• Hosting one AS/400 IP address to internet

    We are planning to host one AS/400 server to internet. Hence we created a network device and connected our DMZ server to AS/400. We assigned the internet IP address. Using intranet IP, we created the private digital certificate for the system and export to the desktop. I have a copy of the...

    naresh1984365 pointsBadges:
  • Why am I getting storage differences between OS X and iOS?

    I'm currently writing several dozen binary data files on OS X that can be read on iOS devices. Here's my following structure: struct poiStruct { double latitude, longitude; char titleString[41]; }; The only problem with this is that its occupying 64 bytes on OS X and 60 bytes on iOS. Does anyone...

    ITKE352,420 pointsBadges:
  • InterVlan Routing on Cisco

    Hi, I have Ipbase Image on a Cisco 4506 switch and configured several vlans eg. 2,3,4 and each have ip addresses associated with them as given below. interface vlan 2 ip address 172.16.2.1 255.255.255.0 interface vlan 3 ip address 172.16.12.1 255.255.255.0 i have said ip routing but i do not see ip...

    Mannie198035 pointsBadges:
  • To copy IOS of PIX version 6.3 from flash to tftp?

    Hello All, I want to copy ios of pix version 6.3 from flash to tftp……….. Can someone give me the exact command for this? Thanks Rahul

    Rahul Shrivastava330 pointsBadges:
  • How can I use XMPFFramework for my iOS?

    I'm trying to figure out how to use XMPPFramework's core data for storing incoming messages. This many seem like a general questions but does anyone have any tutorials or guides on how to use it. I see "user objects" which can have many different resources. Is each message a new resource that I...

    ITKE352,420 pointsBadges:
  • What’s the best way to store passwords in Python?

    I've been writing a program using Python and now I need to store some passwords (for FTP servers). I need to make sure these aren't visible to anyone. And it also means that I can't store a non-reversible hash of the password (like on a webserver) because I'm not checking if the password is right....

    ITKE352,420 pointsBadges:
  • Port monitoring with HP ProCurve 4104GL

    Having problems configuring a Web filter with a HP ProCurve 4104GL switch. Does this switch support port monitoring? Thanks. Moderator Note: This is a submitted question

    BrentSheets6,925 pointsBadges:
  • What layer of the OSI model does a switch operate?

    At what layer of the OSI model does a switch operate?

    NetworkingATE1,545 pointsBadges:
  • How to setup Sonic Wall NSA 3500 as NTP server

    I would like to set the NSA 3500 as the NTP server for internal devices such as switches. The version of code is 5.5.1.3-9o

    Armptech5 pointsBadges:
  • Setting up a differential schedule using Backup Exec 10d

    I have setup the following schedule setup in Backup Exec 10d Monday Full - Backup files Using Archive Bit (reset Archive Bit) Tue Differential - Back Up changed files since last full - Using archive bit( does not reset archive bit) Wed Differential - Back Up changed files since last full - Using...

    Valcon5 pointsBadges:
  • Wiping hard drives in 100 PCs

    We are donating 100 PCs. How can I quickly and effectively wipe all their hard drives? I have looked into Mban and it looks promising but would I be better doing that or pulling all the drives and formatting multiple ones at the same time? What are best practices for doing this?

    NewnanIT1,110 pointsBadges:
  • How should I store my static data in an iOS app?

    I have a huge amount of data located in my application that I need to access, but never be changed. I'm using it in other applications, such as JSON files and SQL databases, but neither one seems straightforward in iOS. I'm trying to stay from Core Data so should I start storing my data in...

    ITKE352,420 pointsBadges:
  • Can data using a loopback be packet sniffed?

    Does anyone if data that's exchanged on a local machine using a loopback IP 127.0.0.1 be packet sniffed if the PC is connected to a network? I'm trying to figure out the loopback is secure enough for exchanging data. We're using these different platforms: Windows Vista, Windows 7, Mac OS X and...

    ITKE352,420 pointsBadges:
  • What is a File copy limit in Windows XP?

    Does any one know what is a copy limit in windows XP as when we copy a lot of small files Windows XP stations come up with low resources error ex. we copy 40GB=800000 files windows 2003 server edition is fine no problems.

    Dimchik0 pointsBadges:
  • Can’t receive email in Outlook

    I continually get a pop up asking for my username & password for the email address I use in Outlook. The username & password are already in their prospective fields but password is apparently incorrect. Can send but not receive

    austin455 pointsBadges:
  • Outlook Calendar Access/Sharing

    My boss and I use Microsoft Office Outlook. My boss currently only uses the shared calendar. He puts all his appointments and such here as well as group things. He doesnot want to use two different ones, but I want him to be able to give himself reminders and eventually be able to link it to his...

    Adventuredev55 pointsBadges:
  • Is IP Address filtering really secure?

    We're planning to deploy an internal application with a ton of sensitive data and we're becoming very worried security wise. I suggested to keep it on our internal network but I was vetoed. Inside of the app, we programmed it to only respect requests if they come from an internal IP address...

    ITKE352,420 pointsBadges:
  • Does Veritas NETbackup 6.5 encrypt data in backup tape?

    Dear All, During a risk assessment exercise, I realized that my backup admin does not encrypt data in backup tapes. He argues, it is not required as an adversary cannot recover/read data from the backup tape, assuming its stolen, if he does not have the corresponding catalog. He further adds that...

    Novice1235 pointsBadges:
  • How to become a Information security consultant / auditor

    Hi all, I am pretty new to all of this so excuse my ignorance, I have been told by an Information Security Officer That I would be a good consultant, however I am too am confused about how to start or where to start. I know that there are three courses to be a lead auditor but I dont have any...

    JohnStewart25 pointsBadges:
  • Retrieving original MAC address

    Our group is tasked with with retrieving the active MAC address for our Windows PCs. Here's the code we're using: private static string macId() { return identifier("Win32_NetworkAdapterConfiguration", "MACAddress", "IPEnabled"); } private static string identifier(string wmiClass, string...

    ITKE352,420 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following