Join us for the next Microsoft Live Chat on Tuesday, June 1 at 11 am ET. SharePoint 2010 allows your company to quickly respond to changing business needs. Your people can share ideas and expertise, create custom solutions for specific needs and find the right business information to drive your business forward. Sign up for [...]
Answer Question | October 31, 2011 2:18 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, ITKE, ITKE Community, Linux, Lotus, Microsoft Live Chat, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Hi Guys, just want to know if it is possible to use Secure FTP on AS400 rather than FTP. What is currently practice at my side is AS400 will FTP files to the windows server and they now want us to use Secure FTP. Is there anyway to go around it?
Answer Question | June 6, 2010 6:50 AM
AS/400, AS400 Job Status, FTP, Secure FTP, SSH
I have an unusual problem with an RPGLE program. This is called inside of other programs that were originally a package software. The file is multi-membered and I am not able to remove locks on the member even when I exit the program, use other programs, etc. I am on an iSeries and commitment control [...]
Answer Question | May 27, 2010 9:06 PM
File locks, iSeries, iSeries File Members, RPGLE
We are installing a package whose vendor (for whatever reason) wants the “user” created to connect to the data to have User ID # 248, but that ID # isa already in use. How do I find what user profile that number belongs to without having to search through all the user profiles?
Answer Question | May 25, 2010 1:22 PM
User Management, User profiles, V5R4
I created a macro and it is saved in personal.xls. How can I make this macro available to other users? I want to be able to give them the ability to run the macro – they do not need to modify it.
Answer Question | May 25, 2010 12:11 PM
Excel 2007, Microsoft Excel macros, User access, XLS
What could be the cause of 5 of my Cisco ASA 5505 to lock up. During this time Internet is blocked, you can’t ping it. Once you reload the asa via console cable or powercycle, connectivity is restore. They have the latest IOS and ASA software. They all have static ips and connected to Cisco [...]
Answer Question | May 24, 2010 9:43 PM
Cisco, Cisco ASA, Cisco ASA 5505, Cisco security
what is the wep key for wlan (NOKIA E63)
Answer Question | July 6, 2010 4:53 AM
WEP, WEP Key, WLAN
What path is taken to disable the users the ability to edit the registry?
Answer Question | May 22, 2010 8:18 PM
AD, Group Policy, User Permissions, Windows Server 2003
Which companies should i contact to solicit info about their willingness to provide outsourced SOC services to a large company?
Answer Question | May 28, 2010 6:57 PM
Security, Security management, SOC
I need assistance to make a correction to the Subject Alternate Names (SAN) in my UCC SSL. I hope that if I provide the network topology, an expert will be able to recommend the correct names for the SANs. The internet domain name is distance.com and the internal domain name is depth. The server name [...]
Answer Question | May 21, 2010 6:10 PM
Exchange 2007, SAN, SSL, SSL Exchange, UCC
I have setup our firewall to NAT the inside IPs to an external IP address. Is there a reason I should or should not register this NAT IP address to a DNS name?
Answer Question | August 19, 2010 7:47 PM
DNS, Firewalls, IP address, NAT
I’m looking for recommendations someone who has used similar services – a Security auditing vendor for SaaS applications and a SAS-70 vendor in DC/MD/VA area for a small company.
Answer Question | May 20, 2010 7:27 PM
SaaS, SAS 70, SAS 70 Type II audit vendor, Security Audit, Security Auditor
I’d like to (hopefully) find a single software solution that does: - traditional backup/restore to a central server of other systems on the LAN - allows you to image for bare-metal restores - allows you to image to virtualizable machines Tried out Symantec’s System Recovery and had a horrible experience with the product and their [...]
Answer Question | June 15, 2010 2:34 PM
LAN, Server Centralization, Symantec, Virtualization, Virtualization in 2010
Hi! [strong]Detailed question below:[/strong] [strong]Introduction[/strong] A custom DLP (http://en.wikipedia.org/wiki/Data_Loss_Prevention) solution installed to: 1. monitor all emails sent by emplyees 2. save these emails in a database for audit, to enforce corporate security policy [strong]Implementation[/strong] MS Exchange 2003 is configured to send a copy of every message to firstname.lastname@example.org. DLP software at smtp.monitoring.local listens 25 port and [...]
Answer Question | May 20, 2010 8:26 AM
Data Loss Prevention, Delivery Status Notification, Exchange 2003, Exchange 2003 error messages
we have our own time attendance software how can we integrate it with any biometric device availabel in market
Answer Question | October 20, 2010 6:08 AM
Biometrics, Integration, Windows 2000
I am setting up spare firewall on an old PIX 535. I reset the box to factory default, assign the inside interfact an IP address and use a cross-over cable to for a laptop to connet to PIX. The problem is I am not able to ping the firewall from the laptop vise versa. There is [...]
Answer Question | August 19, 2010 7:18 PM
Cisco PIX, Firewall management, Firewalls, PIX, PIX 535
Im using a Dos Program in Windows Xp.Im trying to printout staffs from the Dos Program using LPT1 but it doesnt print..Any help regarding this please?
Answer Question | June 5, 2010 12:17 AM
DOS, dos printing, DOS program, samsung, Windows XP
I know there is a lot of buzz around cloud computing, but the weaknesses seem to get no press. My greatest concerns are encryption and key management. What are the other downsides you’ve discovered?
Answer Question | December 16, 2011 2:03 PM
Cloud Computing in 2010, Encryption, Encryption key management
My Objectives: 1. INSIDE can access OFFICE (mail, application, dns) and INTERNET 2. DMZ can communicate with OFFICE and INTERNET 3. INSIDE and DMZ can access each other 4. OFFICE can access DMZ especially http 5. OFFICE can access INSIDE’s web . thank you ,
Answer Question | May 18, 2010 1:33 AM
Adaptive Security Appliances, Cisco ASA 5520, Cisco ASA 5520 Configuration, DMZ, LAN Security
Plz tell me how i can access the PF from IFS file system using QSH..thanks
Answer Question | May 14, 2010 11:42 AM
IBM i, IFS, Packet filtering, QSH, V6R1