Questions & Answers

  • AP Style: How do you spell datasheet, whitepaper?

    Are datasheet and whitepaper each one word? (white paper vs. whitepaper; data sheet vs. datasheet)

    TechnologyMarketers6,240 pointsBadges:
  • Looking for a solution to our software firewall issue

    I work in a small office and we run a router with a dedicated hardware firewall behind it that filters and routes traffic before it hits the LAN. It seems a lot of our internal PC issues are caused by our current firewall, but we obviously can't just turn it off.Does it make sense for us to...

    ITKE344,995 pointsBadges:
  • how to run c++ code off of flash drive

    Hi,I want to know if its possible to run my c++ programs that i write when i connect the flash drive to my PC. Just run them as portable apps and that they would function properly. Some of the programs are really simple like a calculator, etc. I also want a very simple UI to works.Thanks!

    ddatvo5 pointsBadges:
  • Vmware player

    Am running windows 7 64 bit on my laptop i would like to run vmware player on my usb pendrive with backtrack as my gust machine I was wondering if it can be done.

    caribknight5 pointsBadges:
  • Network SImulator

    Can someone suggest me what network simulator should I use to make simulation of multimedia delivery over LTE networks?

    dzcatic5 pointsBadges:
  • Link Query to Report on Access 2010

    In an existing database, I have copied an existing query and an existing report so my new report will be in the same format as existing reports. I changed the criteria on the query so that it is pulling only the information I need. Now I need to link the two so the report will pull just that...

    LindaJenkins5 pointsBadges:
  • convert report to excel without convater

    Is it possible to convert a 10g generated report to excel without excel convater?  

    MCAMCom15 pointsBadges:
  • conversion problem

    how do you convert DCF files into CSV files for export to Excel Spreadsheet

    ironpony45 pointsBadges:
  • Does anyone use bcrypt?

    I have some questions about bcrypt since I'm looking for an unusual way to protect my passwords.I know its like 15 years old, but its not widely adopted and I haven't heard any tales of it being cracked. So does anyone use it? Are there any NIST recommendations about it?  I couldn't find any.

    ITKE344,995 pointsBadges:
  • Duplicate IP addresses?

    How can two laptops have the same IP address? We have a wireless connection to our home computer and somehow we both ended up with the same IP address. This strikes me as infinitely impossible, but it happened, so clearly there is something I don't understand about how IP addresses are distributed....

    Madagaluna5 pointsBadges:
  • DNS name resolve

    Hi ,We have 36 Additinal Domain Controllers in remote branches. All are windows 2008 R2. In Data center, Root domain exist. We configured sites based upon the network and geographical locations. Eventho, respective ADC is up and running, client computets resolving Domain DNS from other DNS servers....

    UK75 pointsBadges:
  • iSeries/AS/400 any problems with iseries access in a VDI environment

    Are there any issues with using iSeries access in a VDI environment. Would it work without any special configurations?

    SuzzyQ5 pointsBadges:
  • Losing my Wi-Fi network which shuts down my phone

    Is it my mobile phone my carrier or is it my Wi-Fi that's causing the shutdown?

    garfied20 pointsBadges:
  • Inter-VLAN

    How to configure inter-VLAN switching?

    sokhai5 pointsBadges:
  • Unsecure privilege mode

    What does it mean my tablet is in "high privilege mode"' (I.e. has been rooted)

    kindaichi5 pointsBadges:
  • RSA: Doing a dictionary attack

    In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...

    ITKE344,995 pointsBadges:
  • Network goes down when one particular computer connects

    I have 5 computers sharing a network / sharing a common router but recently I'm having a problem in which when one particular computer is opened, the whole network goes down and none of the computer is able to connect to the internet. What could be the reason for that? Is it because of some kind of...

    Sushant2015 pointsBadges:
  • Interpreting bandwidth usage by MRTG/CACTI

    Hello guys. We have a dedicated lease line of 1 E1 (2Mbps) that we subscribe from an ISP. For the past several months, we have noticed that internet connection is so slow and it keeps us thinking if we are getting what we are paying for. I need help in interpreting an MRTG graph from CACTI of our...

    JuneC155 pointsBadges:
  • Questions about symmetric session keys in SSL/TLS

    Do session send and receive keys in SSL/TLS protocol use symmetric encryption (DES, AES, BlowFish, etc.)? Are public-private key pairs superior to symmetric keys for key exchange security? Why isn't asymmetric encryption used for the session keys?

    ITKE344,995 pointsBadges:
  • Lotus Notes security: Changing image for password

    I've recently noticed in Lotus Notes that when it asks for my password, it always shows a screen with a picture that appears to change after a new character is entered (after the fifth character).Now I'm not sure if this is security related but is this a way to distract an attacker from looking at...

    ITKE344,995 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following