• Artificial Intelligence

    Good day! What are the capabilities of Turing's test? Can I have the answer not later than 1 week? Thanks a lot!

    Romero215 pointsBadges:
  • Run DB Created on *.5 on Client 7

    I am a developer. I support users running Client Version 7. They installed 8.5 on my new laptop. If I develop using Version, will these applications run on Client 7 version of Lotus Notes

    MaryMinc5 pointsBadges:
  • cleaning

    How do I turn off the cleaning mode?

    rlgarrels5 pointsBadges:
  • Security conference speakers

    I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...

    ShawnaMcAlearney0 pointsBadges:
  • Security issues going from V5R2 to V5r4

    we upgraded from V5R2 to V5r4 and now I am getting authority problems on any update programs in our custom programing library. User authorities were copied over. That seems fine. Were there any know security problems going from R2 to R4? I get around each instance by changing program to use Adopted...

    Kroeter5 pointsBadges:
  • Under-the-radar enterprise security threats

    Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html

    WHurley5 pointsBadges:
  • Your mobile device security policy

    From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Is password hashing really important? Why?

    I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...

    ITKE62,135 pointsBadges:
  • Is Firefox a secure place to store a Master Password?

    I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?

    ITKE62,135 pointsBadges:
  • Is a Firewall impervious to Viruses?

    By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks?  If not, why not?

    ITKE62,135 pointsBadges:
  • Passwords stored in Plain Text?

    I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...

    ITKE62,135 pointsBadges:
  • Virus scanning app for .Net

    I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically.  I could use some help or a good tutorial.

    ITKE62,135 pointsBadges:
  • Data Loss Prevention – Requirements

    Hi, I am currently putting together an options paper for my employer. Does anyone have or could refer me to a concise list of Business and Technical requirements for a DLP solution? Additionally, if anyone has performed a risk assessment prior to deploying a DLP solution, I'd be grateful for any...

    Chestergov5 pointsBadges:
  • AVG is showing an application as a threat

    We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...

    ITKE62,135 pointsBadges:
  • NFPA 75 update comparisons

    A SearchDataCenter.com reader wrote in with this question: What are the main differences between NFPA 75 1999 Edition and NFPA 75 2003 Edition that would impact the protection design and installation of fire suppression systems as well impact the facility operator?

    Leah Rosin520 pointsBadges:
  • Career change from Java to SAP BI

    hi , I have been working for 3.5 years in Java,J2ee. I was interested in SAP BI, so i joined in a training center and did SAP BI course.. now i joined in a MNC asking for a change in SAP BI..I am having a dilemma whether to stay in Java,J2ee OR move on to SAP BI.. How will be my career in SAP...

    Govind8315 pointsBadges:
  • RPGLE, PROCEDURES

    I want to learn about procedures in RPGLE. I asked some senior of mine about procedures, he answered that for understanding I need to learn modules and all in ILE...kindly guide me what all I need to know before going for procedures, main procedures and sub-procedures. Thanks Durgesh Singh

    Durgesh813370 pointsBadges:
  • RSA and DSA keys: Which one should I choose?

    I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?

    ITKE62,135 pointsBadges:
  • When trying to create an email, the message

    When trying to create a new email or reply to email the following message "message interface has an unknown error".  It tells me to close outlook and reopen, but that doesn't do any good.

    rickercb5 pointsBadges:
  • .pdf conversion to Word – Photo Issue

    Hello, I inserted photos in a Word document. Then I grayed them out so no one could identify who the people are. The document was saved as a .pdf file. Question: If someone was to convert the .pdf back to Word, could they re-create the original photos? Please inform.

    Beautybdy25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following