Questions & Answers

  • ISTQB Software Tester

    I plan to get my ISTQB Certification for software testing. Is this field hot? Also, should I get A+ Certified first, or can I do it with just a Masters Certifiate in ISTQB?

    Aviator465 pointsBadges:
  • QSYSOPR Security

    What is the recommended authority setting to QSYSOPR which prevents users from answering messages? What kind of impact does this have on jobs sending messages to the queue?

    MrChristie0 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • A host receives an authenticated packet with the sequence number of 181

    A host receives an authenticated packet with the sequence number of 181 and the replay window spans from 200 to 299. What will the host do with this packet?

    Securenetwork5 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:
  • switch bounce

    what is switch bounce

    dawnmccoy20085 pointsBadges:
  • CRW32.EXE application error

    I installed Crystal Reports v11 on my Server 2003 system. Then when I try to open it I'm getting: crw32.exe Application Error. The instruction at "0x7ff2fbfc" referenced memory at "0x7ff2fbfc". The memory could not be "written". Can anybody tell me what is happening and how to fix it? Marty

    Marty05 pointsBadges:
  • UVO 2.0 player played .av4 files on one vehicle, but not an exact same other?

    dabobguy5 pointsBadges:
  • apps

    What is a rooted app

    madrifter5 pointsBadges:
  • What’s in your network security and troubleshooting toolkit?

    Just curious what tools you have in your network toolkit? I've heard or used snort, TCPDump, NMap, but would love other suggestions

    Michael Morisy8,323 pointsBadges:
  • UNIX Security Assessment

    What is the best way UNIX Assessment procedure?

    Dharmagrao100 pointsBadges:
  • Local Policy location

    Where in local policy is the the ability to disable the calc from the user from using it. I have looked and Googled until I am blue in the fac.Thanks

    Harisheldon5,890 pointsBadges:
  • Masters in Network from UK or Cisco Certifications

    Hi All, I am new to this forum and after reading to many forums i feel you guys can really help me out of the mess. Currently i am working in an IT company as Sr. Software Engineer for Oracle Applications(2 years of experience) but lately i feel more inclined towards Computer Network and also i...

    NikunjM15 pointsBadges:
  • Can’t open repot from oracle report builder 10

    When I tryto open one report from oracle report builder 10g the report builder is stoped working and close report builder by windows 7

    ahmedmilhim5 pointsBadges:
  • wi-fi icon vanished

    I have a Huawei 8665 & Consumer Cellular is my carrier. I have used my AT&T home service for the wi-fi on my phone with no problem till last nite, my wi-fi icon has disapeared even though I am still connected acording to my settings. I have worked all day trying to correct this with no...

    snipitchick5 pointsBadges:
  • Interpreting security audit information

    Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...

    Tinast35 pointsBadges:
  • AS/400 query security

    I have a library we will call liba. In liba i have files for different companies. For eg: files aa01.itm is an inventory file for co# 01 and bb01.cms is a customer file for co# 01. I also have files aa07.itm and bb07.cms. These files are for co# 07.I want to grant someone access to only the files...

    Lougoalie5 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to install Windows updates without Open File Security popup

    I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?

    WindowsServerATE335 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following