• moving program code between lpars.

    I was wondering as to the best way to enable my operations staff to move program code from a test lpar to the production lpar. Because of audit requirements I can't have the programers able to move the code themselves.

    Mstallings0 pointsBadges:
  • Need a way to audit ANY change access to selected database files.

    A client has had a request from auditors that they should be able to audit every change to three critical database files when I am remotely signed on to their ISeries. They would want to turn on and off the auditing so that it is NOT on all day while being hit by 100's of customers. I vaguely...

    Harkabus10 pointsBadges:
  • Lost QSECOFR Password and DST QSECOFR is disabled.

    I have a 170 at V5R1 and I have lost the QSECOFR password, and the DST QSECOFR has been disabled. I do have access to other DST profiles and can access SST, which allow me to modify the MI code if I wish. Anybody have any suggestions as to how I can regain access to this box, in any way, without...

    Mbeland0 pointsBadges:
  • AS400 Security

    We need to limit access to the command line from our users. How do we limit the command line length ? Many of the customized menus to a/r, o/e functions have the full command line. We need to avoid modifying each menu source.

    Danacu0 pointsBadges:
  • Forefront: All-in-one or best-of-breed?

    I recently talked to two Forefront customers, who had a lot of praise for Forefront's all-in-one management console and its protection against external threats.  Any Forefront users out there? What do you think? Do you agree? What have been some of your challenges? Also: what do you consider to...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Filtering Crystal Report Groups

    In my Crystal Report, I have my results grouped by Process, then by Risk, then by Control. Under each Control, there are several Tests, which can be either Effective or Ineffective. If ALL tests under a specific Risk are Effective, I want to filter out the Risk and its related Controls/Tests. If...

    Jcaballero5 pointsBadges:
  • how to secure iSeries Files from unauthorized SQL & FTP commands from a windows application.

    Any ideas on how to lock users out of the capability to run remote ODBC/SQL/FTP commands that update iSeries production data from within a PC application? BPCS security is menu/program specific instead of by file.

    OneandOnly0 pointsBadges:
  • The most-watched IT questions this week: March 9, 2010

    1. A member asks how they can apply GPOs to non-domain computers to make sure they don’t get on the corporate domain, and MrDenny, Technochic, Denwood, and SiThu help with a solution. 2. A member asks about business intelligence in a cloud environment. 3. A SQL Server reader asks how to monitor...

    Michael Morisy7,943 pointsBadges:
  • DHCP Permission issues in my domain

    I have a number of dhcp servers installed on DCs in various offices. I need to assign a local admin in one of the remote offices permission to manage the dhcp server in his site not all dhcp servers. If I add admin to the default local dhcp administrator group in ADUC I believe he will have access...

    JimmyIT1,725 pointsBadges:
  • Reboot Juniper Firewall in Cluster

    Can anyone tell me how to reboot a Juniper Firewall that is in a cluster netwrok. Preferable using the CLI. I appreciate any input, Thank you so much.

    Dscott5 pointsBadges:
  • AS400 SSL with Vista

    Hello, When trying to download the certificate SSL in operation navigator to a PC using Vista it keeps on telling me the password is incorrect. This only happens in Vista PCs. Does any one know what I am missing?

    Magda5 pointsBadges:
  • Cisco ASA DMZ with DynDNS Host

    Hello everbody, I have set-up my Asa with three VLans (outisde, inside and a DMZ), nearly the same configuration as used in the Cisco Documentation. I have managed to create the NAT and Access rules so I can communicate between the inside and the dmz. But I am not able to manage to get access from...

    Maddock10 pointsBadges:
  • Sharepoint LDAP authentication

    Hi , I need to test Sharepoint with sun ldap authentication, I have found that entries about the ldap server have to be added to sharepoint configuration files, I have found many articles on this but all are related to ldap server with anonymous binding (anonymous ldap browsing) , I have an...

    HXX5 pointsBadges:
  • Open Mailbox without permission

    I would like to find out how can I know whether mail administrator open other user mailbox via mail console withhout permission from the user.

    Ytlow30 pointsBadges:
  • Websense

    Hi, In my present organisation the IT policy states that inappropriate and malicious sites will be blocked. In my last organistation I never came across any such site blocking system.So, I have few queries regarding this. I hope those working for companies where site blocking is present would have...

    Meetmeonline210 pointsBadges:
  • Getting authorization to service a job.

    I'm trying to debug a bath program. But, I don't have authority to the job. Here's the error mesage:                         Additional Message Information                       ...

    Dcantwell465 pointsBadges:
  • how about MatriXay?

    I remember seeing MatriXay tool some years ago and it was pretty awesome. And today I was reading the presentation at Blackhat 2006 of MatriXay and found that MatriXay has released 3.6 version. Does anyone know it better? how about it comparing with others?

    Ivyz071710 pointsBadges:
  • Help with Exchange 2003 SMTP virtual servers, connectors, and TLS security.

    I’m having problems coming up with the right Exchange SMTP Virtual Server and SMTP connector configuration for our network, after we decom two of our Borderware routers. I’ll try to explain it as simple as possible: - We have all our internal email filtered, and this will be sent to an Exchange...

    Nevermore92955 pointsBadges:
  • Block user on local network

    How i can block the user on local network to asses the workgroup

    Rizham4565 pointsBadges:
  • HIPAA protection

    What functionality is currently available in BW to provide HIPAA required protection of data?

    Bollast5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following