Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Whilst on Skype to different family members, the camera zooms around the room and I have been told keeps settling on my chest area. Am I being spied on?
This is just a general inquiry to see if anyone can offer insight into what would be Two Factor or Multi-factor best practices when configuring an IPSec site to site VPN between two company firewalls?
I'm a commerce student that wants to become a software engineer and also an information security expert. Where should I start going about this process?
What are the best implementation and tools to implement Two factor authentication
This is the example scenario.One day,her Facebook status gets updated .Her friends inform her of it.She panics.She logs in to check the account.Before her password was 'India' (example)and this time too she gets access to her account via the same 'India' password.She thought her account was hacked...
I knew my friend's (completely unrelated with my web accounts) e-mail address and password. One day, I logged in, and saw an e-mail, in which there were lots of photos that I have watched or seen in my computer! Those photos included my and my friends' Facebook photos, Google photos, every single...
How do I download and install Linux Mint 17 to run side by side with Windows 7 using the power shell?
In my Windows/Linux environment how can I perform a backup and recovery plan for continuous operations?
I've been running a MySQL database locally for our development team but it's been deploying to Heroku which currently uses PostgreSQL. Heroku has been handling most everything I need but we use PostgreSQL for case-insensitive statements. What would be the best way for me to write a case-insensitive...
I apologize for the short question but can anyone help me export my MySQL database into a SQLite database? Thanks so much!
How do I migrate from an SQL .bak file to the iSeries?
When editing the action button properties, it allows an @if statement to flip/flop two choices (lock/unlock). i.e. @If(enlock=1;"Unlock";"Lock") for the "Label" of the action button. At the bottom of the Action properties, icons can be None, Notes, or Custom. When I select Custom, I want the @if...
I have a user who when she logs into her workstation and tries to access her Outlook folders she is denied access. If she removes and then adds them back they work. Only one other person on our network had this problem which I initially thought was connectivity related. I replaced their cat five...
When I try to move certain e-mails into folders I keep getting the error message: Cannot move the item.Errors have been detected in the file. C:\users\Todd\documents\Outlook files\Outlook.pst I run the repair tool but nothing changes Ideas? Thanks
After upgrade Windows Mail Outlook stopped opening. Just don't open it. Reinstall office completely. Mailer opens, but there is no mail. File pst preserved. Can it somehow recover or promt better outlook repair tool? Message "File this is not a personal folders file" and can not be restored. I...
I'm not sure if this is possible but I'm trying to embed a PostgreSQL database. Several employees at our organization told me that it's not possible but I thought I would at least ask here. So basically, I'm looking for a PostgreSQL without the configuration / installation. Appreciate any advice.
What's the perfect example for social media marketing by a company?
Scenario: From a menu, user runs vendor-supplied program A. PGM A calls user written PGM B for data validation. If program B discovers invalid data, it will issue an error message, then end itself and PGM A, returning the user to the menu. Problem: How can PGM B end itself and PGM A without...
How do I know if someone is blocking my calls on Skype?
Can someone help me name 5 successful companies that have used CRM successfully?