Solved

t

Posted on 1997-06-28
1
242 Views
Last Modified: 2013-12-27
t
0
Comment
Question by:Brian122296
1 Comment
 
LVL 4

Accepted Solution

by:
rifty earned 0 total points
ID: 1542185
4 2?
Or 2 4 T?

:)

Rifty.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Although the iPhone has become an incredibly popular device in the cellular industry, the complex technology and software coordination required between Apple and the wireless carriers have seemed to leave many iPhone owners with technical issues. …
Troubleshooting Apple Desktops has its challenges just like any component of high technology and innovation. Some hardware issues within Apple Desktops, are fairly simple to resolve and have straight-forward procedures. With other hardware probl…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now