Questions & Answers

  • Oracle 10g v Sybase ASE 15

    What are the differences between the two products relating to cost, integration, database size, number of concurrent users, performance and features?

    La bodington5 pointsBadges:
  • Getting an error when using the AS/400 command call

    I'm getting this error when using the command Call in Library *libl not allowed. Is this a security issue?

    wittwalt5 pointsBadges:
  • How to brute force attack a password prompt that pops up in my software

    How can I brute force attack a password prompt that pops up in a software program that is being ran on my computer desktop?

    MikeStover5 pointsBadges:
  • How to customize Plone login for two-factor authentication

    I'm pretty new to Plone and Python but I need to customize an existing plone installation login to include two-factor authentication from Duo-Security. Does anyone know the best way to do this? Would there be a Python API for this?

    ITKE353,275 pointsBadges:
  • what is the tool that can be used to measure the qos in mpls voip communication in GNS3?

    what is the tool that can be used to measure the qos in mpls voip communication in GNS3?

    DAVID835 pointsBadges:
  • Getting SAP error HDB 00055

    I'm getting SAP error HDB 00055. What should I do?

    Sagarjdhv1795 pointsBadges:
  • What is the standard for advance encryption?

    What is the advance encryption standard?

    ANIXILIN1235 pointsBadges:
  • Examine and analyze a digital signature

    How do I examine and analyze a digital signature?

    holsen5 pointsBadges:
  • Is Neat Scanner Twain compatible?

    Is Neat Scanner Twain compatible?

    salma85 pointsBadges:
  • Active Directory 2003 backup

    Can you backup your AD schema? What is best practice for backing up Active Directory 2003? Is there any difference in backing up 2008?

    NewnanIT1,110 pointsBadges:
  • Best Option to Backup A Terabytes worth of Data

    What is the best and cost effective way to backup a 1 to 1.5 Terabytes worth of data? What I am backing up is these scanned in images that are just sitting in a directory but are not backed up. Thanks.

    Asif7820 pointsBadges:
  • Best way to scan a server

    What's the best way to scan a server?

    Tahir5665 pointsBadges:
  • How do I create a Windows 8 profile for shared key authentication?

    I've noticed that my Windows 8 won't let me connect to a wireless network that uses WEP with shared-key authentication. I ran Windows 8's network diagnostics wizard and it shows that one exists. The wireless network that you are trying to connect to requires shared-key authentication, a low...

    ITKE353,275 pointsBadges:
  • Is it possible to log out user from a web site if he is using basic authentication?

    Would it be possible to log out a user from our website if he/she is using basic authentication? I already know that killing a session isn't enough because once a user is authenticated, the request contains login information so the user is automatically logged in when they access the site again....

    ITKE353,275 pointsBadges:
  • Microsoft Lync vs. Enterprise Video Conferencing

    Technically speaking, what are the major differences between Microsoft Lync and enterprise video conferencing?  We currently have 19 end points and utilize an off prem bridge service for multipoint (4 or more participants).  I have been tasked with identifying the major differences if we were to...

    ac49485 pointsBadges:
  • How to create an agent that sends e-mail notification to update a document based on last certification date?

    How do I create an agent that sends e-mail notification to update a document based on last certification date?

    bella1810 pointsBadges:
  • Looking to start SAP courses

    Hi I am Deepti. I have done MCA. I have 1 year of experience in .NET. Now I want to do SAP courses. Which is the best as per my background?

    Deepti085 pointsBadges:
  • How does changing your password every 90 days increase security?

    At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...

    ITKE353,275 pointsBadges:
  • Board security awareness & education

    Should corporate boards be required to have representation from the information security domain? Is it a governance issue that security and IT risk management has become critical, yet director's ability to manage this domain has perhaps lagged?

    j2abro15 pointsBadges:
  • Small business network with separate wireless/wired LANs

    We are merging with another accounting firm (totaling 20 users altogether) and will be utilizing Comcast Small Business internet/phone. We have a new server w/2012 R2 and want to keep wireless from accessing the wired network. The plan is is to connect the wireless APs directly to the Comcast...

    askjeeves21125 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following