Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi,I want to know if its possible to run my c++ programs that i write when i connect the flash drive to my PC. Just run them as portable apps and that they would function properly. Some of the programs are really simple like a calculator, etc. I also want a very simple UI to works.Thanks!
Am running windows 7 64 bit on my laptop i would like to run vmware player on my usb pendrive with backtrack as my gust machine I was wondering if it can be done.
Can someone suggest me what network simulator should I use to make simulation of multimedia delivery over LTE networks?
In an existing database, I have copied an existing query and an existing report so my new report will be in the same format as existing reports. I changed the criteria on the query so that it is pulling only the information I need. Now I need to link the two so the report will pull just that...
Is it possible to convert a 10g generated report to excel without excel convater?
how do you convert DCF files into CSV files for export to Excel Spreadsheet
I have some questions about bcrypt since I'm looking for an unusual way to protect my passwords.I know its like 15 years old, but its not widely adopted and I haven't heard any tales of it being cracked. So does anyone use it? Are there any NIST recommendations about it? I couldn't find any.
How can two laptops have the same IP address? We have a wireless connection to our home computer and somehow we both ended up with the same IP address. This strikes me as infinitely impossible, but it happened, so clearly there is something I don't understand about how IP addresses are distributed....
Hi ,We have 36 Additinal Domain Controllers in remote branches. All are windows 2008 R2. In Data center, Root domain exist. We configured sites based upon the network and geographical locations. Eventho, respective ADC is up and running, client computets resolving Domain DNS from other DNS servers....
Are there any issues with using iSeries access in a VDI environment. Would it work without any special configurations?
Is it my mobile phone my carrier or is it my Wi-Fi that's causing the shutdown?
How to configure inter-VLAN switching?
What does it mean my tablet is in "high privilege mode"' (I.e. has been rooted)
In my understanding of learning "Security", I'm looking to learn more about how RSA works. Here's my basic understanding of RSA:Having the public key allows you to encrypt things. Encrypting the same message "Hello" on two different computers using the same public key will produce the same...
I have 5 computers sharing a network / sharing a common router but recently I'm having a problem in which when one particular computer is opened, the whole network goes down and none of the computer is able to connect to the internet. What could be the reason for that? Is it because of some kind of...
Hello guys. We have a dedicated lease line of 1 E1 (2Mbps) that we subscribe from an ISP. For the past several months, we have noticed that internet connection is so slow and it keeps us thinking if we are getting what we are paying for. I need help in interpreting an MRTG graph from CACTI of our...
Do session send and receive keys in SSL/TLS protocol use symmetric encryption (DES, AES, BlowFish, etc.)? Are public-private key pairs superior to symmetric keys for key exchange security? Why isn't asymmetric encryption used for the session keys?
I've recently noticed in Lotus Notes that when it asks for my password, it always shows a screen with a picture that appears to change after a new character is entered (after the fifth character).Now I'm not sure if this is security related but is this a way to distract an attacker from looking at...
Can anyone help me please. I am trying to send an email to a business account but I keep getting the mails bounced back to me with the following error code. I have also tried to email someone else at their headquarters and get the same message...... reason: 550 5.7.1 Requested action not taken:...
How do you delete alot program?