Questions & Answers

  • Help! I lost an encrpyted emai

    Hi Everybody! I need to encrpyt an email with the recipient's public key, using Thunderbird, Enigmail and OpenPGP. I'm new to OpenPGP and have very little experience with Thunderbird. Now that I've encyrpted the email and sent it, I can't in my Sent folder. Any idea where it went?

    ITKE346,190 pointsBadges:
  • Regarding Black-Listed IPs

    What unsuspecting users can do if they received a bad or hacked IP from their ISP.

    aasalem70 pointsBadges:
  • CCNA: Mobile telecom networking

    Is CCNA helpful for mobile telecom networking?

    saifullah5 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Attachment error message in Outlook 2007

    Every time I try to open or save an attachment I get the message: "The operation failed. an object could not be found."

    Mtb5 pointsBadges:
  • Type of value

    error detection over PPP uses what value to test for data validity/

    watsoncedric5 pointsBadges:
  • INLR, RPGLE

    Why do we specify *inlr at the end of program only. What difference would it make if we specify it in beginning?

    Durgesh813370 pointsBadges:
  • AS400 IPL error

    Good day! We have an iSeries machine of IBM. I want to install OS but during the IPL I got an error code B4244230. What should I do? What causes this error? Is there anyone who can help me regarding with my problem? Thanks.

    excellentrandy1,190 pointsBadges:
  • What is this D:\TR\svcjl.bbe ?

    I found this on my server after running MSE. It suggested I send to MS. It is in quaranteen, and has not been opened. What is it? I can't find much info on the net at all.

    thomasvince5 pointsBadges:
  • How do I change my wireless router setting such as name and passwords

    How do I change my wireless router settings

    rodrigolujano5 pointsBadges:
  • Is VPN ID a login ID?

    What do you mean by VPN ID? Is it a login ID

    Autorobinc5 pointsBadges:
  • What are the disadvantages of the layered protocol approach?

    What are the disadvantages of protocol layering?

    NetworkingATE1,545 pointsBadges:
  • Receiving data in a subroutine called via a CALL statement in CICS

    Hi,Am calling a subroutine from an online program using a CALL statement. Is it necessary to have DFHCOMMAREA in my subroutine or I can simply copy the data area (in which I will receive/send the data) under LINKAGE section ? Also, is DFHCOMMAREA necessary only with LINK/XCTL or even for a CALL...

    yogesh015 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE346,190 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE346,190 pointsBadges:
  • Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE346,190 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE346,190 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE346,190 pointsBadges:
  • Find # days between 2 dates in Query 400

    I have never used this function but it looks like the startdate and enddate must be alpha expressions for this to work. Is that correct?

    Abbey120 pointsBadges:
  • Find # days between 2 dates in a AS/400 query

    How do I find the # of days between 2 dates. I'm trying to do this in AS/400 Query 400. I'm looking to do this in the Results area where you do calculations. Can anyone help??? Thanks!!!!!

    Pherrick20 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following