Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have 5 register windows active on a SPARC machine, how many total registers are there?
In our PCI compliance scan, we still have this vulnerability in our website: Synopsis : The remote web server is affected by an information disclosure vulnerability. Description : The remote host appears to be running a version of IIS which allows remote users to determine which authentication...
For PCI compliance reasons, we had to configure auditd. Because PCI states that existing logs can't get changed without an alert. So we tried doing this: -w /var/log/ -k Logs_Accessed -p rwxa But will the auditctl command work? Thank you for your help.
How can I be certain that if I place a new graphics card on this computer it will be recognized and work properly. The motherboard has PCI-x, PCI-e x8, and PCI-e x1, slots. I tried an EVGA GeForce 6200 512MB but, it would not even let the computer boot. However n ATI Radeon 64MB did work; but,...
What is LogPos malware like date of the malware detected, coding language, command and control channel, infecting mechanism, hiding mechanism, impact till date?
How do I share a printer that is connected to 1 computer and share it to other computers without a network?
Please anyone give solution for my error in compiling, I have written java code in d: drive and when am trying to compile it, I am getting the error as follows: C:\>javac -d D:\bms\bin D:\bms\src\Welcome.java javac: file not found: D:\bms\src\Welcome.java Usage: javac <options> <source...
i started learning java rite now..i had copied the java software folder frm my lab and pasted it on my laptop...but then when i try to compile a program in the cmd prompt it says javac file not found.usage javac <options> <source files>....when i tried the same program on my desktop pc...
During import of Excel files, documentum just stops processing & disappears. There's nothing in the log, other than 49 files were processed & no errors. EMC cannot duplicate the error in their lab. Installation gone awry? CC me at firstname.lastname@example.org with solution.
If my Dell laptop is having hard disk problems, can I use an external Hard Drive to fix it?
Hi, Whats are various method to calculate Availability? Whats are the consideraions for availability management?
I can't download anything on my phone. It says it's too full and has no space. What should I do?
We need to fulfill a PCI compliance for our wireless analyzer that would detect the presence of rogue AP's on our internal LAN. What device would do this for us? This is for a Windows environment. Thanks!
Does anyone know what's the best web application firewall (WAF) for IIS? Also, is it useful for blocking attacks against poorly written code? I understand that WAF is required by PCI DSS so our organization needs to get one.
For our department, we need to make sure that our temporary storage of our user's credit card information meets PCI DSS requirements. We have to make sure that deletion is compliant DoD's security standards. We thought about using MySQL but we're not sure about the reliability. What should we do?
Does anyone know if there's a company / software that offers to store data (particularly credit card information securely) in exchange for a token? Also, can we view the data by using authentication and providing a token back to them? That should be enough for PCI compliance, right? Thanks!
How to enable cookies on BlackBerry 9320?
How do I find out what the Domino server-name is in a Web application? I have an application that runs on two servers - one for Notes access (which runs a lot of cool Notes things) and another for Web access (which does cool HTML things). I want to prevent people from running the Web app on the...
I have to store some credit card information. To be compliant with PCI DSS, we need to purge the data from our disks by not just deleting the file but writing over the bytes with a random sequence of data (because that would make it harder to recover the data). We would still like to leverage a...