlink reference not valid..
Figure 12 Installing Screen
12.The Install Complete screen confirms that BEA WebLogic Portlets for SAP was installed successfully, as shown in Error! Hyperlink reference not valid.. Click Done to complete the installation.
Figure 13 Install Complete Screen
Reviewing the Installation
The installer will install files in the following directories:
· Product Documentation will be copied into a directory at <%BEA_HOME%>\weblogic\portal\thirdparty\sapportlets\docs
Note: Depending on the type of installation the product documentation might be shipped separately.
· Sample view templates (for .jsp and .jpf files) will be copied into a directory at <%BEA_HOME%>\weblogic\portal\thirdparty\sapportlets\newportlet
· WebLogic Domain Extension Template - Use the Existing domain or Create Domain using WebLogic Wizard. (See "Creating WebLogic Configurations Using the Configuration Wizard" at Error! Hyperlink reference not valid.).
· Workshop Application Template will be copied into <%BEA_HOME%>\weblogic\workshop\templates
· DDL and DML scripts will be copied into a subdirectory of <%BEA_HOME%>\weblogic\portal\thirdparty\ sapportlets\scripts
Configuring the BEA WebLogic Portal
After the installation is completed, perform the following steps using WebLogic Workshop.
For a new portal application:
Create a new Basic WebLogic Portal Domain using the Configuration Wizard.
Create a new Portal Application in WebLogic Workshop.
Create a new Portal Project.
In the WebLogic Workshop's Application window, right-click the data directory and choose Install > PortletsForSAPPropertySet.
In the WebLogic Workshop's Application window, right-click the portal project directory and choose Install > Portlets for SAP.
Downloading the Third Party Software
Error! Hyperlink reference not valid. shows you what to download, where to download it, and where to store it.
Table 1 List of JAR files required for BEA WebLogic Portlets for SAP
JAR file
Component
Download from /Copy From
Directory
xercesImpl.jar
xalan.jar
xml-apis.jar
xmlParserAPIs.jar
XMLhelper
Download from http://xml.apache.org/dist/xerces-j/old_xerces2/
<\%BEA_HOME%>\user_projects\application\\\WEB-INF\lib
Example:
C:\bea\user_projects\applications\BeaPortalNetApp\beaportal\WEB-INF\lib
For Windows:
jRFC12.dll
librfc32.dll
jCO.jar
Note: The file names may vary depending on the version.
SAPDataEngine
Download from https://websmp103.sap-ag.de/connectors
Copy the jRFC12.dll and librfc32.dll files to C:\WINNT\system32 directory.
Copy the jCO.jar to a directory.
Open the setDomainEnv.cmd file, located in the domain folder.
Modify the CLASSPATH to the directory pointing to the location where the file is copied.
For Linux:
librfccm.so
libsapjcorfc.so
sapjco.jar
SAPDataEngine
Download from https://websmp103.sap-ag.de/connectors
Copy the files to a directory.
Open the commEnv.sh file, located at the following path <%BEA_HOME%>/weblogic/common/bin.
Modify the LD_LIBRARY_PATH to the directory where the files are copied.
Open the setDomainEnv.sh file located in the domain directory.
Modify the CLASSPATH to the directory pointing to the location where the file sapjco.jar is copied.
Configuration and Settings for BEA WebLogic Portlets for SAP
This section contains the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Setting Up SAP Portlets Repository
This topic contains the following procedures:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Creating Schema and Importing Metadata
To create schema and import metadata for BEA WebLogic Portlets for SAP in MS SQL Server run the following scripts in MS SQL Server's Query Analyzer in the order given below:
MSSQL_PNET_DROP_TABLE.SQL
MSSQL_PNET_ CREATE_TABLES.SQL
MSSQL_PNET_DROP_FKEYS.SQL
MSSQL_PNET_CREATE_FKEYS.SQL
MSSQL_PNET_INSERT_SCRIPTS.SQL
To create schema for BEA WebLogic Portlets for SAP in Oracle database run the following scripts in Oracle's SQL Plus in the order given below:
ORACLE_PNET_DROP_TABLE.SQL
ORACLE_PNET_CREATE_TABLES.SQL
ORCLE_PNET_INSERT_SCRIPTS.SQL
ORACLE_PNET_DROP_SEQUENCE.SQL
ORACLE_PNET_CREATE_ SEQUENCE.SQL
ORACLE_PNET_DROP_FKEYS.SQL
ORACLE_PNET_CREATE_FKEYS.SQL
Configuring the PORTALnet.properties File
To configure the properties file:
Open the PORTALnet.properties file from the \bea\user_projects\applications\\\WEB-INF\classes subfolder for the product installed and change the settings.
For example: C:\bea\user_projects\applications\BeaPortalNetApp\beaportal\WEB-INF\classes
Modify the repository connection information, DATASOURCE=
For example: DATASOURCE=EISDB
Registering Java Data Source
To create a Java Data Source:
Start the WebLogic Server for your domain.
Go to Tools > WebLogic Server > DataSource Viewer. The DataSource Viewer window appears.
Click New Data Source to add a new data source. The Configure DataSource window appears, as shown in Error! Hyperlink reference not valid.
Figure 14 Configuring Datasource Screen
Enter the Data Sources as EISDB.
Select the Pool as.
Enter the Pool Name as EISDB.
Configure the Driver, URL, User, and Password, and click OK.
Activating the License for BEA WebLogic Portlets for SAP
To activate the license for BEA WebLogic Portlets for SAP:
Copy the license file license.bea into the <%BEA_HOME%> directory.
Restart the WebLogic Portal server.
Log in to BEA WebLogic Portlets for SAP with the weblogic account.
Uninstalling BEA WebLogic Portlets for SAP
To uninstall BEA WebLogic Portlets for SAP:
Shut down any servers that are running. If any of these servers is configured as a Windows service, you should stop the service(s) before uninstalling the software.
Navigate to the directory where BEA WebLogic Portlets for SAP is installed.
Navigate to the Uninstall_Bea Weblogic Portlets for SAP directory.
Run the BEAPortal Weblogic Portlets Uninstallation Setup.exe uninstallation program.
Click Next to start the uninstall program.
Select Complete Uninstall or Uninstall Specific Features option and click Next.
Click Done to exit the uninstallation program.
Troubleshooting
Use Error! Hyperlink reference not valid. to troubleshoot installation issues.
Table 2 Troubleshooting WebLogic Portlets for SAP
No.
Problem
Cause
1
Running the scripts throws SQL error
Make sure that you run the scripts in the order specified in the installation document.
2
Unable to connect to the database
Check if the JDBC Drivers are configured properly.
3
Invalid datasource entry error
Check if the DataSource is configured properly in WebLogic Workshop.
4
Cannot connect to SAP
Verify if the files jRFC12.dll and librfc32.dll are placed under the system32 directory.
Error! Hyperlink reference not valid.
Error! Hyperlink reference not valid.
Installation Of SAP 4.6b
System Requirements.
P-III System 1024 MB or 512 MB RAM Minimum 60GB HDD 40 GB Hdd (2GB for WinNT & 38 GB for oracle & SAP) 10 GB Hdd for CD dumps. CDROM drive. Network Card
C:\ - 10GB - Windows 2000 Server - NTFS D:\ - 40GB - Oracle & SAP - NTFS E:\ - 10GB - CD Dumps - NTFS F:\ - CDROM Drive
Install Windows 2000 server in first 10GB partition Computer Name - SAPSRV IP Address - 192.168.1.2 Subnet Mask - 255.255.255.0 Work Group - TEKSOFT Complete the installation & Restart.
Install Service Pack 3 Install All the Drivers Install IE6 SP1
Create two Users as mentioned bellow
Start -> Programs -> Administrative Tools -> Computer Management -> Local Users and Groups -> Users -> New User
a. First user name TEKADM Give password, disable the already enabled option & enable "Password Never Expires & user cannot change the password option "
b. Second user name SAPServiceTEK Give password, disable the already enabled option & enable "Password Never Expires & user cannot change the password option "
Add the two Users to Administrators Group
Change hostfile
Open C:\Winnt\System32\driver\ect\host file in Notepad & add IP Address and Computer Name in The bottom of file. Save & Exit.
Change the Virtual Memory
C: Min - 512MB Max - 1024MB
D: Min - 2048MB Max - 2560MB
Change the File and Printer sharing properties to “ Maximize through
Logon as TEKADM Insert SAP-Oracle CD & Select F:\NT\i386\setup & click enter Location of oracle D:\orant & click enter Accept path change & click enter Oracle 8 enterprise edition & click enter (Oracle 8.1.7 will not be supported by SAP Kernel 4.6B) (Oracle 8.1.7 will be supported by SAP Kernel 4.6C only)
After completion of oracle Stop the service "Oracle TNSlistner 80" Select F:\NT\i386\Patchs\8.0.5.2.2\setup & click enter Accept the defaults & complete the installation. Restart the system.
Dump all the export CDs (6 CDs) into E:\dump\db1 - export CD 1 E:\dump\db2 - export CD 2 E:\dump\db3 - export CD 3 (To dump type as E:\dump\db1>Xcopy /e f: & enter) E:\dump\db4 - export CD 4 E:\dump\db5 - export CD 5 E:\dump\db6 - export CD 6
Insert Kernel CD
Select F:\46bker\NT\i386\NTPATCH\R3dllins & click enter This will install patch for NT.
Restart the system.
Logon as TEKADM From kernel CD F:\NT\common\r3setup & enter Enter the following
System Name - TEK (must be 3 Letters Capital) Location - C:\users\Tekadm\install (it comes by default) Accept to restart the machine.
Logon on as TEKADM Copy the file "db_ides.r3s" from DB1\IDES\NT\ORA\DB_IDES.R3S (18KB files size) to C:\users\tekadm\install
Start r3setup from C:\users\tekadm\install\r3setup & enter Select "central.r3s" file & enter & Follow as mentioned bellow
System Name - TEK Instance no. - 00 Accept Defaults Directory of SAP system -change to D: RAM of the sys. - Accept the default Location of the KERNEL CD - F: Port no. - 3600 Enter the password of TEKADM two times Enter the password of SAPServiceTEK two times Start the installation. This will come upto
Select C:\users\tekadm\install\r3setup & enter Select "db_ides.r3s" & enter System Name - TEK Instance no. - 00 Accept Defaults Select WE8DEC (default for r/3 4.x system) & enter Oracle dir. - D:
Location of SAP Database specific files
SAP Database Drive
SAPARCH D SAPBACKUP D SAPCHECK D SAPREORG D SAPTRACE D & enter
Location of Oracle Data files
Oracle Data directory drive
SAPDATA1 D SAPDATA2 D SAPDATA3 D SAPDATA4 D SAPDATA5 D SAPDATA6 D & enter
Location Database LOG files
Dir. for LOG files Drive
ORIGLOGA D ORIGLOGB D & enter
Location Mirrored Database LOG files (Change from D to C)
Dir. for LOG files Drive
MIRRLOGA C MIRRLOGB C & enter
Accept the default RAM & enter
Location of export CDs dump
CD name Location Copy destination
KERNEL F:\46bker EXPORT1 E:\dump\db1\1 EXPORT2 E:\dump\db2\2 EXPORT3 E:\dump\db3\3 EXPORT4 E:\dump\db4\4 (Clear this field) EXPORT5 E:\dump\db5\5 EXPORT6 E:\dump\db6\6 & enter
Enter the Password of TEKADM No. of parallel process - 1 Start installation.
Wait for 14 to 15 Hrs & installation will come Upto 91% & will ask for SAPr3 password. Enter the password of TEKADM & enter
This will come upto 95% Open SAP Management Console from desktop & Right click "TEK" & start the service. Wait for the service to start & will change from yellow to green. Come to the r3setup screen & click next. This will bring upto 100% & the installation is over. Exit the r3setup & stop the "TEK"service & Restart the system.
POST INSTALLATION TASKS
After SAP installation, install SAPGUI in the server. (CD 9) Restart the system
Open SAP Management Console & start the sap service.
Start the Sap Frontend from the start\programs\sap frontend\sapsrv.
Logon as Client 000 User name DDIC
Password 19920706 Language en
* Note : Clear this field This means if you already have the CD's copied on the the harddrive you don't need to copy them again..
CD Title------CD Location-----------CD copy to this location kernel--------Dump location1-------clear , don't re copy cd1-----------Dump2--------- -------clear, this field cd2-----------........3-----------------clear cd3-----------.........4----------------clear
WebLogic Portlets for SAP Installation Guide
This document explains how to install the BEA WebLogic Portlets for SAP application.
The BEA WebLogic Portlets for SAP application integrates BEA WebLogic Portal with the SAP R/3 4.6C System.
This guide contains the following sections:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Installation Prerequisites for BEA WebLogic Portlets for SAP
This section contains the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Hardware Requirements
The server should have the following configuration:
· Pentium 4, 1GHz or higher
· 1 GB RAM or more
· 40GB HDD
Software Requirements
The following software must be installed on the server:
· BEA WebLogic Platform 8.1 SP2 or higher
· SAP Version 4.6 C Patch Level 44
· One of the following databases should be available:
· Oracle 8i or higher
· MS SQL Server 2000 SP2
· Internet Explorer 6 or higher
Administrator Privileges
You must have BEA WebLogic Platform administrator privileges in order to install and configure the BEA WebLogic Portlets for SAP application.
Licensing and Encryption
The WebLogic Platform software cannot be used without a valid license. You can purchase licenses for the entire WebLogic Platform product or for individual components. For information about the licenses available for WebLogic Platform, contact your sales representative or visit the BEA corporate Web site at http://www.bea.com.
About 128-Bit Encryption
Secure sockets layer (SSL) encryption software is available with two levels of encryption: 56-bit and 128-bit. Licenses for the 128-bit client version of SSL are available in the United States and Canada. With proper authorization, customers outside the United States and Canada may also acquire licenses with 128-bit encryption enabled.
A WebLogic Platform license comes with 56-bit encryption enabled by default. Enabling 128-bit encryption for SSL requires that a 128-bit encryption license be present in the license.bea file of the target BEA Home directory before you install the WebLogic Platform software.
Installing BEA WebLogic Portlets for SAP
This section includes the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Before you start the BEA WebLogic Portlets for SAP installation, make sure you meet the Error! Hyperlink reference not valid..
Installing BEA WebLogic Portlets for SAP
BEA WebLogic Portlets for SAP can be installed on both Unix and Windows operating systems using graphical-mode installation.
Graphical-Mode Installation on Windows System
To start the installation on Windows system:
1.Log in to the Windows system.
2.Insert the BEA WebLogic Portlets for SAP CD-ROM into the CD-ROM drive.
3.Navigate to the folder and run the installation file SAPportlets_win_811.exe.
4.The program prepares your system for the installation task, as shown in Error! Hyperlink reference not valid..
Figure 1 Installation Initialization Screen
5.The Introduction screen appears, as shown in Error! Hyperlink reference not valid.. Click Next to continue.
Figure 2 Introduction Screen
6. In the Choose Installation Folder screen (as shown in Error! Hyperlink reference not valid.), specify the path of the installation directory or click Choose to select the \bea\weblogic
Note: If a folder other than \bea\weblogic
Figure 3 Choose Installation Folder Screen
7.The Pre-Installation Summary screen displays your installation preferences, as shown in Error! Hyperlink reference not valid.. Click Install to continue.
Figure 4 Pre-installation Summary Screen
8.The Installing BEA WebLogic Portlets for SAP Installation Setup screen displays the progress of the installation, as shown in Error! Hyperlink reference not valid..
Figure 5 Installation Setup Screen
9.The Install Complete screen confirms that BEA WebLogic Portlets for SAP was installed successfully, as shown in Error! Hyperlink reference not valid.. Click Done to complete the installation.
Figure 6 Install Complete Screen
Graphical-Mode Installation on Unix System
To start the installation on Unix system:
1.Log in to the Unix system.
2.Mount the BEA WebLogic Portlets for SAP CD-ROM into the CD-ROM drive.
3.Open a command-line shell.
4.Go to the CD-ROM directory and navigate to the folder for the installation program SAPportlets_solaris_811.bin.
5.Invoke the procedure by entering the following command:
./SAPportlets_solaris_811.bin
6.The program prepares your system for the installation task, as shown in Error! Hyperlink reference not valid..
Figure 7 Installation Initialization Screen
7.The Introduction screen appears, as shown in Error! Hyperlink reference not valid.. Click Next to continue.
Figure 8 Introduction Screen
8.In the Choose Installation Folder screen (as shown in Error! Hyperlink reference not valid.), specify the path of the installation directory or click Choose to browse for the path where you want to install BEA WebLogic Portlets for SAP. Click Next to continue.
Note: If a folder other than /bea/weblogic
Figure 9 Choose Installation Folder Screen
10.The Pre-Installation Summary screen displays your installation preferences, as shown in Error! Hyperlink reference not valid.. Click Install to continue.
Figure 11 Pre-installation Summary Screen
11.The Installing BEA WebLogic Portlets for SAP screen displays the progress of the installation, as shown in Error! Hyperlink reference not valid..
Figure 12 Installing Screen
12.The Install Complete screen confirms that BEA WebLogic Portlets for SAP was installed successfully, as shown in Error! Hyperlink reference not valid.. Click Done to complete the installation.
Figure 13 Install Complete Screen
Reviewing the Installation
The installer will install files in the following directories:
· Product Documentation will be copied into a directory at <%BEA_HOME%>\weblogic
Note: Depending on the type of installation the product documentation might be shipped separately.
· Sample view templates (for .jsp and .jpf files) will be copied into a directory at <%BEA_HOME%>\weblogic
· WebLogic Domain Extension Template - Use the Existing domain or Create Domain using WebLogic Wizard. (See "Creating WebLogic Configurations Using the Configuration Wizard" at Error! Hyperlink reference not valid.).
· Workshop Application Template will be copied into <%BEA_HOME%>\weblogic
· DDL and DML scripts will be copied into a subdirectory of <%BEA_HOME%>\weblogic
Configuring the BEA WebLogic Portal
After the installation is completed, perform the following steps using WebLogic Workshop.
For a new portal application:
Create a new Basic WebLogic Portal Domain using the Configuration Wizard.
Create a new Portal Application in WebLogic Workshop.
Create a new Portal Project.
In the WebLogic Workshop's Application window, right-click the data directory and choose Install > PortletsForSAPPropertySet.
In the WebLogic Workshop's Application window, right-click the portal project directory and choose Install > Portlets for SAP.
Downloading the Third Party Software
Error! Hyperlink reference not valid. shows you what to download, where to download it, and where to store it.
Table 1 List of JAR files required for BEA WebLogic Portlets for SAP
JAR file
Component
Download from /Copy From
Directory
xercesImpl.jar
xalan.jar
xml-apis.jar
xmlParserAPIs.jar
XMLhelper
Download from http://xml.apache.org/dist/xerces-j/old_xerces2/
<\%BEA_HOME%>\user_projects\application\
Example:
C:\bea\user_projects\applications\BeaPortalNetApp\beaportal\WEB-INF\lib
For Windows:
jRFC12.dll
librfc32.dll
jCO.jar
Note: The file names may vary depending on the version.
SAPDataEngine
Download from https://websmp103.sap-ag.de/connectors
Copy the jRFC12.dll and librfc32.dll files to C:\WINNT\system32 directory.
Copy the jCO.jar to a directory.
Open the setDomainEnv.cmd file, located in the domain folder.
Modify the CLASSPATH to the directory pointing to the location where the file is copied.
For Linux:
librfccm.so
libsapjcorfc.so
sapjco.jar
SAPDataEngine
Download from https://websmp103.sap-ag.de/connectors
Copy the files to a directory.
Open the commEnv.sh file, located at the following path <%BEA_HOME%>/weblogic
Modify the LD_LIBRARY_PATH to the directory where the files are copied.
Open the setDomainEnv.sh file located in the domain directory.
Modify the CLASSPATH to the directory pointing to the location where the file sapjco.jar is copied.
Configuration and Settings for BEA WebLogic Portlets for SAP
This section contains the following topics:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Setting Up SAP Portlets Repository
This topic contains the following procedures:
· Error! Hyperlink reference not valid.
· Error! Hyperlink reference not valid.
Creating Schema and Importing Metadata
To create schema and import metadata for BEA WebLogic Portlets for SAP in MS SQL Server run the following scripts in MS SQL Server's Query Analyzer in the order given below:
MSSQL_PNET_DROP_TABLE.SQL
MSSQL_PNET_ CREATE_TABLES.SQL
MSSQL_PNET_DROP_FKEYS.SQL
MSSQL_PNET_CREATE_FKEYS.SQL
MSSQL_PNET_INSERT_SCRIPTS.SQL
To create schema for BEA WebLogic Portlets for SAP in Oracle database run the following scripts in Oracle's SQL Plus in the order given below:
ORACLE_PNET_DROP_TABLE.SQL
ORACLE_PNET_CREATE_TABLES.SQL
ORCLE_PNET_INSERT_SCRIPTS.SQL
ORACLE_PNET_DROP_SEQUENCE.SQL
ORACLE_PNET_CREATE_ SEQUENCE.SQL
ORACLE_PNET_DROP_FKEYS.SQL
ORACLE_PNET_CREATE_FKEYS.SQL
Configuring the PORTALnet.properties File
To configure the properties file:
Open the PORTALnet.properties file from the \bea\user_projects\applications\
For example: C:\bea\user_projects\applications\BeaPortalNetApp\beaportal\WEB-INF\classes
Modify the repository connection information, DATASOURCE=
For example: DATASOURCE=EISDB
Registering Java Data Source
To create a Java Data Source:
Start the WebLogic Server for your domain.
Go to Tools > WebLogic Server > DataSource Viewer. The DataSource Viewer window appears.
Click New Data Source to add a new data source. The Configure DataSource window appears, as shown in Error! Hyperlink reference not valid.
Figure 14 Configuring Datasource Screen
Enter the Data Sources as EISDB.
Select the Pool as
Enter the Pool Name as EISDB.
Configure the Driver, URL, User, and Password, and click OK.
Activating the License for BEA WebLogic Portlets for SAP
To activate the license for BEA WebLogic Portlets for SAP:
Copy the license file license.bea into the <%BEA_HOME%> directory.
Restart the WebLogic Portal server.
Log in to BEA WebLogic Portlets for SAP with the weblogic account.
Uninstalling BEA WebLogic Portlets for SAP
To uninstall BEA WebLogic Portlets for SAP:
Shut down any servers that are running. If any of these servers is configured as a Windows service, you should stop the service(s) before uninstalling the software.
Navigate to the directory where BEA WebLogic Portlets for SAP is installed.
Navigate to the Uninstall_Bea Weblogic Portlets for SAP directory.
Run the BEAPortal Weblogic Portlets Uninstallation Setup.exe uninstallation program.
Click Next to start the uninstall program.
Select Complete Uninstall or Uninstall Specific Features option and click Next.
Click Done to exit the uninstallation program.
Troubleshooting
Use Error! Hyperlink reference not valid. to troubleshoot installation issues.
Table 2 Troubleshooting WebLogic Portlets for SAP
No.
Problem
Cause
1
Running the scripts throws SQL error
Make sure that you run the scripts in the order specified in the installation document.
2
Unable to connect to the database
Check if the JDBC Drivers are configured properly.
3
Invalid datasource entry error
Check if the DataSource is configured properly in WebLogic Workshop.
4
Cannot connect to SAP
Verify if the files jRFC12.dll and librfc32.dll are placed under the system32 directory.
Error! Hyperlink reference not valid.
Error! Hyperlink reference not valid.
Need a Medical Help?
http://www.askoxford.com/?view=uk (English)
http://www.cancerweb.ncl.ac.uk/omd/ (Medical words) http://www.specialistinfo.com/directory.php (Names of doctors GP, specialists)http://www.nhs.uk/england/default.aspx (Names of doctors/hospitals/clinics) http://www.netdoctor.co.uk/medicines/indexold.shtml (Medications)
http://www.cancerweb.ncl.ac.uk/omd/ (Medical words) http://www.specialistinfo.com/directory.php (Names of doctors GP, specialists)http://www.nhs.uk/england/default.aspx (Names of doctors/hospitals/clinics) http://www.netdoctor.co.uk/medicines/indexold.shtml (Medications)
Data Recovery Web sites
To recover your files by using the follwoing sites?
http://www.recovermyfiles.com/
http://www.getdata.com/
http://www.stellarinfo.com/
http://www.ontrack.co.uk/
http://www.jufsoft.com/
http://www.recovermyfiles.com/
http://www.getdata.com/
http://www.stellarinfo.com/
http://www.ontrack.co.uk/
http://www.jufsoft.com/
If the Problem related to ur desktop
If ur actual desktop is not appearing?
Solution: By downloading Combofix software general tool that helps the helper cleaning up a Hijackthis log.It is able to remove some common infections and helps a user detect files that general scanners cannot find.It also lists registry keys such as the key keys, the desktop keys, and other areas where malware hide.The tool has some rootkit detectors too, allowing a helper to see if a rootkit is present on the PC.
Solution: By downloading Combofix software general tool that helps the helper cleaning up a Hijackthis log.It is able to remove some common infections and helps a user detect files that general scanners cannot find.It also lists registry keys such as the key keys, the desktop keys, and other areas where malware hide.The tool has some rootkit detectors too, allowing a helper to see if a rootkit is present on the PC.
Process to remove Trojan Virus
How to remove a Trojan, Virus, Worm, or other Malware?
About the Virus: If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.
Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Hijackers - A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware - A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.
Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.
How these infections start
Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.
Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals.When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.
Solution:Automated Removal Instructions for VirusBursters and VirusBurst:
Print out these instructions as we will need to close every window that is open later in the fix.
Download SmitfraudFix.exe from here and save it to your desktop:
SmitFraudFix.exe
Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:
Next, please reboot your computer into Safe Mode by doing the following:
Restart your computer
After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
Instead of Windows loading as normal, a menu should appear
Select the first option, to run Windows in Safe Mode.
When you are at the logon prompt, log in as the user you were performing the previous steps as.
When your computer has started in safe mode, and you see the desktop, close all open Windows.
Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:
When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.
You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).
The program will start cleaning your computer and go through a series of cleanup processes. When it is done, it will automatically start the Disk Cleanup program as shown by the image below.
This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 11.
When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.
Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log, and when you are done, close the Notepad screen.Your computer should now be free of the VirusBursters, Virus-Bursters and VirusBurster infection.If you are still having problems with spyware after completing these instructions, then please follow the steps outlined in the topic linked below:
About the Virus: If you use a computer, read the newspaper, or watch the news, you will know about computer viruses or other malware. These are those malicious programs that once they infect your machine will start causing havoc on your computer. What many people do not know is that there are many different types of infections that are categorized in the general category of Malware.
Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses, worms, Trojan horses, spyware, hijackers, and certain type of adware.
This article will focus on those malware that are considered viruses, trojans, worms, and viruses, though this information can be used to remove the other types of malware as well. We will not go into specific details about any one particular infection, but rather provide a broad overview of how these infections can be removed. For the most part these instructions should allow you to remove a good deal of infections, but there are some that need special steps to be removed and these won't be covered under this tutorial.
Before we continue it is important to understand the generic malware terms that you will be reading about.
Adware - A program that generates popups on your computer or displays advertisements. It is important to note that not all adware programs are necessarily considered malware. There are many legitimate programs that are given for free that display ads in their programs in order to generate revenue. As long as this information is provided up front then they are generally not considered malware.
Backdoor - A program that allows a remote user to execute commands and tasks on your computer without your permission. These types of programs are typically used to launch attacks on other computers, distribute copyrighted software or media, or hack other computers.
Dialler - A program that typically dials a premium rate number that has per minute charges over and above the typical call charge. These calls are with the intent of gaining access to pornographic material.
Hijackers - A program that attempts to hijack certain Internet functions like redirecting your start page to the hijacker's own start page, redirecting search queries to a undesired search engine, or replace search results from popular search engines with their own information.
Spyware - A program that monitors your activity or information on your computer and sends that information to a remote computer without your knowledge.
Trojan - A program that has been designed to appear innocent but has been intentionally designed to cause some malicious activity or to provide a backdoor to your system.
Virus - A program that when run, has the ability to self-replicate by infecting other programs and files on your computer. These programs can have many effects ranging from wiping your hard drive, displaying a joke in a small box, or doing nothing at all except to replicate itself. These types of infections tend to be localized to your computer and not have the ability to spread to another computer on their own. The word virus has incorrectly become a general term that encompasses trojans, worms, and viruses.
Worm - A program that when run, has the ability to spread to other computers on its own using either mass-mailing techniques to email addresses found on your computer or by using the Internet to infect a remote computer using known security holes.
How these infections start
Just like any program, in order for the program to work, it must be started. Malware programs are no different in this respect and must be started in some fashion in order to do what they were designed to do. For the most part these infections run by creating a configuration entry in the Windows Registry in order to make these programs start when your computer starts.
Unfortunately, though, in the Windows operating system there are many different ways to make a program start which can make it difficult for the average computer user to find manually. Luckily for us, though, there are programs that allow us to cut through this confusion and see the various programs that are automatically starting when windows boots. The program we recommend for this, because its free and detailed, is Autoruns from Sysinternals.When you run this program it will list all the various programs that start when your computer is booted into Windows. For the most part, the majority of these programs are safe and should be left alone unless you know what you are doing or know you do not need them to run at startup.
Solution:Automated Removal Instructions for VirusBursters and VirusBurst:
Print out these instructions as we will need to close every window that is open later in the fix.
Download SmitfraudFix.exe from here and save it to your desktop:
SmitFraudFix.exe
Confirm that the file SmitfraudFix.exe now resides on your desktop, but do not double-click on the icon as of yet. We will use it in later steps. The icon will look like the one below:
Next, please reboot your computer into Safe Mode by doing the following:
Restart your computer
After hearing your computer beep once during startup, but before the Windows icon appears, press F8.
Instead of Windows loading as normal, a menu should appear
Select the first option, to run Windows in Safe Mode.
When you are at the logon prompt, log in as the user you were performing the previous steps as.
When your computer has started in safe mode, and you see the desktop, close all open Windows.
Now, double-click on the SmitFraudfix icon that should be residing on your desktop.The icon will look like the one below:
When the tool first starts you will see a credits screen. Simply press any key on your keyboard to get to the next screen.
You will now see a menu as shown in the image below. Press the number 2 on your keyboard and the press the enter key to choose the option Clean (safe mode recommended).
The program will start cleaning your computer and go through a series of cleanup processes. When it is done, it will automatically start the Disk Cleanup program as shown by the image below.
This program will remove all Temp, Temporary Internet Files, and other files that may be leftover files from this infection. This process can take up to a few hours depending on your computer, so please be patient. When it is complete, it will close automatically and you will should continue with step 11.
When Disk Cleanup is finished, you will be presented with an option asking Do you want to clean the registry ? (y/n). At this screen you should press the Y button on your keyboard and then press the enter key.
When this last routine is finished, you will be presented with a red screen stating Computer will reboot now. Close all applications. You should now press the spacebar on your computer. A counter will appear stating that the computer will reboot in 15 seconds. Do not cancel this countdown and allow your computer to reboot.
Once the computer has rebooted, you will be presented with a Notepad screen containing a log of all the files removed from your computer. Examine this log, and when you are done, close the Notepad screen.Your computer should now be free of the VirusBursters, Virus-Bursters and VirusBurster infection.If you are still having problems with spyware after completing these instructions, then please follow the steps outlined in the topic linked below:
Subscribe to:
Comments (Atom)