• moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • User Auditing/Journaling

    I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark

    Hllwyrs0 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:
  • Encrypting fields in the AS/400

    Greetings, We are required to encrypt credit card fields in the AS/400 files. I am looking for something convenient to encrypt/decrypt field while in the RPG ILE program. Do we need to buy a software? Does As/400 has its own APIs? Please advise. Thanks Gary Liberman

    GaryL5 pointsBadges:
  • encryption and decryption WIN XP PRO SP2 PRE-INSTALL FROM DELL

    I encrypt the data but i can't decrypt it.? last week i did encrypt some data of 35 GB contains doc xls jpg and videos. simple by selecting folders properties. ==>advanced down in attributes area. ==>then simple check the box enrypt contents to secure data. on D: on that time details button...

    Waqas0075 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:
  • Backup of encrypted data to USB device

    I'm using Ultimaco encryption software and I'm looking for any software/utility that can read files from an encrypted hard drive and copy the data to a USB device. I need to be able to do this for OS disaster recovery in the event of a crash. Any suggestions or recommendations are appreciated....

    BrentSheets6,925 pointsBadges:
  • Requirement to encrypt backup tapes – how in the world…

    Hello all - have a recently-presented requirement, as many of you may have, to encrypt or otherwise protect the data on our iSeries backup tapes that leave the premises. Any experiences or recommendations? Thanks in advance Carter C

    CarterC19220 pointsBadges:
  • Looking for Antivirus for Win Storage 2003 x64 server

    Hi, We are looking for an antivirus software that proven to work well with windows storage 2003 x64 server. Our current product works just fine on all other 2003 servers, but it brings down this one from time to time. Thanks, Oksana

    Oksana0 pointsBadges:
  • Encrypted path for Outlook 2007

    I just set up Office Outlook 2007 for my home computer (Windows XP) & I use Bellsouth DSL. While setting up Outlook 2007, the system asked for my email Id which is: xxxxxx@Bellsouth.net. The system then replied “No encrypted path found both inbound and outbound” (not exact word - paraphrasing)....

    SbElectric2,540 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • Wireless data communication

    According to my understanding if data has to travel through wires and beyod a point it has to travel in a wireless environment, the data is decrypted at the access point and will again be encrypted here depending on what encryption technology the access point is using. Is it correct? Please correct...

    Rahul Shrivastava330 pointsBadges:
  • Encryption key management

    Looking for info on encryption of data for backup purposes, either at the tape drive, VTL, SAN switch or some type of appliance in the backup path. Encryption Key management is more critical than the encryption solution. This request for help was originally submitted to the Research Assistant on...

    ResearchAssistant855 pointsBadges:
  • Data Scrub in Oracle 10g

    I am looking for algorithm for Data Scrub in Oracle 10g - I work with sensitive data and I need to get some help as to how to go about this and if any body can come up with some codes, I really appreciate that. There are some ready made softwares available, but I am interested in getting to know...

    Jug5 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • encrypted file

    an we re-open an encrypted file after pc got formatted. We have formatted the pc, later system wont allow to open any file showing "access denied", when we check that all files was encrypted by earlier user, now whether we can retrive all these encrypted files through administrator login because...

    Pva15 pointsBadges:
  • Best authentication method

    I'm researching authentication methods, trying to determine what method is best for allowing customers to make payments online. Which, in your opinion, is best?

    Coder6270 pointsBadges:
  • When trying to access encrypted files, access is denied?

    I am puzzled. I have encrypted several folders and the associated files that are in them. Now, for some reason, when I want to access a file (doc) it won't let me! Also, when I try to decrypt the file it says "access is denied". I double-checked the security setting of the file and my name is on...

    0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following