Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I've been studying up on my security expertise and I came across an article that talked about the benefits of hashing a password (as a second layer of defense). This is the trouble I'm having with it:Would password hashing only be important if the system is not strong enough to give an intruder...
I have a master password set up on Firefox that is 30 characters long. I'm afraid this is not a very secure set-up. Can someone alleviate my fears or let me know if I should change this ASAP?
By being connected to the Internet, a computer can be infected with viruses. Why do we put a firewall between the computer and the internet. Isn't the firewall vulnerable to virus attacks? If not, why not?
I joined a forum a while back and hadn't returned for a while. In the meantime, I forgot my password. When I returned and clicked their "Request Help With Password link", they sent me my password in Plain Text via email instead of sending me a unique link to reset my password. I would imagine the...
I'm trying to write a web application in C+ for .Net to scan user-uploaded files for viruses. Unfortunately, it seems to be beyond my skill level, specifically drafting an API to perform the check programatically. I could use some help or a good tutorial.
Hi, I am currently putting together an options paper for my employer. Does anyone have or could refer me to a concise list of Business and Technical requirements for a DLP solution? Additionally, if anyone has performed a risk assessment prior to deploying a DLP solution, I'd be grateful for any...
We have a team working on a project in VB.NET that also includes socket communication and HTTP Listeners. (We have a group of applications that are intercommunicating between Sockets). But a few days ago, we received a message that AVG (anti-virus) was showing one as a threat (executable).How can...
A SearchDataCenter.com reader wrote in with this question: What are the main differences between NFPA 75 1999 Edition and NFPA 75 2003 Edition that would impact the protection design and installation of fire suppression systems as well impact the facility operator?
hi , I have been working for 3.5 years in Java,J2ee. I was interested in SAP BI, so i joined in a training center and did SAP BI course.. now i joined in a MNC asking for a change in SAP BI..I am having a dilemma whether to stay in Java,J2ee OR move on to SAP BI.. How will be my career in SAP...
I want to learn about procedures in RPGLE. I asked some senior of mine about procedures, he answered that for understanding I need to learn modules and all in ILE...kindly guide me what all I need to know before going for procedures, main procedures and sub-procedures. Thanks Durgesh Singh
I've been generating SSH Authentication keys on a Linux/Unix using ssh-keygen. After doing that, I've been given the choice of either creating a RSA or DSA key pair (using -t type).This has me curious: What are the big differences between RSA and DSA keys? Why should I choose one over the other?
When trying to create a new email or reply to email the following message "message interface has an unknown error". It tells me to close outlook and reopen, but that doesn't do any good.
Hello, I inserted photos in a Word document. Then I grayed them out so no one could identify who the people are. The document was saved as a .pdf file. Question: If someone was to convert the .pdf back to Word, could they re-create the original photos? Please inform.
Hi, I am basically Java developer and have 5 years of Java Web Application Development experience. Now I am planning to take my career to the next level by choosing latest technologies like cloud computing and big data. What are the cloud technologies to start with keeping job opportunities in...
Hello, How to save CL and SQL in SAVF, while SAVLIB command these two type of members are not saved. I want to move these from V7R1 to V5R4. Please suggest!
What are the different types of RAID?
Have just formated my PC recently, and later installed the Easy Recovery Data Software. I was hoping that I would be able to retrace some of the files in the hard disk which I had deleted but to no avail. Which type of software would you recomend for recovering lost data.
Please help me .what is the t code for work contract (ARC)export to excel
What peripheral port type is expandable using a hub?
This is more of a general question but is S/MIME an abstracted system for MIME type encryption (Just as PGP is used more for email)? Why should I choose one over the other? Is it possible both could be used at the same time?