Solved

points for dogztar

Posted on 2002-03-12
3
301 Views
Last Modified: 2010-08-05
hey dogztar here is your 300 pts of the 500  oh by the way is all the tomb radier games only support 4mb cards???the other 200 pts will be posted later on tonight if you get these
0
Comment
Question by:bombays
  • 2
3 Comments
 
LVL 16

Accepted Solution

by:
Kyle Schroeder earned 300 total points
ID: 6860609
bombays:

Its really not necessary to use up more of your points...the standard point award here at EE is 300 points for a very difficult question; yours was certainly not very difficult.  It didn't require any troubleshooting, problem research, etc.  Award the points instead to 1175089 or pjknibbs who provided basically the same information as I did 12 and 6 hours earlier, respectfully.

-dog*

0
 

Author Comment

by:bombays
ID: 6861419
no worries i am going to give all of you the points
0
 
LVL 16

Expert Comment

by:Kyle Schroeder
ID: 6861486
Well you can't change it now...but its not very fair to 1175089 or pjknibbs who both provided the same information as I did.  If you're on such a point giveaway spree, post some "Points for 1175089" and "Points for pjknibbs" questions.

-dog*
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question