?
Solved

Test

Posted on 1998-10-06
4
Medium Priority
?
135 Views
Last Modified: 2010-04-06
How do I create and delete users i Exchange Server, and associate them with users in windows nt ? (via delphi - programming, and by not using doscommand "admin")
0
Comment
Question by:d7ih
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Expert Comment

by:Gerhard100198
ID: 1342025
OK, I've tested my brain and it still works. Can I now collect the two hundred points please.
0
 

Author Comment

by:d7ih
ID: 1342026
Edited text of question
0
 

Author Comment

by:d7ih
ID: 1342027
I have changed my ? (sorry)
0
 

Accepted Solution

by:
d7cs earned 800 total points
ID: 1342028
You can use the Microsoft Exchange Server 5.5 API call, wich can be found in the Ressource Kit for Microsoft Exchange Server 5.5.
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question