Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...
I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?
A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?
In our organization, our users logon to their desktops with Active Directory and access SharePoint using Windows authentication. But many of our users frequently change teams, so their access to their old SharePoint team site should be removed. Our maintenance team is refusing to setup groups for...
I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....
Is there a way to send a text message to a cell phone from the AS/400 preferably without having to purchase some third party software?
I want to change default password to expire the password when users log in. How do I accomplish this?
In order to generate a 32 character token for access to our API, we've been using this: $token = md5(uniqid(mt_rand(), true)); But someone told us that this isn't the best way to secure it and that we should use this instead: openssl_random_pseudo_bytes What's the best way here? Thanks for the help.
I'm trying to set up a PHP password recovery script, that would use a token but would expire after 24 hours. I'm having trouble setting it up. All I have right now is SHA1 encrypted user passwords but I really need to append a token to the URL that gets sent to the user when they request a password...
Does anyone know of the right way to log out of HTTP authentication protected folder? I understand there are workarounds but they can be dangerous too. Does anyone have a good solution?
I currently have a mobile application that's been using AWS's IAM infrastructure that allows me to provide temporary access tokens to anonymous mobile devices. This allows them to run queries against AWS services from a mobile device. Would anyone happen to know if Windows Azure has a drop-in...
I'm trying to use an API to create SAML authentication requests and receive/interpret the SAML responses but I'm not sure of the best way to do this. I've figured out how to receive and interpret the responses. Can someone point me in the right direction on using APIs to create SAML requests. Thank...
Hi all - does anyone know when IBM will cease to support V5R4 of the iSeries operating system?
please tell me how to configure load-balance on unequal path with ospf.
Is it possible to install IBM 9.0 on Windows 8 with 64-bit machine. What is the hardware requirement to install and run IBM Notes 9.0
Hi, please help me with the logic how can I read the subfile when the record is not changed. (The user did not touch or crossed the subfile of particular record). How can I deal with that? After searching, I came to know we can achieve only with SFLNXTCHG keyword. But I don't how to proceed with...
On a trip to Canada, I used local Wi-Fi hot spots to access internet. I want to minimize security breach possibilities by removing the cookies and or URL references.
Does anyone happen to know if there are any alternatives out there to multifactor authentication that will protect user information as well?
We have a homegrown program that prints a barcoded (6 0f 9) page. I have ran tests and the spool file has only one page of data and is set to 1 copy. When we send the report to an IPDS printer (HP-4050) it prints two copies. Why should it do this? All other reports sent to this printer are normal....
How do I use AS/400 iSeries Power 6 printing on Ricoh MPC6502?