Questions & Answers

  • AS/400 command for searching for particular source of object

    If we want to search the particular Source of an object, which command we prefer object may be any? Like PF, LF or PGM?

    mahalak75 pointsBadges:
  • Why did I lose my email address?

    Hi! when I checked my e-mail yesterday, I discovered it all gone (in box, sent, address book, etc.). I called bellsouth and we sent up a new "account" but what would really like to do is recover my addresses and old e-mails. Is there anyway to do it? I use Netscape (not Outlook)and had only one...

    finlaywilson4520 pointsBadges:
  • Will IIS 7 automatically use SSL 3.0?

    We're running a Windows Server 2008 with IIS 7. I need to use SSL 3.0 for our PCI compliance but from what I was told, we should disable SSL 2.0. But if I need to do this, will IIS automatically use SSL 3.0? Thanks!

    ITKE366,535 pointsBadges:
  • How to calculate end-to-end service availability

    Hi, How do I calculate service availability to business user? Our service should be available to 24x7x365 days, but there are so many dependent components (network, servers, links, application, Data center etc) supported by multiple vendors should be available to meet the requirement. Vendors are...

    Availability20 pointsBadges:
  • IKM Software Quality Assurance test

    Does any one please give idea about IKM test?

    mangalam5 pointsBadges:
  • What is the purpose of /DEFINE before H-spec?

    /DEFINE is a part of compiler directives, which if used will reduce source listings of the program. But I would like to know what happens in runtime if I use this directive. for eg: If I use /DEFINE in pgm : /DEFINE MOD_1..then in I write /If Defined(Mod_2) read FileA; /Else read FileB; /endIf

    Supriyoas400205 pointsBadges:
  • action diagram.

    HELLO FRIENDS,I have recently got a project in which i have to code the modules through synon.As I m new to this platform, i need a little help regarding the coding which is done in an action diagram.and how to use the built in functions in an action diagram and how to use the user defined...

    aadi04capri10 pointsBadges:
  • Is AS/400 the right choice for career after MCA?

    I'm doing MCA in my final year and now I want to choose one way for my career so tell me please: Is AS/400 is right choice after my MCA?

    Vicky1987chauhan5 pointsBadges:
  • Print data types in CL program

    We have 100 files. We want to print the Field, Field Description and Data types through a CL program. Is it possible in a CL program?

    mahalak75 pointsBadges:
  • PCI compliance failure with latest OS X version

    I recently just upgraded to the latest OS X version and our compliance scan tells us that these OS-installed components are causing security vulnerabilities. It says MySQL and PHP are vulnerabilities. Not sure what I should do here. Can anyone help me out?

    ITKE366,535 pointsBadges:
  • Lexmark X864de password reset / factory reset

    How can I recover a lost password of Lexmark X864de? 2 and 6 doesn't seems to work.

    Lexmark5 pointsBadges:
  • SCCM 2012 – Web console?

    Can you access SCCM through a web console? Also can more than one user access it at a time?

    brandens5 pointsBadges:
  • Install DVWA safely

    Hi, I just want to start learning web application pen testing. They require that I download DVWA (Damn Vulnerable Web Application) to VMware, but I don't have enough data to get VMware, and I don't have the money also to purchase an online VMware. So I want to know if its possible to use my Kali...

    ITKE366,535 pointsBadges:
  • Edit MSS Group Policy settings on Windows Server 2012 for PCI Compliance

    At my job, we go through a checklist on our Windows Server 2008 for PCI compliance. There's a ton of Group Policy, Registry and other settings that I need to confirm for security best practices. We this see this, however: The system should be configured to disallow IP Source Routing, ICMP...

    ITKE366,535 pointsBadges:
  • Best solution for PCI DSS compliance

    We're currently comparing solutions for PCI DSS compliance including: Splunk, RSA enVision, ArcSight, etc. But we're not sure what to do with. Has anyone had any experience with these programs? Our PCI system is a small segmented network with 5 hosts and our machines will be running Linux. Thanks!

    ITKE366,535 pointsBadges:
  • SQL Server rotation of keys for PCI compliance

    I understand that PCI compliance requires annual rotation of keys. So, I have 16 databases across 3 servers (with multiple tables in each database). And it's going to get bigger. If I did this manually, it would make my data unreadable. Is there a software to do this?

    ITKE366,535 pointsBadges:
  • Can I use the UPDDTA command in a RPG program?

    Can I use the UPDDTA command in a RPG program in which contains a file?

    venki125965 pointsBadges:
  • Copy of Excel workbook that’s password protected

    When I want to open an Excel workbook that's password protected, it keeps wanting to open a "copy of ***" too - I have not changed any properties to these workbooks (*** above is the file name).  Thank you.

    jackief25 pointsBadges:
  • In Outlook 2010, can a delegate inadvertently prevent his/ her superior from forwarding a meeting notice?

    I have a user who is experiencing error messages while trying to forward a meeting notice. The meeting was created by his delegate, who set it up to disallow forwarding. If the meeting was created on his behalf, shouldn't he still be able to forward it? He keeps receiving the error "Could not...

    kvnshffr5 pointsBadges:
  • When should I use VMware?

    When should I use VMware and what's the importance of it?

    pawansanu5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following