Solved

Points for DTHConsulting

Posted on 2001-08-14
4
128 Views
Last Modified: 2010-04-27
0
Comment
Question by:ClassyLinks
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Expert Comment

by:EarWig
ID: 6392483
Try and ghost it.
0
 
LVL 7

Author Comment

by:ClassyLinks
ID: 6392583
Earwig...this question is to award points to DHT for a problem that is already solved.

BTW- in EE it is considered bad Nettiquette to lock up questions.  Instead post your suggestions as comments.  You will find you get much better interaction from other users.

8-)
0
 
LVL 14

Accepted Solution

by:
Don Thomson earned 25 total points
ID: 6400342
That must be for me - Sorry  - I missed it
0
 
LVL 7

Author Comment

by:ClassyLinks
ID: 6400563
NP....thanks for your help!
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

742 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question