Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I need to open my Pagemaker 5 files. How can I do that?
How does the router know about the port number in NAT and in extended ACLs and suppose the Router just know at Layer 3 network layer?
What is the benefit of the OSPF process-ID?
When we add the command "spanneng-tree vlan 1 root primary " on non root switch, how do I put their priority?
Are the scale out NAS solutions around these, tested/confirmed for HDFS: Dell Fluid File System, Isilon, Hitachi NAS Platform, HP StoreAll, Huawei OceanStor, IBM Elastic Storage, NetApp Clustered Data Ontap 8.x, Quantum StorNext, Red Hat Storage? Can you please point me to links on their...
I just want to know, can I install Filezilla on cpanel or a PHP based web host?
Do they loop run even when you are not running WhatsApp?
My wife has secrets on Facebook. Can I get into her Facebook account?
On Skype, I don't know how to reset my password.
A quick question, what about vendor security? How can you make sure their product is safe? How do you validate that? What things should you look in a Multi-factor authentication vendor that guarantees their product is safe/secure?
What are the key key features differentiating network monitoring tools and firewalls/UTMS? If an organization runs cyberoam, for example, do they require a network monitoring tool for bandwidth and other security/network management aspects
I want to know what it can potentially do. I have two PCs of my own and we have just brought a laptop and a wireless printer in which required our internet connection password. I need to know can that printer access my files through the internet and print as it pleases? If it can which I don't...
Please I need urgent help. So there is this person who could be hacking my phone. One thing I'm worried about is them seeing my deleted photos and videos from the past. But is it possible for them to do so without possessing my phone?
My Apple laptop suddenly jammed and shows your computer has been blocked call.
How can I reset my password but I forgot security questions?
The New York Times has a 10 article a month limit and when you reach that limit you get a pop up telling you, so. So, I logged into my VPN and then went to the NYT but I, still, got the pop up. Doesn't the VPN mask my IP address? How does the NYT website know it's me?
What is the best way to unlock the update file when using update program for inquiry only?
Hi, How do I get/select particular record from a src-pf to update as for requirement?
Why does my phone battery always run low?
Hi, I have MAC address but I need to know the IP address of my MAC address in Cisco 2950 switch. What are the commands to find my IP address?