Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, Cisco, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows 10, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I am using an SQL statement to insert into a file. I am doing some sub-stringing on a record then inserting into another file. I am getting a LVLCHK error on the output file. How can I use OVRDBF in my CL to insert to my output file? My file PROFILE has the data and PROFILE2 is my output file and...
I would like to create a control group where a set of 10 libraries will be saved on a tape which BRMS picks randomly. And the second set of 10 libraries needs to be saved in another random tape. Intention is not to save all 20 lib together, How to accomplish this. Could you please help?
Hi, I have a file with some duplicate records and I want to filter them using wrkqry can anyone please advise how to remove duplicate records using this? I am comparing three fields lets say F1,F2,F3 and comparing them with each other for similar records and for field 4 lets say it's f4 i want to...
How can I bump him off once and for all. He knows my passwords but even more he has studied this area of hacking? Can I take him to court and what will the govt do for if anything? Yes, I do have evidence.
I copied several music CDs to my computer that have .pdi extension. I cannot play the files any longer. Can I convert these files back to music files that I can play?
Hello guys - I fell into a PC problem. I deleted a group folder then when I boot I got this message: tgrub 1.5 stage grub 15 error. The bad news for this problem is I don't have a USB and my DVD is crashed. Please help me and thank you.
What are WAN services?
I have a single PC, NO NETWORK, NIC disabled etc. I am on Dialup. I have nearly everything blocked in and out in windows firewall. Can I block the entries that are current open that say: Network Discovery (WSD EventsSecure-Out) + all the others titled Network Discovery? Thanks.
Recently, I was sent a very eerie email: At first, I thought it was spam, and just for fun I wanted to find out who it was, but when I jokingly tried to log in as the account who sent me the email, I noticed that it was created using my phone number and alternate email. So, via that I actually...
How can I know if my phone has been hacked?
So, would anyone happen to know how I could lock my Google Chrome profile? Basically I want to enter a password to enter my profile. Is that possible? Cannot find a way currently. I'm on Windows 10.
Yesterday, I tried to install a language pack on my Office 2016. But my installation keeps failing every time. All I see is this error message: Couldn't stream office. Sorry we can't find the required file. Please check that the installation source is reachable, then try again. Error code: 30812-4....
I have a situation in my project, we have to retrieve values in array using pointer. I was able to get the pointer value in my Called program with the array being in working-storage section, In my calling program, I'm able to retrieve the pointer value and have defined the array in LINKAGE section...
how to resolve the "Object variable not set" error in lotus script?
I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.
I saw sent emails replying to personal ads on Craigslist on my boyfriend's Gmail. He claims that he was hacked and didn't send them. I'm the emails was an attached private picture if himself and his new number he barely got. With a message saying "hey baby up for some sexting fun" etc. It was an...
This girl I went out with once told me she's hacked me. She said she hacked my email and blocked my (scholarship) applications from being sent. How do I know for sure that this is true. I also have been receiving weird vague emails. And she said those emails means I'm being hacked. I asked a friend...
What programs do I need to hack? Can I hack a Twitter using my phone?
How can I find out who hacked my phone?
I just found out that my phone was hacked. How do I find out who it was?