1. Lotus Domino lnmibdll.dll Error During Upgrade

    Posted on in System Administration

    Lotus Notes Logo I was involved in a project to apply a maintenance release to an existing Lotus Domino installation running on Windows Server 2003. The goal was to upgrade the server from version 6.5.5 to 6.5.6. During the upgrade process, the installer checks the version of Domino that …

  2. Security Policies

    Posted on in information_systems

    It can be said that security policies are living documents that must be frequently reviewed and revised. As organizations evolve, their security needs evolve as well. Policies written before the evolution of the organization may not adequately reflect newly developed needs. Therefore, it should be considered standard procedure to review …

  3. Basic Network Hardware Planning

    Posted on in Networking

    No matter how small, all network installations go through an initial planning phase before implementation. The new network administrator must take many factors into consideration when planning a network. Most importantly, the administrator must understand the required capacity, compatibility, and flexibility of the new network. Gathering this information requires a …

  4. Increase Simultaneous VPN Logins on Cisco ASA

    Posted on in Networking

    In most VPN setups, each VPN user is given unique login credentials. Very rarely, you might run into a situation where a group of individuals is going to be sharing a set of credentials. For example, you might assign VPN credentials to another company for temporary access to part of …

  5. Suggest Tags WordPress Plugin

    Posted on in Programming

    Fomenteu la lectura\<br /> Photograph by Marc Garrido i PuigFor the last couple of years, I've used the Tag Suggest Thing WordPress plugin to recommend tags for my posts based on the post content. Beginning with WordPress 2.5, that plugin started to have problems interacting with the WordPress administration pages. In August 2009, Yahoo! announced that they would …

  6. Cisco Break Sequence for Outgoing Telnet and SSH Sessions

    Posted on in Networking

    There are a few network devices out there that allow you to connect, but don't give you an option to disconnect. For example, you might be stuck at a password prompt, but have no authentication details. Most telnet clients allow you to break these connections with the ^] (control-]) command. <acronym …

  7. BIP / BTOP Filing Extension

    Posted on in Information Systems

    American Recovery and Reinvestment Act (ARRA) LogoGood news today for service providers planning to file an electronic application for either the Broadband Initiatives Program (BIP) or Broadband Technology Opportunities Program (BTOP). The deadline for electronic applications has been extended from 5 p.m. ET on August 14, 2009 to 5 p.m. Eastern Time (ET) on …

  8. Spreadsheets to Databases: Exporting and Importing

    Posted on in Programming

    In the early stages of an organization, it is common for most data to be stored in spreadsheets. Spreadsheet applications are common and easily understood by most small business people. Unfortunately, spreadsheets become burdensome when tasks move beyond calculations and into querying (Churcher, 2007). Fortunately, databases are designed with querying …

  9. Getting Ready to Repackage

    Posted on in Programming

    Hard Disk (Internal)Having built an entire application, the time has come to consider the possibility of redistributing the application for a wider audience. Since the original application was designed to meet the needs of a specific business, one of the primary considerations will be how the application must be modified to meet …

  10. Database Basics

    Posted on in Programming

    The widespread use of computers has made database interaction a daily occurrence. Although databases can be large and complex, they are generally defined by basic terms that come together to create the larger system. Understanding these database basics helps users understand the underlying structure of the system and how they …

  11. The Joy of Modularization

    Posted on in Programming

    orbitModern programs are not developed as singular, autonomous applications. Programmers have learned that many different programs use the same routines over and over again. By developing these routines as independent modules or libraries, programmers gain the advantage of quickly adding functionality to their programs. Modularization allows the detail of often-repeated …

  12. It's Time To Download Firefox 3.5.2

    Posted on in Software

    Spread Firefox Affiliate ButtonFirefox 3.5.2 was released by the Mozilla Project today. This release is mainly a security fix and all users are advised to download the new update as soon as possible. Please take the time to download this important security update today.

    A list of security fixes is available …

Slaptijack's Koding Kraken