[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

There service provider (unfortunately) is GoDaddy (Cpanel). He says that a lot of his emails don't get to the recipient. He gets no bounce messages. He says the recipients have checked their junk mail folder. How do you trace a problem like this?
1
OWASP: Forgery and Phishing
LVL 12
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

Is there an ISO standard (eg: ISO27001) or  Terms of Reference
that recommends the best practice for IT Security & CISO
reporting structure.

https://www.securityroundtable.org/whats-the-best-reporting-structure-for-the-ciso/
Above link gives various suggestions but will need something authoritative like
ISO standard or Terms of Reference to support
0
It seems like legal departments have been getting more and more picky about EULA agreements.
Vendors are reluctant to change their boiler plate. The IT people are getting ulcers waiting for
the EULA to be agreed to and signed off. Two questions:

Is there a reason legal departments seem to be becoming more persnickety about EULA terms
for enterprise software?

Has anyone on EE found a way to more efficiently work with their legal department and vendors?
0
Need better solution for backing up data to a network drive.  Powershell or batch script is ok, just the logging is less than desired.  Needs to be able to run on Windows server OS and handle large amounts of data (2 TB - 8 TB).  

FreeFileSync and SyncToy were great applications that worked well for this simple purpose.  Make a folder pair and configure the kind of sync between the folders.  I am fine doing in a script, just do enjoy the ease of use there.
0
error "you are not authorized to do message tracking"
I added myself to local domain admins group in directory, but still got the same error.

is that something do check in mtstore.nsf ??
0
Linux. I need to set up a script that I can run via cron in the middle of every night to copy / back up specific folders into another directory. I want all folders, files and permissions and attributes copied. The goal is to have a 24 hour old copy that I can restore in case a user screws up their files. Example:

/usr/home/thisuser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/thisotheruser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/andanotheruser/web_master would be copied / backed up to /usr/home/mainuser

Each night, the copy / back up would overwrite the one from 24 hours ago.

How do I set this script up, and what type of file extension should the script be?
0
I'd like to come up with some clever tagline or rhyme for having our users reboot on Thursday.  After we push security updates to endpoints, I want the users to reboot, so I'd like a clever tagline.  For example, if I wanted my users to drink more water, I could say something like, "It's Thirsty Thursday, please make sure you drink plenty of water today!"  Or if I wanted my users to attend a meeting on Tuesday, "It's Technology Tuesday, please come to our technology meeting today!"

Can someone come up with a clever idea because "Reboot Thursday" or "Restart Thursday" just doesn't have a good ring to it!
0
We are restructuring the ownership of documents with new staff/teams being formed.

We currently have IT Applications teams (who run IT Quality Management & still running it), IT Security Governance
(new team), IT Infra Ops.

In general practice (or commonly adopted out there), which team or person owns the 4 documents below:
1. IT Application Delivery Framework :  applications PM, IT Security governance, IT Quality Managemt, or ?
2. Vendor & Contract Management Framework : applications team, IT Security governance, IT Procurement or ?
     (a mix of IT applications, infra, security vendors but most of the vendors are applications vendors)
3. Project Management Methodology : applications PM, IT Quality Management, IT Security governance or ?
4. DR Plan : We don't have a DR team;  so hv to choose betw IT Ops, applications team, IT Security governance or ?

Any authoritative references (eg: NIST, big four consulting firms papers) will be helpful.
0
enable message disclaimers in Domino server side and change the desclaimer message.

I don't want to use client policy for message desclaimer..
0
what exactly is the difference between lotus notes/domino database move vs user move to another server
when should be it be used.
my agenda is to move a user from from 1 serverA to serverB so I can accumulate space on serverA.

and when deleting got a message
after a user move when trying to approve for mail file deletion,
 Both the signer and the author of this request must have Delete Document privileges in the Domino Directory.
I am a member of "local domain admins" in domino directory and this "local domain admins" group has delete document privileges on names.nsf
0
Cloud as a Security Delivery Platform for MSSPs
Cloud as a Security Delivery Platform for MSSPs

Every Managed Security Service Provider (MSSP) needs a platform to deliver effective and efficient security-as-a-service to their customers. Scale, elasticity and profitability are a few of the many features that a Cloud platform offers. View our on-demand webinar to learn more!

Hi! I have Windows 10 professional installed on a laptop. I used admin account to install a software on the laptop, and want to let people use it under standard account (without admin permission). However, when I login with standard account and double click the executable, I am always asked for admin user name and password, such that a standard account wouldn't able to execute it.

I made the following attempt, but didn't work: change the file folder of the installed software to give the specific standard user full control, and find the related folder in registry then give full control to the specified user.

I notice that there is third party tool like this that may make it work: http://www.robotronic.de/runasspcEn.html 
However, I am wondering: is there native way in Windows 10 to allow standard user to run this application?

Thank you!
0
Dear Experts

We are solution implementer like crm application and even server hosting for those companies who require us to host and maintain servers. Recently few of clients are mentioning about soc2 compliance. Can you please help me understand with respect to solution implementation point of view what does soc2 compliance means and how does it help our business, thanks in advance.
0
Does anyone has any data for acceptable acoustic decibel inside the server room, and in the regular office?
0
I would like to resurrect an old question since it is about four years old. I am looking for a good network system inventory tool that doesn't break the bank. I really like the PDQ inventory tool however the $500 /year price mark makes it difficult for a small 20 user firm like us. I could probably swallow half that.
I have looked into the original post at: https://www.experts-exchange.com/questions/28570579/Best-and-Free-tool-for-Network-PC's-hardware-software-inventory.html
and the Spiceworks doesn't seem to work for us for some reason.
Are there any other suggestions that are newer products?
0
Can someone recommend noise cancelling headphones for the server room?  Should be compatible with Android USB-C.  
I used aviation-grade noise cancelling headphones long time ago.  Forgot the model.  And that was a landline in my cage.  
Thanks.
0
Hi guys, non-technical question here.
 Does anyone have any format or an example for the new hire justification.  Instead of asking management "hey can I hire someone to help me, I am working 12 hrs per day"
Maybe someone has previous example or a set format showing the following things or similar:

1) Justify why you need help.
2) Explain your current situation, hours and work load
3) Tell how a new hire/resource will benefit the company, for example, improved revenue by 5%, completion of projects 25% faster, improved customer satisfaction rating, etc.
4) Justify the cost and how the proceeds will offset that person.
5) Show the long term strategy of this person and how this person fits into the organization
6) Show your new role on you being the manager and how this will free up your time for more strategic goals
7) Finally, show how this new hire aligns with company strategy and direction and how your department will be able to meet or exceed those goals.

Appreciate any help/advice.
0
Hi Experts,
the print screen key stopped working on my pc.
any suggestion?
preferably something that does not require restarting my pc...
thanks in advance.
fyi- I'm connected remotely thru gotomypc, however pass special keys to host is checked off.
0
In ubuntu 16:
it's added a wrong file in /etc/sudores.d/ folder.
I can't do sudo form any user. I can't do any thing.
How can I remove this file from folder sudores.d.
can I remove file if I login in as recover mode?

HELP
0
Can you see if reasonable to have 2-post rack this way?  Attached.  Any other pros/cons please?  Designing server room/lab.

 rm33
0
Exploring ASP.NET Core: Fundamentals
LVL 12
Exploring ASP.NET Core: Fundamentals

Learn to build web apps and services, IoT apps, and mobile backends by covering the fundamentals of ASP.NET Core and  exploring the core foundations for app libraries.

Hi Experts,

I have been approached by a group of 8 companies to provide for them an information exchange portal. Here they would store files, documents and posts, organized by category and sub category, and a bulletin board with latest news and events posted by the users.

The companies indicated that SharePoint wont’t work because the each have their own domain, and they need this solution to be independent from any of them. They also want to restrict each company to 3 users, and if another company wants to join, the admin of 3 other companies need to approve.

My question is - would this be a development project (I'm a PHP developer); or a sourcing project, where there is something pre-made that can be adjusted? What would a  bull park cost be for this?

Thank you.
0
I have a user who is running WIN 7 IE 11.  From time-to-time when they browse to a website that requires them to supply their domain credentials the dialogue box that generates contains credentials from a previous user and they must always select "Use another account".  I've reviewed Windows Credentials Manager but that doesn't contain the account to remove.  What we've noticed is that there's no Windows profile for the previous user.  Its as if they remotely accessed the PC (possibly someone from the local Helpdesk), supplied their credentials, and now IE has them cached somewhere - I'm just not sure where.

My next step was to review the registry and see what pops up.

Any thoughts?
0
Please provide me with guides on using System Center Configuration Manager 2016 (SCCM)  to deploy software such as Chrome, Acrobat Reader, & 7-Zip to clients.
0
trying to reach to the companyname.com, using ping companyname.com

This domain is hosted by goddady.com

it was hosted my email myname@companyname.com
now I can send but cannot receive any more.  bouncing back..
Cannot resolve using nslookup either.
email hosted outlook.office365.com

The error is "Domain unavailable"
The domain is not expired (it expires in 2019)
however non-pingable and cannot resolve..
What could be an issue?  Please help troubleshoot..
0
Linux admin supporting Macs.  I have a good Linux helpdesk candidate that will be require to support Macs in the future as well.  Would that be a huge knowledge curve for a good Linux admin to support Macs?  He claims almost 0% mac knowledge.
I know Linux guys very intuitive supporting Networking stuff (Cisco, etc.)  Not sure about Mac OS tho.
0
When taking on a new account, how do you transfer 365 from one MSP to another or do i need to migrate the accounts? Customer does not control the 365 account.
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.