Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What is the best way UNIX Assessment procedure?
Where in local policy is the the ability to disable the calc from the user from using it. I have looked and Googled until I am blue in the fac.Thanks
Hi All, I am new to this forum and after reading to many forums i feel you guys can really help me out of the mess. Currently i am working in an IT company as Sr. Software Engineer for Oracle Applications(2 years of experience) but lately i feel more inclined towards Computer Network and also i...
When I tryto open one report from oracle report builder 10g the report builder is stoped working and close report builder by windows 7
I have a Huawei 8665 & Consumer Cellular is my carrier. I have used my AT&T home service for the wi-fi on my phone with no problem till last nite, my wi-fi icon has disapeared even though I am still connected acording to my settings. I have worked all day trying to correct this with no...
Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...
I have a library we will call liba. In liba i have files for different companies. For eg: files aa01.itm is an inventory file for co# 01 and bb01.cms is a customer file for co# 01. I also have files aa07.itm and bb07.cms. These files are for co# 07.I want to grant someone access to only the files...
A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....
I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?
We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?
Organizations make business deals with other organizations. When negotiating a specific deal, each organization is represented by one lawyer. The same organization can have deals with many other organizations and it might use different lawyers in each case. Each lawyer has a first and last name,...
Anyone who has a template in creating a source code security policy? Thanks!
Hi, I have a customer that is planning on moving to new hardware and performing a SQL upgrade (2000->2005). I know that our application (FileNet Image Services) is sensitive to what we refer to as an "orphaned" database. Our app stops working if a database is simply detached/attached to...
Hi, This is kinda urgent. Is there any way to restrict an user from viewing, writing, deleting anything from my AS400 library... I dont want unknown users to delete, change, create anything in my library or any of the source in the library.. Please help.....
What is a client-side attack and what are its potential effects (impact on confidentiality, integrity, availability) and what methods might be used to get the user to direct a browser to the rogue web server?
We are tyring to apply best security practices by only granting EXECUTE security to Stored Procedures connected to a Role and make users members of the role. However the SP needs to access data from another DB on the same server and when trying we receive "SELECT permission was denied on the...
Looking for a secure authentication and authorization process on WWW - to include federated logon to multiple pages (single sign on behavior) with more security than uid/pwd access - but without issuing a physical device ("something you have")? Some websites are copperating partners - others are...
One of my computers runs a strange set of files that I don't recognize when it boots:bash.exe, curl.exe, uname.exe, sed.exe, rm.exe, tail.exe, cut.exe, awk.exe, cat.exe, chmod.exe, ls.exe, grep.exeI know I haven't uploaded any programs related to these files, so should II be worried about these...
I have a ta 3501 kyocera mfp! My customer is trying to print a report say 150 page report but they only want pages 5-20 and they select that but it prints the whole report?? ideas?
I know this is more of a curiosity but I wanted to get some expert opinions on this. I recently heard someone recommend stepping up from md5ing (not to SHA1) but to AES encrypting the password, which would use itself as the key. Does anyone have any recommendations on if that would be more or less...