Questions & Answers

  • What constitutes a ‘bounced’ email?

    Is an out of office auto-reply considered a bounce in email marketing?

    TechnologyMarketers6,240 pointsBadges:
  • Increase Outlook font size

    I understand I'm using an old version of Outlook (2003 to be exact) but this is a pretty old machine. Can I increase the font size on Outlook? I have really small font and I can barely read it. What can I do?

    ITKE392,245 pointsBadges:
  • Deleted all my Outlook PST files, I can’t recover them?

    After making a full scan today, I choosed "disinfect" for my .pst file, because I don't wanted to "delete" them. That was a huge misunderstanding, since it seems to me, that ad-aware deleted and shredded those files, instead of "disinfecting" them. I want to recover my .pst outlook files, but I...

    OlivierCabaye5 pointsBadges:
  • Is someone using my Wi-Fi?

    When I scan my security on my phone and check my Wi-Fi speed, it says that there is 3 devices using the bandwidth when there should only be mine. Does this mean that there is devices using my Wi-Fi and are on my Wi-Fi network so someone found my password. Help please.

    Tkmckinlay5 pointsBadges:
  • Microsoft Outlook icon is showing caution sign

    For my email - I always use Microsoft Outlook. I noticed a couple of days ago that there's this caution sign on my Outlook icon. And as it turns out, I haven't received any emails for two days. There's no warning message. What should I do?

    ITKE392,245 pointsBadges:
  • Microsoft Outlook won’t open due to error 255

    For some reason, my Outlook 2011 continues to close after launching. Nothing literally happens. All I'm seeing is this error: 255. Can I correct this error? What are the steps?

    ITKE392,245 pointsBadges:
  • Using three ISPs all at the same time

    How can we use 3 ISPs all at the same time to maximize its usage?

    NativeMerchant5 pointsBadges:
  • Subscription-Based & Online Purchased Software

    I've purchased VST plugins from various online vendors. Is it possible to hack the coding used for the software? Can a full version of a software be created from the demo version?

    Itsdh1005 pointsBadges:
  • School network connectivity issue

    How can we improve our school internet connectivity? We have around 400+ students and during high traffic days, our internet connectivity comes to a halt. We don't have enterprise level routers, just home networking routers: Asus, RT-AC68p, Netgear r7000, another Asus and Linksys routers spread out...

    htphil35 pointsBadges:
  • Add a VBS script as a Key Value in Registry

    When I add a Key to the registry I add a command to run for that key under a new subkey called 'command'. I tried to do the same thing using a VBS script but got an error stating it is not a valid ".exe". How do you add VBS scripts as action to take for a registry key?

    Questorfla5 pointsBadges:
  • Bloomberg Biometric device is not detecting in VDI

    We have HP thin client T520, thin pro connected with bloomberg KB with bio metric device. The connection protocol is RDP and remote FX is not enabled on the server side. We checked with Nutanix for the server side to enable remote FX and replied back there is no option for this specific device to...

    Vinunt5 pointsBadges:
  • XenApp 6.5 Web interface 5.4

    I am getting .net compile errors when trying to access the log in page. Here is the exception:Compiler Error Message: CS0234: The type or namespace name 'controls' does not exist in the namespace 'com.citrix.wi' (are you missing an assembly reference?)Here is my web.config. this is a brand new...

    ChadkFranks5 pointsBadges:
  • Exchange 2010 Email Log

    How do I flush email transaction logs in Exchange 2010?

    hp27885 pointsBadges:
  • Hack into phone through Google+ Stream

    Can someone hack into your phone through Google + Stream?

    melodyamara5 pointsBadges:
  • Add SSH key to Docker container

    My friend and I have an application that executes a bunch of things with Git and we're trying to put it in a Docker container. But here's the issue: We can't figure out how to add a SSH key to the container itself. We tried using Git (Git SSH wrapper) but no luck. What should I do?

    ITKE392,245 pointsBadges:
  • Why does my laptop get a longer DHCP lease time and different base IP address than my Android devices?

    Basically my laptops are getting longer DHCP leases than my Android devices, and this matters because my mobile devices are discoonnecting every 1.5- 5 minutes. I noticed the  main IP addresses are different between my laptop and my android devices, and wondering if this may hae something to do...

    tknflorida5 pointsBadges:
  • Using video in website design

    How important is the use of video in website design?

    TechnologyMarketers6,240 pointsBadges:
  • Bypass proxy when VPN and Tor is blocked

    I used to be able to bypass proxy with a VPN but that is blocked now. Is there any other way for me to bypass proxy when VPN and Tor is blocked?

    hoferjake5 pointsBadges:
  • What is the typical ROI for a BI system?

    What is the typical ROI expected for implementing a business intelligence system and / or platform?

    gsabbah5 pointsBadges:
  • Help for mom experiencing IP & posting fraud

    A post online from My IP & Appears from my device, yet I did not post. Can someone fraudulently do this & it be traced to the wrong computer? (Nobody else uses the device)

    motherlove445 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following