Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I have a table with an associated form listing all of our raw materials that we have in house (sometimes multiple lots of materials). I have a table with an associated form defining the components (raw materials) of all of our products I have a “Build” table with which we would use a form to...
How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real? Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...
I use SyncSort with 'sort fields=copy' with include. But I need also an OUTREC. How do I tell SyncSort "if condoition then copy, else outrec"?
I am new to SAP, so I want to learn SAP ABAP online, can any one help me by sending links and other details.Is it possible to learn online?
Hi Group,How to access LDA in COBOL/400 program?Regards,MVRK
Only by using Cached Exchange Mode can i access previous mailbox items or per-configured OST file items. waiting for a good response....
What does the "t" in .pst and .ost stand for
Can someone help me how to connect AS/400 520 with my PC. I have client access. I am using crossover cable. Please help me with very easy steps. MK
programs running on my pc will sometimes just completely shut down for no reason whatsoever
Can anybody suggest me a website from where I can get the AS/400 emulator for free. I have taken a vacation from my job and now before I start it would like to practice a bit. I tried to download Mochasoft but its not working on Win7 machine. Appreciate quick response. Thanks in advance
Why is that 256 bit encryption has become so popular? Isn't 128 bit security enough for most applications?
Hi, i found a question similar to mine but doesn't work. I'm working in a company that shares a public calendar, it is on public folder, if I try to export, it export MY calendar, not the company one. the only way found is to send by email, copy the body, past in notepad, import by excel...whoooow,...
It is our intention to FTP objects between IBM iSeries v6r1 and IBM iSeries v3r2. But when we create the SAVE FILE in IBM iSeries v6r1, in specifying the target release, We can at most stepdown to v5r3. Does anybody know how to overcome this constraint? We want to stepdown to v3r2. Thanks
Now, I'm not sure if this is the best idea so that's why I'm trying to start this discussion. For hashing passwords, should we use hashed passwords as the salt?$passwd = 'foo'; $salt = hash($passwd); $finalHash = hash($passwd . $salt);The $finalHash is what would be stored in the database. I do...
Is there a way for a .NET application to create/start/stop Hyper-V virtual machine?I'm looking to create an automated means of starting/stopping virtual machines from a C# application. I know you can do it via P/Invoke but that's not the best option for me. Can anyone help me out here? Thanks!
I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...
I'm getting following error message: [strong] "ProtocolError occured trying to complete the request. The server returned a status code of : InternalServerError and the status description is : 'Internal Server Error'" [/strong] When I try to use RSS viewer web part with following RSS Feed URL:...
Which antivirus programs use "canary files" with common strings in their filenames to detect:1.) MyRootkit.vir is known to hide files which include the string ".vir" in their filename.2.) Upon installation (or signature update) MyAV puts MyRootkitcanary.vir in C:\Program Files\MyAV\Canary Files\3.)...
A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...
Hi i have a string and want to replace all occurance of " with ".Please let me know how can i accomplish this .