• Configure SFTP on iSeries

    I believe someone has a document how to configure SFTP on the iSeries. Is is possible for someone to email me this document.

    Cavan1235 pointsBadges:
  • How to perform network audit or assessment

    How can I perform a network audit or assessment?

    Apalani20045 pointsBadges:
  • Is it better to use native iOS and Android development or Adobe Air?

    Is it better to invest more money building an Application for iOS and Android in the native way or it worth using AIR for both? I am using a lot of media on the APP, so I want it to be fast.

    cras5165 pointsBadges:
  • File Member Select & Encryption in AS/400

    Two questions here. I have been querying a lot of data out of our database, however I have ran into two issues I'm unsure how to solve. 1.) I'm able to find the referenced table, however this relies on a file. RUNQRY QRY(*LIBL/*N) QRYFILE((SCDATA/SCATRNTL username)) I would like to replicate this...

    kparker25 pointsBadges:
  • Technology behind UltraSurf?

    What technology does ultrasurf use to tunnel through firewalls? How exactly is it doing it?

    Aloysiustany15 pointsBadges:
  • Virus Alerts on Cisco Switches

    We have three layers in our network Core, Distribution and Access this is an campus network wherein all the users are connected to access layer.I wanted to know that is there any command which will aleart me on my Switch either on Core or Access for Virus which is on the users PC by showing MAC...

    Chitah10 pointsBadges:
  • Is there a way to find out what user on the SBS 2003 Server deleted a folder in a share? User activity logs?

    Is there a way to find out what user on the SBS 2003 Server deleted a folder in a share? Security logs? Activity Logs? Thank you, Cory

    Coey615745 pointsBadges:
  • Track records of security advisories

    Does a security research firms track record of vulnerabilities and exploits published make you trust them more, or more likely to hire them?

    Michael Morisy8,323 pointsBadges:
  • Tracking Laptop Users

    Does anyone have a recommendation for a good software program to track internet content for lap top users when not connected to the network? Specifically, what software does the best tracking when the users connects back to the network.

    Gamrey5 pointsBadges:
  • Encryption Form SQL Server 2000

    I want to transfer data from one database to another database both the databases are on SQL Server 2000. I want to transfer the data in encryption form. How do I do it? Regards, Sahil

    Maruf245 pointsBadges:
  • Lotus Domino error: “Domino Web Access Warning: Sorry, we were unable to process your request at this time.”

    Hi I am using Firefox, Cisco VPN 4.9 and Lotus Domino 6.5 to access my email at work. I can open and read my email OK, but cannot reply or create new mail. When I do try to reply to create a new memo, I get the following error message, ""Domino Web Access Warning. Sorry, we were unable to process...

    Cubehunter5 pointsBadges:
  • Best 3rd party monitoring software for SQL?

    What's the best 3rd party monitoring software for SQL?

    Fran5 pointsBadges:
  • Recommendations for hosted intrusion detection and prevention system vendor?

    Hello, I am looking for a 100% outsourced (hosted, managed, etc.) intrusion detection and prevention system vendor for use in the payment card industry. They should be able to demonstrate recognition of and compliance with PCI security parameters. Does anyone have any qualified recommendations...

    Billpoly0 pointsBadges:
  • Penetration Testing Certification

    I am planning to take up certification in Penetration Testing. Could anyone advise on which certification is more widely recognized or considered best (between CEH & GIAC -GPEN)?

    Mclav15 pointsBadges:
  • VPN won’t authenticate

    Hi, We have an Windows Server 2003 R2 Standard Edition SP 1 - Small Business Edition Domain Controller and a Windows Server 2003 R2 Standard Edition SP 1 ISA Server 2006. We have VPN setup in ISA and the administrator user has no problems connecting. With any other user we are denied access....

    DX15 pointsBadges:
  • Configuring Netgear WGT624 Router with Acer Aspire Netbook

    Does anyone know how I could go about configuring my Netgear WGT624 router to work with my new Acer Aspire netbook? I currently have a laptop operating on my Netgear router, but yesterday, when I tried to log on to the internet with my Acer Aspire netbook, nothing? my router is secured. The funny...

    NYC5 pointsBadges:
  • User SID from command line

    How to find out or see the specific user SID from command line. Thanks, Khan

    239069370 pointsBadges:
  • Open IT Forum: What IT conferences are you attending this year?

    Below is a list of the conferences IT Knowledge Exchange is planning on attending in 2011. If you or your company is planning on attending any of them, we'd love to see you there. Let us know if our schedules match up, or tell us which conferences you are going to. RSA Conference, February...

    MelanieYarbrough6,345 pointsBadges:
  • What to expect with Conficker?

    Some computers that I "support" have come down with Conficker and I was wondering what, if any, sort of performance or network issues I will potentially deal with until I am able to remediate the issue.

    Securityn00b12850 pointsBadges:
  • OWA log in screen

    I had some issues with IIS and had to delete and rebuild the virtual servers associated with Exchange. This all went fine and I can now access OWA just fine but I am not given the OWA login screen. Instead I get a standard windows login screen. I have encryption setup and it does open an https...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following