Solved

Question for B2pi

Posted on 1998-07-27
4
154 Views
Last Modified: 2010-03-05
This is to award you some points for your help on the following question http://www.experts-exchange.com/jsp/qShow.jsp?ta=perl&qid=10066458 
0
Comment
Question by:rrivers
  • 4
4 Comments
 
LVL 5

Accepted Solution

by:
b2pi earned 150 total points
ID: 1208798
Thanks
0
 
LVL 5

Expert Comment

by:b2pi
ID: 1208799
rrivers, it might be considered polite to grade this and ozo's question.

Cheers.
0
 
LVL 5

Expert Comment

by:b2pi
ID: 1208800
Please answer this and ozo's question?
0
 
LVL 5

Expert Comment

by:b2pi
ID: 1208801
Is there a reason you haven't graded this and ozo's question?
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Strange perl issue 6 128
transpose into pipe delemited 8 69
Edit Odbc.ini using perl module 2 84
File Find regex problem 4 62
Email validation in proper way is  very important validation required in any web pages. This code is self explainable except that Regular Expression which I used for pattern matching. I originally published as a thread on my website : http://www…
I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question