• ID Theft and National Security

    If it turns out, as I believe, that enemies of the United States are behind a lot of the major ID thefts in the US, that would mean that a lot of money is going to our enemies. Can we therefore surmise that those who mishandle our identity information, by means of their poor stewardship of our...

    InfoSafety75 pointsBadges:
  • Unified Communications product qualification flow

    I want to know how to build a set of UC product,like Plantronics UC wireless headset system voyager Pro UC. Maybe the product adapt to Microsoft® Office Communicator 2007. My question is: How to qualify this product? Must it get some UC qualifications? Is there some UC compliance? What's the...

    Springsummer5 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • iseries access windows 7 compliance

    Is IBM iseries access compatible with Windows 7(x64)

    Dkalar5 pointsBadges:
  • System Administrators Access in a HR/Payroll System

    Hi I have taksed to define the access rights for sys admins for a HR/Payroll system. The thoughts are divided among the groups here - one, the segretion of duties that should limit any type of user to perform tasks end to end since this is a payroll system; two since it is a sys admin access the...

    Cognos20015 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Are there any government restrictions or recommendations regarding Active X Trusted Add-ons?

    Are there any government restrictions or recommendations regarding Active X Trusted Add-ons?

    SeaEagle5 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • RAID1 on computer with 2 internal hard-disks

    I have two identical hard disks in RAID1 array (no additional hard drives are available). There is a CD/DVD drive and USB. I need a solution for both Windows XP and Linux OS, but as single-OS, no dual booting.   I’ve run into several hassles: Upgrading Linux kernel on a machine where one boots...

    ITKE352,580 pointsBadges:
  • Securely accepting credit card payments face-to-face?

    I've been tasked with finding a low-overhead way of taking credit cards for a one-time event. Most people are hopefully paying in advance via PayPal, and I'm wondering if anyone has tried just setting up a laptop (monitored by an employee) to take credit card payments in person before? Any other...

    Michael Morisy8,323 pointsBadges:
  • How to Force a Joblog.

    It used to be that a JOBD with Message logging of 4 0 *seclvl would always force a joblog. This has changed in V5R3. My Sarbanes Oxley requires a joblog for superusers and above. How can I force a joblog to be produced at signoff for these user types?

    Royd5 pointsBadges:
  • Monitoring Object changes in Oracle

    I have to find out who modified objects in dba_objects each week for those changed during that week for SOX perspective. Right now i check with deveplopers for each one, which they don't like. I question is how to find out who modified an object in 9i or 10g (and 11i)?

    QAQA65 pointsBadges:
  • IT structure in investment company

    Can anyone give me an outline of the IT structure in an investment company in the UK? Roles and responsibilities, hierarchical structure, governance, etc. Many thanks. 

    Lampas5 pointsBadges:
  • AGP Video Card- Power supply

    Hi I just purchased a SPARKLE SF8855DT GeForce FX 5500 256MB 128-bit DDR AGP 4X/8X Video Card. I am 90% sure that all AGP video cards requires power coming from the power supply right? if so were is the connection on this card for the power supply and does should i assume i have that connecting...

    Jbbenz15 pointsBadges:
  • Lost QSECOFR Password and DST QSECOFR is disabled.

    I have a 170 at V5R1 and I have lost the QSECOFR password, and the DST QSECOFR has been disabled. I do have access to other DST profiles and can access SST, which allow me to modify the MI code if I wish. Anybody have any suggestions as to how I can regain access to this box, in any way, without...

    Mbeland0 pointsBadges:
  • Can SCCM interact with our online SA agreements and assist with licensing compliance?

    I had heard that SCCM can interact with our online SA agreements and assist with licensing compliance, is this true? This question was asked during the Microsoft System Center live chat on IT Knowledge Exchange in January 2010.

    ITKE352,580 pointsBadges:
  • Secure file deletion on an iSeries

    How can I perform a secure file deletion on an iSeries system, as per a secure file deletion on a PC? The PCI police are chasing me for an answer, but I'm not convinced its possible/necessary.

    Rpm40 pointsBadges:
  • 508 Compliance Testing Tool

    I've already searched on the forums, and searched posts relating to 508 compliant testing. My question is, how reliable are the free websites that check your website? I'm looking for a simple tool that could be used to test web-based training for 508 compliance. Anybody have any recommendations?

    ITKE352,580 pointsBadges:
  • Oracle Application Server – how to manage ciphers

    Hello all, A PCI compliance scan of my web server revealed that it allows weak and anonymous ciphers. I set the sslciphersuite entry in the ssl.conf file, but it didn't change anything. Any ideas how to set the allowed ciphers in Oracle AS 10g?

    Barryit5 pointsBadges:
  • Privacy of Data – SAP Implementation

    [dd class="desc">Our SAP Implementation Consultant is insisting on a point which is in our opinion against the privacy of the companies real time historical data. The management is not willing to permit him or any consultant to view our historical data (such as , item master, price lists, costing...

    AmjadM50 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following