Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi, I have recently installed an extra 1GB of RAM. When I boot up it only show's 3GB in BIOS. This is also the same when i view my system properties. I have tried the basic tests like removing one of the original RAM modules and replacing it with the new one to make sure it is working, it does....
Which Windows utility shows the devices that an IP packet travels through from source to destination?
I'm trying to develop a website, along with a corresponding helper program (that would be installed on a user computer). Both the website and the program will communicate with each other through AJAX but I know it will be a huge security risk other web pages can send requests to the program. I need...
When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...
I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?
A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?
In our organization, our users logon to their desktops with Active Directory and access SharePoint using Windows authentication. But many of our users frequently change teams, so their access to their old SharePoint team site should be removed. Our maintenance team is refusing to setup groups for...
I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....
Is there a way to send a text message to a cell phone from the AS/400 preferably without having to purchase some third party software?
I want to change default password to expire the password when users log in. How do I accomplish this?
In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.
I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...
Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?
I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...
I'm trying to use an API to create SAML authentication requests and receive/interpret the SAML responses but I'm not sure of the best way to do this. I've figured out how to receive and interpret the responses. Can someone point me in the right direction on using APIs to create SAML requests. Thank...
Hi all - does anyone know when IBM will cease to support V5R4 of the iSeries operating system?
please tell me how to configure load-balance on unequal path with ospf.
Is it possible to install IBM 9.0 on Windows 8 with 64-bit machine. What is the hardware requirement to install and run IBM Notes 9.0
Hi, please help me with the logic how can I read the subfile when the record is not changed. (The user did not touch or crossed the subfile of particular record). How can I deal with that? After searching, I came to know we can achieve only with SFLNXTCHG keyword. But I don't how to proceed with...
On a trip to Canada, I used local Wi-Fi hot spots to access internet. I want to minimize security breach possibilities by removing the cookies and or URL references.