Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Uncategorized, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Is there a way for legacy Wi-Fi user to roam over Hot-Spot 2.0 enabled APs?
Is AS/400 audit log able to be modified or deleted? And who have authority to do that? Thank you.
Hi, I'm 16 years old and I was thinking about following a career in information security and I just can't find any good place to teach me the basics of this and school doesn't help me at all cause we are not teached anything like that. Thanks for your time and have a good day!
I need a macro that will open a .DBF file to a tab in my worksheet. Is this possible? If so, can you show me the code needed and if not would you have any alternative suggestions? Thank you
Can I convert a PST to CSV? If yes, how?
I had a PC failure with some missing DLL files. XP Pro would not boot and so I had to reload a fresh XP copy by creating a partition within a partition on my PC to avoid any loss of data. The 2 most important banks of data to me are my word and email files. I use Office Enterprise 2007 which...
Hi again, first off, thanks for your help in my other quests. New problem - Subsystem QSYSWRK disabled user profile USER on device *N. This happens constantly for just this one user. I have changed the PWDEXPITV to *NOMAX but it still happens. I don't know if this is is because of the new version...
Over the past week, I've been trying to get PCI compliance for our dedicated server, which is a Red Hat Enterprise Linux (and that's running Magento). When we first installed it on the server, the RHEL version that comes with a PHP version which is too old for Magento. But our PCI compliance scan...
When I input a mass of data to AS/400 through VBA. The AS/400 status will lock in column 9 will display X SYSTEM randomly, VBA will timeout and requiring restart. It will always appear when I send the "ENTER" key to go another pages.
I'm pretty new to PCI compliance and from what I understand I need to secure a person's credit card info, expiration date and the card holder's name. There's not going to be storage of security codes ever. So in my SQL Server 2008 database, I would need to encrypt these 3 columns? Also, do I need...
My client has an e-commerce which accepts payments through a payment gateway integration that transfers the control to payment gateways. But it knows that it needs to be PCI compliant for accepting credit card information. Instead, could our client use stripe payment gateway / integration that it...
Need more information than this site is generating, any ideas on other sites that hold more traffic?
Can we create radio buttons in Lotus Notes 9. How we do it?
my hard dive could not format during windows installation andthe feedback was that windows could not acces this drive pls help me solve it
For the past few weeks, I've been trying to make my server PCI compliant. I need to remove the INode from an Apache ETag header. So I made this change: <Directory "/var/www/html"> Options FollowSymLinks AllowOverride None Order allow,deny Allow from all FileETag MTime Size But now I'm getting...
For one of our client's websites, they're trying to pass PCI compliance test but the testing company notified us of a vulnerability that we can't figure out. Here's what they told us: The issue here is a cross-site scripting vulnerability that is commonly associated with e-commerce applications....
How do I interface various data from SCADA systems?
If we want to search the particular Source of an object, which command we prefer object may be any? Like PF, LF or PGM?
Hi! when I checked my e-mail yesterday, I discovered it all gone (in box, sent, address book, etc.). I called bellsouth and we sent up a new "account" but what would really like to do is recover my addresses and old e-mails. Is there anyway to do it? I use Netscape (not Outlook)and had only one...
We're running a Windows Server 2008 with IIS 7. I need to use SSL 3.0 for our PCI compliance but from what I was told, we should disable SSL 2.0. But if I need to do this, will IIS automatically use SSL 3.0? Thanks!