Hi, We’re converting some old master files in to new format files. These master files have around 58 million records each. We wrote COBOL programs to convert the format and write to the new files. In order to speed up the process we are splitting the each master file into 20 parts(i.e., 20 files and [...]
Answer Question | October 27, 2004 2:00 AM
COBOL, Data analysis, DataCenter, Development, Disaster recovery software, ERP, Financial services applications, Help Desk, Incident response, Lifecycle development, Manufacturing applications, Office Applications, Programming Languages, RPG, Special-purpose software, SQL, Storage, SunGard Data Systems, Systems Union Group, Tech support, Transaction Systems Architects
What is Digital Signature? I need the procedure and algorithm of it. If you have any sample program please send it to me.
Answer Question | October 27, 2004 3:27 AM
Security management, Security products, Tech support
I’m doing some research on the effectiveness of Microsoft’s technical support, possibly for an article on SearchWindowsSecurity.com. Our site readers continually need help troubleshooting Windows security dilemmas. Some seem to find what they need on Microsoft’s Web pages, and others don’t get enough technical detail (i.e. steps for fixing a specific problem). Do you have [...]
Answer Question | November 3, 2004 3:10 PM
configuration, Desktop security, patching, PEN testing, Platform Security, Security, vulnerability management, Windows, Windows 2000 desktop, Windows 2000 Server, Windows 95/98, Windows client administration and maintenance, Windows Server 2003, Windows tools/WSRM, Windows XP
The following question was submitted to SearchWindowsSecurity.com by a user: I’m having a serious problem with Windows NT. I put two PDC Windows NT in the network to try to demote one to BDC, but I forgot to change the IP of the first, so they conflicted. Since this, the items on the tab of [...]
Answer Question | October 27, 2004 1:44 PM
The following question was submitted by a user: I’m just testing Windows XP with the new Service Pack 2 on our Net, which consits of a Windows 2000/2003 Domain. When I do the login just after booting the PC, I run into Netlogon error 5719. When I wait for a minute after the login screens [...]
Answer Question | October 26, 2004 1:36 PM
Firewalls, Forensics, Incident response, Intrusion management, Network security, Security, VPN, Wireless
Help! I’m a IT/Networking student who is in a Network Management class where I along with 2 other classmates are working in a group to set up and configure a network for a real estate company consisting of 80 employees. There’s a main office which consists of a CEO, 2 legal support people (lawyer and [...]
Answer Question | March 27, 2012 12:20 PM
Budgeting, DataCenter, Networking, Project management, Security, Servers
I am currently working at a small company that has been experiencing a lot of growth. Over 90% of our data lies in the scanned images stored on our server. The structured layout of these images are held in a MS SQL 2000 db and served out using vendor software. For our local site I [...]
Answer Question | October 19, 2004 1:09 PM
Backup & recovery, DataCenter, Dell, IT architecture, Veritas
What I have now is a simple excel spreadsheet to input numbers and info. What I want to do with it is make it a template and have one cell in the top left corner to add a new number in order each time a new user opens it. For example in the cell would [...]
Answer Question | October 26, 2004 9:16 AM
Database Management Systems, DataCenter, Desktop management applications, Desktops, Development, Hardware, Microsoft Systems Management Server, Networking, Programming Languages, Security, Systems management software, Tech support, VBA, VBScript, Visual Basic
Hi all, Nice to meet you all. Does anyone can give me ideas on what’s hot in the last 3 months in the security technology development? Thanks.
Answer Question | October 19, 2004 4:41 AM
Security, Security management
How do you control visability of folders and files on a shared Windows network? We’ve mucked around with permissions which block access, but the folders / files are still visable by members who have been blocked, denied, and or removed from respective groups. Any assistance would be appreciated. Regards.
Answer Question | October 25, 2004 3:34 PM
The following question was submitted to SearchWindowsSecurity.com by a user: Which is more secure domain.local or domain.com?
Answer Question | October 14, 2004 1:20 PM
The following question was sent to SearchWindowsSecurity.com by a user: Some hackers attacked my computer and shut it down. No port scan program or logger is reporting an attack. What’s going on, and where can I find record of the attack?
Answer Question | March 5, 2012 1:13 PM
Intrusion management, Security
The following question was sent to SearchWindowsSecurity.com by a user: I use Windows XP. I’ve downloaded SP2, I run Norton 2005 Internet Security Anti-Virus and I also run Lavasoft’s Ad-Aware Pro. The new Windows firewall has given me small headaches, such as erasing my exlude list if I turn the firewall off and on, and [...]
Answer Question | October 15, 2004 12:59 PM
Firewalls, Forensics, Incident response, Intrusion management, Microsoft Windows, Network security, Security, VPN, Wireless
The following question was sumbitted to SearchWindowsSecurity.com by a user: I have an XP computer that I installed SP2 on, and now I am unable to see the default printer on the network. I have uninstalled it and reinstalled it, and it is not visible. Any suggestions?
Answer Question | October 14, 2004 12:50 PM
Hello, Many times an unknown node attaches themselves to our internal LAN with out the proper controls and then spreads a virus or has malware potential. It is not so much a problem with domain members, but rather at Layer 2-3 where the DHCP connection occurs and any machine can access the network. I am [...]
Answer Question | October 17, 2004 6:27 AM
Network management software, Networking, Product/service procurement, Remote management, Security management
Hi, I have a network, where I want to use WOL from a remote PC. It works when I send a packet from inside the network (or on the server). If I connect via PPTP from a remote windows XP PC, I can?t wake up the PC on the LAN. I suspect the broadcast packet [...]
Answer Question | October 13, 2004 2:10 PM
Active Directory, Administration, DHCP, DNS, Ethernet, Firewalls, Forensics, Incident response, Intrusion management, IPv4, Lotus Domino, Microsoft Windows, Network security, Network testing, Networking, Networking Equipment, Networking services, Security, TCP, UDP, VPN, Wireless
I have received several calls from users that their upgrade of Norton Antivirus or Internet Security 2005 fails. The natural reaction I had was to uninstall the previous version and install 2005. However after the 2005 upgrade even though the previous version is listed in Add/Remove programs, the uninstallation fails. All users have SP2 installed. [...]
Answer Question | October 11, 2004 12:52 PM
backdoors, Current threats, Hacking, human factors, Norton, Spyware, Symantec, Trojans, Viruses, worms
We are currently building a datawarehouse and will need to engage the customers in order to successfully specify the datamarts, a search functionality, etc. All of the technicalities are scoped and being put in place. The question hence directs itself to successfully engaging the customer base, without whose input this could never be successful. Some [...]
Answer Question | October 12, 2004 10:43 AM
Data analysis, Data warehousing applications, DataCenter, ERP, Financial services applications, Implementation, Information risk management, Knowledge management applications, Remote users, Transaction Systems Architects
How can I able to get and work with Oracle in Linux platform. I am using RedHat Linux 9.0.
Answer Question | June 15, 2010 1:41 AM
Administration, AMD PC hardware, Data warehousing/Business intelligence, Database Management Systems, DB2, Development, Hardware, Implementation, Installation/Upgrade, MySQL, Operating system platforms, Oracle, Oracle 8i, Oracle 9i, OS/390, Performance/Tuning, PostgreSQL, Security products, Servers, SQL, SQL Anywhere Studio/M-Business Anywhere/Avantgo, Standard Edition, Standard One Edition, Storage, Storage management, Tech support, UDB for mainframe, Unisys, z/OS
I am trying to remove the OS/2 Subsystem components installed to harden my Win2000 server. Although I managed to delete all files in c:winntsystem32os2 and in all its subfolders (by clearing dllcache), I still couldn’t delete c:winntsystem32os2 and c:winntsystem32os2dll. I have already completed the necessary removal of the following: MACHINESOFTWAREMicrosoftOS/2 Subsystem for NT MACHINESYSTEMCurrentControlSetControlSession ManagerEnvironmentOs2LibPath [...]
Answer Question | October 11, 2004 9:44 PM
configuration, patching, PEN testing, Platform Security, Service and support, Vulnerability Assessment & Audit, vulnerability management