Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is there a device that will transfer data from a 3 1/2" floppy to a flash drive?
I run Windows 7 Pro 64-Bitwith a ASRock P67 PRO3 (B3) MoBothat has a UEFI BIOS.I have EaseUS Partition Master Pro v9.2.2and EaseUS Partition Wizard Home v8.1.1as well as Acronis Disk Director 11 Home Build 11.0.2121My C, D and E partitions are on a 120 GB NTFS SSD with a MBR.I installed Windows 7...
How do you start up a cold IBM machine (what is involved) and how long does it usually take assuming that the machine has been switched off for a month. (eg sysgen, patches, IPL, fixes before data is restored). What is the lead time to order an IBM mainframe? What about a HP server (lead time)?
Hello, could you please tell me where can I find a book, guide or course about Tracking and Analizing Security Audit Journal on iSeries? I have tried Appendix F on Security Guide but there are not all entries and it does not explain how to analize records in journal. Thanks a lot
Typical file sharing can create pathways between the systems of different security levels. I want to provide files (containing no sensitive data) from a secure system so that they can be read from low security systems, without having to ftp through firewalls which have more important duties. What...
I am new to Netgear. How do I make my Netgear secured? Right now it shows unsecured. I would like to change to secured. Thanks
I completed MCA in 2008 and presently working in Non-IT Automotive for the past 6 months. I want to enter IT industry and want to pursue a career in Software Testing & Quality Assurance. I dont have any IT related experience. I want to do either ISTQB or CSTE certfication and confident of...
I am a software tester and working on a financial domain. I am appearing for ISTQB certification and I am interested to pursue my career in SAP domain,so I would like to know which SAP certification will benefit me. Thank you.
I plan to get my ISTQB Certification for software testing. Is this field hot? Also, should I get A+ Certified first, or can I do it with just a Masters Certifiate in ISTQB?
What is the recommended authority setting to QSYSOPR which prevents users from answering messages? What kind of impact does this have on jobs sending messages to the queue?
What are the database security requirements in a Linux environment?
A host receives an authenticated packet with the sequence number of 181 and the replay window spans from 200 to 299. What will the host do with this packet?
Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...
what is switch bounce
I installed Crystal Reports v11 on my Server 2003 system. Then when I try to open it I'm getting: crw32.exe Application Error. The instruction at "0x7ff2fbfc" referenced memory at "0x7ff2fbfc". The memory could not be "written". Can anybody tell me what is happening and how to fix it? Marty
What is a rooted app
Just curious what tools you have in your network toolkit? I've heard or used snort, TCPDump, NMap, but would love other suggestions
What is the best way UNIX Assessment procedure?
Where in local policy is the the ability to disable the calc from the user from using it. I have looked and Googled until I am blue in the fac.Thanks