Questions & Answers

  • How can I block an email tracking service?

    A good friend of mine recently came across this free email tracking service known as bananatag. He found out the service is able to track the fact that the email was read in Gmail without any notice but he has some concerns. Is there a way to block the email tracking service?

    ITKE347,450 pointsBadges:
  • Flash alert

    How I can flash in alert?

    alimbarak10 pointsBadges:
  • Help! I lost an encrpyted emai

    Hi Everybody! I need to encrpyt an email with the recipient's public key, using Thunderbird, Enigmail and OpenPGP. I'm new to OpenPGP and have very little experience with Thunderbird. Now that I've encyrpted the email and sent it, I can't in my Sent folder. Any idea where it went?

    ITKE347,450 pointsBadges:
  • Regarding Black-Listed IPs

    What unsuspecting users can do if they received a bad or hacked IP from their ISP.

    aasalem70 pointsBadges:
  • CCNA: Mobile telecom networking

    Is CCNA helpful for mobile telecom networking?

    saifullah5 pointsBadges:
  • Error message ‘Program is trying to send an email on your behalf’

    I am using MYOB to email payslips and get the message "a program is trying to send an email message..." how do i set outlook to do this automatically so i dont have to hit 'allow' for each email

    Natmaher5 pointsBadges:
  • Attachment error message in Outlook 2007

    Every time I try to open or save an attachment I get the message: "The operation failed. an object could not be found."

    Mtb5 pointsBadges:
  • Type of value

    error detection over PPP uses what value to test for data validity/

    watsoncedric5 pointsBadges:
  • INLR, RPGLE

    Why do we specify *inlr at the end of program only. What difference would it make if we specify it in beginning?

    Durgesh813370 pointsBadges:
  • AS400 IPL error

    Good day! We have an iSeries machine of IBM. I want to install OS but during the IPL I got an error code B4244230. What should I do? What causes this error? Is there anyone who can help me regarding with my problem? Thanks.

    excellentrandy1,260 pointsBadges:
  • What is this D:\TR\svcjl.bbe ?

    I found this on my server after running MSE. It suggested I send to MS. It is in quaranteen, and has not been opened. What is it? I can't find much info on the net at all.

    thomasvince5 pointsBadges:
  • How do I change my wireless router setting such as name and passwords

    How do I change my wireless router settings

    rodrigolujano5 pointsBadges:
  • Is VPN ID a login ID?

    What do you mean by VPN ID? Is it a login ID

    Autorobinc5 pointsBadges:
  • What are the disadvantages of the layered protocol approach?

    What are the disadvantages of protocol layering?

    NetworkingATE1,545 pointsBadges:
  • Receiving data in a subroutine called via a CALL statement in CICS

    Hi,Am calling a subroutine from an online program using a CALL statement. Is it necessary to have DFHCOMMAREA in my subroutine or I can simply copy the data area (in which I will receive/send the data) under LINKAGE section ? Also, is DFHCOMMAREA necessary only with LINK/XCTL or even for a CALL...

    yogesh015 pointsBadges:
  • Is a local firewall actually necessary?

    I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!

    ITKE347,450 pointsBadges:
  • How do I find out what type of encryption is being used?

    I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?

    ITKE347,450 pointsBadges:
  • Can TLS prevent my ISP and others from spying on me?

    Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.

    ITKE347,450 pointsBadges:
  • Egress Filtering

    What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...

    ITKE347,450 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE347,450 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following