From MemoKit combines a memory and cache optimizer with a memory and resource leaks analyzer. It uses a sophisticated algorithm for PC memory optimization and recovery, which provides PCs with fast responses, even in memory overload conditions. The Memory and Resources Leaks Graphic Analyzer helps you to find programs that cause leaks. MemoKit Plus - Software Benefits Inc is a program developed by Software Benefits Inc. Upon installation and setup, it defines an auto-start registry entry which makes this program run on each Windows boot for all user logins. The programs's main executable is MemoKitP2.exe and has been seen to consume an average CPU of less than one percent, and utilizes about 6.89 MB of memory. This entry has information about the startup entry named MemoKit that points to the MK.EXE file. It is up to you if this program should automatically start. It also adds an icon to the Windows notifications area in order to provide access to the program. Typically most users end up uninstalling this just after a few days. The software installer includes 10 files and is usually about 3.5 MB (3,674,979 bytes). In comparison to the total number of users, most PCs are running the OS Windows 7 (SP1) as well as Windows Vista (SP2). While about 50% of users of MemoKit Plus - Software Benefits Inc come from the United States, it is also popular in Belgium and New Zealand. • Automatically starts with Windows •. Program details. Estimated size: 3.5 MB Files installed by MemoKit Plus - Software Benefits Inc Program executable: MemoKitP2.exe Name: MemoKit Plus MemoKit Plus (Memory Optimizer & Program Accelerator) Signed by: DailyGuide Inc Path: C: Program Files memokit plus MemoKitP2.exe MD5: 3c4f6b64f9d0036f8478da Taskbar: Displays an icon in the notification area (From the publisher) “MemoKit is the fastest memory manager which enables your computer to work more efficiently. No matter how much memory you have on your computer, MemoKit will definitely help your computer work faster. Moreover, MemoKit.”. Or, you can uninstall MemoKit Plus - Software Benefits Inc from your computer by using the Add/Remove Program feature in the Window's Control Panel. • On the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then, under Programs, do one of the following: • Windows Vista/7/8: Click Uninstall a Program. • Windows XP: Click Add or Remove Programs. • When you find the program MemoKit Plus - Software Benefits Inc, click it, and then do one of the following: • Windows Vista/7/8: Click Uninstall. • Windows XP: Click the Remove or Change/Remove tab (to the right of the program). • Follow the prompts. A progress bar shows you how long it will take to remove MemoKit Plus - Software Benefits Inc. • If for some reason uninstallation fails, please install Microsoft's uninstall fixer utility which will help fix problems with programs that can't be uninstalled.
0 Comments
Related News: • • • • • Random video: You can choose the directory the image will be saved to and select from several image formats, including JPEG, BMP, GIF, TIFF, and PNG. Sony vegas products multi keygen the fields are filled, you can click a button to share the data. Also for Windows 8, theres a new memory heap manager to minimize the vulnerability to memory exploits. Even with this miss, this freebie is a welcome resource for regular search hounds. It sends so many roadblocks your way during installation that youll think twice about using the program before youve even fully launched it. From Philosoft The miniTrezor program is a Windows-based application that creates a protected, safe store (a so-called vault or trezor) for the users data the data are encrypted, password protected, and physically may be stored in several copies (located on several discs, or even several computers). This free add-on is recommended for all Firefox users. Muso - 2VnKXkrjL If youve got a big music library, you may not want it all on your computer. Other features are restricted to users of AVGs paid upgrades. We were able to add a site, a user name, and the related password. You can drag and drop executables and individual documents or select Add to manually type name, file path and other information for each entry. It automatically adds your IE favorites on installation and theres an option to import your bookmarks from Netscape, but Firefox isnt supported. This toolbar lets you browse without trace because it will not let you browse at all. Math Scratch works in step-by-step mode for addition, subtraction, multiplication, and division problems. They had the fiendishly clever idea of splicing hot keys with mouse gestures to create a free menu-based app launcher and productivity toolkit for Windows. If threats like rootkits sony vegas products multi keygen be removed easily, the computer is rebooted into rescue mode. A separate function is aimed specifically at MP3 files, allowing users to create new filenames from ID3 tag information such as artist or track name, or to add track numbers. Use this PrepKit to be certified on A 2006 certifications. A very sony vegas products multi keygen search box gives users a quick step toward finding malicious code and problem redirects. This tab has two Destination File fields, though one of them is inactive until you select the check box to create two threaded files. It also contains an improvement for multi-user logging in Windows XP. Slower - 2XnavR4Ms You can take this simple file protector and deletion tool with you, but not all functions work on USB drives. In our tests, the app turned out 1,000 alphanumerica keys in less than 30 seconds. The clever but oddly named Bookmarks feature extracts document pages, image details, or video stills for annotation. As all ABC Amber products, its really easy as ABC and powerful as Amber. However, it lacks the ability to select multiple files and perform batch-file conversion. (HID, Hub, Mass Storage, Bluetooth, Still Image Capture, Video, Audio, Printer, Smart Card, Vendor Specific, WUSB) Supports background capturing for performance capture sessions. Click to see larger images View larger image All User Reviews WFetch - 2Y4hsTt3t This free toolbar will definitely give you your YouTube fix, but a few stability issues might prevent you from enjoying all that it has to offer. Delete your Internet ExplorerFirefoxOperaChromeSafari private data with just a few clicks. Whats new in this version Version 3. Percentages-NicePhrases free download Zippyshare Download Free Nulled. Blog Fortran Program For. Percentages- Nice. US5 With Classroom Quizshow you use your own questions in an exciting gameshow format. Nice Sleep Insomnia The Movie with Desert Sleep Disorders Center Las Vegas Nv and Bethesda Sleep Disorders Insomnia Plan Of Care Sleep Disorders Symptom Checker Sleep. Removed Priority option in the tray menu. PC-Time Manager gives you the ability to share the same computer among your children by creating for each child a computer schedule. You merely point to a folder containing your ZIP or RAR files and choose an output directory. (Of course, a software-based timer wont ever fall in the gravy, so maybe it does have all the advantages. Users dont find sony vegas products multi keygen programs main menu right away. The program is hidden on your system and includes standard password-protection features to protect configurations from unauthorized alterations. Click to see larger images View larger image All User Reviews Mono - 2YAHydiGl Editors note The Download Now link will prompt a local download of the Firefox extension. Quick Key is ideal for mathematics, foreign languages, and font development. Yet you tweak the settings from the icon thats active in your task tray. While you can have the program play a sound when a cookie is sony vegas products multi keygen or removed, you can t disable its notification pop-up, which can become very intrusive and annoying when surfing cookie-intensive sites. They didnt come with any kind of file extension, and we werent able to select a download format or convert the files once we had them. Simple enough. The questionsanswers set can be edited at any time for improvement. Today Mixxx includes many features common to digital DJ solutions, but also some very unique features. Still, its a great facsimile for replicating the fun of Lego bricks digitally, and since its free, its the cheapest Lego experience youll ever have. In War mode, you take your sleigh on a sunrise air raid of your opponents island. Choose and Reorder the List 8. From Password Protect Group Password Protect Folders is security software that lets you keep your documents away from prying eyes. To activate and deactivate the programs effect on your keyboard, you can conveniently define hot keys with the programs Settings option. Though most of this information can be found through standard Windows methods, its nice to have it easily accessible in one place. Percentages-NicePhrases - 2YFp54US5 With Classroom Quizshow you use your own questions in an exciting gameshow format. From Accidental Software Get the feel of a real poker game while playing Five-Card Stud, Seven-Card Stud, High Chicago, Hold Em, Five-Card Draw (jacks or better), sony vegas products multi keygen Five Card Draw (no openers required) against four animated computer players with a dedicated dealer. Phone support is also available, although Symantec takes part in the trend of making phone support harder to access by funneling users to sony vegas products multi keygen resources. This program will allow you to on an installed operating system, sony vegas products multi keygen it to the clipboard, copy sony vegas products multi keygen to notepad or Microsoft Word and print it for safe keeping. Another important feature is a wizard like interface that enables the users to quickly set up downloading rules. AutoUP identifies if the latest update is a beta update or a full update in that case if an update is a beta it will be colored by Yellow and if an update is a full update it will be colored by Red if the software is up to date it will be colored by Green AutoUp can also check for Windows Updates, edit your Windows Startup list and displaying alot of sony vegas products multi keygen information about your system. Overall, Relaxing Ocean Screensaver is far from the worst trip youll ever take, but its probably not the beach vacation of your dreams. Changed licensing to free for private and pay for commercial. CopyTrans - 2VpBV4iBE The Windows registry is often considered forbidden territory for newbies. Sid Meiers SimGolf puts you in charge of the creation and operation of sony vegas products multi keygen own golf course and getaway. Youll also find an option for packaging fragments as a sony vegas products multi keygen. From CenturionSoft CenturionSofts CenturionMail 3. Total Video Player - Play video and audio sony vegas products multi keygen in various popular formats - Download Video Previews From iTinySoft Total Video Player is a media player supporting 3gp, Mp4, H264, Flv and all other popular video and audio formats (Mp3, Wma, Ogg, Mpeg-1,Mpeg-2) as well as DVDs, CD Audio and Swf Flash Files. Safe Sony vegas products multi keygen Standard Edition - 2Y4LmW4Wq Web Accessibility Toolbar is a sony vegas products multi keygen for accessibility testers and Web developers, that helps to examine the structure, components and accessibility features of any given Web page. Music Search, Movies Search, Books Search, Software Search. Korinna Kriemhild ford, 2016-11-18 23:13:19. To get authentic Ford Car Parts for your prized Ford motor vehicle, you may need to specify to the supplier what year your Ford motor vehicle was introduced. Jyotsna Nitika ford, 2016-11-19 02:54:45. With the financial difficulties facing the auto industry, Ford Motor Company included, there has been some concern that Ford has once again decided to shelve its latest engine design. However, Ford has shown every confidence that this latest technology is just what is needed to turn things around. The latest reports reveal that production of the engine is on schedule and will be offered in the 2010 F-150 SVT Raptor. The word now is that modular V8 in production now will be offered in the first few months of production for the 2010 Raptor and then midyear the switch will be made to the new Boss engine. The Ford F-150 Raptor should be available with the 6.2 Liter Boss engine no later than the winter of 2009.How To Install An Android Car DVD Player On 2004 - 2008 Ford F150 2017 Ford Focus Titanium Review. Ivona Gita ford, 2016-11-19 08:47:13. The availability of ford parts is never a problem. Parts for 4x4s, SUVs, trucks, vans and cars are available anywhere. A person can drive in a 10 mile radius and there is always a chance that he'll come across a car parts store that carries ford components. People who do their shopping at home can browse the web and find hundreds of online stores that carry the same parts. Locating a ford part is as easy as that. The widespread availability is due in large to two things: the increasing demand because of the growth of the number of Ford vehicles on the streets, and the quality of the parts that are far more dependable than typical alternatives. 2017 Ford C Max Hybrid. Whetu Haanraads ford, 2016-11-19 02:22:04. You might also be able to order Ford Car Parts by the model name itself. The secure socket tunneling protocol (SSTP) allows Web users authenticated by the Forefront UAG portal to access the published remote network. You can use Forefront TMG on UAG to configure who has access to what over SSTP VPN. In this example, we’ll block a specific user/group from accessing the entire Internal network on all protocols. You can also select specific protocols to block. Note: You have to have a working AD with the previously defined users/groups to who you want to deny SSTP services connection. Procedure: 1. Open the Forefront TMG Management console: 2. Right-click the Firewall Policy mode, select New, select Access Rule. Give the rule a name, such as SSTP Block, and click Next. On the Rule Action page, select Deny, and click Next. When rule conditions are met, access will be denied. On the Protocols page, select All Outbound traffic, and click Next. Note: This is the point in the procedure where you can choose a more granular approach – specify protocols you want to block. On the Access Rule Sources page, click Add, and from Networks, select VPN Clients. On the Access Rule Destinations page, click Add, and select Internal from the list of Networks, and click Next. On the User Sets page shown below we’ll actually configure what we’ve set out to do – block specific users. Select All Users and click Remove. Click Add, and on the Add Users dialog box shown below, select New. Jun 18, 2015 We have recently released Rollup 2 for Forefront UAG 2010 Service Pack 4 UAG 2010 Service Pack 4 Rollup 2 is available as a hotfix download from Microsoft. 10 reasons to use DirectAccess and Unified Access Gateway (UAG). There are many advantages to using Forefront Unified Access Gateway 2010 as your DirectAccess. Dec 16, 2013 Today, Microsoft is announcing important changes to the roadmaps of Forefront Identity Manager (FIM) and Forefront Unified Access Gateway (UAG): We plan to. This kicks off the New User Set wizard. Name the new user set SSTP Deny. On the Users page, click Add, and select Windows users and groups. Browse to the right user/group, confirm it with the picker dialog, and close all of the dialogs. Click Next and complete the New User Set wizard. Back in the New Access Rule wizard User Sets page, you can select the new user set, click Next and Finish to finalize the rule. You’ll also have to click Apply in the Forefront TMG console. Remember, Forefront TMG rules are ordered, so if this rule is not near the top and another rule has these conditions and allows access, the request won’t even get to this rule denying access. So make sure this rule is at or near the top. UAG Publishing from: Publishing Exchange Server 2010 with Forefront Unified Access Gateway 2010 and Forefront Threat Management Gateway 2010 http://www.microsoft.com. Dec 17, 2013. The news (December 17) that Microsoft had decided to discontinue Forefront Unified Access Gateway (UAG) came as no shock. The writing was on the wall that UAG would follow TMG into product oblivion as soon as TMG was canned in September 2012 to allow Microsoft to focus on cloud-based security. You can read more about Forefront TMG access rules on. Daniel Slabodar, Automation and performance test engineer Nathan Bigman, Content Publishing Manager, Anywhere Access Team. We recently covered, a new remote access technology that enables users to connect to the corporate network without using a traditional network-level VPN connection or a reverse Web proxy and reverse NAT solution. DirectAccess automatically establishes a connection to the corpnet before users log in. After logging in, they can connect to corporate information resources in the same way as computers directly connected to the corpnet over a wired or wireless connection. The experience for remote DirectAccess users is the same as for users directly connected to the corpnet. Access to file servers, database servers, mail servers, collaboration servers, and any other type of server you can imagine is the same for DirectAccess remote users at it is for users on the corpnet. Microsoft Forefront Unified Access Gateway 2010 (UAG) is the next version of the Intelligent Access Gateway 2007 (IAG). UAG is designed to be a single point of inbound access to your corporate network. UAG does this by consolidating a number of remote access technologies onto a single box. With DirectAccess, remote users use domain member computers to connect to the corpnet over the Internet using secure IPsec tunnels. Domain member users are able to connect to the corpnet to access resources they need. Even more important, IT can manage users in the same way that they manage users on the corpnet. Group Policy Objects can be applied to users, desired configuration and other management settings can be applied using System Center Configuration Manager, and just about any management system you use for end-user command and control can be applied to DirectAccess users located anywhere on the Internet. 2: Manage remote computers with the same tools and technologies you use to manage corpnet computers Similar to end-user management, you can use the same tools and technologies you use to manage computers on the corpnet and apply those to computers located anywhere over the Internet that connect to the network using DirectAccess. DirectAccess client computers connect to the corpnet even before the user logs in so that these computers are more available for systems management. Unlike the situation where users have to use a VPN connection to connect to the corpnet to establish a link to your management systems, the DirectAccess client is always connected, significantly increasing the chances that the DirectAccess client computer will be updated and managed based on corporate policy and reducing the chances that the computer will fall out of compliance. 3: Increase end-user productivity The problem with other corpnet connectivity methods is that end users always have to 'do something' to connect to internal resources they need. They might have to establish a VPN connection or maybe they need to connect to an SSL VPN portal. Maybe they have to remember a URL to connect to a SharePoint or OWA server or maybe they need to configure their applications to work differently when connecting remotely compared to when they're on the corpnet. DirectAccess takes the onus of 'network location awareness' away from end users. With DirectAccess, they turn on their computer, and the connectivity to what they need just works. No VPN connection required, no special inside versus outside URLs, no application reconfiguration. Users seamlessly connect to resources they need regardless of their location. DirectAccess takes away location as a factor for information access — information is always available to your authorized users. 4: Separate intranet and Internet traffic to improve performance Traditional VPN solutions often require that all traffic go over the VPN connection between the VPN client and server. This can have a profound negative effect on over corporate Internet bandwidth, since the VPN users must compete with the corpnet users to Internet bandwidth. DirectAccess solves this problem by enabling users to use the DirectAccess connection when connecting to corpnet resources, and use their established Internet connection when connecting to the Internet. This significantly improves performance for both remote DirectAccess users and users located on the corpnet. 5: Provide an always on and secure connection to the corpnet over the Internet DirectAccess client connections are always on, which means you need to be sure that the connection between the DirectAccess client and server is secure. Security of this connection is assured using IPv6 and IPsec. The DirectAccess client establishes a IPsec connection to the DirectAccess server, which can be the UAG DirectAccess server. During the IPsec connection establishment, the DirectAccess server authenticates to the DirectAccess client and the DirectAccess client authenticates with the DirectAccess server. IPsec encryption is used to insure that private communications are not intercepted over the Internet. 6: Simplify your DirectAccess deployment with UAG DirectAccess is a technology included with Windows Server 2008 R2 and Windows 7. However, the Windows-based DirectAccess solution can be complex to install and configure. When you use UAG as your DirectAccess solution, you get unified management and control over the DirectAccess solution with UAG DirectAccess arrays. In addition, you can benefit from hardware consolidation by bringing multiple solutions into a single UAG DirectAccess server or array by incorporate multiple remote access technologies, IPv6 to IPv4 translation technologies, network load balancing and array functionality into a single server or array. 7: Expand DirectAccess Client Access to IPv4 only resources The Windows DirectAccess solution enables DirectAccess clients on the Internet to access information resources on the corporate network without needing to 'do anything' to make it work. However, those resources need to be IPv6 aware. If the information is contained on a IPv4 only server, the Windows DirectAccess solution will not provide DirectAccess clients access to the information. The UAG DirectAccess solution solves this problem by using DNS64/NAT64, which enables DirectAccess clients to connect to IPv4-only resources on your corporate network. In fact, with the UAG DirectAccess solution, there is no need for any IPv6 resources on the corporate network - making it possible for you to take complete advantage of all that DirectAccess offers today without needing to embroil yourself in the complexities of IPv6. 8: Ease Management Duties with the UAG DirectAccess Console With the Windows-only DirectAccess solution, configuration of more than a single DirectAccess server means creating the configuration on each server separately. Also, monitoring and continued management has to be performed on each server, since there is no shared configured available in the Windows only DirectAccess solution. In contrast, with UAG DirectAccess, you can configure DirectAccess server configuration once, and have it automatically deployed to up to 8 servers in a DirectAccess server array. The array also provides a single console where monitoring and reporting are done, provide a single view of the DirectAccess solution from within UAG. 9: Improve High Availability with UAG DirectAccess and Network Load Balancing The Windows only DirectAccess solution has very limited support for high availability. In contrast, the UAG DirectAccess solution has high availability built-in. UAG DirectAccess integrates with Windows Network Load Balancing to help insure that the array of UAG DirectAccess servers is always available to your users and that the load is distributed evenly among the servers, so that performance is optimized and users have a good end-user experience even if one or more UAG DirectAccess servers go offline. 10: Enhance Remote Access Security with Integrated Support for Smartcards and Network Access Protection (NAP) DirectAccess clients need to meet the same security requirements as computers you directly connect to your corpnet over a wired or wireless connection. That means you need to make sure that only authorized users can connect over DirectAccess. One of the best methods to authenticate users is two-factor authentication. You can configure DirectAccess to require that users present a smartcard and pin before they are able to log onto the network over DirectAccess. In addition, you can use DirectAccess with or without UAG, to enforce Network Access Protection (NAP) enforcement for DirectAccess clients. NAP insures that the DirectAccess computer meets your corporate security requirements before the machine is allowed to connect to network resources. You can configure DirectAccess to provide the NAP clients access to remediation servers so that they can self-remediate, and then provide them full network access after remediation. With UAG DirectAccess, you can enable NAP support by putting a checkmark in a single checkbox - it's that easy! Related Topics. Kafka Summit SF 2017 - Query the Application, Not a Database: “Interactive Queries” in Kafka’s Streams API • 1. 1Confidential Query the App, Not the DB: “Interactive Queries” in Apache® Kafka’sTM Streams API Matthias J. Sax| Software Engineer [email protected] @MatthiasJSax • 2Confidential Outline • Kafka Streams in 30 seconds • What is state and why stateful stream processing? • Technical Deep Dive on Interactive Queries • What does IQ provide? • State handling with Kafka Streams • How to use IQ? Full Specifications What's new in version 1.6.1 This version is the first release on CNET Download.com. General Publisher Publisher web site Release Date June 20, 2008 Date Added June 20, 2008 Version 1.6.1 Category Category Subcategory Operating Systems Operating Systems Windows 95/98/NT/2000/XP/Vista Additional Requirements Windows 95/98/NT/2000/XP/2003 Server/Vista Download Information File Size 5.14MB File Name IQBuilderDemoV161.zip Popularity Total Downloads 135 Downloads Last Week 1 Pricing License Model Free to try Limitations Document size limited Price Free. The Minnesota Vital Statistics Interactive Queries, I.Q., allows the user to customize on- line queries of population data to produce data tables, charts and maps. Is an easy two to three step process for creating queries. This process allows you to modify population data by year, county, age and gender. Oct 26, 2016. This post was co-written with Damian Guy, Engineer at Confluent, Michael Noll, Product Manager at Confluent and Neha Narkhede, CTO and Co-Founder at Confluent. We are excited to announce Interactive Queries, a new feature for stream processing with Apache Kafka®. Interactive Queries allows you. About: Mondrian is a general purpose statistical data-visualization system. It features outstanding interactive visualization techniques for. Empower All Your Users. IQ Server™ is an IBM i-based (AS/400), advanced-function query, reporting, and BI solution that serves as the foundation of the NGS-IQ. Within application, performing the content- based query operation, retrieving the 12 best results embedded into QRI. 8.3.3 Interactive Query Usually mobile device users cannot afford to wait for a long time to get the query results. In some networks (e.g. GSM) user is paying for air time. Alternatively an Interactive Query (IQ). About Vi3Dim Vi3Dim have developed a new 3D capture system that could revolutionize the way in which 3D models of real-world objects are created. We have created a program able to build 3D models of textured objects in several minutes, using only a standard computer and web-cam. This allows 3D modeling to become accessible to everybody. Vi3Dim allows anyone with a web-cam to capture a real-world object as a 3D model with the textures already attached. You don't need any special skills, just a simple web-cam and the Vi3Dim software. The user just needs to position the object they want captured in front of a web-cam. Then the object is rotated and more information captured by the Vi3Dim software. Eventually you end up with a detailed, fully-textured 3D model of the desired object. Vi3dim use advanced 3d reconstruction algorithms which utilized Your Graphics Card mathematics power. Great, your contains between 70 and 160 characters (spaces included). A good meta description acts as an organic advertisement, so use enticing messaging with a clear call to action to maximize click-through rate. They allow you to influence how your web pages are described and displayed in search results. Ensure that all of your web pages have a unique meta description that is explicit and contains your (these appear in bold when they match part or all of the user’s search query). Check your Google Search Console account (Click 'Search Appearance', then 'HTML Improvements') to identify any issues with your meta descriptions, for example, they are too short/long, or duplicated across more than one page. Allows you to add a description to an image. Since search engine crawlers cannot see images,. Alternative text also helps makes an image more likely to appear in a Google image search and is used by screen readers to provide context for visually impaired users. It looks like most or all of your images have alternative text. Check the images on your website to make sure accurate and relevant alternative text is specified for each image on the page. Try to minimize the number of alt text characters to 150 or less (including spaces!) to optimize page load times. Contain the list of your URLs that are available to index and allow the search engines to read your pages more intelligently. They can also include information like your site’s latest updates, frequency of changes and the importance of URLs. Be sure to only include the pages you want search engines to crawl, so leave out any that have been blocked in a robots.txt file. Description: Vi3Dim is a small company located in Israel (I suspect) that has a piece of software that allows you to connect a cheap (. Avoid using any URLs that cause redirects or error codes and be sure to be consistent in using your preferred URLs (with or without www.), correct protocols (http vs. Https) and trailing slashes. You should also to point search engine crawlers to the location of your sitemap. URL parameters are used to track user behaviors on site (session IDs), traffic sources (referrer IDs) or to give users control over the content on the page (sorting and filtering). The issue with URL parameters is that Google sees each unique parameter value as a new URL hosting the same thing - meaning you could have a duplicate content problem. Sometimes, it’s able to and group them together. It then algorithmically decides which URL is the best representation of the group and uses it to consolidate ranking signals and display in search results. You can help Google recognize the best URL by using the rel='canonical' tag. Use the in Google Search Console to tell Google how your URL parameters affect page content and how to to crawl URLs with parameters. Use this tool very carefully - you can easily prevent Google from crawling pages you want indexed through overly restrictive crawling settings, especially if you have URLs with. In a crowded digital marketing world, content is king. Publishing your content on other sites is beneficial, but publishing it on your own site is much more effective. One of the best ways to do this is through a blog. We recommend you start a blog on vi3dim.com to engage with your audience and improve your online visibility to attract qualified traffic from a variety of new sources. Use to out of your blog. If you don't think a blog would work for your site or business, consider publishing other forms of evergreen content such as guides or whitepapers. And avoid long domain names when possible. A descriptive URL is better recognized by search engines. A user should be able to look at the address bar and make an accurate guess about the content of the page before reaching it (e.g., Keep in mind that URLs are also an important part of a comprehensive. Use clean URLs to. Resource: Search for a. If no good names are available, consider a. To prevent brand theft, you might consider trademarking your domain name. Modern websites tend to be SSL secured (HTTPS) as it provides an extra security layer while logging in to your Web Service. In 2014, that an HTTPS (vs HTTP) website would receive an extra boost in their ranking. While switching to HTTPS, make sure your site remains optimized and see to it that your website will still run quickly. ClearSlide enables Marketing and Sales teams to send and track emails with robust customer engagement analytics from your email platform of choice. From 1:1 communications, micro-campaigns, and larger email blasts, ClearSlide email is fully integrated with a single content library so reps are armed with the best content at the right sales stage. Trackable emails provide instant notifications when customers engage with sales content, as well as slide-by-slide, second-by-second analytics showing how viewers engaged with the content – including when content is forwarded. • • • • • When it comes to your business or your job, being able to monitor as many factors as possible is typically a good thing. Email tracking is a great example of a tool that can give you great insight into an important part of your business. While social media marketing is growing in importance and popularity as a medium to distribute information to users, of both information distribution and personal contact on a variety of business levels (and for a variety of business models). A repository of plugins and extensions for the Vuze Bittorrent Client and Azureus. Email scheduling lets you tee up your sales emails to go out at exactly. Email Tracking. Email Scheduling. Schedule emails to go out at a specified date. There are a ton of tools accessible online, some free and some paid for, and these are the most reliable and best email tracking tools available, so you don’t have to leave this important part of your business to guesswork. We all use, it allows you to track how many visitors are coming to your site, for example, enabling you to know which channels are sending the most traffic to you and what content is performing best. Email tracking tools add to those important insights a whole new wide range of features, including letting you know when your sent emails were opened and if any links were clicked. Whether you’re an SMB tracking newsletter opens, or a freelancer tracking invoices (cough, cough), email tracking tools can benefit your business. Why Should I Track My Email Opens? All businesses can benefit from tracking email opens, especially businesses who use email marketing campaigns. By tracking information like which emails are being opened and which are converting, you can see how effective your marketing materials actually are. You can use this information to identify what types of offers and campaigns work best for your By tracking information like which emails are being opened and which are converting, you can see how effective your marketing materials actually are. You can use this information to identify what types of offers and campaigns work best for your business, and focus on creating more like it in the future. Email tracking software is also a valuable lead nurturing tool. Imagine being able to know exactly when a customer opens your email and then being able to time a follow-up call or email based on that information. Planners and Trackers. His and her weight loss tracker Excel. Bid tracker Excel. Employee shift schedule Excel. Project task list Word. Mar 23, 2015. Want to know if somebody opened your email? Or want to schedule your email at later time? Check out review of Sidekick by Hubspot. Don’t lose track of important. But the ease of editing the scheduled email once it was set made the switch to Right. Allows me to schedule emails. You can contact users at the exact right time to increase the likelihood that they’ll convert; some software even automates this for you. It also doesn’t hurt to see when your clients have received contracts, digital files, or invoices; small businesses may need to use the tracking feature if customers start to pull the “oh, I never got the invoice so I can’t pay you.” How Does Email Tracking Work? Whether you’re using paid email tracking software or free email tracking software, it almost all works in a similar way. Many will place small invisible images that contain pixels in the actual email, and when it loads, the information is sent back to the database—and to you. There are limitations to email tracking software. Your software won’t be able to track emails if: • The reader uses ad blockers • The image isn’t loaded; many users don’t have images set to load on default, and they may not click to see further content that would contain the images • The reader uses a security system that prevents the image from being loaded Unfortunately, there’s not much we can do if something blocks the ability of our email tracking software. Overall, though, it will be a helpful tool for the vast majority of the audience you’re trying to reach. 1. Yesware is and probably will always be a personal favorite when it comes to email tracking tools. It’s a great tool for SMBs, letting you do everything from track emails from clients to optimize for sales. Their software is outstandingly user-friendly. Just download the extension, and allow it to connect to your email account. When creating a message, you can choose to track—or not track—each email. You can even choose to have it automatically loaded into the CRM software that you use. Yesware doesn’t just tell you that your email has been opened; it tells you who opened it, what links they’ve clicked, and which attachments they’ve downloaded. This is extremely useful; you can see which leads are warm, and which have actually gotten the invoice they said they never got (even though you can see that they opened it three times). The software works pretty close to real-time, and you can access all the information through the dashboard on your email account. As an added bonus, Yesware has other great features worth mentioning, including their email templates to speed up your outbound efforts, automatic follow up for sales automation, and scheduling tools so your emails can be distributed at any time. Yesware is available for Gmail on Chrome and Firefox browsers (not Safari) and for Microsoft Outlook. They offer a 28-day free trial and have a variety of pricing plans once that trial is over. Their starter plan costs $12 per month. Contact Monkey is a great tool to use when you’re looking to track and monitor sales leads. It can integrate with CRMs like Salesforce for optimal sales potential. Contact Monkey works in real-time, so you’ll never miss an opportunity to nurture a lead who is interested in your business. They’ll not only show you who opened the email, but also where from, when, and on what type of device. You can even get desktop notifications when your email is opened. The dashboard lets you prioritize users by the number of times they’ve opened your email; this can be used to gauge interest and find the warmest leads. They’ll also provide you with analytics, helping you to see the big picture of what’s working and what isn’t. Like Yesware, you can use Contact Monkey right from your inbox, making the ease of use overwhelmingly convenient. This tool has a 14-day free trial and is available for Gmail on Chrome, and on Outlook. Pricing starts at $10 per user per month when billed annually. 3. ToutApp is another great email tracking tool that’s structured itself around driving sales and nurturing leads. It will track engagement on all of your emails, giving you information in real-time like the other tools on this list, and let you know as soon as the email has been opened and what’s been downloaded, clicked, or viewed. They’ll also show you which emails haven’t been delivered, and why; if you’re wondering if the email bounced or was marked at spam, now you can know. If you’re looking for an all-in-one sales analyzer, this is a great tool to use. ToutApp will actually analyze all of your emails, client calls, calendar events, and CRM data to look for correlations and generate incredible reports and insights. If you’re looking to track your emails and see how it fits into the grand scheme, ToutApp is a good way to go. Like the other tools on this list, ToutApp also integrates with a number of different CRMs, including Salesforce. ToutApp is available on Gmail on Chrome, and on Microsoft Outlook. It’s also the most expensive tool on this list; after the 14-day free trial is over, their most affordable plan starts at $49 a month per user. Mailtrack Looking for something really simple with no-fuss, and you just want to know when your email is opened? Is a great tool for you. Some small businesses don’t need—or want—that extensive features other tools offer, especially at the price tag they come at, and Mailtrack does exactly what any email tracking tool promises to do. Mailtrack’s basic, free version of the tool allows for unlimited tracking if you just want to watch for opened emails. It does attach a “Mailtrack” signature to your emails, which you have to upgrade to get rid of. You’ll see a checkmark next to emails that have been read, and if you hover over them, you’ll see the time they were opened. For what it’s worth, even though it’s not technically “real-time tracking” (that comes with the upgrade), I got an email letting me know that my tracked email was opened pretty quickly. If you do upgrade, you’ll also get real-time notifications, link tracking, reminders, and a dashboard to monitor the emails instead of checkmarks by the emails themselves. This plan is only $4.92 a month; if you upgrade to their $6 a month plan, you can track email opens from multiple recipients in one thread. Newton Mail is a great email tracking tool if you want to have a ton of excellent email features, including getting read receipts and seeing a profile of the email’s sender (which is created by pulling information from multiple sources). This software will mark emails as read by a blue tick mark next to the email you sent—even on smartphones. Other great features include the ability to send emails later, un-send an email (within a very short time frame after it was sent, but we’ve all had those moments of “Oh God no I spelled their name wrong” immediately after sending), and integration with multiple third party tools like Evernote and Pocket. Newton Mail attaches a “via Newton Mail” signature automatically to the emails, so users will know that the email is being tracked if they look it up. Sometimes, that can make the reader uncomfortable, so keep that in mind. It also isn’t available yet for Windows; it is available for Apple, iOS, and Android at the moment. Newton has a 14-day free trial; after that, it’s $50 per year, which is one of the more affordable tools on this list. Bananatag can be used for both sales teams and communication within your own internal team. You can use the tracking software through Bananatag’s own dashboard or through an extension in your email. In addition to tracking email opens and attachment tracking, it will also give you analytics on the activity on your tracked emails. Bananatag is available for Outlook, Gmail, Mac Mail, and any iOS or Android device. Plugins are available for Gmail and Outlook. It’s a free email tracking software if you need to track only 5 emails a day or less, but paid plans (which offer more) start at just $10 a month when paid annually. Streak for Gmail Streak has branded itself as giving you “CRM in your inbox,” and they deliver. In particular is exceptional; it lets gives you all the email tracking information you could need right in your Gmail inbox. In addition to email tracking, this tool lets you schedule emails to send later, and gives you a visual history of the viewed message, including the total number of views and the number of unique message views. It also lets you filter your emails; there’s even an “awating replies” filter to make your job ridiculously easy. This tool works for all Google apps. If you’re looking for email tracking software for Gmail, this is a great tool to consider, especially since Streak’s free plan lets users track up to 200 emails a month and gives you access to their basic CRM tools. It’s easily the best free email tracking software plan on this list. GetNotify is a free email tracking software, but they request “donations” that are required to unlock additional features for a certain period of time. In other words, it basically has a “basic” version of the tool that’s free. This tool is pretty simple, but has plenty of great features, including email tracking and delivery confirmation. They’ll also tell you: • The amount of time the email was read • The date and time it was opened (and reopened) • The general geographic location it was opened in My favorite feature of GetNotify, which lands them on this list, is the ability for users to use their own image file as a tracking image. This is fantastic- you could choose an image like your email signature, or an image central to the email itself, to increase the odds users will click to load it. Here’s the catch (aside from the whole donations thing): you need to manually add “.getnotify.com” at the end of every email address of the emails you want to track. So instead of “[email protected],” you’d enter in “[email protected].” GetNotify will work with all modern email companies, including Gmail, Outlook, Yahoo, Eudora, and even AOL. Cirrus Insight is an incredible paid email tracking software that will be particularly helpful for small and medium businesses with full calendars. This software not only lets you track emails, but sync your emails with your calendar and Salesforce, allowing you to book meetings and schedule follow-ups. This email tracking tool will send you open alerts almost immediately, enables reply tracking, and makes it incredible easy to schedule follow-ups thanks to the complete Salesforce integration. You can completely track all engagement on your emails, and see how the links attached within them are opened. Cirrus Insight is available for Gmail, Outlook, Office 365, and mobile devices. There’s a 14 day free trial before the basic monthly plan starts at $28 a month (or $19 a month when paid annually). DidTheyReadIt is a free email tool for up to ten emails a month. If you want to track more than ten emails a month, pricing starts at $24.99 for three months. It also allows you to purchase additional features, like a PDF tracker (which tracks PDF downloads). Like GetNotify, users have to add “.didtheyreadit.com” to the end of the recipient’s email address. Like GetNotify, this will not be displayed to the recipient at any point. This tool does, however, give you the ability to track only the first email the recipient opens in the thread, or all the emails they open in the thread. You can also see how long the email was read and when it was opened. DidTheyReadIt’s email tracking software has browser plugins available for Chrome, Firefox, and Internet Explorer. They have desktop browsers available for Outlook and Thunderbird, and it works on both Windows and Apple devices. Do These Tools Really Need to be “Nosy”? A lot of these tools (I think every single one on this list) requires access that includes the ability to “Send, Read, and Delete emails.” That sounds pretty darn terrifying, but in reality, that’s a necessary ability to give these tools; they are literally sending your emails, and the ability to track means they need to be able to read them. Because of this access, though, you should choose your tools carefully. I’ve used and I trust each tool on this list, and most major brand name tools with tons of reviews and users will be fine; I wouldn’t trust brand new tools that don’t have a ton of users yet. When in doubt, contact customer service of the tool you’re interested in and ask about their privacy policies. Final Thoughts While a lot of people aren’t big fans of email tracking personally (I get it—I turned the “read” receipts off on my iMessaging, and like all technology, I’m sure this can be abused somehow), I think it does have a place professionally so long as it’s not abused. As a freelance writer, I’ve started using an email tracking service with new clients to ensure that they’re receiving the work I’m providing, and I’ll know that they received invoices that some will pretend to never get. I also use it when distributing newsletters for a site I manage, to see so that I can better provide relevant content in the future. There are a ton of great reasons to use email tracking tools, no matter what job position or industry you’re in, and these 10 are among the best. Do you use any of these email tracking tools, or have you tried any? Will you now? Leave us a comment and let us know what you think? I hope you update this article with the Intelliverse Email Tracker. I just installed it (intelliverse.com) and I am loving it. I was using SalesHandy and enjoyed that very much but they chose to make their “Free Forever” email tracking add-in a Pay plan. After several emails back and fourth, they chose not to honor their promise of free forever. I wouldn’t have minded paying for it, but their lack of integrity really left a bad taste in my mouth. Regardless, I’m actually enjoying the Intelliverse addin for Outlook. I just wanted to mention it here because they seem to be doing things right (Intelliverse has a free forever thing going on now too, for the first 50,000 users). Just wanted to give this tool a shout – I’m totally digging it! I don’t represent or work for them, I just really, really love it. Thanks for the article, it helped a lot. Agree with your sentiment about everyone who interfaces with customers should use an email tracker. I used to work in sales, and my company usually paid for Email Tracking and Contact Profile tools. These email features are now an indispensable part of my daily workflow. Now that I started my own company, I wanted my whole team to have this superpower – not just sales, but all customer-facing teams. However, paying for everyone starts getting expensive. So we built one for ourselves instead and decided to let the world have it as well, for free. Just launched last week – would love your thoughts! Thanks Ana, it’s a good article but the trackers profiled don’t really fit what we are looking for – it seems that they are more applicable for business that wish to do marketing. That is not us. So, we are looking for an email tracking program that is a little different that what appears to be the present standard. Let me explain: We are a membership association. We do very little marketing to our members. We do, however, send out informational emails to our members, including a 40 page magazine in a PDF file format. In total, we MAY send emails to between 500 and 5,000 addresses over a month. We are not, however, interested in following up on opened emails for sales purposes. What we want is a program/service that will tell us if: 1) The email opened? 2) Was any link in the email opened? 3) Was an attached PDF file opened? 4) Was the email bounced? An ideal program/service would not send separate emails reporting each email receipt/opening/etc., rather, it would give us a periodic (monthly?) summary of the four items above – what addresses received and opened the email and how many clicked through to a link or opened an attached file. Obviously, this sounds sort of primitive, but what we are looking for is just a simple, basic tracking program/service – something that comes without all the bells and whistles modern programs/services provide. Do you know where we can find such a program/service? ALL help is appreciated. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 'AS IS' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. MantisBT is a web based bug tracking system that was first made available to the public in November 2000. Over time it has matured and gained a lot of popularity, and now it has become one of the most popular open source bug/issue tracking systems. MantisBT is developed in PHP, with support to multiple database backends including MySQL, MS SQL, PostgreSQL and DB2. MantisBT, as a PHP script, can run on any operating system that is supported by PHP and has support for one of the DBMSes that are supported. MantisBT is known to run fine on Windows, Linux, OS/2, Mac OS X, System i and a variety of Unix operating systems. MantisBT is available in several Linux distributions including: Debian, Ubuntu, Fedora, Gentoo, Frugalware and others. Hence, if you are running Linux, start by checking if your distribution has a package for MantisBT. If not, or if the package is not up-to-date with the latest MantisBT version, then you may want to download it directly from. For Windows, Mac OS X and other operating systems, use the link provided above to download MantisBT. The download is compressed in tar.gz or zip format. Both formats can be unpacked using tools like (in case of Windows). Note that at any point in time there are typically two 'latest' MantisBT releases that are available for download. The latest production release (stable), and the latest development release which can be an alpha or a release candidate. It is not recommended to use development releases in production specially if it is still in the alpha stage unless the administrator is familiar with PHP and is able to troubleshoot and fix any issues that may arise. When initially seeking to name this project Ken ran into a problem every programmer encounters. What is a good name? It has to be descriptive, unique, and not too verbose. Additionally having multiple meanings would be a nice touch. Quickly ruled out were php*Something* names which, incidentally, although popular, do not seem to be condoned by the PHP Group developers. Drawing inspiration from Open Source projects like Apache, Mozilla, Gnome, and so forth resulted in two eventual choices: Dragonfly and Mantis. Dragonfly was already the name of a webmail package. So the name became Mantis. Praying Mantis are insects that feed primarily on other insects and bugs. They are extremely desirable in agriculture as they devour insects that feed on crops. They are also extremely elegant looking creatures. So, we have a name that is fairly distinctive and descriptive in multiple ways. The BT suffix stands for 'Bug Tracker' and distinguishes this project from general usage of the word Mantis. However, over time the project was typically referred to as Mantis. Kenzaburo Ito and a friend originally created a bug tracker as an internal tool for their pet project. A search for good, free packages came up with nothing suitable so they wrote their own. After a rewrite and cleanup it was made available to the public via the GNU General Public License (GPL). The GPL was chosen partly because of his belief that development tools should be cheap or free. In 2002, Ken was joined by Jeroen Latour, Victor Boctor and Julian Fitzell to be the administrators and the core development team of MantisBT. This marks a new era in MantisBT lifetime where it is now a team project. There are plenty of resources to help answer support queries. Following are the main ones: • - The forums are one of the most popular destinations for getting MantisBT support. Start off by searching the forums for your questions, if not found, then go ahead and submit a question. • - Available mailing lists are 'mantisbt-announce' for announcements, 'mantisbt-dev' for development issues, mantisbt-lang for localization and 'mantisbt-help' for general help/support questions. There are public archives for such mailing lists. Note that only members of the mailing lists can post to them, hence, subscribe to the lists before you attempt to email them. • - The IRC channel is mainly used by developers to engage in in-person discussion. The recommended tool for IRC is XChat (for Linux), XChat 2 (for Windows). However, you can also use to connect to IRC via your web browser. This is also useful when your work firewall blocks the IRC port (although there are other workarounds involving tunneling to fix this issue). Many people prefer to use IRC to ask questions to the developers and other users who are in the IRC channel. The IRC channel logs are archived and made available on the web. (TODO: add irc logs link) • - The MantisBT Wiki has information related to 'How To (recipes)', FAQ, feature requirements, etc. • Search - A good way for locating an answer for your question or finding more information about a topic is to search across all MantisBT website and the Internet via. It is important to note that support questions should not be sent directly to MantisBT developers or through the MantisBT contact us pages. Use of 'Contact Us' page or emailing the developer directly is available if you are after a paid support or consulting service. There are several ways to keep up to date with MantisBT news. These include: • We send release announcements and important updates to users registered on our. To get onto our mailing list, users will have to signup there and verify their email address. This same account can also be used to report, monitor, and comment on issues relating to MantisBT. • is used to communicate announcements about new releases, topics relating to MantisBT, etc. Users are encouraged to subscribe to the RSS feed to know when new posts are posted there. • is used to notify users about up-to-date details about what is happening with MantisBT development. For example, a Twitter update is automatically posted by the official bug tracker whenever an issue is resolved. Twitter users are encouraged to follow 'mantisbt'. MantisBT has modest hardware requirements. It requires a computer that is able to run the. • Server type The server can be a shared public web server or a dedicated co-located box. • CPU and Memory As for any web application, you should size your server based on the traffic on the site. • Disk The application code is less than 20 MB The amount of disk space required for the database will vary depending on the RDBMS and the volume of data, the main driving factor being the expected number and size of attachments. All of the required software is free for commercial and non-commercial use (open source). Please refer to the for minimum and recommended versions. • Operating System MantisBT runs on Windows, MacOS, OS/2, Linux, Solaris, the BSDs, and just about anything that supports the required server software. • Web Server MantisBT is mainly tested with and. However, it is expected to work with any recent web server software. File Extensions: MantisBT uses only.php files. If your webserver is configured for other extensions (e.g..PHP3,.PHTML) then you will have to request the administrator to add support for.PHP files. This should be a trivial modification. Further details can be found in the • The web server must support PHP. It can be installed as CGI or any other integration technology. • PHP extensions MantisBT is designed to work in as many environments as possible. Hence the required extensions are minimal and many of them are optional affecting only one feature. • mandatory: the extension for the RDBMS being used ( mysql/mysqli, pgsql, oci8, sqlsrv, ibm-db2 ) • Curl - required for the Twitter integration feature • GD - required for the graphs feature • fileinfo - Guesses the MIME type of attachments Without this extension, file attachment previews and downloads may not work correctly as MantisBT won't be able to send the Content-Type header to a browser requesting an attachment. This extension is included by default from PHP version 5.3.x and above. For older versions you will need to install the fileinfo PECL extension (this requires root access to the server you're using). • mbstring - Recommended for best performance with multibyte (UTF8) strings processing. Required if the admin needs to list the SQL queries generated by MantisBT (see $g_show_queries_list in ). • Database MantisBT requires a database to store its data. The supported RDBMS are: MySQL (recommended), PostgreSQL, DB2, Microsoft SQL Server and Oracle (experimental). Note: There are known issues with all of the above platforms except MySQL, and to a lesser extend PostgreSQL; moreover, you should be aware that support for DB2, SQL server and Oracle is limited. These tasks cover the download and deployment of MantisBT, and should be performed prior to any new installation or upgrade. • MantisBT • Transfer the downloaded file to your webserver This can be done using whatever method you like best (ftp, scp, etc). You will need to telnet/ssh into the server machine for the next steps. • Extract the release It is highly recommended to maintain a separate directory for each release. This not only avoids mismatch between versions, (files may have been added or removed) but also provides an easy path to downgrade your installation, should you need to. The usual command is (1 step): tar -xzf filename.tar.gz OR (2 steps): gunzip filename.tar.gz tar -xf filename.tar Other file archiving tools such as should also be able to handle decompression of the archive. The extraction process should create a new directory like mantisbt-1.2.x • Rename the directory For new installations, you may want to rename the directory just created to something simpler, e.g. Mantisbt mv mantisbt-1.2.x mantisbt. This chapter explains how to perform a new installation of MantisBT. Start by checking the and installing the appropriate version of required software. Once that is done, execute the installation script. From your web browser, access The installation procedure will go through the following steps: • The script checks basic parameters for the web server • Provide required information for the installation • database type • database server hostname • user and password Required privileges: SELECT, INSERT, UPDATE, and DELETE • high-privileged database account Additional privileges required: INDEX, CREATE, ALTER, and DROP If this account is not specified, the database user will be used. • Click the Install/Upgrade Database button • The script creates the database and tables. The default Administrator user account is created at this stage, to allow the initial login and setup of MantisBT. • The script attempts to write a basic config_inc.php file to define the database connection parameters. This operation may fail if the web server's user account does not have write permissions to the directory (which is recommended for obvious security reasons). In this case, you will have to manually create the file and copy/paste the contents from the page. • The script perform post installation checks on the system. Review and correct any errors. This chapter explains how to upgrade an existing MantisBT installation. Start by Performing the steps described in above. • Put the site down for maintenance cp mantis_offline.php.sample mantis_offline.php This will prevent users from using the system while the upgrade is in progress. • Always Backup your code, data and config files before upgrading! This includes your Mantis directory, your attachments, and your database. Refer to the section for details. • Copy the configuration files To preserve your system settings, you should copy the files listed below to the new directory, as well as any other custom files such as logo, favicon, css, etc. Config_inc.php custom_strings_inc.php custom_constants_inc.php custom_functions_inc.php • Execute the upgrade script. From your web browser, access where mantisbt-NEW is the name of the directory where the new release was extracted • Provide required information for the upgrade • high-privileged database account Additional privileges required: INDEX, CREATE, ALTER, and DROP If this account is not specified, the database user will be used. • Click the Install/Upgrade Database button • At the end of the upgrade, review and correct any warnings or errors. There are many settings that you can adjust to configure and customize MantisBT. Refer to the section, as well as the config_defaults_inc.php file for in depth explanations of the available options. Check out also the section for further options to personalize your installation. This step is normally only required for new installations, but when upgrading you may want to review and possibly customize any new configuration options. Open or create the file config_inc.php in an editor and add or modify any values as required. These will override the default values. You may want to use the provided config_inc.php.sample file as a starting point. WARNING: you should never edit the config_defaults_inc.php file directly, as it could cause issues with future upgrades. Instructions in this section are common to both new installations and upgrades, and should be applied after completing either process. • Test your configuration Load up admin/check.php to validate if everything is setup correctly. NOTE (for PHP 5.2 only): check.php sometimes reports the value of register_globals incorrectly. To confirm the correct value, Create a page with this line in it: save it with a.php extension and load it up in your web browser. • Delete the admin folder For security reasons, the scripts within this directory should not be accessible on a live MantisBT site or on any installation that is accessible via the Internet. Once you have confirmed that the install/upgrade was successful, you should delete this directory rm -r admin. Instructions in this section should only be applied after upgrading an existing installation. • Test the new release Perform any additional testing as appropriate to ensure the new version does not introduce any regressions. • Switch the site to the new version The commands below should be executed from the web root (or wherever the mantisbt scripts are installed) and assume that the 'live' directory (old version) is named mantisbt and the new release directory is mantisbt-1.2.x. Mv mantisbt mantisbt-old mv mantisbt-1.2.x mantisbt • Put the site back on line rm mantis_offline.php This should be the final step in the upgrade process, as it will let users login again. It is strongly recommended to backup your MantisBT database on a regular basis. The method to perform this operation depends on which RDBMS you use. Backups are a complex subject, and the specificities of implementing and handling them for each RDBMS are beyond the scope of this document. For your convenience, the section below provides a simple method to backup MySQL databases. You should also consider implementing backups of your MantisBT code (which includes your configs and possibly customization), as well as issue attachments (if stored on disk) and project documents.!!! Backups should always be performed before an upgrade!!! MySQL databases are easy to backup using the mysqldump command: mysqldump -u -p > To restore a backup you will need to have a clean database. Then run: mysql -u -p You can also perform both of these tasks using A good idea is to make a backup script and run it regularly through cron or a task scheduler (for Windows see ). Using the current date in the filename can prevent overwriting and make cataloguing easier. References and useful links: • •. It is recommended that you make a backup in case you wish to use your data in the future. See the page for details. To uninstall MantisBT: • Delete the MantisBT directory and all files and subdirectories. • Drop all MantisBT tables from the database, these can be identified by the configured prefix for the installation. The default prefix is 'mantis'. • Remove any customizations or additions that you may have made. If you have the permissions to create/drop databases and you have a specific database for MantisBT that does not contain any other data, you can drop the whole database. In MantisBT, there is no limit on the number of user accounts that can be created. Typically, installations with thousands of users tend to have a limited number of users that have access level above REPORTER. By default users with ADMINISTRATOR access level have access to create new user accounts. The steps to do that are: • Click 'Manage' on Main Menu. • Click 'Manage Users' (if not selected by default). • Click 'Create New Account' button just below the alphabet key. • Enter user name, email address, global access level (more details about access levels later). Other fields are optional. • Click 'Create Users'. Creating a user triggers the following actions: • Creating a user in the database. • If email notifications ($g_enable_email_notification) is set to ON, then the user will receive an email allowing them to activate their account and set their password. Otherwise, the account will be created with a blank password. • If email notifications ($g_enable_email_notification) is set to ON, users with access level about $g_notify_new_user_created_threshold_min will get a notification that a user account has been created. Information about the user like user name and email address are provided. The IP of the user that created the account is also included. When the 'Protected' flag is set on a user account, it indicates that the account is a shared account (e.g. Demo account) and hence users logged using such account will not be allowed to change account preferences and profile information. The anonymous user account specified with the $g_anonymous_account option will always be treated as a protected user account. When you are creating the anonymous user account, the 'Protected' flag is essentially ignored because the anonymous user is always treated as a protected user. The recommended way of retiring user accounts is to disable them. Scenarios where this is useful is when a person leaves the team and it is necessary to retire their account. Once an account is disabled the following will be enforced: • All currently active sessions for the account will be invalidated (i.e. Automatically logged out). • It will no longer be possible login using this account. • No further email notifications will be sent to the account once it is disabled. • The user account will not show anymore in lists like 'assign to', 'send reminder to', etc. The disabling process is totally reversible. Hence, the account can be re-enabled and all the account history will remain intact. For example, the user will still have issues reported by them, assigned to them, monitored by them, etc. Another way to retire user accounts is by deleting them. This approach is only recommended for accounts that have not been active (i.e. Haven't reported issues). Once the account is deleted, any issues or actions associated with such account, will be associated with user123 (where 123 is the code of the account that was deleted). Note that associated issues or actions are not deleted. As far as the underlying database, after the deletion of a user, records with the user id as a foreign key will have a value that no longer exists in the users table. Hence, any tools that operate directly on the database must take this into consideration. By default administrators are the only users who can delete user accounts. They can delete accounts by clicking Manage, Manage Users, locating the user to be deleted and opening it details page, then clicking on the 'Delete User' button which deletes the user. Note that 'Deleting Users' is not a reversible process. Hence, if it is required to re-add the user account, it is not possible to recreate the user account so that it gets the same ID and hence retains its history. However, manually creating a record in the users table with the same id, can possibly do that. However, this approach is not recommended or supported. For open source and freeware projects, it is very common to setup MantisBT so that users can signup for an account and get a REPORTER access by default (configurable by the $g_default_new_account_access_level configuration option). The signup process can be enabled / disabled using the $g_allow_signup configuration option, which is enabled by default. If user signup is enabled, then it is required that $g_send_reset_password is ON as well, and the e-mail settings properly configured (see ). If email notifications ($g_enable_email_notification) is set to ON, users with access level about $g_notify_new_user_created_threshold_min will get a notification that a user account has been created. Information about the user like user name, email address, IP address are included in the email notification. It is pretty common for users to forget their password. MantisBT provides two ways to handle such scenario: 'Forgot Password' and 'Reset Password'. 'Forgot Password' is a self service scenario where users go to the login page, figure out they don't remember their password, and then click the 'Lost your password?' Users are then asked for their user name and email address. If correct, then they are sent an email with a link which allows them to login to MantisBT and change their password. 'Reset Password' scenario is where a user reports to the administrator that they are not able to login into MantisBT anymore. This can be due to forgetting their password and possibly user name or email address that they used when signing up. The administrator then goes to Manage, Manage Users, locates the user account and opens its details. Under the user account details, there is a 'Reset Password' button which the administrator can click to reset the password and trigger an email to the user to allow them to get into MantisBT and set their password. In the case where email notifications are disabled, resetting password will set the password to an empty string. Users are able to change their own passwords (unless their account is 'protected'). This can be done by clicking on 'My Account', and then typing the new password in the 'Password' and 'Confirm Password' fields, then clicking 'Update User'. Changing the password automatically invalidates all logged in sessions and hence the user will be required to re-login. Invalidating existing sessions is very useful in the case where a user going onto a computer, logs into MantisBT and leaves the computer without logging out. By changing the password from another computer, the session on the original computer automatically becomes invalidated. MantisBT uses access levels to define what a user can do. Each user account has a global or default access level that is associated with it. This access level is used as the access level for such users for all actions associated with public projects as well as actions that are not related to a specific project. Users with global access level less than $g_private_project_threshold will not have access to private projects by default. The default access levels shipped with MantisBT out of the box are VIEWER, REPORTER, UPDATER, DEVELOPER, MANAGER and ADMINISTRATOR. Each features has several configuration options associated with it and identifies the required access level to do certain actions. For example, viewing an issue, reporting an issue, updating an issue, adding a note, etc. For example, in the case of reporting issues, the required access level is configurable using the $g_report_bug_threshold configuration option (which is defaulted to REPORTER). So for a user to be able to report an issue against a public project, the user must have a project-specific or a global access level that is greater than or equal to REPORTER. However, in the case of reporting an issue against a private project, the user must have project specific access level (that is explicitly granted against the project) that is higher than REPORTER or have a global access level that is higher than both $g_private_project_threshold and $g_report_bug_threshold. Note that project specific access levels override the global access levels. For example, a user may have REPORTER as the global access level, but have a MANAGER access level to a specific project. Or a user may have MANAGER as the global access level by VIEWER access to a specific project. Access levels can be overridden for both public and private projects. However, overriding access level is not allowed for users with global access ADMINISTRATOR. Each feature typically has multiple access control configuration options to defines what access level can do certain operations. For example, adding a note may require REPORTER access level, updating a note my require DEVELOPER access level, unless the own was owned by the same user and in this case REPORTER access level. Such threshold configuration options can be set to a single access level, which means users with such threshold and above are authorized to do such action. The other option is to specify an array of access level which indicates that users with the explicitly specific thresholds are allowed to do such actions. It is also worth mentioning that the access levels are defined by the $g_access_levels_enum_string configuration option, and it is possible to customize such list. The default value for the available access levels is '10:viewer, 25:reporter, 40:updater, 55:developer, 70:manager, 90:administrator'. The instructions about how to customize the list of access levels will be covered in the customization section. In some cases MantisBT is setup in a way, where it allows users that already exists in a directory or another application to be automatically authenticated and added to MantisBT. For example, a company may setup their MantisBT installation in a way, where its staff members that are already registered in their LDAP directory, should be allowed to login into MantisBT with the same user name and password. Another example, is where MantisBT is integrated into some content management system, where it is desired to have a single registration and single sign-on experience. In such scenarios, once a user logs in for the first time, a user account is automatically created for them, although the password verification is still done against LDAP or the main users repository. Users can fine tune they way MantisBT interacts with them via modifying their user preferences. User preferences can only be managed by users and are not available for the administrators to tweak. The administrators can only tweak the default value for such preferences. However, once a user account is created, it is then the responsibility of the user to manage their own preferences. The user preferences include the following: • Default Project: A user can choose the default project that is selected when the user first logs in. This can be a specific project or 'All Projects'. For users that only work on one project, it would make sense to set such project as the default project (rather than 'All Projects'). The active project is part of the filter applied on the issues listed in the 'View Issues' page. Also any newly reported issues will be associated with the active project. • Refresh Delay: The refresh delay is used to specify the number of seconds between auto-refreshes of the View Issues page. • Redirect Delay: The redirect delay is the number of seconds to wait after displaying flash messages like 'Issue created successfully', and before the user gets redirected to the next page. • Notes Sort Order: The preference relating to how notes should be ordered on an issue is viewed or in email notifications. The ascending order is where notes are ordered so that ordered notes appear before newer notes, the descending order is the reverse. • Email on New: If unticked, then email notifications relating to creation of a new issue would be disabled. Note that the preference is only used to disabled notifications that as per the administrator's configuration, this user would have qualified to receive them. • Email on Change of Handler: TODO - is this preference used? • Email on Feedback: TODO - is this preference used? • Email on Resolved: TODO • Email on Closed: TODO • Email on Reopened: TODO • Email on Note Added: TODO • Email on Status Change: TODO • Email on Priority Change: TODO - is this preference used? • Email Notes Limit: This preference can be used to limit the number of issue notes to view or to be included in an email notifications. Specifying N here means that the latest N notes will be included. The value 0 causes all notes to be included. • Language: The preferred language of the user. This language is used by the GUI and in email notifications. Note that MantisBT uses UTF8 for encoding the data, and hence, the user can be interacting with MantisBT user interface in Chinese while logging issue data in German. A user profile describes an environment that the user uses to run the software for which issues are being tracked. The profile information include 'Platform', 'Operating System', 'OS Version', and 'Additional Description'. Each user has access to profiles that they create (can be multiple), in addition to global ones that are shared created by other users. When reporting issues, users can elect to enter information like platform, operating system, version manually, or they can choose from the list of profiles that are already defined. Global profiles are typically used by the administrator to define a set of standard profiles that are typically used by the MantisBT users. This makes it easier for the users to use such profiles without having to define create them. The access level required for users to be able to create global profiles is configured by the $g_manage_global_profile_threshold configuration option and it is defaulted to MANAGER. The life cycle of an issue starts with its creation. An issue can be created via one of the following channels: • MantisBT Web Interface - This is where a user logs into MantisBT and reports a new issue. • SOAP API - Where an application automatically reports an issue into MantisBT using the SOAP API web services interfaces. For example, the nightly build script can automatically report an issue if the build fails. • Email - This is not supported out of the box, but there are existing MantisBT patches that would listen to emails on pre-configured email addresses and adds them to the MantisBT database. • Others - There can be several other ways to report issues. For example, applications / scripts that directly injects issues into MantisBT database (not recommended, except for one-off migration scripts), or PHP scripts that use the core MantisBT API to create new issues. An important part of issue tracking is to classify issues as per their status. Each team may decide to have a different set of categorization for the status of the issues, and hence, MantisBT provides the ability to customize the list of statuses. MantisBT assumes that an issue can be in one of three stages: opened, resolved and closed. Hence, the customized statuses list will be mapped to these three stages. For example, MantisBT comes out of the box with the following statuses: new, feedback, acknowledged, confirmed, assigned, resolved and closed. In this case 'new' -> 'assigned' map to opened, 'resolved' means resolved and 'closed' means closed. Following is the explanation of what the standard statuses that are shipped with MantisBT means. • New - This is the landing status for new issues. Issues stay in this status until they are assigned, acknowledged, confirmed or resolved. The next status can be 'acknowledged', 'confirmed', 'assigned' or 'resolved'. • Acknowledged - This status is used by the development team to reflect their agreement to the suggested feature request. Or to agree with what the reporter is suggesting in an issue report, although they didn't yet attempt to reproduce what the reporter is referring to. The next status is typically 'assigned' or 'confirmed'. • Confirmed - This status is typically used by the development team to mention that they agree with what the reporter is suggesting in the issue and that they have confirmed and reproduced the issue. The next status is typically 'assigned'. • Assigned - This status is used to reflect that the issue has been assigned to one of the team members and that such team member is actively working on the issue. The next status is typically 'resolved'. • Resolved - This status is used to reflect that the issue has been resolved. An issue can be resolved with one of many resolutions (customizable). For example, an issue can be resolved as 'fixed', 'duplicate', 'won't fix', 'no change required', etc. The next statuses are typically 'closed' or in case of the issue being re-opened, then it would be 'feedback'. • Closed - This status reflects that the issue is completely closed and no further actions are required on it. It also typically hides the issue from the View Issues page. Some teams use 'closed' to reflect sign-off by the reporter and others use it to reflect the fact that the fix has been released to customers. Now that we have covered how an issue gets created, and what are the different statuses during the life cycle of such issues, the next step is to define the workflow. The workflow dictates the valid transitions between statuses and the user access level required of the user who triggers such transitions; in other words, how issues move from one status to another and who is authorized to trigger such transitions. MantisBT provides the ability for teams to define their own custom workflow which works on top of their. By default, there is no workflow defined, which means that all states are accessible from any other, by anyone. The 'Manage > Manage Configuration > Workflow Transitions' page allows users with ADMINISTRATOR access level to do the following tasks: • Define the valid next statuses for each status. • Define the default next status for each status. • Define the minimum access level required for a user to transition to each status. • Define the default status for newly created issues. • Define the status at which the issue is considered resolved. Any issues a status code greater than or equal to the specified status will be considered resolved. • Define the status which is assigned to issues that are re-opened. • Define the required access level to change the workflow. Note that the scope of the applied change is dependent on the selected project. If 'All Projects' is selected, then the configuration is to be used as the default for all projects, unless overidden by a specific project. To configure for a specific project, switch to it via the combobox at the top right corner of the screen. The Global ('All Projects') workflow can also be defined in the config_inc.php file, as per the following example. This 'Manage > Manage Configuration > Workflow Thresholds' page allows users with ADMINISTRATOR access level to define the thresholds required to do certain actions. Following is a list of such actions and what they mean: • Report an issue - The access levels that are allowed to report an issue. • Update an issue - The access levels that are allowed to update the header information of an issue. • Allow issue to be closed on resolved - The access levels that are allow to resolve and close an issue in one step. • Allow reporter to close issue - Indicates if reporters should be allowed to close issues reported by them. • Monitor an issue - The access levels required for a user to be able to monitor an issue. Once a user monitors an issue, the user will be included in all future email notifications relating to changes in the issue. • Handle an issue - The access levels required for a user to be shown in the list of users that can handle an issue. • Assign an issue - The access levels required for a user to be able to change the handler (i.e. Assign / unassign) an issue. • Move an issue - The access levels required for a user to be able to move an issue from one project to another. (TODO: are these access levels evaluated against source or destination project?). • Delete an issue - The access levels required for a user to be able to delete an issue. • Reopen an issue - The access levels required for a user to be able to re-open a resolved or closed issue. • Allow Reporter to re-open Issue - Whether the reporter of an issue can re-open a resolved or closed issue, independent of their access level. • Status to which a reopened issue is set - This is the status to which an issue is set after it is re-opened. • Resolution to which a reopen issue is set - The resolution to set on issues that are reopened. • Status where an issue is considered resolved - The status at which an issue is considered resolved. • Status where an issue becomes readonly - Issues with such status and above are considered read-only. Read-only issues can only be modified by users with a configured access level. Read-only applies to the issue header information as well as other issue related information like relationships, attachments, notes, etc. • Update readonly issues - The access levels required for a user to be able to modify a readonly issue. • Update issue status - The access levels required for a user to be able to modify the status of an issue. • View private issues - The access levels for a user to be able to view a private issue. • Set view status (public vs. Private) - The access level for a user to be able to set whether an issue is private or public, when reporting the issue. If the user reporting the issues doesn't have the required access, then the issue will be created with the default view state. • Update view status (public vs private) - The access level required for a user to be able to update the view status (i.e. • Show list of users monitoring issue - The access level required for a user to be able to view the list of users monitoring an issue. • Set status on assignment of handler - The access levels required for a user to be able to re-assign an issue when changing its status. • Status to set auto-assigned issues to - The status - This is the status that is set on issues that are auto assigned to users that are associated with the category that the issuer is reported under. • Limit reporter's access to their own issues - When set, reporters are only allow to view issues that they have reported. • Add notes - The access levels required for users to be able to add notes. • Update notes - The access levels required for users to be able to update issue notes. • Allow user to edit their own issue notes - A flag that indicates the ability for users to edit issue notes report by them. • Delete note - The access levels required for a user to delete a note that they may or may not have reported themselves. • View private notes - The access levels required for a user to be able to view private notes associated with an issue that they have access to view. • View Change Log - The access levels required for a user to be able to view the change log. • View Assigned To - The access levels required for a user to be able to know the handler of an issue that they have access to. • View Issue History - The access levels required for a user to be able to view the history of changes of an issue. • Send reminders - The access levels required for a user to be able to send reminders to other users relating to an issue that they have access to. $g_hostname Host name or connection string for Database server. The default value is localhost. For MySql, this should be hostname or hostname:port (e.g. $g_db_username User name to use for connecting to the database. The user needs to have read/write access to the MantisBT database. The default user name is 'root'. $g_db_password Password for the specified user name. The default password is empty. $g_database_name Name of database that contains MantisBT tables. The default name is 'bugtracker'. $g_db_schema The database schema (used in case of DB2), otherwise should be left blank. $g_db_type The supported database types are listed in the table below. The PHP extension corresponding to the selected type must be enabled. $g_path URL to your installation as seen from the web browser; this is what you type into the URL field. Requires trailing '/' character. 'In the following example https protocol is used: eg. 'MantisBT will default this to the correct value. However, in some cases it might be necessary to override the default. This is typically needed when an installation can be accessed by multiple URLs (internal vs external). $g_icon_path This is the URL to the icons (images) directory as seen from the web browser. All MantisBT images/icons are loaded from this URL. The default value for this URL is based on $g_path (i.e. Note that a trailing '/' is required. $g_short_path Short web path without the domain name. This requires the trailing '/'. $g_absolute_path This is the absolute file system path to the MantisBT installation, it is defaulted to the directory where config_defaults_inc.php resides. Requires trailing '/' character (eg. $g_core_path This is the path to the core directory of your installation. The default value is usually OK, unless you move the 'core' directory out of your webroot. Requires trailing DIRECTORY_SEPARATOR. $g_class_path This is the path to the classes directory which is a sub-directory of core by default. The default value is typically OK. Requires trailing DIRECTORY_SEPARATOR. $g_manual_url This is the url to the MantisBT online manual. Requires trailing '/' character. $g_use_iis Indicates that IIS (Microsoft Internet Information Server) is the web server on which MantisBT is hosted. Default value is normally determined automatically by the system. $g_session_handler Session handler. Possible values are as per the list below; the default is php. • php: PHP filesystem sessions • adodb: Database storage sessions • memcached: Memcached storage sessions $g_session_key A string to uniquely identify the MantisBT sessions. This should be unique between multiple installations to prevent conflicts. Defaults to MantisBT. $g_session_save_path Location where session files are stored. The default is false, meaning the session handler's default location will be used. $g_session_validation Use Session validation (defaults to ON) WARNING: Disabling this could be a potential security risk $g_form_security_validation Form security validation, defaults to ON. This protects against. Some proxy servers may not correctly work with this option enabled because they cache pages incorrectly. WARNING: Disabling this option is a security risk, it is strongly recommended to leave it ON. $g_allow_signup Allow users to signup for their own accounts. If ON (default), then $g_send_reset_password must be ON as well, and mail settings must be correctly configured (see ). $g_max_failed_login_count Maximum failing login attempts before the account is locked. Once locked, it's required to reset the password (lost password). Value resets to zero at each successfully login. Default is OFF. $g_notify_new_user_created_threshold_min The minimum global access level required to be notified when a new user registers via the 'signup form'. To pick specific access levels that are not necessarily at the higher end of access levels, use an array of access levels. Default is ADMINISTRATOR. $g_send_reset_password If ON (default), users will be sent their password when their account is created or password reset (this requires mail settings to be correctly configured). If OFF, then the Administrator will have to provide a password when creating new accounts, and the password will be set to blank when reset. $g_password_confirm_hash_magic_string TODO $g_signup_use_captcha TODO $g_system_font_folder TODO $g_font_per_captcha TODO $g_lost_password_feature TODO $g_max_lost_password_in_progress_count TODO. $g_administrator_email The administrator's e-mail address. This is mainly prompted to the user in case of errors that might require the intervention of the system administrator. For example, SQL errors. [email protected] $g_webmaster_email The webmaster's e-mail address. This address is displayed in the bottom of all MantisBT pages. [email protected] $g_from_email The email address to be used as the source of all emails sent by MantisBT. [email protected] $g_return_path_email Email address to receive bounced emails. $g_enable_email_notification Set to ON to enable email notifications, OFF to disable them. Default is ON. Note that disabling email notifications has no effect on emails generated as part of the user signup process. When set to OFF, the password reset feature is disabled. Additionally, notifications of administrators updating accounts are not sent to users. $g_default_notify_flags Associated with each action a list of flags to control who should be notified.The default will be used if the action is not included in $g_notify_flags or if the flag is not included in the specific action definition. The list of actions include: new, assigned, resolved, bugnote, reopened, closed, deleted, feedback.The default is: $g_default_notify_flags = array('reporter' => ON, 'handler' => ON, 'monitor' => ON, 'bugnotes' => ON, 'explicit' => ON, 'threshold_min' => NOBODY, 'threshold_max' => NOBODY); threshold_min and threshold_max are used to send messages to all members of the project whose status is greater than or equal to 'threshold_min' and less than or equal to 'threshold_max'. Sending messages to everyone would set 'threshold_min' to ANYBODY and 'threshold_max to 'NOBODY'. To send to all DEVELOPERS and above (as 0.17.5), use DEVELOPER and NOBODY respectively. $g_notify_flags Defines the notification flags that are different from the defaults that are defined in $g_default_notify_flags. This is only used with PHPMAILER_METHOD_SMTP (see $g_phpmailer_method). The default is 'localhost'. $g_smtp_port The default SMTP port to use. This can be overridden individually for specific hosts. (see $g_smtp_host). Typical SMTP ports are 25 and 587. The default is 25. $g_smtp_connection_mode Allow secure connection to the SMTP server. Valid values are: • ' (empty string): No encryption. This is the default. • ssl • tls $g_smtp_username SMTP Server Authentication user Allows the use of SMTP Authentication when using a remote SMTP host. Must be set to ' (empty string) if the SMTP host does not require authentication. Default is '. $g_smtp_password This is the password that is used in SMTP Authentication. Not used when $g_smtp_username = ' Default is '. $g_email_send_using_cronjob Disables sending of emails as soon as an action is performed. Emails are instead queued and must be sent by running scripts/send_emails.php periodically. This script can only be executed from the CLI, not from the web interface, for security reasons. Enabling this option can help with performance problems if large numbers of emails are generated or mail delivery is slow by not delaying page execution when sending emails. $g_email_set_category Specify whether e-mails should be sent with the category set or not. This is tested with Microsoft Outlook. More testing for this feature + other formats will be added in the future. OFF, EMAIL_CATEGORY_PROJECT_CATEGORY (format: [Project] Category). Default is OFF. $g_email_separator1 Default is str_pad(', 70, '='); This means 70 equal signs. $g_email_separator2 Default is str_pad(', 70, '-'); This means 70 minus signs. $g_email_padding_length Default is 28. MantisBT uses flags and a threshold system to generate emails on events. $g_default_language This is the language used by default in MantisBT. This may be set to 'auto' where MantisBT will try to determine the language from the browser. $g_language_choices_arr This is to be set to an array of languages that are available for users to choose from. The default value includes all languages supported by MantisBT. The administrator can limit the languages available for users to choose from by overriding this value. For example, to support English, French and German include the following code: array( 'english', 'french', 'german' ); Of course, administrators can also add their own languages by translating the strings and creating their own language files. You are encouraged to share any translation work that you do with the MantisBT team. This will ensure that the newly created language file is maintained with future MantisBT releases.All language files reside in the lang/ folder. They are all named according to the following pattern: strings_.txt. $g_fallback_language This is the language used if MantisBT cannot determine the language from the browser. It defaults to 'english'.As of 0.19.0, this may be set to 'auto' where MantisBT will try to determine the language from the browser. $g_window_title This is the browser window title ( tag). $g_page_title This is a heading that is displayed in the viewing area of the page. $g_favicon_image Path to the favorites icon relative to MantisBT root folder (default 'images/favicon.ico'). $g_logo_image Path to the logo image relative to MantisBT root folder (default 'images/mantis_logo.gif'). $g_logo_url The default URL to be associated with the logo. By default this is set to $g_default_home_page (which defaults to My View page). Clicking on the logo from any page in the bug tracker will navigate to the URL specified in this configuration option. $g_show_footer_menu Show the menu at the bottom of the page as well as at the top. Default value is OFF. $g_show_project_menu_bar This option specifies whether to add menu at the top of the page which includes links to all the projects. The default value is OFF. $g_show_assigned_names When a bug is assigned then replace the word 'assigned' with the name of the developer in parenthesis. Default is ON. $g_show_priority_text Specifies whether to show priority as text (ON) or icon (OFF) in the view all bugs page. Default is OFF (icon). $g_priority_significant_threshold Define the priority level at which a bug becomes significant. Significant bugs are displayed with emphasis. Set this value to -1 to disable the feature. The default value is HIGH. $g_severity_significant_threshold Define the severity level at which a bug becomes significant. Significant bugs are displayed with emphasis. Set this value to -1 to disable the feature. The default value is MAJOR. $g_view_issues_page_columns This configuration option is used to select the columns to be included in the View Issues page and in which order. If one of the column is not accessible to the logged in user, or corresponds to a disabled feature, then it will be automatically removed from the list at runtime. Hence, the same column list may show a different set of columns based on the logged in user, the currently selected project and enabled features (e.g. Sponsorship_total is only shown if the sponsorship feature is enabled). The supported columns are: selection, edit, id, project_id, reporter_id, handler_id, priority, reproducibility, projection, eta, resolution, fixed_in_version, view_state, os, os_build, build (for product build), platform, version, date_submitted, attachment_count, category, sponsorship_total, severity, status, last_updated, summary, bugnotes_count, description, steps_to_reproduce, additional_info. As for custom fields they can be referenced by adding a 'custom_' to their name (e.g. Xyz would be custom_xyz). By default the following columns are selected: selection, edit, priority, id, sponsorship_total, bugnotes_count, attachment_count, category_id, severity, status, last_updated, summary. $g_print_issues_page_columns This configuration option is used to select the columns to be included in the Print Issues page and in which order. See $g_view_issues_page_columns for more details about the supported fields. By default the following columns are selected: selection, priority, id, sponsorship_total, bugnotes_count, attachment_count, category_id, severity, status, last_updated, summary $g_csv_columns This configuration option is used to select the columns to be included in the CSV export and in which order. See $g_view_issues_page_columns for more details about the supported fields. By default the following columns are selected: id, project_id, reporter_id, handler_id, priority, severity, reproducibility, version, build, projection, category_id, date_submitted, eta, os, os_build, platform, view_state, last_updated, summary, status, resolution, fixed_in_version, duplicate_id. $g_excel_columns This configuration option is used to select the columns to be included in the CSV export and in which order. See $g_view_issues_page_columns for more details about the supported fields. By default the following columns are selected: id, project_id, reporter_id, handler_id, priority, severity, reproducibility, version, build, projection, category_id, date_submitted, eta, os, os_build, platform, view_state, last_updated, summary, status, resolution, fixed_in_version, duplicate_id. $g_show_bug_project_links Show project links when in All Projects mode. Default is ON. $g_status_legend_position Specifies the position of the status colour legend, can be: STATUS_LEGEND_POSITION_TOP or STATUS_LEGEND_POSITION_BOTTOM. Default is STATUS_LEGEND_POSITION_BOTTOM. $g_show_product_version This controls display of the product version in the report, view, update and print issue pages. This flag also applies to other product version related fields like product build, fixed in version, and target version. Valid values are ON, OFF, and AUTO. ON for always displayed, AUTO for displayed when project has versions defined, and OFF for always OFF. The default value is AUTO. $g_show_version_dates_threshold The access level threshold at which users will see the date of release for product versions. Dates will be shown next to the product version, target version and fixed in version fields. Set this threshold to NOBODY to disable the feature. Default value is NOBODY. $g_show_realname This control will replace the user's userid with their realname. If it is set to ON, and the real name field has been populated, the replacement will occur. It defaults to OFF. $g_show_avatar Show the user's avatar The current implementation is based on; Users will need to register there the same email address used in this MantisBT installation to have their avatar shown. Please note: upon registration or avatar change, it may take some time for the updated gravatar images to show on sites The config can be either set to OFF (avatars disabled), or to a string defining the default avatar to be used when none is associated with the user's email. Valid values are: • OFF (default) • ON (equivalent to 'identicon') • One of Gravatar's defaults (mm, identicon, monsterid, wavatar, retro); refer to for further details. • An URL to the default image to be used (for example, 'http:/path/to/unknown.jpg' or '%path%images/no_avatar.png'). $g_show_avatar_threshold The threshold of users for which MantisBT should attempt to show the avatar (default DEVELOPER). Note that the threshold is related to the user for whom the avatar is being shown, rather than the user who is currently logged in. $g_cookie_time_length Time for 'permanent' cookie to live in seconds. This is what is used when a user selects 'save login'. Default is the equivalent of 1 year (30000000). $g_allow_permanent_cookie Allow users to opt for a 'permanent' cookie when logging in. Controls the display of the 'Remember my login in this browser' checkbox on the login page. See $g_cookie_time_length. $g_wait_time Time to delay between page redirects (in seconds). Users can override this setting in their user preferences. Default is 2 seconds. $g_content_expire Time to wait before document is stale (in minutes). This is used in meta_inc.php. Default is 0 (expires right away). $g_long_process_timeout This timeout is used by pages which does time consuming operations like upgrading the database. The default value of 0 disables timeout. Note that this timeout is specified in seconds. $g_news_enabled Indicates whether the news feature should be enabled or disabled. The default is OFF. The news feature is deprecated in favor of being moved to a plugin. $g_news_limit_method Limit the news entry that are displayed by number of entries (BY_LIMIT) or by date (BY_DATE). The default is BY_LIMIT. $g_news_view_limit The limit for the number of news entries to be displayed. This option is only used if $g_news_limit_method is set to BY_LIMIT. $g_news_view_limit_days Specifies the number of dates after which the news are not displayed. This option is only used if $g_news_limit_method is set to BY_DATE. $g_private_news_threshold Specifies the access level required to view private news. The default is DEVELOPER. $g_default_new_account_access_level This is the default access level users are given when their account is created by email. The default access level is REPORTER. Look in constant_inc.php for other values. $g_default_bug_view_status The default viewing status for the new bug (VS_PUBLIC or VS_PRIVATE). The default is VS_PUBLIC. $g_default_bugnote_view_status The default viewing status for the new bugnote (VS_PUBLIC or VS_PRIVATE). The default is VS_PUBLIC. $g_default_reminder_view_status The default viewing status for the new reminders (VS_PUBLIC or VS_PRIVATE). The default is VS_PUBLIC. $g_reminder_receive_threshold The minimum access level for a user to show up in the reminder user picker. Note that this is the access level for the project for which the issue belongs. The default is DEVELOPER. $g_default_bug_resolution The resolution for a newly created issue. The default is OPEN. Look in constant_inc.php for other values. $g_default_bug_severity The severity for a newly created issue. The default is MINOR. Look in constant_inc.php for other values. $g_default_bug_priority The priority for a newly created issue. The default is NORMAL. Look in constant_inc.php for other values. $g_default_bug_reproducibility The reproducibility for a newly created issue. The default is REPRODUCIBILITY_HAVENOTTRIED. Look in constant_inc.php for other values. $g_default_bug_projection The projection for a newly created issue. The default is PROJECTION_NONE. Look in constant_inc.php for other values. $g_default_bug_eta The ETA for a newly created issue. The default is ETA_NONE. Look in constant_inc.php for other values. $g_default_category_for_moves Default global category to be used when an issue is moved from a project to another that doesn't have a category with a matching name. The default is 1 which is the 'General' category that is created in the default database. $g_default_limit_view Number of bugs to show in the View Bugs page. The default value is 50. $g_default_show_changed Highlight bugs that have changed during the last N hours. The default value is 6. $g_hide_status_default Controls which issues will be displayed in the View Issues page. Default value is CLOSED, implying that all issues at 'closed' or higher state will not be shown. $g_min_refresh_delay This is the delay between automatic refreshes of the View Issues page in minutes. Make sure refresh delay in user preferences isn't too short. If a users set their preferences to be lower then it is bumped back up to this minimum value. The default value is 10 minutes. These settings are used as the default values for preferences for new users. Each user can override these settings through the user preferences form. Default language is set to default site language ($g_default_language). $g_default_refresh_delay Default page refresh delay (in minutes). This is for the bug listing pages. Default value is 30 minutes. $g_default_redirect_delay Default delay before a user is redirected to a page after being prompted by a message (eg: operational successful). Default value is 2 seconds. $g_default_bugnote_order This controls the time order in which bug notes are displayed. It can be either ASC (oldest first, the default) or DESC (newest first). $g_default_email_on_new$g_default_email_on_assigned$g_default_email_on_feedback$g_default_email_on_resolved$g_default_email_on_closed Default user preferences to enable receiving emails when a bug is set to the corresponding status. This option only has an effect if users have the required access level to receive such emails. Default value is ON. $g_default_email_on_reopened Default user preferences to enable receiving emails when bugs are re-opened. Default value is ON. $g_default_email_on_bugnote Default user preferences to enable receiving emails when bugnotes are added to bugs. Default value is ON. $g_default_email_on_status$g_default_email_on_priority Default user preferences to enable receiving emails when status or priority is changed. Default is ON. Note that this option is not implemented. $g_default_email_on_new_minimum_severity$g_default_email_on_assigned_minimum_severity$g_default_email_on_feedback_minimum_severity$g_default_email_on_resolved_minimum_severity$g_default_email_on_closed_minimum_severity$g_default_email_on_reopened_minimum_severity$g_default_email_on_bugnote_minimum_severity Default user preferences to enable filtering based on issue severity. These correspond to the email_on_ settings. Default is 'any'. $g_default_email_on_bugnote_minimum_severity Default user preference to enable filtering based on issue severity. These corresponds to the email_on_bugnote setting. Default is 'any'. $g_default_email_on_status_minimum_severity$g_default_email_on_priority_minimum_severity Default user preferences to enable filtering based on issue severity. These correspond to the email_on_status and email_on_priority settings. Default is 'any'. Note that this option is not yet implemented. $g_reporter_summary_limit Limit how many reporters to show in the summary page. This is useful when there are dozens or hundreds of reporters. The default value is 10. $g_date_partitions An array of date lengths to count bugs by (in days) for the summary by date. The default is to count for 1, 2, 3, 7, 30, 60, 90, 180, and 365. $g_summary_category_include_project Specifies whether category names should be preceded by project names (eg: [Project] Category) when the summary page is viewed for all projects. This is useful in the case where category names are common across projects. The default is OFF. $g_view_summary_threshold Specifies the access level required to view the summary page. Default is MANAGER. $g_severity_multipliers An array of multipliers which are used to determine the effectiveness of reporters based on the severity of bugs. Higher multipliers will result in an increase in reporter effectiveness. The default multipliers are: $g_severity_multipliers = array ( FEATURE => 1, TRIVIAL => 2, TEXT => 3, TWEAK => 2, MINOR => 5, MAJOR => 8, CRASH => 8, BLOCK => 10 ); The keys of the array are severity constants from constant_inc.php or from custom_constants_inc.php if you have custom severities defined. The values are integers, typically in the range of 0 to 10. If you would like for a severity to not count towards effectiveness, set the value to 0 for that severity. $g_resolution_multipliers An array of multipliers which are used to determine the effectiveness of reporters based on the resolution of bugs. Higher multipliers will result in a decrease in reporter effectiveness. The only resolutions that need to be defined here are those which match or exceed $g_bug_resolution_not_fixed_threshold. The default multipliers are: $g_resolution_multipliers = array( UNABLE_TO_DUPLICATE => 2, NOT_FIXABLE => 1, DUPLICATE => 3, NOT_A_BUG => 5, SUSPENDED => 1, WONT_FIX => 1 ); The keys of the array are resolution constants from constant_inc.php or from custom_constants_inc.php if you have custom resolutions defined. Resolutions not included here will be assumed to have a multiplier value of 0. The values are integers, typically in the range of 0 to 10. If you would like for a resolution to not count towards effectiveness, set the value to 0 for that resolution or remove it from the array completely. Note that these resolution multipliers are stacked on top of the severity multipliers. Therefore by default, a user reporting many duplicate bugs at severity level BLOCK will be far worse off than a user reporting many duplicate bugs at severity level FEATURE. $g_allow_file_upload Whether to allow/disallow uploading of attachments. Default value is ON. $g_file_upload_method Specify the location for uploading attachments. This can be DISK, DATABASE, or FTP. In case of FTP, the files are saved on the webserver (same as disk) as well as on the specified FTP server. Default value is DATABASE. In case of DISK / FTP upload methods you need to provide the webserver with write access rights to the configured upload path (configured in the project) and temporary upload path (used by PHP). $g_file_upload_max_num Maximum number of files that can be uploaded simultaneously. $g_max_file_size The maximum file size to allow as an attachment. You may also have to configure your php.ini file to increase the execution time, memory limit, max post size, and max upload size. $g_file_upload_ftp_server Address of the FTP server to write to (eg: ftp.example.com). This option is only effective if upload method is FTP. $g_file_upload_ftp_user FTP user name for account to be used in uploading files to the FTP server. This account must have read/write access to the FTP server. The default path for the account is used for uploading the files. $g_file_upload_ftp_pass Password to use when logging in to the FTP server. $g_max_file_size Maximum file size that can be uploaded. Default value is about 5MB. The max file upload size is also affected by the value specified in php.ini. The PHP value is usually defaulted to 2MB. $g_allowed_files Files that are allowed. Separate items by commas. 'zip,bmp,gif,jpg,txt' If $g_allowed_files is filled in NO other file types will be allowed. If empty it will assume any files are accepted that pass the $g_disallowed_files list. $g_disallowed_files Files that are not allowed. Separate items by commas. 'php,php3,phtml,html,class,java,exe,pl' $g_disallowed_files takes precedence over $g_allowed_files. It is recommended to disable all extensions that can be executed by your server. $g_document_files_prefix Prefix to give to uploaded files when saved to the upload directory. This is used for documents that are attached to projects in order to be able to differentiate them from files that are attached to bugs. The name of the file has the following format prefix-projectcode-filename. The default value is 'doc'. $g_preview_attachments_inline_max_size This limit applies to previewing of image / text attachments. If the attachment size is smaller than the specified value, the attachment is previewed with the issue details. The previewing can be disabled by setting this configuration to 0. The default value is 256 * 1024 (256KB). $g_fileinfo_magic_db_file Specify the filename of the magic database file. This is used by PHP 5.3.0 (or earlier versions with the fileinfo PECL extension) to guess what the MIME type of a file is. Usually it is safe to leave this setting as the default (blank) as PHP is usually able to find this file by itself. $g_html_valid_tags This is the list of HTML tags that are allowed.Do NOT include href or img tags here.Do NOT include tags that have parameters (eg. )The HTML code is allowed to enter the database as is. The $g_allow_href_tags does not have to be enabled to make URL links. The package will automatically hyperlink properly formatted URLs eg. Or mailto://[email protected]/ $g_hr_size hr size. $g_hr_width hr width. Leave off the percentage (%) symbol. $g_bottom_include_page If this page exists it will be displayed at the bottom of every page. It makes a good company branding include page. $g_top_include_page If this page exists it will be displayed at the top of every page. It makes a good company branding include page. $g_css_include_file Set this to point to the CSS file of your choice. $g_css_rtl_include_file Set this to point to the RTL CSS file of your choice. $g_meta_include_file Set this to point to the META tag file of your choice. $g_main_menu_custom_options This option will add custom options to the main menu. It is an array of arrays listing the caption, access level required, and the link to be executed. For example: $g_main_menu_custom_options = array( array( 'My Link', MANAGER, 'my_link.php' ), array( 'My Link2', ADMINISTRATOR, 'my_link2.php' ) ); Note that if the caption is found in custom_strings_inc.php, then it will be replaced by the translated string. Options will only be added to the menu if the current logged in user has the appropriate access level. $g_login_method Specifies which method will be used to authenticate. $g_ldap_server Specifies the LDAP or Active Directory server to connect to, and must be provided as an URI The protocol is optional, can be one of ldap or ldaps, and defaults to ldap. The port number is optional, and defaults to 389. If this doesn't work, try using one of the following standard port numbers: 636 (ldaps); for Active Directory Global Catalog forest-wide search, use 3268 (ldap) or 3269 (ldaps) Examples of valid URI: ldap.example.com ldap.example.com:3268 ldap://ldap.example.com/ ldaps://ldap.example.com:3269/ $g_ldap_root_dn The root distinguished name for LDAP searches. For example, 'dc=example, dc=com'. $g_ldap_organization LDAP search filter for the organization, for example, '(organizationname=*Traffic)'. Defaults to '. $g_ldap_protocol_version The LDAP Protocol Version. If 0, then the protocol version is not set. Defaults to 0. For Active Directory use protocol version 3. $g_ldap_follow_referrals Determines whether the LDAP library automatically follows referrals returned by LDAP servers or not. This maps to LDAP_OPT_REFERRALS ldap library option. Defaults to ON. For Active Directory, this should be set to OFF. $g_ldap_bind_dn The distinguished name of the service account to use for binding to the LDAP server. For example, 'CN=ldap,OU=Administrators,DC=example,DC=com'. $g_ldap_bind_passwd The password for the service account used to establish the connection to the LDAP server. $g_ldap_uid_field The LDAP field for username. Defaults to uid. For Active Directory, set to sAMAccountName. $g_ldap_realname_field The LDAP field for the user's real name (i.e. Common name). Defaults to cn. $g_use_ldap_realname Use the realname specified in LDAP (ON) rather than the one stored in the database (OFF). Defaults to OFF. Note that MantisBT will update the database with the data retrieved from LDAP when ON. $g_use_ldap_email Use the email address specified in LDAP (ON) rather than the one stored in the database (OFF). Defaults to OFF. Note that MantisBT will update the database with the data retrieved from LDAP when ON. $g_ldap_simulation_file_path This configuration option allows replacing the ldap server with a comma-delimited text file for development or testing purposes. The LDAP simulation file format is as follows: One line per user Each line has 4 comma-delimited fields - username, - realname, - e-mail, - password Any extra fields are ignored On production systems, this option should be set to '. This is the default. $g_ldap_port Deprecated since MantisBT release 1.2.0a1. The LDAP server port number should be defined as part of the URI in $g_ldap_server instead (see above). $g_bug_submit_status Status to assign to the bug when submitted. Default value is NEW_. $g_bug_assigned_status Status to assign to the bug when assigned. Default value is ASSIGNED. $g_bug_reopen_status Status to assign to the bug when reopened. Default value is FEEDBACK. $g_bug_feedback_status Status to assign to the bug when feedback is required from the issue reporter. Once the reporter adds a note the status moves back from feedback to $g_bug_assigned_status or $g_bug_submit_status based on whether the bug assigned or not. $g_reassign_on_feedback When a note is added to a bug currently in $g_bug_feedback_status, and the note author is the bug's reporter, this option will automatically set the bug status to $g_bug_submit_status or $g_bug_assigned_status if the bug is assigned to a developer. Defaults to enabled. $g_bug_reopen_resolution Resolution to assign to the bug when reopened. Default value is REOPENED. $g_auto_set_status_to_assigned Automatically set status to $g_bug_assigned_status whenever a bug is assigned to a person. Installations where assigned status is to be used when the defect is in progress, rather than just put in a person's queue should set it to OFF. Default is ON. $g_bug_resolved_status_threshold Bug is resolved, ready to be closed or reopened. In some custom installations a bug maybe considered as resolved when it is moved to a custom (FIXED OR TESTED) status. $g_bug_resolution_fixed_threshold Threshold resolution which denotes that a bug has been resolved and successfully fixed by developers. Resolutions above this threshold and below $g_bug_resolution_not_fixed_threshold are considered to be resolved successfully. Default value is FIXED. $g_bug_resolution_not_fixed_threshold Threshold resolution which denotes that a bug has been resolved without being successfully fixed by developers. Resolutions above this threshold are considered to be resolved in an unsuccessful way. Default value is UNABLE_TO_DUPLICATE. $g_bug_readonly_status_threshold $g_update_readonly_bug_threshold Bug becomes readonly if its status is >= $g_bug_readonly_status_threshold. The bug becomes read/write again if re-opened and its status becomes less than this threshold. The default is RESOLVED. Once the bug becomes readonly, a user with an access level greater than or equal to $g_update_readonly_bug_threshold can still edit the bug. $g_status_enum_workflow 'status_enum_workflow' defines the workflow, and reflects a simple 2-dimensional matrix. For each existing status, you define which statuses you can go to from that status, e.g. From NEW_ you might list statuses '10:new,20:feedback,30:acknowledged' but not higher ones.The default is no workflow, where all states are accessible from any others. $g_report_bug_threshold This is the access level required to open a bug. The default is REPORTER. $g_update_bug_threshold This is the access level generally required to update the content of a bug. The default is UPDATER. $g_handle_bug_threshold This is the access level generally required to be access level needed to be listed in the assign to field. The default is DEVELOPER. If a more restrictive setting can be determined from $g_set_status_threshold, it will be used. $g_update_bug_status_threshold $g_set_status_threshold These settings control the access level required to promote a bug to a new status once the bug is opened.$g_set_status_threshold is an array indexed by the status value that allows a distinct setting for each status. It defaults to blank.If the appropriate status is not defined above, $g_update_bug_status_threshold is used instead. The default is DEVELOPER. $g_allow_close_immediately If set, bugs are allowed to be resolved and closed in one action. The default is OFF. $g_allow_reporter_close If set, the bug reporter is allowed to close their own bugs, regardless of their access level. The default is OFF. $g_allow_reporter_reopen If set, the bug reporter is allowed to reopen their own bugs once resolved, regardless of their access level. This allows the reporter to disagree with the resolution. The default is ON. $g_filter_by_custom_fields Show custom fields in the filter dialog and use these in filtering. Defaults to ON. $g_filter_custom_fields_per_row The number of custom fields to display per row. The default is 7. The value should be greater than or equal to 7. $g_view_filters = SIMPLE_DEFAULT; Controls the display of the filter pages. Possible values are: • SIMPLE_ONLY - only simple view • ADVANCED_ONLY - only advanced view (allows multiple value selections) • SIMPLE_DEFAULT - defaults to simple view, but shows a link for advanced • ADVANCED_DEFAULT - defaults to advanced view, but shows a link for simple $g_dhtml_filters = OFF; Controls the use of DHTML filters that will display the filter in view page using DHTML and javascript. Default is OFF. This requires $g_use_javascript to ne set to ON. This may not work in all browsers as it requires xmlhttprequest functionality. $g_create_permalink_threshold The threshold required for users to be able to create permalinks (default DEVELOPER). To turn this feature off use NOBODY. $g_create_short_url The service to use to create a short URL. The%s will be replaced by the long URL. By default service is used to shorten URLs. $g_user_login_valid_regex The regular expression to use when validating new user login names. The default regular expression allows a-z, A-Z, 0-9, +, -, dot, space and underscore. If you change this, you may want to update the ERROR_USER_NAME_INVALID string in the language files to explain the rules you are using on your site. See for more details about regular expressions. For testing regular expressions, use. $g_monitor_bug_threshold Access level needed to monitor bugs. The default value is REPORTER. $g_monitor_add_others_bug_threshold Access level needed to add other users to the list of users monitoring a bug. The default value is DEVELOPER. $g_monitor_delete_others_bug_threshold Access level needed to delete other users from the list of users monitoring a bug. The default value is DEVELOPER. $g_limit_reporters Limit reporters to only viewing bugs that they report. $g_allow_reporter_close Allow reporters to close the bugs they reported. $g_allow_close_immediately Allow developers and above to close bugs immediately when resolving bugs. $g_delete_bug_threshold Allow the specified access level and above to delete bugs. $g_bug_move_access_level Allow the specified access level and above to move bugs between projects. $g_allow_account_delete Allow users to delete their own accounts. $g_allow_anonymous_login Enable anonymous access to Mantis. You must also specify $g_anonymous_account as the account which anonymous users will browse Mantis with. The default setting is OFF. $g_anonymous_account Define the account which anonymous users will assume when using Mantis. This account is considered by Mantis to be protected from modification. In other words, this account can only be modified by users with an access level equal to or higher than $g_manage_user_threshold. Anonymous users will not be able to adjust preferences or change account settings like normal users can. You will need to create a new account to use for this $g_anonymous_account setting. When creating the account you should specify a password, email address and so forth in the same way you'd create any other account. It is suggested that the access level for this account be set to VIEWER or some other read only level. The anonymous user account will not receive standard notifications and can not monitor issues. The default setting is blank/undefined. You only need to define this setting when $g_allow_anonymous_login is set to ON. $g_cvs_web This allows for quick linking to CVS files via CVSweb or ViewCVS. $g_bug_link_tag If a number follows this tag it will create a link to a bug. Default is '#'. • '#': a link would be #45 • 'bug:' a link would be bug:98 $g_bugnote_link_tag If a number follows this tag it will create a link to a bug note. Default is '~'. • '~': a link would be ~45 • 'bugnote:' a link would be bugnote:98 $g_show_timer Time page loads. Shows at the bottom of the page. $g_show_queries_count Shows the total number/unique number of queries executed to serve the page. Default is ON. $g_show_queries_list Shows the list of all queries that are executed in chronological order from top to bottom. This option is only effective when $g_show_queries_count is ON. Default is OFF. WARNING: Potential security hazard. Only turn this on when you really need it (for debugging or profiling) $g_register_globals If your register_globals is Off then set this to OFF. Check your register_globals setting in php.ini or phpinfo(). $g_enable_project_documentation Specifies whether to enable support for project documents or not. Default is OFF. This feature is deprecated and is expected to be moved to a plugin in the future. $g_admin_site_threshold Threshold at which a user is considered to be a site administrator. These users have the highest level of access to your Mantis installation. This access level is required to change key Mantis settings (such as server paths) and perform other administrative duties. You may need to change this value from the default of ADMINISTRATOR if you have defined a new access level to replace the default ADMINISTRATOR level in constant_inc.php. This is a potentially dangerous configuration option. Users at or above this threshold value will have permission to all aspects of Mantis including the admin/ directory. With this access level, users can damage your installation of Mantis, destroy your database or have elevated access to your server. DO NOT CHANGE THIS VALUE UNLESS YOU ABSOLUTELY KNOW WHAT YOU'RE DOING. BE VERY CAREFUL WITH CHANGING THIS CONFIGURATION VALUE FROM THE DEFAULT SETTING. $g_view_configuration_threshold Threshold for users to view the raw system configurations as stored in the database. The default value is ADMINISTRATOR. $g_set_configuration_threshold Threshold for users to set the system configurations generically via MantisBT web interface. WARNING: Users who have access to set configuration via the interface MUST be trusted. This is due to the fact that such users can set configurations to PHP code and hence there can be a security risk if such users are not trusted. The default value is ADMINISTRATOR. $g_csv_add_bom Add Byte Order Mark (BOM) at the begining of the file as it helps Excel display the file in UTF-8. The default value is OFF. $g_cookie_path Specifies the path under which a cookie is visible. All scripts in this directory and its sub-directories will be able to access MantisBT cookies. Default value is '/'. It is recommended to set this to the actual MantisBT path. $g_cookie_domain The domain that the MantisBT cookies are available to. $g_cookie_version Version of the view_all_page cookie. This is used as a prefix for cookies that should be expired when the code is changed in a certain way. The developers would increase this version when necessary, which in effect will cause the creation of new cookies that are compatible with the new code. It is not expected for the user to need to change this setting. $g_cookie_prefix Prefix for all MantisBT cookies This should be an identifier which does not include spaces or periods, and should be unique per MantisBT installation, especially if $g_cookie_path is not restricting the cookies' scope to the actual MantisBT directory. It applies to the cookies listed below. Their actual names are calculated by prepending the prefix, and it is not expected for the user to need to change these. • $g_string_cookie • $g_project_cookie • $g_view_all_cookie • $g_manage_users_cookie Stores the filter criteria for the Manage Users page • $g_manage_config_cookie Stores the filter criteria for the Manage Config Report page • $g_logout_cookie • $g_bug_list_cookie. $g_compress_html This option is used to enable buffering/compression of HTML output if the user's browser supports it. Default value is ON. This option will be ignored in the following scenarios: • If php.ini has zlib.output_compression enabled. • If php.ini has output_handler set to a handler. • If PHP does not include the zlib extension (PHP 4.3.0 and later include zlib extension by default). You can check the loaded modules in your PHP by running 'php -m' on the command line, or by using php_info() command in a php script. $g_use_persistent_connections Use persistent database connections, setting this to ON will open the database once per connection, rather than once per page. There might be some scalability issues here and that is why it is defaulted to OFF. Sending reminders is a feature where a user can notify / remind other users about a bug. In the past, only selected users like the managers, or developers would get notified about bugs. However, these people can not invite other people (through MantisBT) to look at or monitor these bugs. This feature is useful if the Manager needs to get feedback from testers / requirements team about a certain bug. It avoid needing this person to do this manual outside MantisBT. It also records the history of such reminders. $g_enable_sponsorship enable/disable the whole issue sponsorship feature. The default os OFF. $g_sponsorship_currency The currency string used for all sponsorships. The default is 'US$'. $g_minimum_sponsorship_amount The minimum sponsorship amount that can be entered. If the user enters a value less than this, an error will be flagged. The default is 5. $g_view_sponsorship_total_threshold The access level threshold needed to view the total sponsorship for an issue by all users. The default is VIEWER. $g_view_sponsorship_details_threshold The access level threshold needed to view the details of the sponsorship (i.e., who will donate what) for an issue by all users. The default is VIEWER. $g_sponsor_threshold The access level threshold needed to allow user to sponsor issues. The default is REPORTER. Note that sponsoring user must have their email set in their profile. $g_handle_sponsored_bugs_threshold The access level required to be able to handle sponsored issues. The default is DEVELOPER. $g_assign_sponsored_bugs_threshold The access level required to be able to assign a sponsored issue to a user with access level greater or equal to 'handle_sponsored_bugs_threshold'. The default is MANAGER. $g_my_view_boxes This is an array of values defining the order that the boxes to be shown. A box that is not to be shown can have its value set to 0. The default is: $g_my_view_boxes = array ( 'assigned' => '1', 'unassigned' => '2', 'reported' => '3', 'resolved' => '4', 'recent_mod' => '5', 'monitored' => '6' ); If you want to change the definition, copy the default value and apply the changes. $g_my_view_bug_count Number of bugs shown in each box. The default is 10. $g_default_home_page Default page to transfer to after Login or Set Project. The default is 'my_view_page.php'. An alternative would be 'view_all_bugs_page.php' or 'main_page.php'. $g_relationship_graph_enable This enables the relationship graphs feature where issues are represented by nodes and relationships as links between such nodes. Possible values are ON or OFF. Default is OFF. This feature requires installing (all OSes except Windows) or (only Windows). Refer to the notes near the top of core/graphviz_api.php and core/relationship_graph_api.php for more information. $g_relationship_graph_fontname Font name and size, as required by Graphviz. If Graphviz fails to run for you, you are probably using a font name that gd PHP extension can't find. On Linux, try the name of the font file without the extension. The default value is 'Arial'. $g_relationship_graph_fontsize Font size, default is 8. $g_relationship_graph_orientation Default dependency orientation. If you have issues with lots of children or parents, leave as 'horizontal', otherwise, if you have lots of 'chained' issue dependencies, change to 'vertical'. Default is 'horizontal'. $g_relationship_graph_max_depth Max depth for relation graphs. This only affects relationship graphs, dependency graphs are drawn to the full depth. The default value is 2. $g_relationship_graph_view_on_click If set to ON, clicking on an issue on the relationship graph will open the bug view page for that issue, otherwise, will navigate to the relationship graph for that issue. $g_dot_tool The full path for the dot tool. The webserver must have execute permission to this program in order to generate relationship graphs. This configuration option is not relevant for Windows. The default value is '/usr/bin/dot'. $g_neato_tool The full path for the neato tool. The webserver must have execute permission to this program in order to generate relationship graphs. This configuration option is not relevant for Windows. The default value is '/usr/bin/neato'. $g_show_extended_project_browser Whether to use the extended project selector, where top level projects have their separate selector, and sub-projects have another. If OFF, there will be one combo box at the top right to select the project/sub-project. If ON, there will be two. The default is OFF. $g_subprojects_inherit_versions Whether sub-projects should inherit versions from parent projects. For project X which is a sub-project of A and B, it will have versions from X, A and B. The default value is ON. $g_subprojects_inherit_categories Whether sub-projects should inherit categories from parent projects. For project X which is a sub-project of A and B, it will have categories from X, A and B. The default value is ON. $g_enable_eta Enable or disable usage of 'ETA' field. Default value is OFF. $g_enable_projection Enable or disable usage of 'Projection' field. Default value is OFF. $g_show_product_build Enable or disable usage of 'Product Build' field. Default is OFF. $g_bug_report_page_fields An array of fields to show on the issue view page. Some of these fields may be filtered out if their features are disabled or if the user doesn't have access to view them. See BUG_FIELD_* in constant_inc.php for all possible values. The following fields cannot be included: BUG_FIELD_ID, BUG_FIELD_PROJECT, BUG_FIELD_DATE_SUBMITTED, BUG_FIELD_LAST_UPDATED, BUG_FIELD_TAGS, BUG_FIELD_FIXED_IN_VERSION, BUG_FIELD_PROJECTION, BUG_FIELD_ETA, BUG_FIELD_REPORTER. The following fields must be included: BUG_FIELD_CATEGORY, BUG_FIELD_SUMMARY, BUG_FIELD_DESCRIPTION. To overload these settings per project, then the settings must be included in the database through the generic configuration form. Note that the array in the database should consistent of the values of the constants below. For example, replace BUG_FIELD_CATEGORY with 'category_id'. See constant_inc.php for the values of the constants. $g_bug_view_page_fields An array of fields to show on the issue view page. Some of these fields may be filtered out if their features are disabled or if the user doesn't have access to view them. See BUG_FIELD_* in constant_inc.php for all possible values. To overload this setting per project, then the setting must be included in the database through the generic configuration form. Note that the array in the database should consistent of the values of the constants. For example, replace BUG_FIELD_CATEGORY with 'category_id'. See constant_inc.php for the values of the constants. $g_bug_print_page_fields An array of fields to show on the issue print page. Some of these fields may be filtered out if their features are disabled or if the user doesn't have access to view them. See BUG_FIELD_* in constant_inc.php for all possible values. $g_bug_update_page_fields An array of fields to show on the issue update page. Some of these fields may be filtered out if their features are disabled or if the user doesn't have access to view them. See BUG_FIELD_* in constant_inc.php for all possible values. To overload this setting per project, then the setting must be included in the database through the generic configuration form. Note that the array in the database should consistent of the values of the constants. For example, replace BUG_FIELD_CATEGORY with 'category_id'. See constant_inc.php for the values of the constants. $g_bug_change_status_page_fields An array of fields to show on the issue change status page. Some of these fields may be filtered out of their features are disabled or if the user doesn't have access to view them. See BUG_FIELD_* in constant_inc.php for all possible values. To overload this setting per project, then the setting must be included in the database through the generic configuration form. Note that the array in the database should consistent of the values of the constants. For example, replace BUG_FIELD_CATEGORY with 'category_id'. See constant_inc.php for the values of the constants. LOG_AJAX logs AJAX events LOG_DATABASE logs database events and executed queries LOG_EMAIL logs issue id, message type and recipients for all emails sent LOG_EMAIL_RECIPIENT logs the details of email recipient determination. Each user id is listed as well as why they are added, or deleted from the recipient list LOG_FILTERING logs filter operations LOG_LDAP logs the details of LDAP operations Multiple logging levels can be combined by using an inclusive or operator, e.g. LOG_EMAIL| LOG_EMAIL_RECIPIENT $g_log_destination specifies the file where the log data goes. This file must be writable by the web server userid running MantisBT. Right now, only 'file:' is supported. For example, $g_log_destination = 'file:/tmp/mantis_log'; See for details. $g_time_tracking_enabled Turns Time Tracking features ON or OFF - Default is OFF $g_time_tracking_without_note Allow time tracking to be recorded without writing some text in the associated bugnote - Default is ON $g_time_tracking_with_billing Adds calculation links to workout how much time has been spent between a particular time frame. Currently it will allow you to enter a cost/hour and will work out some billing information. This will become more extensive in the future. Currently it is more of a proof of concept. $g_time_tracking_stopwatch Instead of a text field turning this option on places a stopwatch on the page with Start/Stop and Reset buttons next to it. You must have $g_use_javascript switched on for this to take effect. A bit gimmicky, but who cares. $g_time_tracking_view_threshold Access level required to view time tracking information - Default DEVELOPER. $g_time_tracking_edit_threshold Access level required to add/edit time tracking information (If you give a user $g_time_tracking_edit_threshold you must give them $g_time_tracking_view_threshold aswell) - Default DEVELOPER. $g_time_tracking_reporting_threshold Access level required to run reports (not completed yet) - Default MANAGER. MantisBT exposes a SOAP API which allows remote clients to interact with MantisBT and perform many of the usual tasks, such as reporting issues, running filtered searches and retrieving attachments. The SOAP API is enabled by default and available at /api/soap/mantisconnect.php below your installation root. A WSDL file which describes the web service is available at /api/soap/mantisconnect.php?wsdl below your installation root. The following options are used to control the behaviour of the MantisBT SOAP API and are usually configured in api/soap/mc_config_inc.php. $g_mc_use_nusoap Flag controlling the library to use for SOAP communication. When the native PHP extension is available this flag default to OFF, which means that nusoap will not used. The native extension has the advantage of being faster, more memory efficient and maintained to work with recent versions on PHP. When the extension is not available MantisBT falls back to using nusoap. $g_mc_readonly_access_level_threshold Minimum global access level required to access webservice for readonly operations. $g_mc_readwrite_access_level_threshold Minimum global access level required to access webservice for read/write operations. $g_mc_admin_access_level_threshold Minimum global access level required to access the administrator webservices. Just enter your username and password and hit the login button. There is also a Save Login checkbox to have the package remember that you are logged in between browser sessions. You will have to have cookies enabled to login.If the account doesn't exist, the account is disabled, or the password is incorrect then you will remain at the login page. An error message will be displayed.The administrator may allow users to sign up for their own accounts. If so, a link to Signup for your own account will be available.The administrator may also have anonymous login allowed. Anonymous users will be logged in under a common account.You will be allowed to select a project to work in after logging in. You can make a project your default selection from the Select Project screen or from your Account Options.SignupHere you can signup for a new account. You must supply a valid email address and select a unique username. Your randomly generated password will be emailed to your email account. If MantisBT is setup so that the email password is not to be emailed, newly generated accounts will have an empty password. This is the first page you see upon logging in. It shows you the latest news updates for the bugtracker. This is a simple news module (based off of work by Scott Roberts) and is to keep users abreast of changes in the bugtracker or project. Some news postings are specific to projects and others are global across the entire bugtracker. This is set at the time of posting in the Edit News section.The number of news posts is controlled by a global variable. When the number of posts is more than the limit, a link to show 'older news' is displayed at the bottom. Similarly a 'newer news' is displayed when you have clicked on 'older news'.There is an Archives option at the bottom of the page to view all listings.ArchivesA title/date/poster listing of ALL past news articles will be listed here. Clicking on the link will bring up the specified article. This listing will also only display items that are either global or specific to the selected project. Here we can view the issue listings. The page has a set of viewing filters at the top and the issues are listed below.FiltersThe filters control the behavior of the issues list. The filters are saved between browsing sessions but do not currently save sort order or direction.If the number of issues exceeds the 'Show' count in the filter a set of navigation to go to 'First', 'Last', 'Previous', 'Next' and specific page numbers are added.The Search field will look for simple keyword matches in the summary, description, steps to reproduce, additional information, issue id, or issue text id fields. It does not search through issue notes. Issue List - The issues are listed in a table and the attributes are listed in the following order: priority, id, number of issue notes, category, severity, status, last updated, and summary. Each (except for number of issue notes) can be clicked on to sort by that column. Clicking again will reverse the direction of the sort. The default is to sort by last modification time, where the last modified issue appears at the top. The issue id is a link that leads to a more detailed report about the issue. You can also add issue notes here. The number in the issue note count column will be bold if an issue note has been added in the specified time frame. The addition of an issue note will make the issue note link of the issue appear in the unvisited state. The text in the 'Severity' column will be bold if the severity is major, crash, or block and the issue not resolved. The text in the 'Updated' column will be bold if the issue has changed in the last 'Changed(hrs)' field which is specified in the viewing filters. Each table row is color coded according to the issue status. Here is the simple listing of the issue report. Most of the fields are self-explanatory. 'Assigned To' will contain the developer assigned to handle the issue. Priority is fully functional but currently does nothing of importance. Duplicate ID is used when an issue is a duplicate of another. It links to the duplicate issue which allows users to read up on the original issue report. Below the issue report is a set of buttons that a user can select to work on the issue. • Update Issue - brings up a page to edit all aspects of the issue • Assign to - in conjunction with the dropdown list next top the button, this is a shortcut to change the assignment of an issue • Change Status to - in conjunction with the dropdown list next top the button, this is a shortcut to change the status of an issue. Another page (Change Status) will be presented to allow the user to add notes or change relevant information • Monitor / Unmonitor Issue - allows the user to monitor any additions to the issue by email • Create Clone - create a copy of the current issue. This presents the user with a new issue reporting form with all of the information in the current issue filled in. Upon submission, a new issue, related to the current issue, will be created. • Reopen Issue - Allows the user to re-open a resolved issue • Move Issue - allows the user to move the issue to another project • Delete Issue - Allows the user to delete the issue permanently. It is recommended against deleting issues unless the entry is frivolous. Instead issues should be set to resolved and an appropriate resolution category chosen. A panel is provided to view and update the sponsorship of an issue.Another panel is provided to view, delete and add relationships for an issue. Issues can have a parent/child relationship, where the user is warned about resolving a parent issue before all of the children are resolved. A peer relationship is also possible.Below this, there may be a form for uploading file attachments. The Administrator needs to configure the bugtracker to handle file uploads. If uploading to disk is selected, each project needs to set its own upload path. Issue notes are shown at the bottom of the issue report. A panel to add issue notes is also shown. This page allow an administrator to manage the users in the system.It essentially supplies a list of users defined in the system. The user names are linked to a page where you can change the user's name, access level, and projects to which they are assigned. You can also reset their passwords through this page.At the top, there is also a list of new users (who have created an account in the last week), and accounts where the user has yet to log in.New users are created using the 'Create User' link above the list of existing users. Note that the username must be unique in the system. Further, note that the user's real name (as displayed on the screen) cannot match another user's user name. This page allows the user to manage the projects listed in the system.Each project is listed along with a link to manage that specific project. The specific project pages allow the user to change: • the project name • the project description • its status • whether the project is public or private. Private projects are only visible to users who are assigned to it or users who have the access level to automatically have access to private projects (eg: administrators). • afile directory used to store attachments for issues and documents associated with the project. This folder is located on the webserver, it can be absolute path or path relative to the main MantisBT folder. Note that this is only used if the files are stored on disk or via FTP. In case of FTP, the cached version that is saved on the webserver, is stored in the specified path. • common subprojects. These are other projects who can be considered a sub-project of this one. They can be shared amongst multiple projects. For example, a 'documentation' project may be shared amongst several development projects. • project categories. These are used to sub-divide the issues stored in the system. • project versions. These are used to create ChangeLog reports and can be used to filter issues. They are used for both the Found In and Fixed In versions. • Custom Fields linked to this project • Users linked to this project. Here is the place where a user's access level may be upgraded or downgraded depending on their particular role in the project. This page is the base point for managing custom fields. It lists the custom fields defined in the system. There is also a place to enter a new field name to create a new field.The 'Edit' links take you to a page where you can define the details of a custom field. These include it's name, type, value, and display information. On the edit page, the following information is defined to control the custom field: • name • type. Possible values are listed below. • Value constraints (Possible values, default value, regular expression, minimum length, maximum length). • Access (who can read and write the field based on their access level). • Display control (where the field will show up and must be filled in All fields are compared in length to be greater than or equal to the minimum length, and less than or equal to the minimum length, unless these values are 0. If the values are 0, the check is skipped. All fields are also compared against the regular expression. If the value matches the expression, then the value is stored. For example, the expression '/^-?([0-9])*$/' can be used to constrain an integer.The table below describes the field types and the value constraints. Type Field Contents Value Constraints String text string up to 255 characters Numeric an integer Float a floating point number Enumeration one of a list of text strings Enter the list of text strings separated by '|' (pipe character) in the Possible Values field. The Default value should match one of these strings as well. This will be displayed as a dropdown menu. Email an email address string up to 255 characters When displayed, the value will also be encapsulated in a mailto: reference. Checkbox zero or more of a list of text strings Enter the list of text strings separated by '|' (pipe character) in the Possible Values field. The Default value should match one of these strings as well. This will be displayed as a list of text strings with a checkbox beside them. List one of a list of text strings Enter the list of text strings separated by '|' (pipe character) in the Possible Values field. The Default value should match one of these strings as well. This will be displayed as a multi-line dropdown menu. Multiselection List zero or more of a list of text strings Enter the list of text strings separated by '|' (pipe character) in the Possible Values field. The Default value should match one of these strings as well. This will be displayed as a multi-line dropdown menu. Date text string defining a date This is displayed as a set of dropdown menus for day, month, and year. Defaults should be defined in yyyy-mm-dd format. The display entries are used as follows. Entry Meaning Display Only On Advanced Page If checked, the field will NOT be shown on the simple issue displays Display When Reporting Issues If checked, the field will be shown on the report issues displays Display When Updating Issues If checked, the field will NOT be shown on the update issue and change status displays Display When Resolving Issues If checked, the field will NOT be shown on the update issue displays and change status displays, if the new status is resolved. Display When Closing Issues If checked, the field will NOT be shown on the update issue displays and change status displays, if the new status is closed. Required On Report If checked, the field must be filled in on the issue reports. Required On Update If checked, the field must be filled in on the update issue and change status displays. Required On Resolve If checked, the field must be filled in on the update issue and change status displays, if the new status is resolved. Required On Close If checked, the field must be filled in on the update issue and change status displays, if the new status is closed. Notes on Display • Be careful not to set both a required attribute and show only on advanced display. It may be possible to trigger a validation error that the user cannot recover from (i.e., field is not filled in). This set of pages control the configuration of the MantisBT system. Note that the configuration items displayed may be on a project by project basis.These pages serve two purposes. First, they will display the settings for the particular aspects of the system. If authorized, they will allow a user to change the parameters. They also have settings for what access level is required to change these settings ON A PROJECT basis. In general, this should be left alone, but administrators may want to delegate some of these settings to managers. Issues Title Variable Description Status to which a new issue is set $g_bug_submit_status status issue is set to when submitted Status where an issue is considered resolved $g_bug_resolved_status_threshold status where issue is resolved Status to which a reopened Issue is set $g_bug_reopen_status status issue is set to when reopened The matrix that follows has checkmarks where the transitions are allowed from the status on the left edge to the status listed across the top. This corresponds to the $g_enum_workflow array.At the bottom, there is a list of access levels that are required to change the status to the value listed across the top. This can be used, for instance, to restrict those who can close an issue to a specific level, say a manager. This corresponds to the $g_set_status_threshold array and the $g_report_bug_threshold setting. This page sets the system defaults for sending emails on issue related events. MantisBT uses flags and a threshold system to generate emails on events. The monitor issues feature allows users to subscribe to certain issues and hence get copied on all notification emails that are sent for these issues.Depending on the configuration, sending a reminder to a user about an issue can add this issue to the user's list of monitored issues. Users who reported the issue or are assigned the issue typically don't need to monitor the issue to get the notifications. This is because by default they get notified on changes related to the issue anyway. However, administrators can change the configuration to disable notifications to reporters or handlers in specific scenarios. MantisBT supports news syndication using RSS v2.0 protocol. MantisBT also supports authenticated news feeds for private projects or installations where anonymous access is not enabled. Authenticated feeds takes a user name and a key token that are used to authenticate the user and generate the feed results in the context of the user's access rights (i.e. The same as what the user would see if they were to logged into MantisBT).To get access to the News RSS as anonymous user, visit the following page: While a user is logged in, the RSS links provided in the UI will always provide links to the authenticated feeds, if no user is logged in (i.e. Anonymous), then anonymous links will be provided. Different teams typically like to capture different information as users report issues, in some cases, the data required is even different from one project to another. Hence, MantisBT provides the ability for managers and administrators to define custom fields as way to extend MantisBT to deal with information that is specific to their teams or their projects. The aim is for this to keep MantisBT native fields to a minimum. Following are some facts about the implementation of custom fields in MantisBT: • Custom fields are defined system wide. • Custom fields can be linked to multiple projects. • The sequence of displaying custom fields can be different per project. • Custom fields must be defined by users with access level ADMINISTRATOR. • Custom fields can be linked to projects by users with access level MANAGER or above (by default, this can be configurable). • Number of custom fields is not restricted. • Users can define filters that include custom fields. • Custom fields can be included in View Issues, Print Issues, and CSV exports. • Enumeration custom fields can have a set of static values or values that are calculated dynamically based on a custom function. • The logged in user needs to have access level that is greater than or equal to $g_custom_field_link_threshold and $g_manage_project_threshold. • Select 'Manage' from the main menu. • Select 'Manage Projects'. • Select the name of the project to manage. • Scroll down to the 'Custom Fields' box. • Select the field to add from the list, then click 'Add This Existing Custom Field'. • To change the order of the custom fields, edit the 'Sequence' value and click update. Custom fields with smaller values are displayed first. • To unlink a custom field, click on 'Remove' link next to the field. Unlinking a custom field will not delete the values that are associated with the issues for this field. These values are only deleted if the custom field definition is removed (not unlinked!) from the database. This is useful if you decide to re-link the custom field. These values may also re-appear if issues are moved to another project which has this field linked. As discussed earlier, one of the possible types of a custom field is 'enumeration'. This type of custom field allows the user to select one value from a provided list of possible values. The standard way of defining such custom fields is to provide a '|' separated list of possible values. However, this approach has two limitations: the list is static, and the maximum length of the list must be no longer than 255 characters. Hence, the need for the ability to construct the list of possible values dynamically. MantisBT ships with some dynamic possible values, these include the following: • =categories - a list of categories defined in the current project (or the project to which the issue belongs). • =versions - a list of all versions defined in the current project (or the project to which the issue belongs). • =future_versions - a list of all versions that belong to the current project with released flag set to false. • =released_versions - a list of all versions that belong to the current project with released flag set to true. How enumerations work? Core/constant_inc.php defines the constants that correspond to those in the enumeration. These are useful to refer to these enumerations in the configs and the code. Define( 'VIEWER', 10 ) define( 'REPORTER', 25 ) define( 'UPDATER', 40 ) define( 'DEVELOPER', 55 ) define( 'MANAGER', 70 ) define( 'ADMINISTRATOR', 90 ) config_defaults_inc.php includes the defaults for the enumerations. The configuration options that are defaulted here are used in specifying which enumerations are active and should be used in MantisBT. However, the strings included in the enumerations here are just for documentation purpose, they are not shown to the user (due to the need for localisation). Hence, if an entry in this enumeration is not found in the corresponding localised enumeration (i.e. 70:manager), then it will be printed to the user as @70@. $g_access_levels_enum_string = '10:viewer,25:reporter,40:updater,55:developer,70:manager,90:administrator'; lang/strings_german.txt provide the localised strings (in this case, in german) for enumerations. But again, the master list is the enumeration in the configs, the ones in the language files are just used for finding the localised equivalent for an entry. Hence, if a user changes the config to have only two types of users developers and administrators, then only those will be prompted to the users even if the enumerations in the language files still includes the full list. $s_access_levels_enum_string = '10:Betrachter,25:Reporter,40:Updater,55:Entwickler,70:Manager,90:Administrator'. See Email in the Configuration section. Examples: • Notify only managers of new issues. $g_notify_flags['new']['threshold_min'] = MANAGER; $g_notify_flags['new']['threshold_max'] = MANAGER; • Notify Developers and managers of all project events, except, exclude developers from the 'closed' events. $g_default_notify_flags['threshold_min'] = DEVELOPER; $g_default_notify_flags['threshold_max'] = MANAGER; $g_notify_flags['closed']['threshold_max'] = MANAGER; $g_notify_flags['closed']['threshold_max'] = MANAGER; • Exclude those who contributed issue notes from getting messages about other changes in the issue. $g_default_notify_flags['bugnotes'] = OFF; • Exclude those monitoring issues from seeing the 'closed' message $g_notify_flags['closed']['monitor'] = OFF; • Only notify developers when issue notes are added. $g_notify_flags['bugnote']['threshold_min'] = DEVELOPER; $g_notify_flags['bugnote']['threshold_max'] = DEVELOPER; • Notify managers of changes in sponsorship. $g_notify_flags['sponsor']['threshold_max'] = MANAGER; $g_notify_flags['sponsor']['threshold_max'] = MANAGER; • Notify originator and managers of changes in ownership ('Assigned To:'). $g_notify_flags['owner']['threshold_max'] = MANAGER; $g_notify_flags['owner']['threshold_max'] = MANAGER; $g_notify_flags['owner']['reporter'] = ON; • I'm paranoid about mail. Only send information on issues to those involved in them. Don't send mail people already know about. Also send new issue notifications to managers so they can screen them. $g_mail_receive_own = OFF; $g_default_notify_flags = array('reporter' => ON, 'handler' => ON, 'monitor' => ON, 'bugnotes' => ON, 'threshold_min' => NOBODY, 'threshold_max' => NOBODY); $g_notify_flags['new']['threshold_min'] = MANAGER; $g_notify_flags['new']['threshold_max'] = MANAGER; • How do I replace the $g_to_email configuration variable to log all messages to an email logger. You will need to create a dummy user with the appropriate access level for the notices you want to log. Once this user is added to projects, they will receive mail using the appropriate rules. Do NOT call lang_get_current() from custom_strings_inc.php, as doing so will reset the active_language, causing the code to return incorrect translations if the default language is different from English. Always use the $g_active_language global variable instead. • Add the new status to the workflow as required. Custom functions are used to extend the functionality of MantisBT by integrating user-written functions into the issue processing at strategic places. This allows the system administrator to change the functionality without touching MantisBT's core. Default Custom Functions are defined in the API file core/custom_function_api.php, and are named custom_function_default_descriptive_name, where descriptive_name describes the particular function. For a description of the specific functions. User versions of these functions (overrides) are named like custom_function_override_descriptive_name, and placed in a file called custom_functions_inc.php that must be saved in MantisBT's root directory (This is the same place where the config_inc.php file resides). In normal processing, the system will look for override functions and execute them instead of the provided default functions. The simplest way to create a custom function is to copy the default one from the api to your override file ( custom_functions_inc.php), and rename it (i.e. Replacing 'default' by 'override'). The specific functionality you need can then be coded into the override function. Custom Function Name Description Return value custom_function_default_auth_can_change_password() Determines whether MantisBT can update the password True if yes, False if not custom_function_default_changelog_include_issue( $p_issue_id ) Determines whether the specified issue should be included in the Changelog or not. This error occurs whenever MantisBT tries to access an issue having a Category which has been deleted from the database. It will most likely happen when the Category specified by has been deleted, and an issue is subsequently moved to another project where its current category does not exist. There are two ways to resolve this issue: • Recreate the missing category • Find the missing Category's Id This can be done by checking the value of default_category_for_moves in config_inc.php and/or in Manage Configuration. Alternatively, the following SQL can be executed SELECT DISTINCT category_id FROM mantis_bug_table b LEFT OUTER JOIN mantis_category_table c ON category_id = c.id WHERE category_id 0 AND c.id IS NULL • Recreate the missing Category The category's id must be manually set to reflect the value retrieved above (e.g. Using SQL or your favorite DB admin tool) • Assign a new category to the issues referencing the missing one • Identify the corrupted issues and corresponding missing categories SELECT b.id, category_id FROM mantis_bug_table b LEFT OUTER JOIN mantis_category_table c ON category_id = c.id WHERE category_id 0 AND c.id IS NULL • Determine which Category id to use instead of the deleted one • Update the issues This can either be done manually using your favorite DB admin tool or with SQL, e.g. UPDATE mantis_bug_table SET category_id = (NewCategoryId) WHERE category_id = (OldCategoryId) Finally, to avoid future occurences, you need to set to a valid Category Id. This must be done as appropriate, either globally in config_inc.php, or via the Manage Configuration page, for all occurences of the parameter. Note: to retrieve a category's ID, you can either • Look up the value directly in the database: mantis_category_table, column 'id' • Go to Manage Projects, click the Edit button for the desired category and look for the the value next to 'id=' in the page's URL. This error may only occur when Form Validation is enabled with = ON. There are several known cases that could trigger it: • Multiple submissions of a form by clicking on the submit button several times (user error) • Invalid or unauthorized submission of a form, e.g. By hand-crafting the URL (CSRF attack) • Expired PHP session In the first two instances, MantisBT's behavior is by design, and the response as expected. For expired sessions however, the user is impacted by system behavior, which could not only cause confusion, but also potential loss of submitted form data. What happens is driven by several php.ini configuration settings: • The ratio divided by, which determines the probability that the garbage collection process will start when a session is initialized. • which specifies (as the name does not indicate) the minimum validity of session data. With PHP default values, sessions created more than 1440 seconds (24 minutes) ago have a 1% chance to be invalidated each time a new session is initialized. This explains the seemingly random occurence of this error. Unfortunately, this problem cannot be fixed without a major rework of the way sessions and form security are handled in MantisBT. As a workaround, the Administrator can • Increase the value of • Set = OFF. Note that for security reasons, it is strongly recommended not to do this. Users may also install local tools to avoid loss of form data, e.g. Add-on for Firefox. Further references and reading: • MantisBT issues,. Authentication MantisBT supports several authentication methods out of the box. In addition, there is work in progress relating to supporting authentication plug-ins. Once these are implemented, authentication against any protocol or repository of user names and passwords will be possible without having to touch MantisBT core code. It is important to note that MantisBT does not yet support hybrid authentication scenarios. For example, internal staff authenticating against LDAP while customers authenticate against the MantisBT database with MD5 hash. See $g_login_method in for more details about how to configure MantisBT to use one of these authentication techniques. This is currently a work in progress. To follow the work have a look on the wiki page To activate the Time Tracking feature you have to set the configuration option 'time_tracking_enabled' to ON. To activating the Time Tracking you can: • Static solution: change the variable '$g_time_tracking_enabled' in the configuration file 'config_defaults_inc.php', this will change the configuration for all the MantisBT instance; • Dynamic and 'project by project' solution: Use the administration page 'Manage Configuration' and set the variable 'time_tracking_enabled' to '1' for which user and which project of you choice. All Time Tracking configuration options are described in the configuration section off this guide. If you have a product that can be integrates with MantisBT to provide a value for MantisBT users, that would be a great place to contribute and benefit both your project's community and the MantisBT community. A great examples in this area are integrations with content management systems (e.g. *Nuke, Xoops), project management (PHPProjekt), and TestLink for Test Management. MantisBT can easily be integrated with projects in any programming language whether it is hosted on the same webserver or anywhere else in the world. This can be achieved through it's SOAP API and MantisConnect client libraries. MantisConnect comes with client libraries and samples in languages like PHP,.NET, Java and Cocoa. Date Added: March 12, 2009| Visits: 4.131 Remove red, blue, green eyes from your pet's photos. The program can be installed as standalone and a plug-in as well. Requirements: Video system must support no less than 65K colors and 800x600 pixels Release Date: March 05, 2009 Install Support: Install and Uninstall Platforms: Windows XP, Windows Vista Home Basic Keyword:,,,,,,,,,, Version 3.5 Changes: + Eye color tool is added. Users rating: 0/10 License: Demo Cost: $29.95 USD Size: 3.19 MB. Red Eye Removal offers automatic, one click red eyes correction. No need to carefully select the eyes zone - just click on the eye, and Red Eye Removal utility will detect and fix the red-eye effect. ★ Diabetes Research Pilot Trial ★★ Diabetic Meal Planner App::The 3 Step Trick that Reverses Diabetes Permanently in As Little as 11 Days.[ DIABETES RESEARCH. I Beauty Pilot—Removes skin imperfections in portraits I Exif Pilot—Create, view, and edit Exif data I Layer Pilot—Makes image posters I MakeUp Pilot—Adds makeup effects directly to portraits I Perspective Pilot—For perspective correction I Pet Eye Pilot—Removes red, blue, and green eyes from pet photos I Photo Print. Remove red, blue, green eyes from your pet's photos with Pet Eye Pilot (+ Plugin) When you take photos of your pets, you often get a red eye effect; with animals. The Red Eye Removal tool makes red-eyes fixing. 2.51 MB - SoftOrbits Red Eye Remover offers automatic, one-click red eyes fixing. No need to select the eye zone - just click on the eye, and red eye remover will automatically detect and fix the red-eyes effect. The Red Eye Remover software makes red-eyes. 2.76 MB - Free photo red-eye reduction tool. Remove or fix red-eye effect very easily. The red-eye effect in photography is the common appearance of red pupils in color photographs of eyes. Free Red-eye Reduction Tool is a photo correction tool. 6.03 MB - 2 + 2 =. 2048 Cat + Cat = Dog Goat + Goat =. Snake + Snake =? Can you continue 2048 Animal version will make you really enjoy the game in 2048 Puzzle. Away you feel like exploring the collection and cute animals. 3.6 MB - In this game there will be 3 cats and 2 dogs placed alternatively. The object of this game is to move the cats and dots so that they are separated, i.e. 3 cats and then 2 dogs consecutively in a row. Each time you move, you must move a pair of cat. 263 KB - Sound Book for kids. This application is for kids, to learn reorganization of various animal, bird pictures and sounds. This application gives fun for your kids by learning more than 30 pictures and sounds: elephant, Cat, Dog, tiger. 5 MB - Anyone who takes photos will need Super Denoising. Super Denoising is an effective photo noise reduction software for Mac to remove image noise and improve image quality without disrupting crisp outlines and image colors for clearer, more. 16.41 MB - Find out the real age of your pets. If you have a cat, dog, rabbit, hamster, turtle or monkey you'll never miss their birthday again. Find out if you're older than your pet. Enter the birthday of your pet and see what age they are. 2 MB - New game for kid. Move an animal to right position in red circle Update new feature Requirements: Windows Phone 8.1, Windows Phone 8, Windows Phone 7.5 6 MB - Super Eraser Pro is a powerful image processing software to erase unwanted objects, scale, denoise and remove haze for images. Super Eraser Pro magically scales an image or removes unwanted elements such as watermark, date, people, building, etc. To protect the copyright, iTunes videos all come with Apple FairPlay DRM, which limits the videos from being played, edited or converted on non-Apple devices. However, some iTunes users requires to transfer these purchased or rented videos to. 2.3 MB - DVDFab Blu-ray Cinavia Removal is the world's first complete and permanent Cinavia removal solution. It can help Blu-ray consumers get rid of the annoying Cinavia protections embedded in the audio tracks of any Blu-ray discs, so that they can. 122.27 MB - DVDFab DVD Ripper is the most powerful and flexible DVD to Mobile Converter which can convert DVD to almost all the popular video/audio formats playable on any mobile devices. Features Highlight: 1. More than 10 DVD Ripper modes available. 122.4 MB - DVDFab DVD & Blu-ray Cinavia Removal, formerly known as DVDFab CinaviaRemoval HD, is a bundled package covering DVD Cinavia Removal and Blu-ray Cinavia Removal, the most prestigious Cinavia removal solutions out there on the market place. 122.4 MB - DVDFab DVD Cinavia Removal, the world's best and complete DVD Cinavia removal solution, is capable of detecting and then removing the hard-to-conquer Cinavia watermarks planted in the audio tracks of the affected DVD discs. The backup discs are. 122.4 MB - Photoshop Plugin for macOS 10.10 and later and Win7 and later for time and work efficient Dust and Scratch Removal. Whenever you digitize analog images without corrections, dust and scratches of the original will be digitized, too and it's almost. 4.78 MB - PhotoPad Pro Edition for Windows is a professional. PhotoPad Pro allows you to edit and apply effects to photos and other images. When you can crop, rotate and resize and, if required, add effects like sepia. 3.95 MB - PhotoPad image editing software is a free photo editor for Windows. When editing photos you can crop, rotate and resize and, if required, add effects like sepia tones, red eye reduction as well as the ability to change the hue, saturation and. 3.95 MB - ACDSee Photo Studio Ultimate 2018 - With GPU-accelerated adjustment layers, RAW editing, and an arsenal of professional digital asset management tools, ACDSee Photo Studio Ultimate 2018 is perfectly positioned as the only software you need to. 1.17 MB - ACDSee Photo Studio Professional 2018 - Built for Professionals As an established RAW editor and digital asset management solution, ACDSee Photo Studio Professional 2018 is brimming with everything you need to hold complete mastery over your. Remove red, blue, green eyes from your pet's photos with Pet Eye Pilot (+ Plugin) When you take photos of your pets, you often get a red eye effect; with animals, however, you may get blue, green or yellow eyes. With Pet Eye Pilot, you can easily fix this problem. To get rid of this effect, take only two steps: 1. Click on the left red eye 2. Click on the right red eye You can adjust the pupil area and brightness, and preview the results real-time. The program keeps structure of the pupil. After you install Pet Eye Pilot, you can see the demo. Run it from the Demonstration menu. Pet Eye Pilot is also capable to fix red eyes in photos of people. It is identical to. (3.6M) - Windows XP/Vista (32/64)/Windows 7 (32/64)/Windows 8 (32/64)/Windows 10 (32/64) Limitation of the trial version: the software allows you to save the image in a special format (.tpi). After purchasing, you will be able to open your TPI images in the full registered version of the program and save them in any of the JPG, TIFF, PNG, and BMP formats. Ordering information (29.95 Euro). Earth rotates through an entire day as captured in this animation of 22 still images taken on September 17, 2015 by NASA’s Earth Polychromatic Imaging Camera (EPIC) camera on the Deep Space Climate Observatory (DSCOVR) spacecraft. Image credit: NASA NASA launched a new yesterday (October 20) where you can see images of the full, sunlit side of the Earth every day. The images are taken by a NASA camera one million miles away on the Deep Space Climate Observatory (). Once a day NASA will post at least a dozen new color images of Earth acquired from 12 to 36 hours earlier by NASA’s Earth Polychromatic Imaging Camera (EPIC). Each daily sequence of images will show the Earth as it rotates, thus revealing the whole globe over the course of a day. The new website also features an archive of EPIC images searchable by date and continent. EPIC’s images of Earth allow scientists to study daily variations over the entire globe in such features as vegetation, ozone, aerosols, and cloud height and reflectivity. EPIC is a four megapixel CCD camera and telescope. The color Earth images are created by combining three separate single-color images to create a photographic-quality image equivalent to a 12-megapixel camera. The camera takes a series of 10 images using different narrowband filters — from ultraviolet to near infrared — to produce a variety of science products. The red, green and blue channel images are used to create the color images. Uranus is the seventh planet from the Sun. It was discovered by William Herschel in 1781. It has at least 21 moons. Uranus is composed mostly of hydrogen, helium, and. These images show views of Earth and the moon from NASA's Cassini probe around Saturn (left) and Messenger spacecraft at Mercury (right) from July 19, 2013. Cassini was 898 million miles (1.44 billion kilometers) away from Earth at the time, while Messenger was 61 million miles (98 million km) away. Apr 06, 2015 B-roll of views of Earth from the International Space Station. Each image is about 3 megabytes in size. Since Earth is extremely bright in the darkness of space, EPIC has to take very short exposure images (20-100 milliseconds). The much fainter stars are not visible in the background as a result of the short exposure times. The DSCOVR spacecraft orbits around the L1 Lagrange point directly between Earth and the sun. This orbit keeps the spacecraft near the L1 point and requires only occasional small maneuvers, but its orbit can vary from 4 to 15 degrees away from the sun-Earth line over several years. Bottom line: On October 20, 2015 NASA launched a new with daily images of the full, sunlit side of the Earth. The images are taken by a NASA camera one million miles away on the Deep Space Climate Observatory (DSCOVR). *** *** Welcome to CURRENT SATELLITE VIEWS OF EARTH AND CURRENT WEATHER SATELLITE SIMULATIONS OF EARTH VIEWS A Directory of Links to some of the Coolest Views of Earth of the Last Few Hours Produced by U. Environmental Directories Copyright © 2008 - 2017 by United States Environmental Directories, Inc. All rights reserved. Copyright Notice: Copying or reproduction in any manner of all or any part of this Web site and the directory within it is strictly forbidden without the written permission of United States Environmental Directories, Inc. This Web site is protected by national and international copyright laws. *** *** A Global Awareness Movement to Protect Earth from Asteroid Impacts Tell Your U.S. Representative & Senators to Decrease Overall Immigration Levels in any New Immigration Bills! Also See Overpopulation is Solvable! (links to environmental jobs, news & events) (bicycling jobs, news, events & much more). Current Satellite Views of Earth and Current Weather Satellite Simulations of Earth Views Copyright © 2008 - 2017 by United States Environmental Directories, Inc. All rights reserved. Copying of all or part of this Web site is prohibited. Apr 22, 2016. A collection of the some of the best images of Earth from space. Google Earth for mobile enables you to explore the globe with a swipe of your finger. Fly through 3D cities like London, Tokyo and Rome. Dive in to view the world. Five Almost Live Views of the Earth from Space, U. / This site was created on November 23, 2008. Most recent modification: November 25, 2017. Disclaimer: U. Environmental Directories, Inc. Assumes no responsibility and disclaims any injury or damage or economic loss resulting from the use of this Web site & directory and the Web sites linked to by this directory. Environmental Directories, Inc. Does not necessarily endorse or support any of the organizations or agencies listed in this directory. Copyright Information: No part of this publication may be reproduced in any form or by any means, either electronic or mechanical, including recording, photocopying or by any information retrieval and storage system, without the written permission of the copyright holder. This Web site is protected by national and international copyright laws. Copyright © 2008 - 2017 by United States Environmental Directories, Inc. All rights reserved.!! NEW YORK -- For the first time since 2012, NASA has released a global map of Earth at night -- and the results are breathtaking. NASA has examined the different ways that light is radiated, scattered and reflected by land, atmospheric and ocean surfaces, it. The principal challenge in nighttime satellite imaging is accounting for the phases of the moon, which constantly varies the amount of light shining on Earth. NASA has dubbed the new image “Black Marble” -- a play off the original “ ” of Earth taken by the Apollo 17 crew on December 7, 1972. • •, a former astronaut, spoke to CBS News to explain the beautiful views. “You’re able to get with new technology these great images. You’re able to see where people are living and these pockets around the planet where people exist.” He pointed out that people in Australia are living along the coast. You can see certain countries that aren’t as affluent as America and are a little bit darker. As a result, this has the potential to aid short-term weather forecasting and disaster response. “We can monitor cyclical changes driven by reoccurring human activities such as holiday lighting and seasonal migrations. We can also monitor gradual changes driven by urbanization, out-migration, economic changes, and electrification. The fact that we can track all these different aspects at the heart of what defines a city is simply mind-boggling,” said Dr. Miguel Román of NASA Goddard Space Flight Center in Greenbelt, Maryland. His team’s goal is to make these night images updated on a daily basis. NASA Goddard Space Flight Center In addition, NASA says daily nighttime imagery could be used to help monitor unregulated or unreported fishing. It could also contribute to efforts to track sea ice movements and concentrations. Researchers in Puerto Rico intend to use the dataset to reduce light pollution and help protect tropical forests and coastal areas that support fragile ecosystems. A team at the United Nations has already used night lights data to monitor the effects of war on electric power and the movement of displaced populations in war-torn. 3-in-1 iPad, iPhone and iPod Data Recovery Software for Personal Use No one like mistakenly losing important data from their portable devices. So Amacsoft iOS Data Recovery for Mac comes here to help all Mac users find back their lost contancts, text messages, call history, photos, etc. From iPad, iPhone and iPod directly. And you're also allowed to extract data from iTunes backup files as you like. • Supports recover up to 10 types of files from your iPad, iPhone and iPod easily. • Extract or restore your lost data from iTunes backup files without connection. • Preview files before recovery in list and thumbnail mode. Supported OS:Mac OS X 10.6-10.9 or above Go. Quick, Simple & Safe Recovery Tool for Your iDevices Whether you lost your iPhone, iPad or iPod files due to the fact of a failed jailbreak, smashed, upgrade or deleted by accident, you still have a chance to find them back by using a professional Mac iOS Data Recovery program. With it, you can: * Recover up to 10 types of files from iDevices, including SMS messages, contacts, call history, safari, notes, calendar, reminders, voice memos, photos, SMS attachments, etc. * Perfectly supports almost all iOS devices, including the latest iPad Air, iPhone 6, iPhone 6 Plus, iPhone 5S, iPhone 5C, iPhone 5, iPhone 4S/4, iPad mini, iPad 4/2, iPod touch, iPod shuffle/nano/classic. Recover Deleted or Lost Data from iTunes Backup Lots of recovery tools on the market are designed for single purpose or single device, so they are not enabled users to restore data from iPhone, iPad and iPod simultaneously. Now, Amacsoft have solved this program for you. This powerful program is a combination of iPhone Data Recovery + iPad Data Recovery + iPod Data Recovery. To help you rescue your iPad, iPhone or iPod from the dead, Amacsoft iTunes Backup Extractor is right here for you to recover lost data from iOS devices by extracting from iTunes backup record. Photos, videos, contacts, text messages or other important stuff on your iPad, iPhone and iPod are closely relevant with the people's lives and work. * Automatically scan and display all iTunes backup files on your Mac computer. * Export and save text contents like Messages, Contacts, Notes, Call history, Calendar, Reminder, Safari bookmark in.html format. So that you can easily viewing and editing iDevice data on Mac. Preview What You Want Before Recovery No matter text messages, contacts, or photos on your iPad, iPhone and iPod backup files can be checked and viewed in the program before recovery. In this way, you can check the file in all kinds of details. * Preview all your photos in thumbnail mode. You can select picture for restoring through its small screenshot. * Messages, contacts, and other text contents in this program will be displayed with more details, including name, phone number, email, etc. * Double-click any file under the 'SMS' option, then you can view the detailed conversation on Mac directly. Company: Supported OS: Windows 8/Windows 7/Vista/Windows XP (64&32 bits) Version: We make sure the license you purchase is the latest version Key Features: • Work perfectly on all generations of iPhone, iPad and iPod; • Recover all stuff on iOS devices by extracting iTunes backup files directly; • Support to directly recover 9 types of files from iDevices with ease; • Preview function allows you to select and recover the exact files you need. License: A license is for a single user Language: English Sales for: Global *USD$ is default, select other currencies at the order page Shipping: Send Registration Code by Email, download URL is included. 3-in-1 Data Recovery Solution for iPad/iPhone/iPod! Here is the ultimate solution that can easily solve all kinds of data loss issues happen on your iPad, iPhone or iPod. Whatever you mistakenly deleted data from your iDevice, formatted your devices, failed updates kill your data, device damage makes the stuff gone, etc. In brief, by using this data recovery software for iOS devices, data loss problem can be solved hands down. • Work perfectly on all generations of iPhone, iPad and iPod; • Recover all stuff on iOS devices by extracting iTunes backup files directly; • Support to directly recover 10+ types of files from iDevices with ease; • Preview function allows you to select and recover the exact files you need. Supported OS: Windows 10/8/7/Vista, XP. Ultimate Data Recovery Software for All iOS Devices Data on portable devices can be lost easily due to various and unexpected reasons, iOS devices are not no exception. But if you have ever synced your iDevices with iTunes before, you will still have a big chance to get back all your lost. * As a multi-functional tool, this program is consist of iPad Data Recovery, iPhone Data Recovery and iPod Data Recovery. * Be compatible with all iOS devices like iPhone 6/6 Plus/5S/5C/5/4S/4/3GS, iPad Air, iPad mini, iPad 4/3/2/1, iPod touch, iPod touch 4/5, iPod Shuffle, iPod Nano 3/4/5/6, and iPod Classic, etc. One-click to Find Back 10+ File Types As long as you have ever synced your iDevice with iTunes before you lose the data, this data recovery for iPad/iPhone/iPod will 100% helpful to retrieve back what you want. That's because iTunes will backup your iDevice each time you sync with it. This software will be able to extract the content from your iOS device or the iTunes backup record as you like. * Recover more than 10 types of data from iPad, iPhone and iPod directly, including call history, contacts, text messages, note, safari, calendar, voice memos, photos and more. * Scan the iTunes backup files and recover lost data for iPhone, iPad, iPod on Windows without connecting your device to the computer. Preview What You’ve Lost before Recovery The scanning performed by the software is deep and full. Once you launch the scan, all content in your iPad/iPhone/iPod backup files will be scanned out and displayed in categories. * The built-in preview function enables you to preview the found files in list or thumbnail before recovery, so that you can recover what you want accurately and rapidly. * The data on your iOS devices will be categorized in different folder, and the detailed information of each file are also shown here for your reference, such as name, company, phone number, email, date&time, size, etc. Work on Overall Data Loss Circumstances Within only 1 mouse click, you will retrieve all files to your iOS devices with zero quality loss. It supports various data loss circumstances, known or unknown, personal or impersonal. * Accidently deleted files on your iPad, iPhone or iPod. * Format your iDevice or restore it to factory settings. * Fail to upgrade or jailbreak your iOS devices * Your device is lost, damaged, crashed, or broken. * While Apple Logo Screen of Death or other inaccessible system error. I wonder what we would see if we mirrored one of Picasso's paintings or even a panel on a comic book. The human brain is trained to find patterns, and it will do so any time, which is why we see shapes in clouds, why we have constellations, why that grease spot on the pan looks like Jesus's face. So, what makes these 'findings' any more credible than that Jesus face in the pan? Da Vinci was a brilliant man and an odd man. He did things by mirrors. He thought up crude ideas of things like the helicopter used today. It's not far from truth to say that he more than likely left 'clues' in his pain. I am so impressed with this young man, DEREK BAIR! Without making accusations, he has simply stated the facts as to HIS DISCOVERY! I would also like to publicly thank DEREK BAIR for mentioning my web site in his artice! His generosity is truly overwhelming! DEREK has MANY MORE AMAZING DISCOVERIES ON HIS WEB SITE!! Did Renaissance genius Leonardo Da Vinci paint his likeness in to one of his most famous paintings? One of my personal favorites is an image he captured from the LAST SUPPER of a wound in Christ's wrist, SPOUTING BLOOD INTO A GLASS!!! The world needs to keep a close eye on DEREK BAIR. I for one, cannot wait to see what he'll share with us next! Thank you my friend, thank you! Img src='style='float:left' border='0' alt='user posted image r'After the recent explosion of press and controversy over Slavisa Pesci's discovery of Hidden images in the Last Supper, author Derek Bair is claiming to have made this same discovery months ago. An article about Derek and his discoveries was posted on Unexplained Mysteries back in September 2006: 'He has his research on his web site img src='border='0' alt='news icon' View: a href='http:/. Img src='style='float:left' border='0' alt='user posted image r'After the recent explosion of press and controversy over Slavisa Pesci's discovery of Hidden images in the Last Supper, author Derek Bair is claiming to have made this same discovery months ago. An article about Derek and his discoveries was posted on Unexplained Mysteries back in September 2006: 'He has his research on his web site img src='border='0' alt='news icon' View: a href='http:/. Apr 19, 2011 For example, Matthew, Mark and Luke all state the Last Supper was a meal marking the start of the Jewish festival of Passover. John, by contrast, says that it took place before the Passover began. Whatever you think about the Bible, the fact is that Jewish people would never mistake the Passover meal for another meal, so for the Gospels to contradict themselves about this is really hard to understand. Although The Last Supper is easily one of the world's most iconic paintings, its permanent home is a convent in Milan, Italy. Da Vinci painted the religious work directly (and fittingly) on the dining hall wall of the Convent of Santa Maria delle Grazie back in 1495. Keywords: Leonardo da Vinci, The Last Supper, halos, mystery, saints, Jesus, message, secret, code LOS ANGELES, CA (California Network) - Sometimes the best hiding place is in plain sight. Artists studying da Vinci's most famous work, 'The Last Supper' have asked a simple question, thus uncovering a deep secret. Bible readers throughout history have noticed discrepancies in the Gospel accounts, and this often leads people to question the Bible's veracity entirely. For example, Matthew, Mark and Luke all state the Last Supper was a meal marking the start of the Jewish festival of Passover. John, by contrast, says that it took place before the Passover began. Whatever you think about the Bible, the fact is that Jewish people would never mistake the Passover meal for another meal, so for the Gospels to contradict themselves about this is really hard to understand. The eminent biblical scholar F.F. Bruce once described this problem as 'the thorniest problem in the New Testament.' The Gospels also do not seem to allow enough time for all the events they record between the Last Supper and the Crucifixion, whilst indicating that Wednesday was a 'missing day' on which Jesus did nothing. Scholars have literally rushed around Jerusalem with a stop-watch to see how the large number of events recorded in the Gospels could have fit between the Last Supper on Thursday night and the Crucifixion on Friday morning. Most conclude that it is impossible. However, it turns out that there is a very simple solution to these problems: If you move the Last Supper to Wednesday, instead of Thursday, the Gospels are actually in remarkable agreement, and can be read as a reliable record. What really happened in Jesus' last week? In my new book, The Mystery of the Last Supper, I use science and historical reconstruction to take a closer look at the inconsistencies in the Gospel accounts of the final days of Jesus. Essential to this task was the use of different calendars. The Dead Sea Scrolls reveal that there were a number of different Jewish calendars in use in Israel in the first century A.D., and so different Jewish groups celebrated Passover on different days. We have a similar situation today with the date of Easter: Catholics and Protestants celebrate Easter on a different date from Greek and Russian Orthodox Christians because they calculate the date of Easter using different calendars (Gregorian and Julian, respectively). In his description of the Last Supper, John uses the official Jewish calendar, in which the Last Supper was before the date of the official Passover. However, I suggest that Jesus chose to hold his Last Supper on the date of Passover in a different Jewish calendar, which is what Matthew, Mark and Luke report. So all four Gospels in fact agree! I am not the first person to suggest that Jesus might have been using a different calendar. Most recently, the Pope proposed in 2007 that Jesus might have used the solar calendar of the Qumran community, who were probably a Jewish sect called the Essenes. But when the date of Passover is calculated using this calendar, it would have fallen a week later, after both Jesus' death and resurrection. I have worked with an expert astronomer to investigate, for the first time, the possibility that a third Jewish calendar was in use in the first century A.D. The official Jewish calendar at the time of Jesus' death was that still used by Jews today: a lunar system in which days run from sunset to sunset. This was developed during the Jewish exile in Babylon in the sixth century B.C. Before that, however, the Jews had a different system. This is referred to in the Book of Exodus, in the Old Testament, when God instructs Moses and Aaron to start their year at the time of the Exodus from Egypt. There is extensive evidence that this original Jewish calendar survived to Jesus' time. It was used by groups such as the Samaritans, Zealots, some Galileans and some Essenes. Under this pre-exilic calendar, Passover always fell a few days earlier than in the official Jewish calendar, and the days were marked from sunrise to sunrise, not sunset to sunset. Using our reconstruction of this calendar we can see that in A.D. 33, the year of the Crucifixion, the Passover meal was on the Wednesday of Holy Week. From the clues they give, it's clear that Matthew, Mark and Luke all used the pre-exilic calendar in their description of the Last Supper as a Passover meal, whereas John uses the official calendar in which the Last Supper was before the Passover. What does this mean for our celebration of Easter? Holy Thursday is the well-known day on which Christians annually commemorate the Last Supper of Jesus. But my research shows that we should really be celebrating this on the Wednesday of Holy Week. A Wednesday Last Supper with the Crucifixion on Friday also allows just the right amount of time for all the events the Gospels record between the Last Supper and the Crucifixion. Today, about half of the churches in the world use unleavened bread in their weekly or monthly celebration of the Last Supper, because they believe it was a Passover meal, and half use leavened bread, because they believe it was before the Passover meal. I have shown that everyone is right! The Last Supper was before Passover in the official Jewish calendar (used by John), but it was the Passover meal in the earlier original Jewish calendar that Jesus chose to use for his Last Supper (described by Matthew, Mark and Luke). We celebrate Christmas on a fixed date each year: Dec. However, Easter is a moveable feast: the date of Easter Sunday changes every year, according to a complicated formula, and can range from March 23 to April 25. For those who would like a more fixed date for Easter, my research suggests that Easter Sunday should be the first Sunday in April. Finally, why did Jesus choose to hold his Last Supper at Passover time according to the pre-exilic calendar? I suggest it was because this original Jewish calendar was the one the Old Testament says was used by Moses to celebrate the very first Passover in Egypt. The Gospels are full of examples of Jesus presenting himself as the new Moses. Jesus was therefore holding his Last Supper on the exact anniversary of the first Passover of Moses, thus proclaiming that he was the new Moses, instituting a new covenant and leading his people out of slavery into a new life. Jesus then died just as the Passover lambs were being slain, according to the official Jewish calendar. These are deep, powerful symbolisms, which are based on objective, historical evidence. Far from being incompatible, as many scholars make them out to be, here science and the Bible work hand-in-hand to show that all four Gospels are in remarkable agreement about Jesus' final days. DaVINCI LAST SUPPER MYSTERIES Leonardo da Vinci, perhaps most noted as an artist, was also an architect, inventor and chronicler of science, among other outlets for his talents. Born on April 15, 1452, in Vinci, Italy, Leonardo da Vinci was the son of a prominent attorney notary and a young peasant girl. Born out of wedlock, he was raised by his father, Ser Piero, and several stepmothers. Leonardo di ser da Vinci became accomplished as a painter, sculptor, architect, musician, mathematician, engineer, inventor, anatomist, geologist, cartographer, botanist, and writer. Leonardo’s “Last Supper,”” which he worked on from 1492 to 1498 by most accounts, was painted on the dining room wall of the of the Santa Maria delle Grazie monastery in Milan. It depicts the dramatic moment when Jesus tells the apostles that one of them will betray him soon. It was not done with the fresco technique where water-based paint is applied to fresh plaster but Da Vinci instead chose to try to paint on the wall in layers. As a result, the masterpiece began to deteriorate during his lifetime and has undergone an extensive restoration. Did Da Vinci knowingly embed secret codes into his paintings? Was his hand guided by an unseen force in the “Last Supper” painting to unveil mysteries relevant for our time? Prophet Daniel did say that in our day knowledge would increase. Jesus told us that everything hidden would be revealed. Take a look at the video clips below. There are some fascinating revelations seems to be embedded, you decide. Could there be sacred secret music actually embedded in Da Vinci’s “Last Supper? If so, what are the hidden notes and lyrics? Check out the video at the end of the article. Michael DeForest Rhinehart sent me this video about this Da Vinci’s “Last Supper” video. This is a mirrored and inverted image, with the focus on Jesus’ head. —————————————– This part does not have much to do with the “Last Super” directly, but it does have to do with hidden codes. Here’s another mystery that Hollywood seems to be embedding within many movies. Since we know who controls Hollywood, we know that there are hidden layers of clues and messages behind repeated images. What is the mystery of Illuminati code A-113? Do you believe their cover story? Okay, I don’t buy the complete cover story that they had to come up with, since sharp people are asking questions why this code is being used so frequently. When I saw the code, my mind started to turn the numbers in reverse and add the gematria of Hebrew alphabet. 3= Gimel or G. 1= Aleph or A. 1=Aleph or A. G-A-A I was sure in my long past research into demonology I had studied one of the Goetia demons with the same or similar name. One of the demon prince or president that rules over 66 legions of demons name is GAAp. Realizing the name is not exactly the same, we are only asking questions. Could the A-113 be a code that activates something in the unconscious mind that relates to the demon king Gaap? The directors @ Hollywood is a master at subliminal suggestions. GAAp is considered a water-demon, since he has some control over the element of water and the elemental water demons. When he is invoked, Gaap teaches Philosophy and all liberal sciences, can cause love or hate and make men insensible and invisibleetc. Since we are way out on a limb, we are living in a time frame when will see many of these hybrid chimera demons manifesting in the physical world. They will be released from their prisons. At this time they can only come to the 3-d world if a conjurer can summon them and only for a short time. GAAp is one of the few that will appear as human. Share this with all you know. We accept donations for our non profit work. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
July 2018
Categories |