• Dynamic Memory and in-process memory is it the wave of the future

    What is the prospects for Microsoft's Dynamic Memory and in-memory processing and impact on security? From the blogs and industry newsletters, it sounds too good to be true.  Analyzing data before storage and the new solid state devices appears to be the answer to cost of storage and the...

    Twolittlehorses5 pointsBadges:
  • Is it possible for the monitor jobs to start automatically

    Is it possible for the monitor jobs to start automatically after ipl. We need to manually start the monitor jobs after every IPL. We have setup few monitor jobs under iseries navigator.  

    JohnsonMumbai1,160 pointsBadges:
  • Is there a way to limit access to the OWA in 2007 or 2010 so that the users will have access inside the LAN and still not have access from the DMZ?

    I want to move away from the Fat client for email and only use OWA for 90% of the company. Issue is I cannot have the end users accessing the email from outside of the building. Is there a way to limit access to the OWA in 2007 or 2010 so that the users will have access inside the LAN and still not...

    ITKE342,985 pointsBadges:
  • In Exchange 2010 is there a way I can control who sends information to a distribution list?

    Is there a way I can control who sends information to a distribution list? For example, if I have a company-wide DL and I don't want to use ACLs?

    ITKE342,985 pointsBadges:
  • Test & Production File Write issues

    I'm creating a new test environment. I made a user called TEST01 with a new testing job description, I've added the test library to the top of TEST01's library list. The files and programs were complied using the test library. I ran the program and it created a new part as it was supposed to do in...

    Lk5815 pointsBadges:
  • verify support ssl version

    how can i verify what version of ssl supports my website?

    Pettros5 pointsBadges:
  • Encrypting passwords on SQL server 2000

    I m using SQL server 2000 and I want to use a password field for Employee Master. My question is how to encrypt this password field in my insert query. I have heard about the “EncryptByPassPhrase” function and symmetric key, but it is provided from SQL Server 2005. I have tried using pwdencrypt...

    SQL Server Ask the Experts2,585 pointsBadges:
  • RSA 1024 for Delphi and .NET

    Hi All, I need to do public key encryption with certificates so that I can encrypt something in Delphi and pass it to a dot net app and have it decrypt. It needs to be RSA 1024. I have been able to do this in Delphi but not sure how to decrypt it in dot net. Does anyone having experience in doing...

    Virtualnil15 pointsBadges:
  • Which Linux client is best for full encryption on a limited platform?

    Okay, I realize "full encryption" might be interpreted in different ways – and my intention is not to start a Linux flame war – but I was hoping to hear some opinions on which Linux clients perform best on limited platforms with full-time data encryption. Two questions: 1) If 256-bit encryption...

    BrentSheets6,925 pointsBadges:
  • iSeries backup encryption on LT04?

    Hi, We are looking to encrypt our backups and having looked about it appears that using a fibre attached LT04 in the tape library where the encryption is done at hardware level would be the best /cheapest option. It is the best option for us as it also says that no software is required, however...

    Col7775 pointsBadges:
  • How to Reconfigure LAN After Move from DSL to T1

    Our 2003 installed network uses DSL since 2003. We have several IP in use for different servers running in our network since 2003. Now this ISP upgrades us to T1. A new T1 modem is installed, with a new set of IP, Subnet, Gateway, DNS 1 & 2 data for T1. We are told that we have to reconfigure...

    Beston225 pointsBadges:
  • CISCO ASA 5505 software update

    This may is trivial but I ask it anyway. I found out on the cisco webpage that the cisco asa have a new ASDM and ASA Version. I know how to upload images into the flash, but that is the next step to activate these image plus to get the images?

    Maddock10 pointsBadges:
  • Golden Gate

    Where can I find detailed information on Golden Gate software?

    Cgardel30 pointsBadges:
  • DDM Security – Where Are Security Parms Stored For updating Files on another box without a user profile.

    Currently on our development Iseries, our programs that use DDM have the ability to update files on production even though our development user profiles do not exist on the production box. Where on the Iseries is the information/parameters stored that allow our development box to do this? In...

    Marky6060615 pointsBadges:
  • moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • Need a way to audit ANY change access to selected database files.

    A client has had a request from auditors that they should be able to audit every change to three critical database files when I am remotely signed on to their ISeries. They would want to turn on and off the auditing so that it is NOT on all day while being hit by 100's of customers. I vaguely...

    Harkabus10 pointsBadges:
  • Lost QSECOFR Password and DST QSECOFR is disabled.

    I have a 170 at V5R1 and I have lost the QSECOFR password, and the DST QSECOFR has been disabled. I do have access to other DST profiles and can access SST, which allow me to modify the MI code if I wish. Anybody have any suggestions as to how I can regain access to this box, in any way, without...

    Mbeland0 pointsBadges:
  • AS400 Security

    We need to limit access to the command line from our users. How do we limit the command line length ? Many of the customized menus to a/r, o/e functions have the full command line. We need to avoid modifying each menu source.

    Danacu0 pointsBadges:
  • Forefront: All-in-one or best-of-breed?

    I recently talked to two Forefront customers, who had a lot of praise for Forefront's all-in-one management console and its protection against external threats.  Any Forefront users out there? What do you think? Do you agree? What have been some of your challenges? Also: what do you consider to...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Filtering Crystal Report Groups

    In my Crystal Report, I have my results grouped by Process, then by Risk, then by Control. Under each Control, there are several Tests, which can be either Effective or Ineffective. If ALL tests under a specific Risk are Effective, I want to filter out the Risk and its related Controls/Tests. If...

    Jcaballero5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following