Questions & Answers
Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows 10, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
-
My ex-husband is accessing my laptop remotely
My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...
Last updated: -
Facebook, email and phone hacked
Any info greatly appreciated. I know I am going to have to pay an IT person for any specific help but someone on here may be able to assist. So 2 weeks ago my phone email and FB was hacked. I first noticed when i couldn't log into my email account, I sent a forgotten password link to a different...
Last updated: -
Is connecting my laptop to Wi-Fi extender with ethernet cable same as connecting it to the router?
Is connecting my laptop to Wi-Fi extender with ethernet cable same as connecting it to the router (with ethernet cable as well) or is it gonna give me worse connection if no is there any difference? If there is what is it?
Last updated: -
How to write my name in alphanumeric letters?
Last updated: -
How to prevent phone eavesdropping
How do I prevent eavesdropping from a handphone if somebody knows my handphone number?
Last updated: -
How to configure alerting for Linux servers in the tool. Can we get the document or the steps?
Last updated: -
Hello, My email has frozen, and I am unable to get access. I kept receiving a message to say my inbox is almost full, I tried to delete some items, but it has stopped working. Can you help please?
-
There is no method to recover .OST file. But my friend said to me about transformation OST to PST. Someone knows how to do it?
Last updated: -
What is the use of OVRDBF command and when can I use it in CL program?
Last updated: -
How can I change my password for ComputerWeekly?
Does anyone know how I can change my password for ComputerWeekly?
-
How to know if AS/400 data is journaling properly?
How we can know that Data is Journaling proparly or not?
Last updated: -
If my VMware vSphere Client gets a power failure, or dip, does this affect all the ESI hosts, including the backup hosts.
Last updated: -
Can someone please explain the concept of the TCP/IP model?
Last updated: -
Can I recover a deleted Checkpoint in Hyper-V Manager?
I deleted a checkpoint using Hyper-V Manager. The files no longer reside in the repository folder. Can this checkpoint be recovered?
Last updated: -
As CRTJVAPGM is no longer supported (with V7R2), how should we create a Java program? I have some Java programs written in eclipse tool. My RPGLE procedures invoke the java programs. I want to debug the Java program, and hence like to create Java program in iSeries. Is that possible?
-
List of approved hand tools to be used inside of data centers
Is there a list of approved hand tools that should be used inside of a data center?
Last updated: -
Set of tapes backed up in BRMS
I have to set a control group which performs the below: I have a set of 10 lib to be backed up by BRMS in a volume. But next set of 10 tapes should be backed up in another random volume in BRMS. How do I achieve this?
-
Include original email in NDR – just like Gmail.
Hi, is there any way that Exchange can associate and include the original sent email with the NDR that has been returned? A working example of this is with Gmail, if you send an email to a non-existent address, the resulting NDR will have the original email underneath the non-delivery text....
Last updated: -
Problem: I am trying to access a data area on a library that is in an iASP partition via a java program. I am using jt400 to create a jdbc connection to access the said data area. then getcharacterdataarea.class to basically access the data area, with the filepath paramater pointed to the iASP...
-
Master Planning Capacity Management
I need specific training resources for master planning capacity management. Can someone point me in the right direction?