Questions & Answers

  • Is it the encryption level?

    I've got a Linksys BEFSR81 wired router, which is networked to about 5 other Linksys/Motorola routers. The BEFSR81 is on WEP, as are the others. The system runs at a crawl after i download the first 5mb of most files. I have been told that it could be that it's because this system is on WEP. Is it...

    Strtme5 pointsBadges:
  • Android: Call someone who has added you to reject list

    Is there anyway of bypassing and call someone who has added you to their reject list?

    shish4king10 pointsBadges:
  • Introduction to Networking

    What is basic of networking?

    030294848125 pointsBadges:
  • Is there a way to bypass a blocked list?

    If someone has added u to their blocked list and has blocked you from ringing them, is there any way of by passing it with a code like *62 which works for us numbers and not for u.k numbers, or is there a mmi code. Please help.

    shish4king10 pointsBadges:
  • Exchange: Send an email to a distribution list using C#

    For a friend of mine, I need to send an email to an Exchange distribution list that's called "DL-IT" using C#. Would anyone know how to do that? Thanks so much.

    ITKE350,795 pointsBadges:
  • What is Wrong with this code?

    What is wrong with this code in Visual Basic? Sub Main() Dim a = InputBox("add first number") Dim b = InputBox("add second number") Dim c = InputBox("add third number") If a > b & c Then Console.WriteLine("a Wins") ElseIf b > a & c Then Console.WriteLine("b Wins") Else...

    King10015 pointsBadges:
  • iPhone 6 Privacy

    Has there been any indication that the iPhone 6 is better at privacy than other iPhone versions? There is speculation because the iPhone 6 is being pushed so hard by the cell phone companies that it could have embedded monitoring or is more secure and that is why the FBI doesn't like it. (Per news...

    milesdoc5 pointsBadges:
  • Making a DAS (direct attached storage)

    Can you connect any new i7 4 generation Intel motherboard to a raid card, without any CPU and memory? and if I connected via thunderbolt from the motherboard will the computer find the storage? So in other words: Building my own das with a thunderbolt motherboard but no CPU and memory Add a RAID...

    alejandroruizit5 pointsBadges:
  • API for hmm generation

    I am looking for an API that generates hmm automatically (without human).

    beachlove5 pointsBadges:
  • AS/400-Data area and dataq

    What are the main difference between DTAARA and DTAQ? I know the below differences, is any other differences is there? The ength of data area is 1024 char and datlaq is 64,512 char. We can't initialize an variables at the time of declaration of a data Queue but we can initialize data area. I have...

    chowas400190 pointsBadges:
  • What is electronic data interchange?

    Can anyone tell me what is electronic data interchange?

    vamsboi245 pointsBadges:
  • Configuring Application Pools

    Amanda is the owner and operator of a small Web hosting company. She is using Windows Server 2008 computers as her Web servers, with IIS7 hosting multiple Websites on each computer. One of Amanda’s clients is a game manufacturer who has released a hot new product. Their Website contains an online...

    michaelathc10 pointsBadges:
  • How to deal with Microsoft Excel text overflow

    Text that is too long for a cell can be handled in several different ways. What is the difference between: (1) Not giving Excel any instructions about what to do with the text overflow (2) Letting Excel go with text overflow?

    Bethsmith1210 pointsBadges:
  • Corrupt Lotus Notes NSF File

    Hi, I have always got good advice from this site. This time it seems tough as there does not seem to be many software tools on my problem. But I have hopes from this site still. I archived my Lotus Notes Mails into the NSF file that it creates. Then copied it to my USB External HDD and then moved...

    MarkPerkin45 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Lotus Notes archive database error message: ‘Database Corrupt–Cannot Allocate Space’

    I have a Lotus Notes archive database that returns the following error message to me whenever I try to open it: "Database Corrupt--Cannot Allocate Space." How can I fix this issue?

    Domino Ask The Experts435 pointsBadges:
  • What is the best way to recover a corrupted .nsf file?

    What is the quickest and easiest way to recover a corrupted .nsf file?

    Domino Ask The Experts435 pointsBadges:
  • AS/400 compare files

    I want to compare two files without using SQL and logical file. I have written a code but I didn't get exact out put. Please look into the below code and help me guys. File:test1 Keyfield=accid ACCID   ACCNAME 1   siva 2   hari 3   vinayaka File:test2 no key field here ACCID   ACCNAME...

    chowas400190 pointsBadges:
  • Ending active jobs in AS/400

    How do I end active jobs in AS/400?

    dtrombley5 pointsBadges:
  • Job Waiting in AS/400

    How to find how many and what are the object waiting in the AS/400 system? Is there any command for that?

    Sureyz2,465 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following