Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Need more information than this site is generating, any ideas on other sites that hold more traffic?
Can we create radio buttons in Lotus Notes 9. How we do it?
my hard dive could not format during windows installation andthe feedback was that windows could not acces this drive pls help me solve it
For the past few weeks, I've been trying to make my server PCI compliant. I need to remove the INode from an Apache ETag header. So I made this change: <Directory "/var/www/html"> Options FollowSymLinks AllowOverride None Order allow,deny Allow from all FileETag MTime Size But now I'm getting...
For one of our client's websites, they're trying to pass PCI compliance test but the testing company notified us of a vulnerability that we can't figure out. Here's what they told us: The issue here is a cross-site scripting vulnerability that is commonly associated with e-commerce applications....
How do I interface various data from SCADA systems?
If we want to search the particular Source of an object, which command we prefer object may be any? Like PF, LF or PGM?
Hi! when I checked my e-mail yesterday, I discovered it all gone (in box, sent, address book, etc.). I called bellsouth and we sent up a new "account" but what would really like to do is recover my addresses and old e-mails. Is there anyway to do it? I use Netscape (not Outlook)and had only one...
We're running a Windows Server 2008 with IIS 7. I need to use SSL 3.0 for our PCI compliance but from what I was told, we should disable SSL 2.0. But if I need to do this, will IIS automatically use SSL 3.0? Thanks!
Hi, How do I calculate service availability to business user? Our service should be available to 24x7x365 days, but there are so many dependent components (network, servers, links, application, Data center etc) supported by multiple vendors should be available to meet the requirement. Vendors are...
/DEFINE is a part of compiler directives, which if used will reduce source listings of the program. But I would like to know what happens in runtime if I use this directive. for eg: If I use /DEFINE in pgm : /DEFINE MOD_1..then in I write /If Defined(Mod_2) read FileA; /Else read FileB; /endIf
HELLO FRIENDS,I have recently got a project in which i have to code the modules through synon.As I m new to this platform, i need a little help regarding the coding which is done in an action diagram.and how to use the built in functions in an action diagram and how to use the user defined...
I'm doing MCA in my final year and now I want to choose one way for my career so tell me please: Is AS/400 is right choice after my MCA?
We have 100 files. We want to print the Field, Field Description and Data types through a CL program. Is it possible in a CL program?
I recently just upgraded to the latest OS X version and our compliance scan tells us that these OS-installed components are causing security vulnerabilities. It says MySQL and PHP are vulnerabilities. Not sure what I should do here. Can anyone help me out?
How can I recover a lost password of Lexmark X864de? 2 and 6 doesn't seems to work.
Can you access SCCM through a web console? Also can more than one user access it at a time?
Hi, I just want to start learning web application pen testing. They require that I download DVWA (Damn Vulnerable Web Application) to VMware, but I don't have enough data to get VMware, and I don't have the money also to purchase an online VMware. So I want to know if its possible to use my Kali...
At my job, we go through a checklist on our Windows Server 2008 for PCI compliance. There's a ton of Group Policy, Registry and other settings that I need to confirm for security best practices. We this see this, however: The system should be configured to disallow IP Source Routing, ICMP...
We're currently comparing solutions for PCI DSS compliance including: Splunk, RSA enVision, ArcSight, etc. But we're not sure what to do with. Has anyone had any experience with these programs? Our PCI system is a small segmented network with 5 hosts and our machines will be running Linux. Thanks!