Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, CRM, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is there a way for a .NET application to create/start/stop Hyper-V virtual machine?I'm looking to create an automated means of starting/stopping virtual machines from a C# application. I know you can do it via P/Invoke but that's not the best option for me. Can anyone help me out here? Thanks!
I'm studying to become a security expert and I've noticed a ton of websites use GUIDs for password resets, unsubscribe requests, etc. I'm assuming most sites use them because they're easy to use and they're unique. But I'm curious to find out how safe GUIDs actually are. Are they actually intended...
I'm getting following error message: [strong] "ProtocolError occured trying to complete the request. The server returned a status code of : InternalServerError and the status description is : 'Internal Server Error'" [/strong] When I try to use RSS viewer web part with following RSS Feed URL:...
Which antivirus programs use "canary files" with common strings in their filenames to detect:1.) MyRootkit.vir is known to hide files which include the string ".vir" in their filename.2.) Upon installation (or signature update) MyAV puts MyRootkitcanary.vir in C:\Program Files\MyAV\Canary Files\3.)...
A friend of mine in the security industry recently told me that many DOS attacks and general "black hat hacking" attacks usually happen over the TOR network. Would it be possible to dynamically block source IP's by their presence in a BotNet?Would this be effective in blocking DDoS attacks? How...
Hi i have a string and want to replace all occurance of " with ".Please let me know how can i accomplish this .
What password policies are the best without going crazy? We want security but changing passwords 2 times a month is too much. What is a healthy middle ground between security and convenience?
If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?
I recently realized when you save a password in a variable, it's actually stored as plain text in the memory.I know the OS does a good job by forbidding processes from accessing other allocated memory. But isn't it still bypassable? Is there a safer way to store passwords to make sure processess...
I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...
Hi, I have a load all subfile which is used to display the records of a file on the screen. I have the previlage to either enter/delete the records on screen, which will be shown on the screen.Now, my SFLSIZE is 16 And SFLPAG is 15. now i have 25 records on display. now i am deleting 20th record,...
Can someone help me with good strategies for generating personal passwords that are unique and strong, but easy to remember?
Is there a prevailing format for RSS feeds? If I wanted to produce one, should I go with ATOM or RSS 2.0?
What are the basic differences between permeability & permittivity? Please explain it to me.
My external drive is supposed to have a capacity of about 1TB (931 GB, but when I tried to back up the data on my new computer, it said it was full after 459 GB. With my old computer, it appeared to back up everything.
I have a installation of Hyper-v 2012 with an SBS 2011 VHD. Snapshots have been setup and have filled the drive (nearly 1tb of snapshots). I have moved these snapshots to a USB drive and not it says its merging 10% and its been stuck there for a while. The main VHD is growing and the avhdx file is...
Can some one please tell me how to enable to track mailbox content and mailbox traffic of my company. I want to create a report based on the mailbox traffic and content. I want to automate this process because I don't want to log in every month.
We have frequent meetings that we are several people that need to be able to edit/update the details of the meeting, body text for example. Problem is that the meeting organizer seems to be the only one able to do this. Is there a way to make others able to edit the meetings?
Does anybody have sample questions from the Software Quality Assurance test by International Knowledge Management?
Can anybody help me with IKM Quality Assurance sample questions please