Patch 10.5.1 making Toad unstable

There are some options in Toad that connect to the web. For
example download tool tips at startup and check for update. Try
turning these off and see if that helps the startup time.

I unchecked both options. In my case, this DID work for me - FOR A WHILE - and then stopped working. I never re-checked these options, and I'm not sure if McAfee "learns" (heuristics?) but once things degraded again, I never could speed it back up without adding Toad (actually Toad's install folder) to the white-list. Big Brother seems to clear my white-list periodically, so the only real resolution for me was to reinstall 10.5 without the 10.5.1 patch.

  • Rick

Maybe you could put in a request to the all seeing, all knowing corporate IT anti-virus overlords that Toad be white listed on a company wide basis.

As original poster of this thread I will just add that I am also “infected” by McAfee.

I am restricted from changing any settings - company policy - and I am afraid that if Toad cannot co-exist in some kind of a “standard setup” with McAfee, then Toad will not win that battle…:-((

(10 Toads against +30.000 McAfees!)

I can - however, access my “McAfee log file”, below is an extract from when I had the problem that maybe can help to find a solution.

BR Martin Z.

Morning all,

As original poster of this thread I will just add that I am
also "infected" by McAfee.
My disease is Symantec!

I am restricted from changing any settings - company policy
Likewise. I can't even reschedule the timing of the full scan that slows
my PC to an absolute crawl!

  • and I am afraid that if Toad cannot co-exist in some kind
    of a "standard setup" with McAfee, then Toad will not win
    that battle....:-((
    There may be a way!

(10 Toads against +30.000 McAfees!)
About the same here, except Symantec instead of McAfee.

However, we do have the ability to request of our Symantec Man, to white
list - on our behalf - the various Toad exe files, QSR and the SQL
Tracker utility. Of course, you have the then try and convince said
Symantec Man about what happens if a copy of an infected Toad get sin -
but that's going to be a problem with ANY white listed application I
expect.

I can - however, access my "McAfee log file", below is an
extract from when I had the problem that maybe can help to
find a solution.
That looks like McAfee was in a loop, timing out and trying again - no
wonder you had severe startup problems.

I suspect that we should all switch to Linux.

Cheers,
Norm. [TeamT]

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else. We have checked this email and its attachments for viruses. But you should still check any attachment before opening it. We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes. If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else.

We have checked this email and its attachments for viruses. But you should still check any attachment before opening it.
We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes.

If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Linux and Windows both have an inherent security vulnerabilities called
binaries.affected OS extensions are:
Windows: exes and dlls
Linux: are exes,o and so files

if one were to examine any of these files one could determine it would be easy
for not so nice individuals
to inject trojans viruses into any ONE of the files…

the ONLY answer we all have is to cimpletely disavow any framework which
produces a binary file and re-implement all of applications and the Operating
System to an OpenSource Architecture such as Java…the problem is there exists
tera-bytes of code in OS and Database Systems written with binary file format
(exe…dll…so…bin and o)

If you want to get early retirement from your corporate sponsor just say either:

I want to rewrite my OS using a framework with a OpenSource Architecture
I want to rewrite my Database using a framework with a OpenSource Architecture
and because nobody cannot accomplish either task in the length of a golf-game
you and your posessions will be escorted to the door!

The problem is not with technologists or technology …its the administrators and
managers who do not understand
the massive problems involved with downloading configuring and installing any
binary be it .so,.o,.bin or .exe,.dll to their Operating System, Database or
Application

Even with Norton…McAfee and everything running full-tilt …russia and china are
paying russian/chinese engineers many rubles/yen to crack every western file
format to tack russian/chinese trojans to binaries contained in Windows 7 or
Oracle 11i or even Toad itself

In Conclusion: We must retask and retool ALL architectures from their
implemented base of Windows or Linux binaries (starting with Applications…then
move to Databases and eventually working down to OS) to OpenSource Architecture
such as Java which will not support trojans or viruses

…jumping off soap-box…
Martin Gainty


do not alter/modify or disrupt this transmission. Thank You

Java is not immune to viruses:
http://www.sophos.com/pressoffice/news/articles/1998/08/va_java.html

Java is not immune to viruses:
http://www.sophos.com/pressoffice/news/articles/1998/08/va_java.html

Hi Martin,

you were doing sooooooh well, but then you mentioned Java! :wink:

In Conclusion: We must retask and retool ALL architectures
from their implemented base of Windows or Linux binaries
(starting with Applications..then move to Databases and
eventually working down to OS) to OpenSource Architecture
such as Java which will not support trojans or viruses

Or, pull the network lead out?

Cheers,
Norm. [TeamT]

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else. We have checked this email and its attachments for viruses. But you should still check any attachment before opening it. We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes. If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else.

We have checked this email and its attachments for viruses. But you should still check any attachment before opening it.
We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes.

If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

I for one would like to avoid java – every java update I get given crashes
some program or other that I need that uses java. Tried not updating but
something/someone changed my update settings over weekend and this week has been
a mess because of java16u20.

I run Win and Lins but not McAfee. Got okay to use another anti-V because I was
crashing PC even too much for me. Our helpdesk refused to touch my PCs and LTs
years ago.

Disclaimer: As long as java is a coffee variety I’m good. And don’t
even mention Sun now being Oracle.

Deborah M Flad, DBA
Office: 302.633.2694 Emergencies: 302.528.3652
“Please consider your environmental responsibility before printing this e-mail”
image001.gif

in the 1980’s i enrolled in a Oracle imports/exports class and asked:
what happens if i’ve imported 5000 records from a WANG PACE DB (from a 10,000
total record import )
into oracle6 and I run out of diskspace???

the answer was: PULL THE PLUG!

ignorance is bliss i guess
Martin Gainty


Please do not alter or modify or disrupt this transmission. Thank You

Bill is still the richest with 50b and climbing …Larry is only 27b …but with
acquisition of Sun… Larry’s net worth may top 30b in the next year or 2

java has only 1 or 2 dll’s so I guess I dont understand what could be causing
the problem?
please feel free to ping me offline and I’ll help out

“May the wind always be at your back and the road rise up to meet you” -an Old
Irish Saying
Martin Gainty


Please do not alter/modify or disrupt this transmission. Thak You
image001.gif

Hey Martin,

the ONLY answer we all have is to cimpletely disavow any framework which
produces a binary file and re-implement all of applications and the
Operating System to an OpenSource Architecture such as Java..the problem is
there exists tera-bytes of code in OS and Database Systems written with
binary file format (exe..dll..so..bin and o)

And Java Classes are not normally distributed as binary???

I started off my IT (ahem, "DP") career working with VMS v4. I'd be willing
to bet that it's still the most secure OS around. Even Trojan Horse attacks
can be easily foiled (although at the expense of the Security Enhanced
version).

The manual ("The Orange Wall" or "The Grey Wall") stated that the way to
secure the system was to prevent physical access to the console. That was
the only key -- as long as the standard security measures were in place
(e.g. never run anything as "SYSTEM"). Contrast this with Winders or
Unix/Linux.

Rich -- [TeamT]

Disclaimer: I'm just sayin'.

Not to get back on topic or anything, but…

The admins at my company were so kind as to white-list TOAD (don’t know how or what that REALLY means) in McAfee and now 10.5 with the patch is blazing…

Sorry if that isn’t an option for others.

Morning glynch_234,

The admins at my company were so kind as to white-list TOAD
(don't know how or what that REALLY means) in McAfee and now
10.5 with the patch is blazing...

What it means is that the anti-virus software has been told that
"whenever you see toad.exe being executed, from this particular folder,
then let it run unchecked".

I suspect, possibly (but I don't know) that the AV software may try all
known decompressors against the executable when it is first starting up

  • you want the AV to check it out before the app gets a chance to
    decompress itself and "do the damage". SO maybe, it's trying to find out
    what sort of executable the toad.exe file is, and so on?

I have no idea! It's Monday, early and already over 80 degrees in the
office. :frowning:

Cheers,
Norm. [TeamT]

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else. We have checked this email and its attachments for viruses. But you should still check any attachment before opening it. We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes. If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else.

We have checked this email and its attachments for viruses. But you should still check any attachment before opening it.
We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes.

If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Groetjes,
Wim

On Mon, May 24, 2010 at 09:02, Dunbar, Norman wrote:

I have no idea! It's Monday, early and already over 80 degrees in the
office. :-(

Yeah, it’s Whit monday and it is already 23 degrees Celsius outside…

Cheers,
Norm. [TeamT]

if the OS is windoze the binary extension is .exe and .dll
if the OS is eunuchs the binary extension is .so…possibly .lib or .bin…(some
systems will even load and execute a .exe)

as the people working in lousiana know when the temperature exceeds 80 degrees
hardware systems (and tempers) fail
the remedy is to go home stick the fan in the window and let cooler heads
prevail (and get your work completed) unless of course you’re a federal
contractor!

Martin


Verzicht und Vertraulichkeitanmerkung/Note de déni et de confidentialité

Diese Nachricht ist vertraulich. Sollten Sie nicht der vorgesehene Empfaenger
sein, so bitten wir hoeflich um eine Mitteilung. Jede unbefugte Weiterleitung
oder Fertigung einer Kopie ist unzulaessig. Diese Nachricht dient lediglich dem
Austausch von Informationen und entfaltet keine rechtliche Bindungswirkung.
Aufgrund der leichten Manipulierbarkeit von E-Mails koennen wir keine Haftung
fuer den Inhalt uebernehmen.

Ce message est confidentiel et peut être privilégié. Si vous n’êtes pas le destinataire prévu, nous te demandons avec bonté que pour satisfaire informez l’expéditeur. N’importe quelle diffusion non autorisée ou la copie de ceci est interdite. Ce message sert à l’information seulement et n’aura pas n’importe quel effet légalement obligatoire. Étant donné que les email peuvent facilement être sujets à la manipulation, nous ne pouvons accepter aucune responsabilité pour le contenu fourni.

Martin,

as the people working in lousiana know when the temperature
exceeds 80 degrees hardware systems (and tempers) fail
the remedy is to go home stick the fan in the window and let
cooler heads prevail (and get your work completed) unless of
course you're a federal contractor!

Fans, Air Con etc are not allowed - this is bad for the environment
apparently. We are permited to open windos on both siodes of the office
to "cross ventilate". This is fine provided that there is a breeze.

There isn't! :frowning:

Cheers,
Norm. [TeamVeryHotT]

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else. We have checked this email and its attachments for viruses. But you should still check any attachment before opening it. We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes. If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Information in this message may be confidential and may be legally privileged. If you have received this message by mistake, please notify the sender immediately, delete it and do not copy it to anyone else.

We have checked this email and its attachments for viruses. But you should still check any attachment before opening it.
We may have to make this message and any reply to it public if asked to under the Freedom of Information Act, Data Protection Act or for litigation. Email messages and attachments sent to or from any Environment Agency address may also be accessed by someone other than the sender or recipient, for business purposes.

If we have sent you information and you wish to use it please read our terms and conditions which you can get by calling us on 08708 506 506. Find out more about the Environment Agency at www.environment-agency.gov.uk

Bert,

Your latest blog posting gave me an idea…!

http://www.toadworld.com/BLOGS/tabid/67/EntryID/545/Default.aspx

I already have a Virtualbox Linux VM on my PC. I could install Toad there and not have to worry with McAfee at all! (In theory, at least, until McAfee starts bogging down my Virtualbox process.)

The only negative (that I can think of until I actually try it) is that I’ll have to re-enter all my stored passwords the first time I connect since it’d be a different (virtual) machine.

Thanks for the idea!

  • Rick

Glad it was of help. I try to write on things people might like or need J

Thanks for the feedback – it’s appreciated ….