• Password and email name remains after removal

    My email name and password returns after I have signed out. I do it several times but it remains even when I return. Why is this happening? This happens to several students also.

    aimulibrary5 pointsBadges:
  • Creating HTTP authentication on a Lotus Domino server

    I've been trying to an Android application that would be capable of reading different amounts of data from a Lotus Notes database. I've already started to create the a page to test the HTTP authentication and have run into some problems. Here's my code: public void GoAuth(View v){ final String...

    ITKE346,430 pointsBadges:
  • How to retrieve a password

    How do I retrieve my MSN password?

    himmelblau4120 pointsBadges:
  • Physical Security

    Is it advisable to have one key open all doors in IT that does not contain servers?

    WJacobs25 pointsBadges:
  • Can I enable pinging on Windows Server firewall?

    I've recently installed Windows Server 2008 on one of my servers as I'm able to to connect through Remote Desktop but I'm having trouble pinging. Would I have to open a special port on my firewall to be able to ping my server?

    ITKE346,430 pointsBadges:
  • Changing password on my account

    How can I change the password on my account?

    purpleflower5 pointsBadges:
  • Script failing in Firefox

    I have a slideshow script that works fine in IE and Chrome, but is failing in Firefox. Note that it works fine in Firefox when viewed on my local machine, but is failing when viewed from the server. The site is www.marsandvenusthedogsgreetingcards.com. Please help me figure out why it is failing...

    sroonet10 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • How to extract the complete ACL in a Lotus Notes document

    My partner and I are looking for a way to save a complete user list access privileges for a specific Lotus Notes document. We already know that we can get the database-level ACL's from catalog.nsf but not the document-level. How can we attain the complete ACL of every user in a document? Any help...

    ITKE346,430 pointsBadges:
  • Securing Internet only passwords in Lotus Domino 8.5.3

    We have a secondary address book that we use to authenticate Web only users to a Domino Application. We would like to apply best security practices with the next update of our application.  These would include password expiration, password strength (specific length and character requirements IAW...

    JAVUVA5 pointsBadges:
  • Can’t log in to my computer

    On 1 computer only users cannot log in. Username is typed and password gets typed (it doesn't show anything being typed for password) however once enter is pressed, nothing happens. Several users have tried on the one PC as all other PCs work  Can I delete app data for it?  I don't know how.

    AaronBreville5 pointsBadges:
  • Can’t connect to proxy server

    Unable to connect to proxy server. What do I do to fix it?

    shanville5 pointsBadges:
  • Call centers and ISO 9000 certification

    Are there case studies available about the benefit of ISO 9000 certification in call centers?

    skraybill5 pointsBadges:
  • Spying on a mobile phone

    Is there any way to spy on a phone other than installing a spy software on the mobile phone? And if not is there a possibility that this could happen? Please reply.

    moustapha725 pointsBadges:
  • Applying encryption to mobile devices

    How feasible is it to apply encryption to organizational data on mobile devices such as email and other organizational applications? We have a BYOD policy, the question is are we facing any law issues regarding this need mainly in the US and Germany. Thanks.

    OfirNissim5 pointsBadges:
  • Using iPad 2 to Remote Desktop

    Has anyone tried getting an iPad 2 to do remote desktop on a Windows XP pc, through a Cisco Pix (ver.6) router? I know Cisco doesn't have an iPad client for the Pix because it's not ASA.

    JZDoug5 pointsBadges:
  • SFTP in AS/400

    Is SFTP available in AS/400 with standard configuration? If yes, any steps to set it up?

    TonySW10 pointsBadges:
  • Need to recover forgotten Outlook password

    How to recover forgotten Outlook password? Need to recover passwords to Microsoft Outlook accounts in local installation on PC.

    bob14white90 pointsBadges:
  • Disk Wipe for Enterprise

    Hi, I'm from the IT Dept of a large size organization. We want to have a solution where we can wipe the hard disk of end users with below conditions: When end users quit the organization When end users do not connect to our organization for more than 90 days When end users laptop is stolen and is...

    AmitC198015 pointsBadges:
  • Trace Number ACH

    Is there a way to research a trace number to access the beneficiary of a multi-layered fraud where the names of end user is an alias? Such as actual subscriber information.

    rhodesma5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following