• Can you transfer active jobs to another subsystem?

    If a job is already active in one subsystem, can you use tfrbchjob or tfrjob to move into a different job queue to run in a different subsystem, or will you get errors because the job is already active in one subsystem?

    Bkr0963c0 pointsBadges:
  • Changing Permissions on Local Drive C

    I would like to know how to script adding the power user group on the local computer to the security of the C drive with modify permissions.

    Machrider5 pointsBadges:
  • Auditing Windows 2003 and MS SQL 2005

    Are there any audit scripts I can use to audit Windows 2003 and MS SQL 2005?

    Gideont5 pointsBadges:
  • The most-watched IT questions this week: Oct. 20, 2009

    Here are the 5 most watched questions on ITKE: There's some great discussions going on ranging from SQL to diagnosing app crashes. Go answer a question now and take your shot at winning a TV, or check out the rest of the top 10 on the Community Blog: 1.ORA-31672 in oracle 11g tops the list, with...

    Michael Morisy8,588 pointsBadges:
  • How to pop up login when using STRPCCMD

    How do you pop up loginwindow when using STRPCCMD?

    Bpulido35 pointsBadges:
  • ISA Server 2004 log configuration

    How can I have the server logs show the name of the website and not just the ip address.

    ITKE439,630 pointsBadges:
  • Adopted Authority

    I am extemely new to RPG so I am looking for a simple code that uses adopted authority of SECOFR to an operator temporarily simply to enable users. I know that it can be done, but I would like to know the structure of it from and RPG standpoint. Thanks in advance.

    Rrnmla0 pointsBadges:
  • iseries Client Access does not allow third parties applications to open the login screen to change password when it’s expired.

    Hello all: I will apreciate any help about this problem. I am a system administrator (mainly Active Directory) now dealing with this ISeries Client Access Problem in my 400 workstations. There are e few applications in the company, developed in FoxPro and Visual Basic, accesing the AS/400 (now a...

    Romanillo0 pointsBadges:
  • Encrypting fields in the AS/400

    Greetings, We are required to encrypt credit card fields in the AS/400 files. I am looking for something convenient to encrypt/decrypt field while in the RPG ILE program. Do we need to buy a software? Does As/400 has its own APIs? Please advise. Thanks Gary Liberman

    GaryL5 pointsBadges:
  • How to trace unauthroized users trying someone’s user id on AS/400 system.

    How to trace unauthroized users trying someone's user id on AS/400 system, is there anyway so that I can trap his system IP address?

    Vinay40055 pointsBadges:
  • Most popular blog posts this week

    10. Removing old hardware after a P2V conversion Eric Siebert shares a long-held best practice regarding old server management. 9. The challenge of managing risk when IT budgets tighten Linda Tucci explains the challenges of a down economy -- and offers some tips on coming out ahead. 8. Ellison...

    ITKE439,630 pointsBadges:
  • problems to install SDM in a 2620XM router

    Hi, I tried to install the SDM in my router and pc. In my pc there is not problem, but, when I try to install or connect from my pc always I´ve got the same error:" it is not possible to connect with the router for installing SDM". The router is an 2620XM I have configured an IP address in the...

    Dunkel30 pointsBadges:
  • Windows Server 2003 partitioning

    I have a server with 4 cpu's on this server. One application states that for each CPU on the server, a license needs to be bought. How can I tie 1 CPU to that one particular application? How can this be done from an OS perspective or hardware configuration?

    ITKE439,630 pointsBadges:
  • encryption and decryption WIN XP PRO SP2 PRE-INSTALL FROM DELL

    I encrypt the data but i can't decrypt it.? last week i did encrypt some data of 35 GB contains doc xls jpg and videos. simple by selecting folders properties. ==>advanced down in attributes area. ==>then simple check the box enrypt contents to secure data. on D: on that time details button...

    Waqas0075 pointsBadges:
  • The most-watched IT questions this week: Oct. 13, 2009

    Here are the 10 most watched questions on ITKE: There’s some great discussions going on ranging from going green to how to create a new network. Go answer a question now and take your shot at winning a TV, or check out the rest of the top 10 on the Community Blog: 1. Going green: Are you feeling...

    Michael Morisy8,588 pointsBadges:
  • cisco l2l vpn on pix 525

    what is the command in pix 525 i want to know bandwidth utilization for my l2l vpn

    Ekansh400 pointsBadges:
  • interVLAN

    I want to configure interVLAN useing two ROUTER with two SWITCH i am unable two configure it can you help me how can i configure it

    Router1235 pointsBadges:
  • torrent Block

    how i block torrents and p2p in ISA 2006 by a firewall rule or ony other mathod applying only at server end.

    Qureshtal10 pointsBadges:
  • AS/400 – IBMi Managed Hosting – Looking For Service Partner

    Can anyone recommend a good Managed Hosting company that has specific experience with the Systemi.  Need to position HA & DR services to clients and would like to find a good partner.  Ideally somewhere in the Midwest.

    Jdryan44555 pointsBadges:
  • Clarrification on VSphere with vCenter

    There are 3 Questions that i would like to know of . Till date , We have our ESX Servers added as part of Virtual Center through its IP address . We are planning to remove and add it using its FQDN . In this scenario , Will we be able to retain the performance data of the ESX Server and Virtual...

    Sudhrsn5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following