• data encryption

    I am working on a project where I need to be able to pass a string through a SHA-2 encryption and then use the result as part of a call to open a URL.  The URL call is a breeze.., If there source code out there that has the SHA-2 algorithm that can run on the iSeries?  If it has to be in a JAVA...

    Droutt75 pointsBadges:
  • The most-watched IT questions this week: Oct. 20, 2009

    Here are the 5 most watched questions on ITKE: There's some great discussions going on ranging from SQL to diagnosing app crashes. Go answer a question now and take your shot at winning a TV, or check out the rest of the top 10 on the Community Blog: 1.ORA-31672 in oracle 11g tops the list, with...

    Michael Morisy8,323 pointsBadges:
  • Upload IOS in cisco router without TFTP

    Dear Sir, Can you please tell me that how can i upload a ios in cisco 3640 series router without use of a TFTP server, Because TFTP server can be used only when we can ping a local ethernet, And if i have to upload ios directy for a pc then how can i?

    Khanna5 pointsBadges:
  • How to pop up login when using STRPCCMD

    How do you pop up loginwindow when using STRPCCMD?

    Bpulido35 pointsBadges:
  • ISA Server 2004 log configuration

    How can I have the server logs show the name of the website and not just the ip address.

    ITKE342,985 pointsBadges:
  • Adopted Authority

    I am extemely new to RPG so I am looking for a simple code that uses adopted authority of SECOFR to an operator temporarily simply to enable users. I know that it can be done, but I would like to know the structure of it from and RPG standpoint. Thanks in advance.

    Rrnmla0 pointsBadges:
  • iseries Client Access does not allow third parties applications to open the login screen to change password when it’s expired.

    Hello all: I will apreciate any help about this problem. I am a system administrator (mainly Active Directory) now dealing with this ISeries Client Access Problem in my 400 workstations. There are e few applications in the company, developed in FoxPro and Visual Basic, accesing the AS/400 (now a...

    Romanillo0 pointsBadges:
  • DOS Attact Message or Just a Simple Query”?

    I have checked firewall alert message everyday from my organization firewall equipment, and it returns an alert message "anomaly: udp_src_session, 1001 > threshold 1000, repeated 214 times" Starting from 172.10.2.45:51158 to 210.181.1.24:53. I wanna know whether it's really infected and...

    RedJason5 pointsBadges:
  • Can’t browse the internet via the PIX

    Hay everyone, here is my situation i have two 3700 cisco router one 3750 switch and one 525 pix firewall. I connect one of the router to a cable modem and received a dhcp address from then i NAT all out going address, and that works fine. Now i am trying to add the 525 Pix to my network but i can...

    Kolangi10 pointsBadges:
  • Is it possible to block MAC addresses with ISA Server 2005?

    Is it possible to block MAC addresses with ISA Server 2005?

    NetworkingATE1,545 pointsBadges:
  • Encrypting fields in the AS/400

    Greetings, We are required to encrypt credit card fields in the AS/400 files. I am looking for something convenient to encrypt/decrypt field while in the RPG ILE program. Do we need to buy a software? Does As/400 has its own APIs? Please advise. Thanks Gary Liberman

    GaryL5 pointsBadges:
  • VPN creation between ISA Server and Cisco ASA 5510

    Can you create a VPN between a microsoft ISA Server and a cisco asa5510

    Bartski5 pointsBadges:
  • AS400 Clutter

    anyone know what causes *SQLPKG objects to be created in various libraries by many different users, some by IBM internal most not. Trying to cleanup system.

    Jpolep5 pointsBadges:
  • How to trace unauthroized users trying someone’s user id on AS/400 system.

    How to trace unauthroized users trying someone's user id on AS/400 system, is there anyway so that I can trap his system IP address?

    Vinay40055 pointsBadges:
  • Most popular blog posts this week

    10. Removing old hardware after a P2V conversion Eric Siebert shares a long-held best practice regarding old server management. 9. The challenge of managing risk when IT budgets tighten Linda Tucci explains the challenges of a down economy -- and offers some tips on coming out ahead. 8. Ellison...

    ITKE342,985 pointsBadges:
  • problems to install SDM in a 2620XM router

    Hi, I tried to install the SDM in my router and pc. In my pc there is not problem, but, when I try to install or connect from my pc always I´ve got the same error:" it is not possible to connect with the router for installing SDM". The router is an 2620XM I have configured an IP address in the...

    Dunkel30 pointsBadges:
  • cisco pix 525

    I want to monitor bandwidth in ipsec vpn tunnel. I am able to monitor the outside interface of my pix throught prtg but i need to monitor specially my vpn tunnels. can any body suggest me any software availabie ?

    Ekansh400 pointsBadges:
  • encryption and decryption WIN XP PRO SP2 PRE-INSTALL FROM DELL

    I encrypt the data but i can't decrypt it.? last week i did encrypt some data of 35 GB contains doc xls jpg and videos. simple by selecting folders properties. ==>advanced down in attributes area. ==>then simple check the box enrypt contents to secure data. on D: on that time details button...

    Waqas0075 pointsBadges:
  • auditing

    can any one provide details about auditing in all areas of iseries..with commands to generate reports.thanks in advance

    0 pointsBadges:
  • Secured TELNET

    How can I secure telnet so one cannot just telnet to our systm name and access a QPADEV* session? TIA

    Abigail645 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following