Questions & Answers

  • Security Certifications

    What are credible entry level security certifications? There are so many and Im confused. I am Comptia A+, network+ and MCTS server 2008 certified along with a CIS bachelors

    Flkid5 pointsBadges:
  • slove the logic using truth table

    p implise pare equilent p ^ nehation q implize r^ negation r

    junaid125 pointsBadges:
  • Can I tell if an Outlook user is reading someone elses email?

    I suspect that a manager is reading my email.....is there a way to tell?

    Outlookuser5210 pointsBadges:
  • Lotus script question

    Hi,I have some lotus script that creates multiple documents from a form and then sends a doc link to selected recipients.What I'm trying to is the same thing except to create multiple copies of an existing document and then sends a doclink to the selected recipients .... ie If one recipient is...

    FrankSinclair5 pointsBadges:
  • compatibility matrix

    Does the Avaya wireless phones can support Cisco Call Manager?

    sijo19835 pointsBadges:
  • how to transform pst files to wab

    I have my adressbook in Outlook , that is pst files...and would like to have the same in a windows adressbook which is using wab...what to do ?

    Seawind17095 pointsBadges:
  • BI Publisher Parameter

    I want to pass parameter from obi publisher to RPD. So that i can fetch record from opaque view on the basis of that parameter. As it is done in answer with the help of session variable and request variable.

    44063860 pointsBadges:
  • Storing and retrieving data

    I have something very specific I want my spreadsheet to do for a schedule I am making. I want to be able to add data as text (IE shower or eat out) as a list 1-40. Ths list would give each text a value 1-5. If the text is already in the database, then it would only add the value to the balance...

    shyfellow19555 pointsBadges:
  • sending to groups

    I am trying to send e-mail to groups that I have in my address book with outlook (hotmail). My groups are 33-37 addresses. On my first attempt the message only went to 20 of 33 in the group. Is there a limit to how many can be in a group?

    jimmiejim5 pointsBadges:
  • Would versioning a file make it less secure?

    I'm using KeePassX as a password manager, and I've stored a KDB file in a Sparkleshare folder to back it up / sync with other devices.But just as a question (with the file being encrypted) if someone stole the file, they would several different versions of the file with minor variations. Would that...

    ITKE342,450 pointsBadges:
  • DB2 Logical Files – Select/Omit statement

    Is it possible to use field-to-field comparisons in a select/omit statement or must the comparison be a literal?

    DoctorT15 pointsBadges:
  • DUPSPLF

    I need to use DUPSPLF. How can I install TAA to be able to use DUPSPLF?

    adambenahmed5 pointsBadges:
  • ask.fm

    someone made a fake ask.fm account. how do i find out who it is?

    sarah197815 pointsBadges:
  • opening webarchives webgalleries

    I can't open webarchives or webgalleries on my mac..that i created in bridge ..either through the link or downloaded to the desktop on this mac book pro

    jamesdaddio5 pointsBadges:
  • Exchange 2013 where to troubleshoot mailflow issues.

    I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next.  with...

    Arcolino20 pointsBadges:
  • What differentiates certain zero clients from others?

    I have been looking into the different zero clients offered by companies like Dell, HP, Samsung, etc. From what I've seen so far, there are major price differences between some. However, with there being very little in them, how can differentiate some from others. Also, do all zero clients use...

    mathew355 pointsBadges:
  • What types of content shouldn’t be sent by email?

    I'm been doing some research on email security and I've realized that while emails are one of the main ways of business communication, sometimes it's not entirely secure.Does it make sense to use emails for these examples:E-TicketsSoftware license filesSo from a practical point of view, how...

    ITKE342,450 pointsBadges:
  • Detecting / Reacting to DNS tunnels

    Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?

    ITKE342,450 pointsBadges:
  • Is NAR an image file?

    When I capture an image by my Nokia Lumai 520 and add it to my desktop, it shows so many nar files. Why?

    rattupandit5 pointsBadges:
  • Our team is looking to a tool to scan a PDF file for malware

    Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?

    ITKE342,450 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following