Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
We have 100 files. We want to print the Field, Field Description and Data types through a CL program. Is it possible in a CL program?
I recently just upgraded to the latest OS X version and our compliance scan tells us that these OS-installed components are causing security vulnerabilities. It says MySQL and PHP are vulnerabilities. Not sure what I should do here. Can anyone help me out?
How can I recover a lost password of Lexmark X864de? 2 and 6 doesn't seems to work.
Can you access SCCM through a web console? Also can more than one user access it at a time?
Hi, I just want to start learning web application pen testing. They require that I download DVWA (Damn Vulnerable Web Application) to VMware, but I don't have enough data to get VMware, and I don't have the money also to purchase an online VMware. So I want to know if its possible to use my Kali...
At my job, we go through a checklist on our Windows Server 2008 for PCI compliance. There's a ton of Group Policy, Registry and other settings that I need to confirm for security best practices. We this see this, however: The system should be configured to disallow IP Source Routing, ICMP...
We're currently comparing solutions for PCI DSS compliance including: Splunk, RSA enVision, ArcSight, etc. But we're not sure what to do with. Has anyone had any experience with these programs? Our PCI system is a small segmented network with 5 hosts and our machines will be running Linux. Thanks!
I understand that PCI compliance requires annual rotation of keys. So, I have 16 databases across 3 servers (with multiple tables in each database). And it's going to get bigger. If I did this manually, it would make my data unreadable. Is there a software to do this?
When I want to open an Excel workbook that's password protected, it keeps wanting to open a "copy of ***" too - I have not changed any properties to these workbooks (*** above is the file name). Thank you.
I have a user who is experiencing error messages while trying to forward a meeting notice. The meeting was created by his delegate, who set it up to disallow forwarding. If the meeting was created on his behalf, shouldn't he still be able to forward it? He keeps receiving the error "Could not...
When should I use VMware and what's the importance of it?
Hi guys, Could you tell me why when I insert date into a database table, it's reversed from (dd-mm-yyyy) to (mm-dd-yyyy)? I have well defined my date format on form design already, but when it's inserted into the table it automatically reversed. How can I solve it?
What is the concept of writing and tracking test cases?
Hi, We would like to do security testing to our current project which is developed in JAVA, can you please share some information about how to start security testing, related websites, tools, techniques and any documents related to it. Thanks in Advance Regards Harish Malvi
Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?
If someone has added u to their blocked list and has blocked you from ringing them, is there any way of by passing it with a code like *62 which works for us numbers and not for u.k numbers, or is there a mmi code. Please help.
How is it possible for a network on a laptop to establish connection to a PC without my knowledge?
My department needs an open source static source code analysis tool that's going to be used for security testing on an Android app. We need to make sure the app is PCI compliant. Anyone know of a software that we can use for this?
How to Convert more then one rdf to single pdf in report 6i
What is the use of SPCAUT command?