Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...
I have mail thru Ipage, using Imap. what is entry of incoming and outgoing mail server name setting and port# Check SSL ?
I'm using Ubuntu 11.04 as a Firewall in SOHO environment with the thought of installing a GUI on it. Is it true that this would be a mistake because I should not run other applications on a firewall. Why is this the case?I just don't understand why putting a GUI on it would affect the "security" of...
How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.
Can an individual utilize webtv to surf various internet sites without having an activity or tracking log such as a phone log, modem dial out log, or internet browsing history. Is this an option to bypass any record tracking system?
I've recently read that a Belgium MP claimed that her email headers were being read during routing. It also said that the headers had this message "message opened by mailclient". What does this message actually mean?
I have a CL program that errors out with a CPF1080 on the command STRSBS SBSD(MYLIB/MYSUBS). Are there other commands that will have this same problem and is there a list of these commands somewhere ?
I have Iseries , and after it finish count from 1 to 48, a black empty screen stayed for about 30 minutes .. and after it start working the server always become very very slow for about 3 hours ... is there any solution to that
I run a small business and was wondering which type of computer is better to buy. If anyone can enlighten me that would be great. Thanks!
After doing some research on Security, I've finally figured out how to verify if an email / document was actually sent by the "sender". Here's the process I've figured out:The sender gives their public RSA key to the recipient.The sender also uses SHA1 to hash the document.Then he uses his private...
I've been reading more and more about the LANMAN (LM) hash and I'm having trouble understanding some of the concepts. Is there really any security advantage when it comes to splitting a password, encrypting the two halves separately, and combining the halves to form one hash? Or is it just more of...
We are planning to run the following setup: a firewall between our internal zones and the public internet. Each of our trusted zones use a different VLAN with a 3-layered switch while the DMZ zone is on the firewall itself, trunked to a layer 2 switch on the firewall.Would this setup provide...
When we IMPL the operator message queue (QSYSOPR) is clear. Is there a way to prevent this from happening.
Can we write OPNQRYF then OVRDBF with SHARE(*YES) and then call a program. Will this program will process only selected records from OPNQRYF or process all records?
What we can do in SQL which we cannot do in OPNQRYF
What are the licensing/pricing options around Forefront Client Security? This question is from the Microsoft Live Chat which took place on July 13th.
Can we record any other information in the security log about a failed log in attempt on a Windows XP SP3 desktop? And if so what other information and how can we get at it?
I am Running Outlook 2007/Outlook 2003 on Windows 7/XP sp3 systems with pop mail from non exchange local e-mail server. The mail servers security certificate expired. I created a new self signed certificate and installed new server certificate on the clients, however I am getting certificate...
What's the print program correspondence SAP 11?
Any one can share some settings where we can get alert or event when user remove / add from distribution group in exchange 2007