Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Hi! when I checked my e-mail yesterday, I discovered it all gone (in box, sent, address book, etc.). I called bellsouth and we sent up a new "account" but what would really like to do is recover my addresses and old e-mails. Is there anyway to do it? I use Netscape (not Outlook)and had only one...
We're running a Windows Server 2008 with IIS 7. I need to use SSL 3.0 for our PCI compliance but from what I was told, we should disable SSL 2.0. But if I need to do this, will IIS automatically use SSL 3.0? Thanks!
Hi, How do I calculate service availability to business user? Our service should be available to 24x7x365 days, but there are so many dependent components (network, servers, links, application, Data center etc) supported by multiple vendors should be available to meet the requirement. Vendors are...
/DEFINE is a part of compiler directives, which if used will reduce source listings of the program. But I would like to know what happens in runtime if I use this directive. for eg: If I use /DEFINE in pgm : /DEFINE MOD_1..then in I write /If Defined(Mod_2) read FileA; /Else read FileB; /endIf
HELLO FRIENDS,I have recently got a project in which i have to code the modules through synon.As I m new to this platform, i need a little help regarding the coding which is done in an action diagram.and how to use the built in functions in an action diagram and how to use the user defined...
I'm doing MCA in my final year and now I want to choose one way for my career so tell me please: Is AS/400 is right choice after my MCA?
We have 100 files. We want to print the Field, Field Description and Data types through a CL program. Is it possible in a CL program?
I recently just upgraded to the latest OS X version and our compliance scan tells us that these OS-installed components are causing security vulnerabilities. It says MySQL and PHP are vulnerabilities. Not sure what I should do here. Can anyone help me out?
How can I recover a lost password of Lexmark X864de? 2 and 6 doesn't seems to work.
Can you access SCCM through a web console? Also can more than one user access it at a time?
Hi, I just want to start learning web application pen testing. They require that I download DVWA (Damn Vulnerable Web Application) to VMware, but I don't have enough data to get VMware, and I don't have the money also to purchase an online VMware. So I want to know if its possible to use my Kali...
At my job, we go through a checklist on our Windows Server 2008 for PCI compliance. There's a ton of Group Policy, Registry and other settings that I need to confirm for security best practices. We this see this, however: The system should be configured to disallow IP Source Routing, ICMP...
We're currently comparing solutions for PCI DSS compliance including: Splunk, RSA enVision, ArcSight, etc. But we're not sure what to do with. Has anyone had any experience with these programs? Our PCI system is a small segmented network with 5 hosts and our machines will be running Linux. Thanks!
I understand that PCI compliance requires annual rotation of keys. So, I have 16 databases across 3 servers (with multiple tables in each database). And it's going to get bigger. If I did this manually, it would make my data unreadable. Is there a software to do this?
When I want to open an Excel workbook that's password protected, it keeps wanting to open a "copy of ***" too - I have not changed any properties to these workbooks (*** above is the file name). Thank you.
I have a user who is experiencing error messages while trying to forward a meeting notice. The meeting was created by his delegate, who set it up to disallow forwarding. If the meeting was created on his behalf, shouldn't he still be able to forward it? He keeps receiving the error "Could not...
When should I use VMware and what's the importance of it?
Hi guys, Could you tell me why when I insert date into a database table, it's reversed from (dd-mm-yyyy) to (mm-dd-yyyy)? I have well defined my date format on form design already, but when it's inserted into the table it automatically reversed. How can I solve it?
What is the concept of writing and tracking test cases?
Hi, We would like to do security testing to our current project which is developed in JAVA, can you please share some information about how to start security testing, related websites, tools, techniques and any documents related to it. Thanks in Advance Regards Harish Malvi