Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
The company I work for makes us change my password every 90 days. I know this is commonplace for many organizations but I'm trying to find out if there is a specific vulnerability that it's designed to counter. Or is it just good practice to be done?I know it's a general security question but it's...
please help me solve my wifes answering book turbo pascal. I'm not expert to this field but I'm trying to study it myself. i cant solve this one. here it is: Write a program that have a password, and if the password enter 3 times is failed, it will appear 'error'. I would greatly appreciate those...
Hi All, Our new E1 interface to Robot seems to have created an issue where previous EDI react jobs are not finishing in the OS and so Robot Schedule continues to think they are still running. After looking at the job log for the hung job I noticed it only created a data queue in the ROBOTLIB. I...
Our professor gave us an assignment. "Enumerate different Intellect Devices and Their uses." but i already searched for it over half an hour and didn't got an answer. So I'm just thinking if there's really an Intellect devices or I just copied a wrong assignment. Anw, I'm taking BSIT and I'm First...
I have to lists of libraries on the same system as PFs. Using query, I want to see what libraries are not on one system, but on the other and vis-virus and generate a report. Can you offer solution? The two library lists come from two different systems. I FTP'd the one file over to another so...
Is there a reason why I should run VPNs and Reflexive ACLs on a firewall with NAT + routing functions on the router, if the router alone can take care of it?
What word feature is especially useful when you want to send the same basic letter to several people, but you want to customize it for each recipient?
how do i add bullet points to a document
should I delete dmp files
I want to put a list together to try and improve response rates for B2B customer satisfaction surveys. I have a few ideas (which I've listed) and would be grateful for any additions.Acting on the feedback - shows you've listened and helps response rates for repeat surveys Have good customer data -...
I need to scan uploaded files for viruses on a Linux server, but I'm not sure how to go about it. Any suggestions?
Who are the most popular network technology key note speakers for 2013?
I got some documents printed the other day at a local print shop. I noticed that they moved my PDF from my flash drive to their desktop. Is there a way to protect my files without using a password? Is there a way to make a file open once and after that encrypt it?
I might have a virus problem with one of my machines so I'm trying to figure out if there's a way to detect an antivirus software inside of it using C#. I understand that the Security Center detects software but is there a way using C#? Thanks for all the help!
I've recently created a program but after a few hundred downloads, my Nod32 antivirus is detecting it as a Win32/Agent.NFIWJLP trojan. Can someone help me before my program doesn't get deleted by the antivirus software? My program mimics the user's interactions with the PC at a scheduled time....
I would like to be able to view the LDA for a job that is running on the system. Is there any way of doing that without having to create a report?
I'm currently using VMware 5 and I've noticed recently 2 connections are appearing when I start it up. TCP 10.100.100.161:55555->as-40816.engx.vmware.com:https (ESTABLISHED) TCP 10.100.100.161:55556->a184-85-99-51.deploy.static.akamaitechnologies.com:https (ESTABLISHED) But the problem is...
Error message reads Microsoft Office Outlook cannot open this item. Your Digital ID name cannot be found by the underlying security system.
How can I update the error message for Windows 8.1?
I already know that anti-virus software receives updates from virus definition files (which contains patterns used to identify viruses). But with the size of updates growing frequently each time, I'm wondering in order to limit the size of the updates, do AV companies remove older viruses from...