• New Contest: ASK, Answer and win some Amazon.com gift cards

    It's that time again -- a chance to win an Amazon.com gift certificate based on your activity in the IT Knowledge Exchange community! Remember: the more you ask, answer and discuss questions, the more Knowledge Points you will earn. (Only valid questions, answers and discussions will be counted...

    ITKE345,340 pointsBadges:
  • Community Announcement: Cash in your Knowledge Points for an Amazon gift card

    Members who have earned over 1,000 Knowledge Points in the community by December 15th have the opportunity to cash in their points for Amazon gift cards -- just e-mail us at contactus -AT- itknowledgeexchange.com with your handle when you choose to cash out. You can also post here in the discussion...

    ITKE345,340 pointsBadges:
  • how to do SFTP on AS400 to UNIX given http:// address

    I am given a http://  address and would like to send file to that address from the AS400.  Was told I can use SFTP. What is the syntax.  

    Kongking5 pointsBadges:
  • CMDB Update

    Can someone point me to some recent real world information about CMDB? The tools, the implementation, approaches, realistic expectations. I am a data guy and understand the complexities of the underlying data. I am having a hard time getting my arms around what are realistic expectations and what...

    Silverbacko15 pointsBadges:
  • Help needed in making firewall in either C or C++ language

    i have to make a program in C/C++ to be run Client pc(windows platform) for followings: 1. to block access to a site(s), either by drop down menu or user entered. 2. act as a url filter to block any url consisting any word from a given list, for example "Facebook" or a bad word. progress: for the...

    Vishalgoel00335 pointsBadges:
  • Security ramifications if translating IPv6 to IPv4

    How is IPv6 more secure over IPv4? If we are translating IPv6 to IPv4 can their be security ramifications?

    NewnanIT1,110 pointsBadges:
  • Free IT Book: Building Applications in the Cloud

    This week's free IT book is Christopher Moyer's Building Applications in the Cloud: Concepts, Patterns, and Projects. "Don't just migrate the cloud: Use cloud architectural patterns that deliver superior performance, scalability, and availability" with this great resource. Answer one of five...

    MelanieYarbrough6,345 pointsBadges:
  • Encrypting wireless router

    What steps should I follow in encrypting my linksys wireless router? My previous password had both letters and numbers.

    Windman665 pointsBadges:
  • Link Access automated form to separate outlook mailbox

    I want to email a form from access to 5,000+ indiviudals. This form contains sensitive data so I want to encrypt an outlook mailbox (we'll call it mailbox B) for the purpose of this correspondance. The outlook mailbox is separate from my personal mailbox (mailbox A). The problem I'm having is that...

    KNK5 pointsBadges:
  • Windows Server 2008 encryption

    Can I encrypt data over the wire between local Windows Server 2008 local servers?

    NewnanIT1,110 pointsBadges:
  • Blocking command line on desktops

    How can we block the command line on 7 desktops for all non-administrator users?

    Troubleshooter24755 pointsBadges:
  • Encrypting DHCP requests and traffic

    Is it possible to encrypt DHCP requests and traffic?

    Troubleshooter24755 pointsBadges:
  • Network failover using Fortinet F310B

    We are using Fortinet F310b Internet appliance having AV,IPS/PDS,Firewall for our connectivity with outside world. We have two(2) nos. of 2Mbps(1:1) dedicated internet Lease Line and a 1.5Mbps WiMax Link. Entire network load is balance between 2 Lease Line and Wimax link is used for Backup link....

    S909920 pointsBadges:
  • ACL configuration

    hey, I want to create standard acl to allow all network to flow from 172.16.10.0 0.0.0.255 to 172.16.20.0 0.0.0.255 and 172.16.30.0 0.0.0.255 but i don’t want network to flow from 172.16.20.0 0.0.0.255 to 172.16.30.0 0.0.0.255 and vice versa, so I created the following acl, access-list standard...

    Bryan155 pointsBadges:
  • Deploying MMC consoles

    Can we deploy MMC consoles pre-populated to domain administrators start menus under administrative tools?

    NewnanIT1,110 pointsBadges:
  • UDP datagram don’t get the server

    I have implemented with c++, two small apps: an UDP client and an UDP server I place client in same machine than server. I start server, I start client, and I send data from client to 127.0.0.1... server receives OK now i do ipconfig and i get my local IP is 192.168.1.8 so I repeat by sending to...

    Thetonatiuh55 pointsBadges:
  • Active Directory LDAP, Set Custom Security Persmissions on 3 Attributes, not the whole class

    Fellow experts, I signed up just a few minutes ago, and hope to become a valuable contributor on this forum, however I need your expertise now... so put on your AD Schema hat... I have an object class "organizationalPerson" and three optional attributes in the class. I went into adsiedit and edited...

    This1guy20 pointsBadges:
  • Smoothwall School Guardian and New VLANs

    I was wondering if someone could help me with the specifics of how to set up a VLAN for the network using Schoolguardian. I do not have formal network training and so I feel very inadequate to tackle this project, but it just needs to be done and so any help would be very appreciated…Current...

    Techobi25 pointsBadges:
  • Do I have hackers?

    I have recently noted what appears to be "suspicious acitivity" on my computer.  In doing so, I went to the Control Panel, clicked on Internet Connections, then "View computers in your workgroup."  I was shocked and afraid when I discovered five (5) different computers.  Upon further research, I...

    Askapro10 pointsBadges:
  • Free IT Book: Development with the Force.com Platform

    These days enterprise applications are all the rage, with the ultimate question being: Who's going to build it? You know the saying, If you build it, they will come, and while I'm not quite sure how the second part of that saying fits, we have the resource to help you build it. Development with the...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following