Questions & Answers

  • action diagram.

    HELLO FRIENDS,I have recently got a project in which i have to code the modules through synon.As I m new to this platform, i need a little help regarding the coding which is done in an action diagram.and how to use the built in functions in an action diagram and how to use the user defined...

    aadi04capri10 pointsBadges:
  • Is AS/400 the right choice for career after MCA?

    I'm doing MCA in my final year and now I want to choose one way for my career so tell me please: Is AS/400 is right choice after my MCA?

    Vicky1987chauhan5 pointsBadges:
  • Print data types in CL program

    We have 100 files. We want to print the Field, Field Description and Data types through a CL program. Is it possible in a CL program?

    mahalak75 pointsBadges:
  • PCI compliance failure with latest OS X version

    I recently just upgraded to the latest OS X version and our compliance scan tells us that these OS-installed components are causing security vulnerabilities. It says MySQL and PHP are vulnerabilities. Not sure what I should do here. Can anyone help me out?

    ITKE366,480 pointsBadges:
  • Lexmark X864de password reset / factory reset

    How can I recover a lost password of Lexmark X864de? 2 and 6 doesn't seems to work.

    Lexmark5 pointsBadges:
  • SCCM 2012 – Web console?

    Can you access SCCM through a web console? Also can more than one user access it at a time?

    brandens5 pointsBadges:
  • Install DVWA safely

    Hi, I just want to start learning web application pen testing. They require that I download DVWA (Damn Vulnerable Web Application) to VMware, but I don't have enough data to get VMware, and I don't have the money also to purchase an online VMware. So I want to know if its possible to use my Kali...

    ITKE366,480 pointsBadges:
  • Edit MSS Group Policy settings on Windows Server 2012 for PCI Compliance

    At my job, we go through a checklist on our Windows Server 2008 for PCI compliance. There's a ton of Group Policy, Registry and other settings that I need to confirm for security best practices. We this see this, however: The system should be configured to disallow IP Source Routing, ICMP...

    ITKE366,480 pointsBadges:
  • Best solution for PCI DSS compliance

    We're currently comparing solutions for PCI DSS compliance including: Splunk, RSA enVision, ArcSight, etc. But we're not sure what to do with. Has anyone had any experience with these programs? Our PCI system is a small segmented network with 5 hosts and our machines will be running Linux. Thanks!

    ITKE366,480 pointsBadges:
  • SQL Server rotation of keys for PCI compliance

    I understand that PCI compliance requires annual rotation of keys. So, I have 16 databases across 3 servers (with multiple tables in each database). And it's going to get bigger. If I did this manually, it would make my data unreadable. Is there a software to do this?

    ITKE366,480 pointsBadges:
  • Can I use the UPDDTA command in a RPG program?

    Can I use the UPDDTA command in a RPG program in which contains a file?

    venki125965 pointsBadges:
  • Copy of Excel workbook that’s password protected

    When I want to open an Excel workbook that's password protected, it keeps wanting to open a "copy of ***" too - I have not changed any properties to these workbooks (*** above is the file name).  Thank you.

    jackief25 pointsBadges:
  • In Outlook 2010, can a delegate inadvertently prevent his/ her superior from forwarding a meeting notice?

    I have a user who is experiencing error messages while trying to forward a meeting notice. The meeting was created by his delegate, who set it up to disallow forwarding. If the meeting was created on his behalf, shouldn't he still be able to forward it? He keeps receiving the error "Could not...

    kvnshffr5 pointsBadges:
  • When should I use VMware?

    When should I use VMware and what's the importance of it?

    pawansanu5 pointsBadges:
  • Date dd-mm-yyyy reversed to mm-dd-yyyy

    Hi guys, Could you tell me why when I insert date into a database table, it's reversed from (dd-mm-yyyy) to (mm-dd-yyyy)? I have well defined my date format on form design already, but when it's inserted into the table it automatically reversed. How can I solve it?

    srithea165 pointsBadges:
  • What is tracking test cases?

    What is the concept of writing and tracking test cases?

    kovidreddy5 pointsBadges:
  • Security testing tools and techniques

    Hi, We would like to do security testing to our current project which is developed in JAVA, can you please share some information about how to start security testing, related websites, tools, techniques and any documents related to it. Thanks in Advance Regards Harish Malvi

    SOFTWARETESTER9995 pointsBadges:
  • Website monitoring suggestions?

    Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?

    NewnanIT1,110 pointsBadges:
  • Is there a way to bypass a blocked list?

    If someone has added u to their blocked list and has blocked you from ringing them, is there any way of by passing it with a code like *62 which works for us numbers and not for u.k numbers, or is there a mmi code. Please help.

    shish4king10 pointsBadges:
  • Network on PC

    How is it possible for a network on a laptop to establish connection to a PC without my knowledge?

    nataliepitt5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following