Solved

Question only for Fargo

Posted on 1998-10-15
2
203 Views
Last Modified: 2013-11-20
This question should be answered only by Fargo, because he helped me in a problem, but there was also a proposed answer , that was very good, so I want to give the points also to him.

Bye,
atari
0
Comment
Question by:atari
2 Comments
 
LVL 1

Accepted Solution

by:
Fargo earned 300 total points
ID: 1323310
Thanx, atari :)
I didn't expect you to give mi these points, bacause of the misunderstanding we had. I'm really happy we got over that.
See you and thank you again!

Fargo :))
0
 
LVL 1

Author Comment

by:atari
ID: 1323311
Hope you help me again, if I have some other questions in the future !

Bye,
atari
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
substring method in java 1 130
either24  challenge 19 101
matchUp  challenge 6 69
how to use laptop or pad camera in vb.net windows application 2 86
Introduction: Finishing the grid – keyboard support for arrow keys to manoeuvre, entering the numbers.  The PreTranslateMessage function is to be used to intercept and respond to keyboard events. Continuing from the fourth article about sudoku. …
If you use Adobe Reader X it is possible you can't open OLE PDF documents in the standard. The reason is the 'save box mode' in adobe reader X. Many people think the protected Mode of adobe reader x is only to stop the write access. But this fe…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question