Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi! I need to go into a Hotmail account. I have the sign-in and inbox URL. Can I just use this to see the inbox?
A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...
**First submit blanked out all the original content** Sorry Environment - Windows Server 2003 SP1, SQL Server 2000 .exe version 2000.080.0760.00 I am helping to remove the clustering and migrate all databases on the cluster to a single machine in the cluster. I was able to evict Server 1 from the...
A clustered index is created automatically in SQLserver 2012 while creating a table with primary key. The index is created on the primary key field. My queries which are not using the primary key for search are costing 100% on clustered index scan. Should I create covered index for each and every...
Should a web server have antivirus software installed and active at all times? Are there situations where it is not needed? What should be considered when choosing one to install?
tools which are used to analyse vulnerabilities(which can be downloaded for free)
I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...
I have BSNL VPN connection in my office and I have a broadband internet connection in my home which is 2 km away. I want to do my office work even in my home. Suggest me the ways to get connect with my office BSNL VPN ADSL router. Thank you.
This is getting irritating. This is the second time in the past few months after a large windows update my system got corrupted. The last windows update I applied had 39 updates. After the updates were done I powered off the laptop. A week later I went to use it and it displayed the message...
How do I use Echo when using Avaya OneX Agent?
Hi Group,I am trying to understand the significance of sorting in COBOL/400.Sorting is used for arranging records into a specific sequence so that sequential processing can be performed. But, for arranging records in a particular order I can as well create a logical file and process it; Why should...
How do antivirus programs investigate hundreds of thousands of files so quickly while maintaining good detection rates? Most are able to do this in real-time while not slowing down computer processing rates by very much. How is this done?
Hi everyone, My self Vinod Kumar, having qualification of Master of Science in food technology, and working in company from last 7 years. I want to do SAP certification course, to get a job in SAP market. I'm requesting you please tell me whether it is possible to do some trainings and get a job in...
I have a table with an associated form listing all of our raw materials that we have in house (sometimes multiple lots of materials). I have a table with an associated form defining the components (raw materials) of all of our products I have a “Build” table with which we would use a form to...
How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real? Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...
I use SyncSort with 'sort fields=copy' with include. But I need also an OUTREC. How do I tell SyncSort "if condoition then copy, else outrec"?
I am new to SAP, so I want to learn SAP ABAP online, can any one help me by sending links and other details.Is it possible to learn online?
Hi Group,How to access LDA in COBOL/400 program?Regards,MVRK
Only by using Cached Exchange Mode can i access previous mailbox items or per-configured OST file items. waiting for a good response....
What does the "t" in .pst and .ost stand for