ZPM 6.4 patching SLES

Someone has bought ZPM 6.4, to patch SLES servers.

How is the patch stream for SLES?  Beyond what you would have gotten out 
of Yast's Online Update from a repository, how much else does it offer?
6/16/2009 7:30:36 PM
novell.zenworks.patch 2914 articles. 0 followers. Follow

3 Replies

Similar Articles

[PageSpeed] 46
Get it on Google Play
Get it on Apple App Store


automation, I guess - and Novell would prefer you to use ZLM :) You 
know you have to buy special licences to use ZPM with Linux/Unix?


Shaun Pond

6/17/2009 7:19:59 AM
Shaun Pond wrote:
> Geoffrey,
> automation, I guess - and Novell would prefer you to use ZLM :) You 
> know you have to buy special licences to use ZPM with Linux/Unix?

I thought that was the case too.  But it looks like they bought ZPM, the 
sales guy who sold it, is probably to blame.  I will double check with 
him as to WHY they chose that.
6/18/2009 9:52:59 AM

and do make sure that you've bought the licenses for Linux clients, 
they have to be bought separately...


Shaun Pond

6/18/2009 10:31:47 AM

Similar Artilces:

Patches, patches, patches...
To forestall potential incidents of Warnock's Dillemma... I'm about to apply a whole heap 'o patches to Parrot. (With appropriate [APPLIED] responses, I hope) If, at the end of the day, I have *not* applied or commented on a patch you've sent, it means I've Officially Missed It, so give another try. Sorry 'bout this. Too much mail in the mailbox, and going back in time is tricky, as it can miss subsequent discussions on patches 'n stuff. -- Dan --------------------------------------"it's like th...

Zenworks patch management update server 6.3 server patch 6
--____DNNFMJENKMAMFEYVXCEU____ Content-Type: text/plain; charset=iso-8859-15 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline; modification-date="Thu, 23 May 2007 12:16:37 -0400" Hello, Should I be seeing this patch in my vulnerabilities for my PL server? = Server agent version is I don't see it. thanks Tom --____DNNFMJENKMAMFEYVXCEU____ Content-Type: multipart/related; boundary="____RAHTTLYUNHGCILCCFTGD____" --____RAHTTLYUNHGCILCCFTGD____ Content-Type: text/html; charset=iso-8859-15 Content-Transfer-Encodi...

Patched 6.5.4 with 6.5.6 but agents are still running 6.5.4
I recently attempted to patch GroupWise 6.5.4 with the most recent patch 6.5.6. After the update finished, I restarted the server, checked all agents and noticed that they all were still running version 6.5.4. However, the first time that I attempted the patch, and I got to the end of the installation, I chose the option to automatically update the startup files, and to start the PO and the Domain (after clicking finish). When the domain and the PO started on the server (after I clicked on finish), they where running 6.5.6, but when I restarted the server and checked the ver...

Patches, patches, patches... #2
OK, this is advance warning that I'm about to be reposting a bunch of patches of mine which appear to have succumbed to Warnock's Dilemma. The first three should be uncontroversial: there's a documentation fix-up for core.ops, and new tests for strings and stacks. The last one is rather larger, and consists of a greatly expanded set of tests for PerlString's, plus a bunch of bug-fixes. I'd be grateful if Jeff or Dan could take a look at this, as I have the feeling that a lot of the scalar PMCs are going to need similar fixes. Simon ...

Hello, We are currently running the Agent version: Client Agent: Detection Agent: Patch Management Server: Control Panel: Notification Manager: If i deploy the new patch: "C - ZENworks Patch Management Agent Upgrade for Windows from 6.0 or higher to" it is installed fine (status: green), but after a reboot of this workstation the Client Agent is not changed and still I checked GravitixService.exe and DAgent.exe, and these versions are still So why is...

Zenworks Patch Management/PatchLink 6.4
This weekend I updated out 6.3 system to the 6.4 software and everything seems to be working fine, except I can't find a package/vulnerabilities that shows the new agent ( to be installed. Currently most of my agents are at My Subscription Service History shows vulnerabilities/licenses/packages status as all complete and successful is True. I can install the new agent manually without problem. Anybody have any ideas what to try next? Pat, It appears that in the past few days you have not received a response to your posting. That concerns us, a...

[PATCH] SvPVX_const()
--/04w6evG8XlLl3ft Content-Type: text/plain; charset=us-ascii Content-Disposition: inline To quote the movie "Airplane", "I picked the wrong week to stop sniffing glue." It sure seems like sv.c would be a good place to find possible changes from SvPVX() to SvPVX_const(). Also, included are conversions to regcomp.c and regexec.c which I sort of punted on with the last patch. Finally, there is also a change to embed.fnc to constify S_sv_release_COW. This all been tested with -DDEBUGGING -Duseithreads -DPERL_COPY_ON_WRITE. Since there is a change to embed...

[PATCH] Patch to patch for callbacks in core
I should have tested this better before submitting it. This patch is to Perl 11722 after applying my previous patch. Now callbacks will actually work. :-) - D <dmlloyd@tds.net> --- mg.c-old Tue Aug 21 13:26:52 2001 +++ perl-devel/mg.c Tue Aug 21 15:09:16 2001 @@ -1068,7 +1068,18 @@ void Perl_despatch_signals(pTHX) { - PL_event_pending = 0; + if (PL_callback_head != NULL) { + CALLBACK *cur, *next; + + for (cur = PL_callback_head; cur != NULL; cur = next) { + next = cur->next; + (*cur->callback)(cur->data); + ...

[PATCH 1/3] buildperl.pl: add patches to support gcc 3.x and 4.x when compiling Perl 5.6.x
--- cpan/Devel-PPPort/devel/buildperl.pl | 144 ++++++++++++++++++++++++++++++++++ 1 files changed, 144 insertions(+), 0 deletions(-) diff --git a/cpan/Devel-PPPort/devel/buildperl.pl b/cpan/Devel-PPPort/devel/buildperl.pl index 49b7fbb..529c999 100644 --- a/cpan/Devel-PPPort/devel/buildperl.pl +++ b/cpan/Devel-PPPort/devel/buildperl.pl @@ -132,6 +132,32 @@ my @patch = ( [ \&patch_sysv ], ], }, + { + perl => [ + '5.6.0', + ], + subs => [ + [ \&patch_gcc_56 ], + [ \...

Where are the ZENworks Patch Management server patches at?
According to this URL: http://www.novell.com/support/dynamickc.do?externalId=3540830&sliceId=SAL_Public&command=show&forward=nonthreadedKC&kcId=3540830 ZENworks Patch Management Patch 5 is out....I must be way behind because I still have the base product installed. Where are these patches at? I cannot seem to find any of them on Novell's website. Applying these patches could very well fix my issue with my server not being able to contact novell.patchlinksecure.net as well as the issue we are having regarding the Discovery Agent using vast amounts of client CPU when it runs. Any info on this would be greatly appreciated. Grant that patch is in beta right now -- Shaun Pond Well what about the 4 patches before that one? Are there any patches for ZPM 6.3? I cannot find any download information on them if there are. > that patch is in beta right now > > -- > > Shaun Pond > > ZPM6.3 already includes the first 4 patches that Patchlink put out for 6.3... that's why it was a while before it was released ;) -- Shaun Pond Ahhh...well that explains why I can't find any patches to download...thanks for the info. Grant > ZPM6.3 already includes the first 4 patches that Patchlink put out for > 6.3... that's why it was a while before it was released ;) > > -- > > Shaun Pond > > ...

Patching of Powerdesigner 6.1.3 to 6.1.4
Hi experts, the release confusion does not seem to stop. In order to get a working installation of Data Architect with Metaworks Sybase sent me the update from DA 6.1.0 to 6.1.3. Metaworks I have available in version Now I read in the installation instructions of Powerdesigner 6.1.4, that all Powerdesigner components must be patched and only version can be patched. What should I do? Is the following the proper procedure? 1 Installation of Metaworks 6.1.1 2 Update of Metaworks 6.1.1 to 6.1.3 with "613mw32.zip" from the web support page 3 Install...

Bugzilla 4.4 to 4.4.2 patch
Greetings, We ran the bugzilla-4.4-to-4.4.2 diff file through patch and it appears to work on a test server fine, but I see the version number didn't update. Should I find a new bugzilla-update.xml or just edit it? Ellen Clary Senior System Administrator Dynamic Graphics Alameda, CA, USA ellen@dgi.com ...

Compression Custom Patch Zenworks Patch Management
Hello, Please I am testing Custom Patch ZPM 6.4, My problem is I don't know how many compress file. Please someone knows this, Please tell me. Regardess Ricardo Seris Guerra -- Ricardo_Seris ------------------------------------------------------------------------ Ricardo, are you asking how to compress your files? In a custom package you would have to do this yourself, perhaps use winzip to compress, then use a script to decompress at the workstation. To make this automatic, you would need to buy the PDK (Patch Development Kit) -- Shaun Pond ...

PATCH: high_perf: various enhancements (6 patches)
--=_lindy-31652-1116613258-0001-2 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline There are six patches attached. Two of them supersede the patches in my earlier message subject: "PATCH: high_perf: fixes for accept optimizing". Newer versions of both patches from that message are included here. Summaries in alphabetical order: ==> client.pm.patch <== First, since EventLoop goes off and does other things, any PostLoopCallback can signal "our" EventLoop to return. To ensure we wait the full ti...

[PATCH 5.6.0] Threadsafe patches
This patch replaces all the threadsafe patches I've sent except for the subprocess filehandle array one. It threadsafes $AUTOLOAD, lock, and sort. It exposes Perl_lock (with no corresponding lock() compatibility layer exposed, since there's no need) to XS so you can take out a perl-level lock on things, and still exposes the SvLOCK macro which now goes after a per-interpreter lock instead of a per-sv one. There's also a change to use the atomic increment and decrement code on Alphas running OpenVMS intead of the per interpreter refcount mutex. Whether this is a performance w...

Patch Management Upgrade ( to 6.4)
In order to Upgrade PatchLink to 6.4, Can you just install Novell_ZENworks_Patch_Management_Server.exe from http://download.novell.com/Download?buildid=C9dVCxzo5YI~ over top of Will it keep the Serial Number? Thanks It will keep the serial number but you need to upgrade to SQL 2005 for the upgrade to work. "Frank" <frank.wireko@gov.ab.ca> wrote in message news:Dn2Wi.950$Uq7.786@kovat.provo.novell.com... > In order to Upgrade PatchLink to 6.4, Can you just install > Novell_ZENworks_Patch_Management_Server.exe fro...

[PATCH 5.6.0 RC2]VMS patches
Without these patches. RC2 won't build properly, install, or build modules. --- configure.com;1 Tue Mar 14 23:21:55 2000 +++ configure.com Wed Mar 15 03:31:56 2000 @@ -1924,7 +1924,10 @@ $ echo "file types of nothing, .pl, and .com, in that order (e.g. typing" $ echo """$ perl foo"" would cause Perl to look for foo., then foo.pl, and" $ echo "finally foo.com)." -$ dflt = "y" +$ echo "" +$ echo "This is currently broken in some configurations. Only enable it if +$ echo "you know what ...

Optional patches 6.4
--____MQJCRHEUFKCVJAENSYKC____ Content-Type: text/plain; charset=iso-8859-15 Content-Transfer-Encoding: quoted-printable Content-Disposition: inline; modification-date="Wed, 24 Feb 2009 04:39:05 -0600" Sean, On the home screen on ZEN patch management 6.4 my critical and recommenced = patch levels under vulnerability severity are 0% but, optional is 89% What exactly are optional vulnerabilities? Thanks, /Chad --____MQJCRHEUFKCVJAENSYKC____ Content-Type: multipart/related; boundary="____UPSBSMTCRKDPGBHQQVXZ____" --____UPSBSMTCRKDPGBHQQVXZ____ Cont...

PATCH 5.6.0: Replacement for previous patch
I forgot to patch perldiag.pod. This patch includes both changes. --- perl.c 2000/04/24 23:16:47 1.1 +++ perl.c 2000/04/24 23:37:19 @@ -2135,6 +2135,8 @@ sv_catpv( sv, " ()"); } } else { + if (s == start) + Perl_croak(aTHX_ "Module name required with -M option"); sv_catpvn(sv, start, s-start); sv_catpv(sv, " split(/,/,q{"); sv_catpv(sv, ++s); --- pod/perldiag.pod 2000/04/24 23:40:20 1.1 +++ pod/perldiag.pod 2000/04/24 23:41:29 @@ -3627,6 +3627,12 @@ may appear if components are not fou...

[PATCH] More Build patches
Two patches inline... A small change to Makefile.in so that 'make test' doesn't try to run without an interpreter or missing assembler libraries. Index: Makefile.in =================================================================== RCS file: /home/perlcvs/parrot/Makefile.in,v retrieving revision 1.24 diff -u -r1.24 Makefile.in --- Makefile.in 2001/10/14 10:58:19 1.24 +++ Makefile.in 2001/10/15 14:42:12 @@ -106,7 +106,7 @@ cd t; make clean cd docs; make clean -test: .test_dummy +test: $(TEST_PROG) assemble.pl .test_dummy .test_dummy: ...

[PATCH 5.6.1] OS2::DLL patch
OS2::DLL was missing error-reporting code. Enjoy, Ilya --- ./os2/OS2/REXX/DLL/DLL.pm-old Thu Feb 22 18:57:56 2001 +++ ./os2/OS2/REXX/DLL/DLL.pm Fri Jun 15 15:34:20 2001 @@ -22,6 +22,15 @@ sub AUTOLOAD { # Cannot autoload, the autoloader is used for the REXX functions. +sub new { + confess 'Usage: OS2::DLL->new( <file> [<dirs>] )' unless @_ >= 2; + my ($class, $file) = (shift, shift); + my $handle; + $handle = $class->load($file, @_) and return $handle; + my $path = @_ ? " from '@_'" : ''; + croak "Can't load '$file'$path: " . DynaLoader::dl_error(); +} + sub load { confess 'Usage: load OS2::DLL <file> [<dirs>]' unless $#_ >= 1; @@ -108,7 +117,15 @@ is performed in default DLL path (withou The DLL is not unloaded when the variable dies. -Returns DLL object reference, or undef on failure. +Returns DLL object reference, or undef on failure (in this case one can +get the reason via C<DynaLoader::dl_error()>). + +=head2 Create a REXX DLL handle + + $dll = OS2::DLL->new( NAME [, WHERE] ); + +Same as L<C<load>|Load REXX DLL>, but croaks with a meaningful message on +failure. =head2 Check for functions (optional): On Fri, Jun 15, 2001 at 07:10:57PM -0400, Ilya Zakharevich wrote: > OS2::DLL was missing error-reporting code. Thanks, applied. -- $jhi++; # http://www.iki.fi/jhi/ # ...

[PATCH] Refactoring to Sv*_set() macros
--IJpNTDwzlM2Ie8A6 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Argh! I spoke too soon again. This patch is mainly clean up of a file missed in the previous patch, lvalue assignments that showed up when an additional -D flag was set, and changes to bytecode.pl and ext/Byteloader/bytecode.h since I hadn't realized that byterun.c was a generated file. Questions and comments are welcome. Steve Peters steve@fisharerojo.org --IJpNTDwzlM2Ie8A6 Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="misc.patch&qu...

[PATCH] unfork the debugger (patch for 5.8.4)
--Boundary-00=_ZyJiAWYUm5+o2Mw Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Here is a patch which unforks the maint. debugger from bleed. It's been perltidy'd and most, but not all, of the changes are whitespace. Note to Nick and Rafael: both 5.8.4 and 5.9.x patches are required! Ciao Richard Foley --- Ciao - Shorter than Aufwiedersehen http://www.oreilly.com/catalog/perldebugpr/index.html --Boundary-00=_ZyJiAWYUm5+o2Mw Content-Type: text/x-diff; charset="us-ascii"...

BlackIce Patched or Not Patched?
ISS recently released a patch for the much published denial of server venerability in BlackIce Defender. Yet, eEye referred to the venerability as a buffer overflow. My question is ... does the newly released patch cover both? The ISS site does not refer to a buffer overflow. Does that mean that even after installing the patch BlackIce Defender is open to a buffer overflow? (not good if so) I've taken BlackIce offline until I am certain that it is fully patched. Thanks in advance. Tom Correction: Denial of service venerability as opposed to denial of server. (grin) ...

Web resources about - ZPM 6.4 patching SLES - novell.zenworks.patch

Cost Savings Through Virtual Patching
Computerworld Australia is the leading source of technology news, analysis and tools for IT decision makers, managers and professionals.

Patching hole in the net
MANAGEMENT procedures relating to high-profile parolees have been changed after convicted killer Peter Kamm absconded this week while on parole. ...

Fez, Fish and The Problem with Patching
Polytron's Phil Fish lands himself in controversy again - but is Microsoft the real villain?

Oracle settles with FTC over Java’s “deceptive” security patching
Commission faults Oracle's Java SE update process with making consumers' computers insecure.

New cloud platform streamlines device management and patching
... that cut the time needed to assess in half compared with the previous version. With agentless technology, Protect streamlines the patching process ...

Apple could spend much of 2013 patching its big Achilles’ heel: Web services
Let’s face it: Apple’s ( AAPL ) Maps fiasco wouldn’t have been such a big deal if it were just a one-time mistake. But as AllThingsD’s John Paczkowski ...

Patching the Voting Rights Act by @BloggersRUs
Patching the Voting Rights Act by Tom Sullivan The hole the Supreme Court's 2013 Shelby County v. Holder ruling blew in the Voting Rights Act ...

Senate tires of patching highway programs
SFGate Senate tires of patching highway programs Businessweek WASHINGTON (AP) — The Senate delivered an unexpectedly strong vote Tuesday in ...

Patching Cracks Between Different Materials Is Touchy
Q-The steps leading to our basement from the outside are steel and at the bottom meet a single concrete step. The crack between steel and concrete ...

Microsoft: Patching Windows 2000 'Infeasible'
Microsoft took the unusual step today and skipped patching one of the vulnerabilities addressed in its monthly security update, an omission that ...

Resources last updated: 3/7/2016 12:50:02 AM