Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I'm trying to implement Google Authenticator in .NET apps...is there a tutorial on how to do this? I'm trying to add tw0-factor authentication to several of my applications and I heard this is the way to do it. I would appreciate the help.
chkdsk c:/f/r consistently failed to check my HDD, so the interface from Properties->Tools-> Check Now. Is there another way to scan HDD for errors, bad blocks and sectors?
Give that you have a Windows XP System. Assume the system is running,but you are at the desktop and there are no windows open. What sequence steps must you perform to open Disk Administrator to create a new partition?
Hi there, I'm just looking for some suggestions of possible causes for losing connection to our server periodically. We just brought our whole IT infrastructure in house about 6 months ago. From day one we've been losing connection to the server (ie. our offline files folder kicks in, lose...
I have a server which acts as a Domain Controller, File server, is it possible to transfer these roles to another server without having to reconfigure the whole thing?
For February, ITKnowledgeExchange is building out a guide on cloud computing. What is on your recommended reading list for getting up to speed or tackling particular technologies? Thanks for any suggestion to our reading list!
How can I define a GP so that users cannot use their USB Flash disks?
In Linux, when one of our files is deleted, some content may still be left in the filesystem (unless it's overwritten by someone). I understand the wipe command can erase files but it's not erasing the free disk space I should have from those files. What can I do to achieve this?
Hi, I am looking to start a small business that would need a FTP server for about 20-50 clients. Each client would be transferring data to our FTP daily ranging from 100 MB up to 100 GIGs of data. I have extensive knowledge on PCs but not to much about servers. Would anyone be able to give me an...
Can you explain the difference between a modem and a router? Thanks!
I noticed when I create a new user in the server, and when I log on to the user's account he has access to some network drives. How did this happen and where can I find these settings?
We are on V5R3 and are about to upgrade our disks prior to going to V5R4. Does anyone know how to save AND restore spoolfiles including tose with attribute *USERASCII? Thanks.
My McAfee framework is not installing, and could not update. What should I do?
I plugged in the wrong cord to external wd my book 2tb external hard drive. I took out the drive, bought recover data cord. I'm able to plug drive into computer, its running, computer recognizes the cable connection, but will not recognize or load the hard drive data
Can't get my tablet to connect to public wi-fi. What should I do?
How can I prevent TV's, printers, appliances from calling home?
Would there be a way to start Microsoft Outlook and have an email pre-populated from a command line? Specifically, I need the To, Body and attachment all pre-populated. Thanks so much.
When I open Lotus Notes, undesired documents keep opening. What should I do?
How to provide security for an application in WebSphere application server v7 ? I already installed some applications, now i want to provide security for those applications. please help me on this.
Is there any way to declare all the files present in a source physical file using CL by the single DCLF statement?