Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
during an IPL we received B200F001 LP=002. What is this error
Hi, I had generated the crystal report by using visual stdio 2010, having asp.net vb and ms access database. It is working fine on local server but displaying blank page on server. I am including the code for reference. Thanks a lot to for solution in advance.reportview.aspx.vb fileImports...
Am I safe giving away an old tower to a lady who needs one?
Hi! I could use some help. My company plans to send out critical data to our clients in encrypted PDF format. Is there a danger that they could be blocked in the future as virus scanners become more sophisticated and conclude that they could be carrying malware?
Can someone help me with iSeries DB2 searching text filters?
How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?
I'm new to the security world but I know that instant messaging uses "off-the-record" encryption (which means that a user would get authentication, encryption and forward deniability). But for my email, all we use is GPG/PGP, which offers authentication and encryption but doesn't allow forward...
Does anyone know how to reset Tellabs 532L DACS back to the factory default of TELLABS?
After a power outage at work, we lost connection to the Iseries. One of the AP files that holds multiple members lost one member of data. 2 days later this member shows up again without anybody doing anything. The CFO wants to know how this happened. Can anyone answer this?
How can you set up a cell to activate the current time when another cell has data entered into it? Just want to track what time DATA was entered in the other cell.
I am using RUNRMTCMD from an AS400 server to execute a c program in an AIX server, it is working fine but I want to know if there is an error message code I can monitor to know when the communication is lost. What is happening now is that the remote program continues running in the AIX but cannot...
this appears when I try to find a website--error No_db_file
I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...
Hi! I need to go into a Hotmail account. I have the sign-in and inbox URL. Can I just use this to see the inbox?
A part of our team has had to extend our website to try to communicate user credentials for a suppliers website. We're using a 256-bit key but they're using a static IV for decrypting the information. We've advised them not to use static because it's an a security risk. But we want to know how big...
**First submit blanked out all the original content** Sorry Environment - Windows Server 2003 SP1, SQL Server 2000 .exe version 2000.080.0760.00 I am helping to remove the clustering and migrate all databases on the cluster to a single machine in the cluster. I was able to evict Server 1 from the...
A clustered index is created automatically in SQLserver 2012 while creating a table with primary key. The index is created on the primary key field. My queries which are not using the primary key for search are costing 100% on clustered index scan. Should I create covered index for each and every...
Should a web server have antivirus software installed and active at all times? Are there situations where it is not needed? What should be considered when choosing one to install?
tools which are used to analyse vulnerabilities(which can be downloaded for free)
I'm trying to find some cyphers which are known to be secure for HTTPs. The OpenSSL website has a long list of cyphers that can be used with SSL and TLs, but how to tell which, if any, are still valid and of those which would support HTTPS? Is there a recent paper or similar tool I can use to find...