• Log onto to Windows w/o username or password

    My husband found a computer in the trash after a store closed. He brought it home I connected it and of course it requires a user name and pw. Obviously it works, but how do I clear that window so that I can work on the computer? Does any one know?

    G10197730 pointsBadges:
  • AS400 intreface with other platforms

    Can anybody tell me how to interface As/400 with other platforms say windows or linux for example

    Cute98862892710 pointsBadges:
  • Is it possible to reorganize a very big transaction in one night?

    I want to reorganize a very big transaction file in day end process and it cannot finish within 1 night. The problem is RGZPFM command lock that file ,so the day after , user cannot use that file because it is locked. Do you have any ideas to help me?

    Cookiekitty110 pointsBadges:
  • Blocking certain fields from being downloaded using Client Access

    Hi, By using WRKQRY, we can select the files and create output files. My problem is how do I block certain users from downloading certain sensitive fields like Price in the output file. Thanks..

    N4t45h40 pointsBadges:
  • Access list

    I want to config a router to deny any use for TCP port 80. How can I do that?

    Asal15 pointsBadges:
  • Running a job in SQL 2005 by calling a batch file from a As400 CL program

    Hi, I already asked this question before but did not get any reply. Anybody please help.. I am calling a job on AS400 which uses RUNRMTCMD to execute a batch file on sqlserver 2005 server. This batch file uses sqlcmd command to run a job on sqlserver. When I execute this batch file manually from...

    Gullu15 pointsBadges:
  • V5.2 SAVSECDTA Problem

    I am trying to run savsecdta from V5.2 box so I can move the user profiles and authorities to a new iSeries. I have done this a thousand times and never had a probelm, but this time after the command is issued it runs for hours and hours and never finishes. Cum level is 3252520. Any ideas?

    Helpdesktf0 pointsBadges:
  • Array Corruption

    I have written an RPGLE pgm in which I took an array with a size of 400 (20 fields with a length of 20) and did a MOVEA to put it inside a character field of 400. I then passed this field to another program and I did a MOVEA to populate the array in the 2nd program. When I call the 2nd program...

    GHENDER190 pointsBadges:
  • HOW DO YOU ELIMINATE MULTIPLE ID’S PER USER, BY IMPLEMENTING SINGLE USER ID?

    I am the Security Admin for my company ane we run SRM 4.0 (SRM Server 500;EBP5.0). Due to the nature of our Organizational Structure, founded on several Purchasing Organizations and Purcahsing Groups, we have situations where our IOC (international Oil company) users, package and submit contracts...

    sapsecurity2885 pointsBadges:
  • mail send problem exchnage 2003

    Hi. I have confingured exchange server 2003. I'm sending and receiving mails. I have spam program GFI mail essential. and ISASERVER 2006 enterprise edition.But i have this problem: Ican send mail every domain expect one domain. i'll call this domain test.com. I colled this mail administrator he...

    Eliyevelxan1,235 pointsBadges:
  • Audit Journal entry type ‘AD’ for stream files (*STMF)

    Hi, When I analyse the audit journal for the journal entry type `AD?, I can see the following entries. My question is that in this type of entries I can not see object level details, (Object is *N). Is there any other method to see the object level details or any other related journal entries in...

    Gaminiwe0 pointsBadges:
  • Email and Web Security Merger

    Is your organization merging, or planning to merge, your email security and Web security gateway capabilities? Why does it make sense to do so, but more importantly, what are some of the gotchas you weren't expecting?

    SearchMidmarketSecurityATE150 pointsBadges:
  • What factors should go into a “social media” cost analysis?

    As Sister CISA CISSP pointed out, a lot of factors aren't included when companies embark on social media adventures, and it's usually IT that has to raise considerations. What would you suggest be included as companies draw out a "social media" total cost analysis?

    ITKE342,560 pointsBadges:
  • Fingerprint certificate

    I was having some fun reading about Certificates, and realized I could see them in my browser. Anyways, I noticed at my bank it has something called "fingerprints" associated to it. Does this mean I can use my fingerprint reader to login?

    Filthgrinder55 pointsBadges:
  • Spam block list on ISA server 2006

    Hi i have confingured ISA server 2006 Enterprise edition.But there is not SMTP filter (Add-ins -->Smtp filter). There is not place that i import mails for block and else. Where can i download service pack that include SMTP filter.

    Eliyevelxan1,235 pointsBadges:
  • clear physical file member question

    is it possible for me to only clear certain records of a physical while leaving certain records available? I have a file with thousands of records, but I only need the records starting with a certain date. How can I delete everything prior to the date that i need with out totally wiping out the...

    Blackc0 pointsBadges:
  • Cisco ASA5510

    I need to find out if there is a command to shutdown Cisco ASA5510 firewall rather then walking up to the firewall and pulling the power plug ... thanks

    Kwt712555 pointsBadges:
  • origin of connection

    Today I ran a DSPAUDJRNE ENTTYP(PW) USRPRF(*ALL) and while skimming over the results I noticed several entries similar to the following : Violation Type : U User Profile : ADMIN Device Name : Communications Device Remote Name : Local Name : Network ID : Job Name : QZDASOINIT Job User : QUSER Job...

    MODMOD0 pointsBadges:
  • modifying a job description

    I created a job description with several initial library lists. I now need to add a new library but I don't want to add it to the bottom of the list. Is there a way to insert the library at the desired location? If not, I will have to retype the entire library list.

    GHENDER190 pointsBadges:
  • Administrative rights in an application

    Good day all, I am new in the application development world as a Business Analyst. Please pardon my ignorance, Kindly attend to my question. What type of access does an administrator/super administrator have on a system/application? i.e. what can be done and not done?

    BUSINESSANALYSIS5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following