Questions & Answers

  • What is the advantage of IPV6

    What is the advantage of IPV6

    mukutrahman5 pointsBadges:
  • Suggestions for a hosting (cloud) service.

    Hello. We are looking for a simple solution to host a common set of catalog graphics for our remote sites that are both geographically and independent and separate. Any suggestions would be appreciated. Thanks. Paul.

    Newtothecloud5 pointsBadges:
  • removal of .rbf files

    After defragmenting my system disc, there sometimes remains a lot of fragmented .rbf files.I understand these files can be safely deleted.I also read that the Config.msi directory and files therein are automatically removed upon successful installation.This is not the case on my computer.How can I...

    jeanmelchior5 pointsBadges:
  • How to become a security expert?

    Hi, How do I become an expert as a security analyst? I graduated from business IT field without security knowledge. What area should I start studying with? Some people suggested me to take CEH first. What do you guys think? Is CEH a good cert to start with?Appreciate any feedback :)

    user7775 pointsBadges:
  • Errors during an IPL

    during an IPL we received B200F001 LP=002. What is this error

    Gurias5 pointsBadges:
  • Crystal report is not showing any data

    Hi, I had generated the crystal report by using visual stdio 2010, having asp.net vb and ms access database. It is working fine on local server but displaying blank page on server. I am including the code for reference. Thanks a lot to for solution in advance.reportview.aspx.vb fileImports...

    2007sanjay15 pointsBadges:
  • Give away old tower

    Am I safe giving away an old tower to a lady who needs one?

    jayemes15 pointsBadges:
  • Transmitting encrypted PDFs via email

    Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?

    ITKE342,190 pointsBadges:
  • iSeries DB2 searching text filters

    Can someone help me with iSeries DB2 searching text filters?

    manfinson5 pointsBadges:
  • How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE342,190 pointsBadges:
  • Can I use off-the-record style encryption for my emails?

    I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...

    ITKE342,190 pointsBadges:
  • Tellabs 532L DACS password

    Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?

    comstock5 pointsBadges:
  • recovery of missing file member after connection loss to Iseries

    After a power outage at work, we lost connection to the Iseries. One of the AP files that holds multiple members lost one member of data. 2 days later this member shows up again without anybody doing anything. The CFO wants to know how this happened. Can anyone answer this?

    Ci40030 pointsBadges:
  • Automatic date

    How can you set up a cell to activate the current time when another cell has data entered into it? Just want to track what time DATA was entered in the other cell.

    Bispo120 pointsBadges:
  • Connection lost when runrmtcmd

    I am using RUNRMTCMD from an AS400 server to execute a c program in an AIX server, it is working fine but I want to know if there is an error message code I can monitor to know when the communication is lost. What is happening now is that the remote program continues running in the AIX but cannot...

    ehaguilar5 pointsBadges:
  • db file question

    this appears when I try to find a website--error No_db_file

    Fghjkl15 pointsBadges:
  • Is it really necessary to block outgoing ports?

    I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...

    ITKE342,190 pointsBadges:
  • Hacking a hotmail account with URL

    Hi! I need to go into a Hotmail account. I have the sign-in and inbox URL. Can I just use this to see the inbox?

    ceebee8515 pointsBadges:
  • Encryption: Using a static IV

    A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...

    ITKE342,190 pointsBadges:
  • Evicted Last Server from 2003 Cluster – Databases won’t start

    **First submit blanked out all the original content** Sorry Environment - Windows Server 2003 SP1, SQL Server 2000 .exe version 2000.080.0760.00 I am helping to remove the clustering and migrate all databases on the cluster to a single machine in the cluster. I was able to evict Server 1 from the...

    MaxxOC5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following