Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?
We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...
Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...
One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...
I have a ta 3501 kyocera mfp! My customer is trying to print a report say 150 page report but they only want pages 5-20 and they select that but it prints the whole report?? ideas?
I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...
I have mail thru Ipage, using Imap. what is entry of incoming and outgoing mail server name setting and port# Check SSL ?
I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...
How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.
Can an individual utilize webtv to surf various internet sites without having an activity or tracking log such as a phone log, modem dial out log, or internet browsing history. Is this an option to bypass any record tracking system?
I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?
I have a CL program that errors out with a CPF1080 on the command STRSBS SBSD(MYLIB/MYSUBS). Are there other commands that will have this same problem and is there a list of these commands somewhere ?
I have Iseries , and after it finish count from 1 to 48, a black empty screen stayed for about 30 minutes .. and after it start working the server always become very very slow for about 3 hours ... is there any solution to that
I run a small business and was wondering which type of computer is better to buy. If anyone can enlighten me that would be great. Thanks!
After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...
I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...
We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...
When we IMPL the operator message queue (QSYSOPR) is clear. Is there a way to prevent this from happening.
Can we write OPNQRYF then OVRDBF with SHARE(*YES) and then call a program. Will this program will process only selected records from OPNQRYF or process all records?
What we can do in SQL which we cannot do in OPNQRYF