Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...
I have inherited a SQL DB and need to give a group of users access to some views within a DB. We do not want them to access the tables, just the views. They will be connecting using MS Excel for reporting purposes. Do I use a role or schema? What is the best practice to accompish this task without...
i want to know where to go for security resources on the web
I have done 14 months networking/hardware + security training course from IACM,delhi. I want to know what other advance courses are available related to this.
I've been having some problems compiling a 25,000 line program and I'm figuring that a line limit is causing all of my errors. Is there a limit to what the SQL pre-complier can handle for a SQLRPGLE source object?
How can Microsoft Windows assist me in school?
We have a few users who just got new Windows 7 desktops, and their terminal emulators aren't behaving correctly. When they do some work at the end of a line (insert, delete, backspacing...) that is will sometimes: 1. extend the line past the edge 2. insert extra spaces between characters Our tech...
When sending an email with an attachment through my application I get the following security warnings. "A program is trying to access e-mail addresses you have stored in Outlook. Do you want to allow this?" Yes. "A program is trying to automatically send e-mail on your behalf. Do you want to allow...
Hi, I'm trying to convince my boss that our organization can provide access to e-mail over the internet without security threats. I plan to use OWA. So, can you tell me the risks and the counter measures?
Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...
I have reviewed system values for QAUDLVL and found the we have the appropriate values running. I have reviewed the journals that contain over 3 months of information and determined that we have no AF or J entries. Is this all I need to verify before I recommend that we move to level 40? I have...
Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?
How can I export the data from a Windows Active Directory server's security log to create a graph of who logged in and out at what times?
Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...
Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no switchport port-security mac-address...
What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?
Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.
All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...
Hi, I am a systems security auditor with CISSP certification. I have decided to narrow my specialization and become a subject matter expert in SAP security. SAP does not have such specific certification and I would like to get recommendations on: What is the most suitable SAP certification that I...
This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...