What are SNMP traps and how can they be used for network monitoring in our new data center?
Answer Question | December 9, 2010 3:04 PM
Data Center management, Network Monitor, Network monitoring, Network Monitoring Tools, Network security, Network Security Management, SNMP, SNMP monitoring
i have a probelm which when my CLP use STRPCCMD to open the URL it pass one parameter only and when i add & to another one , it always read first parameter only, how can i add the secound parameter with using & so HTML can read it
Answer Question | December 9, 2010 11:48 AM
AS/400 Parameters, CLP, CLPROGRAM, STRPCCMD
How to remove HPLIP software in Ubuntu?
Answer Question | December 9, 2010 12:50 AM
Linux, Linux administration, Ubuntu
we have SQL 2008, and looking for tools to monitor sql and get sql diagrams. do you know any good tools?
Answer Question | December 16, 2010 10:51 PM
Network Monitoring Tools, Network security, SQL 2008, SQL Server 2008, SQL Server administration
Is it possible to update the column heading’s of PF in an RPGLE program ?
Answer Question | December 30, 2010 7:47 PM
AS/400, Physical File, RPGLE
Is crystal 8.5 compatible with SQL Server 2005?
Answer Question | December 10, 2010 4:45 PM
Crystal Reports 8.5, SQL, SQL Server, SQL Server 2005
I have auto forwarding on Exchange 2003. i.e. email@example.com forwards to firstname.lastname@example.org. This was set up using a contact in active directory,then setting up the user exchange settings. I have four people set up like this and it works most of the time. Except every now and again, if a email is sent from a [...]
Answer Question | December 9, 2010 4:40 PM
Active Directory, Active Directory Settings, Exchange 2003, Exchange Forwarding, Sophos
How do I change object authority for a library
Answer Question | December 21, 2010 3:38 PM
AS/400 administration, AS/400 Library, Edit Object Authority, Object authority
Do you have a checklist or a favorite set of server hardening tools in your arsenal? Share with us what you think are the most important considerations when creating a server security baseline. Be sure to include what hardware and software you’re using! Helpful suggestions and innovative ideas will you earn you a whopping 100 [...]
Answer Question | December 13, 2010 3:27 PM
Network security, Network Security Management, Network Security Policies, Open IT Forum, Server Hardware, Server Security
If the administrator password for an Active Directory box is lost what is the process for recovering it? Can it be done?
Answer Question | December 9, 2010 2:48 PM
Active Directory, Active Directory Administration, Active Directory security, Network security, Password recovery
Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?
Answer Question | May 22, 2011 2:45 PM
Encryption, Encryption Software, Network security, Network Security Policies, Remote access, Security, Security management
We have an intranet site on our windows 2003 network. How can we setup DNS so that when typing intranet it redirects to our webserver?
Answer Question | December 9, 2010 2:39 PM
DNS, DNS management, Intranet, Web servers, Windows Network Administration, Windows networking, Windows Server 2003
When users send a PDF attachment (other type attachments work fine) in iNotes (webmail), it is received in both iNotes and the Notes client as raw text. Domino server 8.5.2. iNotes 8.5.2. IE ver. 8. Here is a snippit of what some of the text looks like that is received…this is the attachment in raw [...]
Answer Question | September 26, 2011 2:36 PM
Domino 8.5.2, iNotes, Lotus Domino, Lotus Domino 8.5, PDF, PDF attachments
I have a exchange server 2003 hosted in our network and we have registered our exchange domain in godaddy.com.The problem is whenever our primary ISP is down we are not able to send mails as our primary IP is registered in Godaddy and as a backup we do have a backup Leasline connection which has [...]
Answer Question | December 9, 2010 12:49 PM
Exchange 2003, Exchange 2003 administration, Exchange Hosted Services, Hosted servers, Server Hosts
Hi, this is Miftah. I have done my MBA in HR & marketing. But working in a BPO from last 3 and 1/2 years in Business and Financial services. My work includes Investment banking process and Retirement services. I want to come out of BPO life and get a good job in any other field with good [...]
Answer Question | December 9, 2010 12:19 PM
SAP careers, SAP certifications, SAP modules
Hi Guys, Is there an easy tool that can be used to decipher event logs I dont mind paying for it but would rather a free tool as long as it “does exactly what it says on the tin” Thanks All Shane.
Answer Question | December 10, 2010 10:55 AM
Event logs, SBS 2008, Small Business Server, Small Business Server 2008, Windows Server 2003
Which feature in exchange 2007 do i have to block in order to stop configuring exchange mails in personal devices (iphone/blackberry(BIS))
Answer Question | February 24, 2011 10:01 AM
BIS, Exchange, Exchange 2007, Exchange 2007 administration, Exchange email security
please advise some tips about how to create and tune a good performance of xfs filesystem to work effeciently with oracle database? thanks, nltt
Answer Question | December 9, 2010 8:25 AM
Oracle Database, Oracle Database 11g, ZFS Filesystem
This is my Physical file ‘EMPS’ existing in library “TAMIL1″ and its record format is ‘EMPRCD” a)its source is R EMPRCD ENO 4 0 ENAME 10 EADD [...]
Answer Question | December 9, 2010 8:17 AM
AS400/OPNQRYF, Open Query, Open Query File, Physical File, QRYSLT, V5R3
Hi, I am planning to implement restrictions on outgoing SMTP mails for group of people. User in that group needs to send mail to particular internet domian and that gorup should be restricted to send mails to other external domains. All other user on that server must not have any issue in send mails.
Answer Question | December 14, 2010 6:40 AM
Domino Server, Group Policy, Lotus Domino, SMTP