• How to create a Windows 98 bootable USB using IMA file.

    I want to create a bootable USB using IMA file, having Windows 98 boot files. I have created a bootable CD by using this. I have checked this on SATA DVD Writer Drive. It was working fine. It contains this. http://i.imgur.com/eTz1cWX.jpg OR Provide me a bootable ISO, so I can use it with DOS prompt...

    Xaphar220 pointsBadges:
  • Script to restore database permissions during a migration to SQL Server 2005

    We are in the process of migrating from SQL Server 2000 to SQL Server 2005, and I'm searching for a script that can transfer and restore the database permissions of all accounts from SQL Server 2000 to SQL Server 2005. I used sp_help_revlog to restore the logins, but I still have to restore the...

    SQL Server Ask the Experts2,585 pointsBadges:
  • SQL Server restore job fails

    I've created a Restore Job under SQL Server Agent. Job owner is sa, Run as User dbo. There are no users connected to the database or processes running. The job fails with: Msg 3101, Sev 16: Exclusive access could not be obtained because the database is in use. [SQLSTATE 42000] Msg 3013, Sev...

    TuftsDBA0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • SQL Server 2000/2005 – Creating Unique Constraints allowing multiple NULLs

    Hi there! I'm having a problem maintaining data integrity on a database table in MS SQL-Server 2000. To ensure maintaining the integrity I need to implement a Unique Constraint on one of my coloumns. The problem however is, that this coloumn also has to allow multiple NULL-values - but for every...

    LeChuck0 pointsBadges:
  • radiation dose conversions

    Hi how do you convert 10micro gray metres squared to millgray or decigray centimetres squared?

    conor5 pointsBadges:
  • How can I bind IP address to MAC address of PC

    I have ISA Server 2004, only selected users are allowed to access internet. Here my requirement is to allow selected LAN users to access internet only from their machine. I have tried allowing them through IP based. IP based: a user can ask or guess someone IP and put in his machine and get access...

    pdsathishkumar3,790 pointsBadges:
  • Is it possible I was hacked through my VPN?

    I have a hacker problem. I am using a VPN that specifies it is USA on an iPAD, and is Apple approved. When I log into my email it always gives a California or Texas IP address, with one exception: Once a week it says I have logged in from Dubai. I was actually logged in when this happened and the...

    ITKE353,360 pointsBadges:
  • Deleted Object not Found in Audit Log

    I found a Program object present in the system when I did a DSPOBJD for a library last week. But today, when checked the object is not present in the system. I checked the AUDIT Logs (DSPAUDJRNE, DSPJRN, CPYAUDJRNE) with DO, MO etc. But this object has not been registered anywhere in the Audit logs...

    AdminAS40015 pointsBadges:
  • How to make all branches visible to others

    I need a help please. I have fortigate 80c connected to 16 branches through IPsec VPN and all is fine. What I need is to make all branches see each others. I have a trend-net device in each branch.

    ITDeptsd10 pointsBadges:
  • DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • Receiving error message connecting to SQL Server 2008 R2

    I'm trying to connect to SQL Server 2008 R2 using Windows authentication. However, I can't because I keep getting this error:Login failed for user 'AVATOPIA\ian'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: ]Now, I can log in...

    ITKE353,360 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:
  • Error Code 64: Host not available – ISA error

    Hello Sir;   When I am accessing the  internal website from other system, I get below error. How can I bypass internal broadcast  from ISA server?   I alread bypass from  broweser's internet option but still same issue.   With Regards Bhupendra Jesalpura 9426372705

    BhupenJesalpura10 pointsBadges:
  • Delivery Failures for mail I did not send – Spoofing or Trojan

    I'm getting delivery failures for email I didn't send. It's probabaly someone spoofing my account, but could it be a trojan sending emails directly via SMTP? How can I tell? Is there a way to query the SMTP service for a list of sent emails?

    Eag5 pointsBadges:
  • HIPAA audit on virtual network

    I'm hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPAA compliance audit. Does anyone have suggestions of open source or pay tools they'd recommend? Do I need to pull in an outside party for this?

    Michael Morisy8,323 pointsBadges:
  • FOXPRO 2.6 FOR MS DOS DATABASE CONVERSION

    I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPAA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has...

    Cephid5 pointsBadges:
  • Personal E-mail at work (aol, gmail)

    I am looking for documentation to support blocking personal e-mail at work(aol, comcast, hotmail etc) for virus and HIPAA compliance regions. Can anyone direct me to any publications that support this? Thanks!

    Itadmin34775 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following