• Linux OS

    Interested in moving to Linux from Explorer, and Windows OS 8

    blackbird50110 pointsBadges:
  • Zimbra Storage

    This a mail from my colleague, "I would like for us to use the zimbra briefcases for storage of latest datasheets and specs for the future. This enables global (but controlled) access to the documents (for example you or I can specify exactly which people can access the folders)." So my question is...

    shrieveIT5 pointsBadges:
  • How do I convert an Open Office doc. to an rtf format doc.

    How do I convert an Open Office doc. to an rtf format doc.?

    Drinkalot5 pointsBadges:
  • What are your favorite cloud security blogs?

    You told us what your favorite IT blogs are, now we want to get a little more specific. Do you have any security blogs or cloud security blogs that you go to for the latest threats and solutions?

    MelanieYarbrough6,345 pointsBadges:
  • complexity for shell script migration

    we have approx 700 shell script which is written for sybase ASE. and we have to make them compatible to work for SQL SERVER 2014 as we are migrating our database from SYBASE ASE 15.7 to SQL SERVER 2014. could you please tell me what should be my checklist in every shell scripts?

    mayurigupta915 pointsBadges:
  • Error installing linux on Dell Poweredge 2950

    I'm trying to install Novell Linux OS on a  Dell Poweredge 2950 server. 64-bit with raid and sas drives but i am getting a "no hard disk found" error

    ITKE344,900 pointsBadges:
  • Is it possible to connect PHP to iSeries OS/400?

    I need to desperately connect our website (which uses PHP5/Apache 1.3/OpenBSD 4.1) to our back end system that is running on a iSeries OS/400 V5R3. We need to access several tables that are stores in there. But, I've run into some problems.First, the DB2 extensions / software from IBM can only run...

    ITKE344,900 pointsBadges:
  • traditional linux file schema

    what are the benefits of the traditional Linux file schema and how might it be superior to permission methodologies employed in other operating systems

    kirt24655 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Wanted to configure PGP on Oracle applications R12

    Hi, We are currently on Oracle Applications R12 based on Unix Platform.  We have a requirement to encrypt the files using the PGP key and FTP to another server. The other server will require to decrypt these files. Can you please let me know from where I have to start? Do we need any...

    khushbub5 pointsBadges:
  • Linux database security

    What are the database security requirements in a Linux environment?

    Cnotejunebug20 pointsBadges:
  • UNIX Security Assessment

    What is the best way UNIX Assessment procedure?

    Dharmagrao100 pointsBadges:
  • Security implications surrouding outbound SSH traffic

    The school that my son goes to blocks outbound SSH traffic. The users inside the network can't use Port 22 / trying to make a SSH connection through another port is also blocked. The reason I was given for this was because it's putting the users inside the network at risk and would allow port...

    ITKE344,900 pointsBadges:
  • Cross-platform tools for security, monitoring

    What would be some good cross-platform administration tools to use for an environment running Windows OS X and Debian's test release lenny? It is a small business (<200 employees) and the main concerns are being able to perform secure file transfers throughout the system and keeping track of...

    Linux - Ask the Expert270 pointsBadges:
  • Interpreting bandwidth usage by MRTG/CACTI

    Hello guys. We have a dedicated lease line of 1 E1 (2Mbps) that we subscribe from an ISP. For the past several months, we have noticed that internet connection is so slow and it keeps us thinking if we are getting what we are paying for. I need help in interpreting an MRTG graph from CACTI of our...

    JuneC155 pointsBadges:
  • How does Unbuntu encrypt its disk utility?

    Is Ubuntu's disk utility encryption very secure? If so, what kind of algorithm runs it? Does anyone have documentation about it or know where I can find it?

    ITKE344,900 pointsBadges:
  • Is Port Knocking a good idea?

    I generally lock down SSH and other non-public services so that they can only be accessed by specific IP addresses. But some businesses we work with do not have static IPs and occasionally they need to provide access for contractors and outside developers. I have been told that Port Knocking could...

    ITKE344,900 pointsBadges:
  • Thoughts on a multiboot system with encryption and pre-boot authentication

    I'm running a system that runs Windows 7 and Windows XP, with Red Hat soon to be added. All this in conjunction with Grub 2 boot loader. How would I go about setting up a multiboot system with hard drive encryption and pre-boot authentication?I know TrueCrypt could be used to pre-boot...

    ITKE344,900 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following