Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I'm not a security expert but is having local firewalls (enabled on different machines) necessary if you're already running hardware firewalls, like Netgear, that controls in/outbound connections?Does it just added another layer of protection? Thanks!
I am testing a web application which stores the password in the database in an encrypted format. How do I determine what hashing or encryption is being used?
Is it possible to use TLS exclusively to secure my email, http servers and desktop client, for everything including email, in/out:80 and web surfing/entertainment browsing? My goal is to prevent my ISP and others from spying on my activity.
What are the pros and the cons of egress filtering when referring to the network of a medium-sized software business? From what I understand the use of egress filtering will cause issues for some users as it requires policy changes for all new software. But does that annoyance outweigh the...
I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?
I have never used this function but it looks like the startdate and enddate must be alpha expressions for this to work. Is that correct?
How do I find the # of days between 2 dates. I'm trying to do this in AS/400 Query 400. I'm looking to do this in the Results area where you do calculations. Can anyone help??? Thanks!!!!!
Microsoft's unveiled a new "Metro-ized" UI for business applications, recently showing off an updated version of ERP software Dynamics GP. Do you think the move to better looking interfaces is a step in the right direction, or simply dumbing now software that has to be complex because it does...
From what I understand, antiviruses hook to a file, accesses it and scan the files, and if necessary, make the file inaccessible to protect the system. Is this done via API hooking or some other methodology?
How do I open .pic file?
I have one .pmf compressed file but inside there are three .wav file. How do I decompress and copy those files from the PMF?
Is D2K is compatible with Oracle 12? My application has been developed in D2K and with database Oracle 8i. Now I want to change Oracle 8i to Oracle 11 or Oracle 12.
i need to generate huge amount of data.how should i do it from initial stage like creation of database to last
I have bought a new PC and want to copy files from my old PC over to the new one. What is an easy and cheap way of doing this?
Sir/Madam, We are having 2 systems with windows as operating system. We need your help for transferring data from USB to USB Port. plese give max. possible ways. Thanking You, Appala Raju
I read an article in our newspaper about this mesh networking, I am always looking to save money. At present I am paying $415.00 for Sattelite tv, computer network, home phone and cell phone serv. This is outrageous . I need some tech help
Currently, I have four HDDs and one SSD; the HDDs carry in range, size and age with one being a very old Maxtor drive. I am looking to upgrade in this area to simplify things and had the following questions for advice:1. Is it ideal to have one HDD for all my storage (games, movies, music,...
any one can help this
I've read that hackers can hit all 10,000 possible variations of a 4-digit pin code within 5 minutes. Is this true? If so, what is the best way to secure the password - hashing, salting, bcrypt, or something else?
hi all i want to do sap security some body recommned me to do that course is it will give good job opportunity in that area any body pl give me reply