Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows 10, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How can I use CVE-2015-6834 exploit? It's not a ready script and not listed in metasploit so I don't know how to use it. GHDB description makes no sense to me. Can anyone explain usage of this exploit? A demo would be helpful.
I'm conducting an investigation in order to define the best EPM tool for planning, forecasting and consolidation in a large business (composed of multiple entities). We are currently using HSF (Hyperion Strategic Finance) but we want to consider using BPC from SAP. Which EPM is more recommendable...
The code C9002910 takes a long time on IPL display without starting up. How can I resolve this problem?
Hi There, I need to find a command that will list all users last login. Also all disabled accounts. For Audit purposes Thanks :)
This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?
- If I have users with *ALLOBJ, but no access to command line: How does the user access those *any* objects on the server or app? How is the risk materializing? If I look at a client's screen and they say: "yeah I have allobj but see? I don't have a CL and my menu shows only 2-3 options.. So how...
I'm worried that one of my neighbors keeps trying to get on my private Wi-Fi. Is there a way I can see if someone is trying to access it? Also, can I see which devices are connected too? Thanks!
I just downloaded the new version of Firefox on Windows 10. But then I opened it, I can no longer bookmark any pages. The button is not working. How can I get it to work?
How can I get a list of primary and foreign keys within schema in DB2/400?
Linksys LAPAC1200 Dual-Band Access Point or Cisco WAP321 Wireless-N Access Point with single point setup. Which is easy to setup & managed maximum devices for basic Internet use?
I've started to notice that my GNU/Linux Debian is taking so long to turn off. Is there anyway to make it faster? Thanks so much.
I can get online but I can't type to get to a website. What's wrong?
When i try to write to record, i am getting Key Mapping error.Please let me know if somebody has faced this type of error
Hello techies out there! Forgive my ignorance but I am clueless to building a website. My question is... Is there anyway that you can build a website without using a website builder site like Wix or GoDaddy? For example, if you had the knowledge of say Bill Gates or Mark Zuckerberg, could you build...
I have Acronis, and Ashampoo backup programs and have VMDK backups. My computer will not boot and I need to know which program uses the VMDK extension.
Just interested to know which CRM open source is good which can be downloaded and installed easily. I know of some of the top players but was curious to know your thoughts.
Hey, I lost my cell phone few months back and now someone is misusing my data and blackmailing me for the same. Is there any one who can delete its content or suggest me some way out? Please reply ASAP.
On Ubuntu, is there a way for me to log a file before I delete it? I'm doing some file conversions right now (It's PNG to JPG) and I would like to log the old file before I delete it. Is that possible? Thank you.
In Windows 10, would there be a way for me to check if an application has administrative privileges when it's launched. I can't find this in Task Manager. Thank you.
Requirement - To send the printer file generated in Spool into LAN connected printer directly. I have created a new DEVD and OUTQ for connecting printer (which is connected with my PC via LAN). I'm worried that I have missed something during setup. Please anyone advice on this. CRTDEVPRT DEVD(newQ)...