Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next. with...
I have been looking into the different zero clients offered by companies like Dell, HP, Samsung, etc. From what I've seen so far, there are major price differences between some. However, with there being very little in them, how can differentiate some from others. Also, do all zero clients use...
I'm been doing some research on email security and I've realized that while emails are one of the main ways of business communication, sometimes it's not entirely secure.Does it make sense to use emails for these examples:E-TicketsSoftware license filesSo from a practical point of view, how...
Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?
When I capture an image by my Nokia Lumai 520 and add it to my desktop, it shows so many nar files. Why?
Our development team is looking for a tool that can scan a PDF file to determine if it might contain malware or a virus. Alternatively, the tool assigns a risk level to PDF.A web-based solution could work if it's scriptable. Does anyone have any suggestions?
Can you please let me know the freeware or licensed testing tool to find out performance of VB 6.0 code including load balance testing?
How do I add a second phone number to a smart phone and do I have to pay for it?
How do I turn on the webcam on my Asus laptop?
(SDN may be good for businesses and the people implementing them, but if you are the user, its hard to regain control.) Seems like SDN has been implemented on my own home network. We have Cisco E2000, an ISP Provider set up. Now it seems, Either intruders or practicing IT family members have taken...
I want to audit some actions on my Windows 2008 Server environment. I need to manage some groups, having the complete information on which groups the users have been added before. Do you know that how to get this information on my Active Directory?
I have a file *.FRP. I do not have the program that created the *.frp file on the computer. Can I print the file and how?
Is it possible to use Wildcard certificates with Citrix Secure Gateway. There is already one on the server but when selecting it for use with the Citrix Secure Gateway, the site claims there is an invalid certificate installed and that it does not match the FQDN.
Good day! What are the capabilities of Turing's test? Can I have the answer not later than 1 week? Thanks a lot!
I am a developer. I support users running Client Version 7. They installed 8.5 on my new laptop. If I develop using Version, will these applications run on Client 7 version of Lotus Notes
How do I turn off the cleaning mode?
I just wrote a story on one of the RSA 2005 keynotes. Anyone like to share their opinion on this topic? Frank Abagnale: Catch him if you can http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1035900,00.html The former ID thief made famous in a Leonardo DiCaprio movie wants to...
we upgraded from V5R2 to V5r4 and now I am getting authority problems on any update programs in our custom programing library. User authorities were copied over. That seems fine. Were there any know security problems going from R2 to R4? I get around each instance by changing program to use Adopted...
Which enterprise security threat do you think has gone under the radar? As an editor on SearchSecurity.com, I'm interested to hear what you think. Our favorite response will win some great, free security training books. http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1368789,00.html
From a security perspective, how are you dealing with employees that want to bring in their own personal devices? http://searchmidmarketsecurity.techtarget.com/news/article/0,289142,sid198_gci1510987,00.html