VOX
Navigation Slide Out Menu
Communities
View more
Data Protection
Availability
Insights
Compliance
VIP
Community Insights
CPEP
Technical Blogs
Groups
Podcast
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for
Search instead for
Did you mean:
Veritas.com
Support
Sign In
VOX
Data Protection
System Recovery
PQJ xml exploitment
Options
Subscribe to RSS Feed
Mark Topic as New
Mark Topic as Read
Float this Topic for Current User
Bookmark
Subscribe
Mute
Printer Friendly Page
PQJ xml exploitment
Francesco_Varre
Not applicable
Options
Mark as New
Bookmark
Subscribe
Mute
Subscribe to RSS Feed
Permalink
Print
Report Inappropriate Content
04-27-2007
12:58 AM
Hello,
I use LiveState Recovery 3.0 and 6.0, and I'd like to get agent task options.
So, I look at PQJ files in agent Schedule folder but I don't know the exact tags/values meanig.
Can somebody please help me?
Thanks,
Francesco Varrese
Labels:
Labels:
Backup and Recovery
BESR 7.x and Earlier
System Recovery
All forum topics
Previous Topic
Next Topic
1 REPLY
1
Bill_Felt
Level 6
Employee
Accredited
Certified
Options
Mark as New
Bookmark
Subscribe
Mute
Subscribe to RSS Feed
Permalink
Print
Report Inappropriate Content
04-27-2007
09:06 AM
Hello Francesco,
To my knowledge, Symantec has not released this information for public distribution, so I'm afraid I don't know the answer to your question.
Could your needs be met by means of the scripting interface we offer for the product, with its associated documentation?
Thanks.
Post Reply
Preview
Exit Preview
never-displayed
You must be signed in to add attachments
never-displayed
Additional options
Associated Products
You do not have permission to remove this product association.
Related Content
Netbackup SYM05-024: Exploitation of a buffer overflow vulnerability in VERITAS NetBackup
in
NetBackup
04-16-2012
Custom Reports howto write and exploite
in
Backup Exec
06-02-2008
Exploited - servers registry
in
Backup Exec
11-21-2005
Backup Exec Windows Agent Remote File Access Exploit (0day)
in
Backup Exec
08-13-2005