Solved

For interiot

Posted on 2002-03-28
4
159 Views
Last Modified: 2013-12-25
For your assistance in Q# 20158195

Thank you
Computer101
E-E Moderator
0
Comment
Question by:Computer101
  • 2
4 Comments
 

Expert Comment

by:SpideyMod
ID: 8384656
Just a placekeeping note.

SpideyMod
Community Support Moderator @Experts Exchange
0
 
LVL 1

Author Comment

by:Computer101
ID: 8405437
Mail sent 27 Apr 2003

C101
0
 
LVL 3

Accepted Solution

by:
interiot earned 100 total points
ID: 8408130
Thanks :)
0
 

Expert Comment

by:SpideyMod
ID: 8408168
Our pleasure
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Powershell scripts to log lock and unlock computer for the user 4 131
Windows Batch File - Combing output in a single line 3 60
Sed question 2 68
AWS CLI issues with Tags 3 63
The following is a collection of cases for strange behaviour when using advanced techniques in DOS batch files. You should have some basic experience in batch "programming", as I'm assuming some knowledge and not further explain the basics. For some…
In this tutorial I will focus on how to use WhizBase as a tool for sending ICQ messages to ICQ. Here I will use a new technology in WhizBase, published in WhizBase 5.1 version. In this tutorial I will use 3 files, pager.wbsp for the processing, e…
Learn the basics of if, else, and elif statements in Python 2.7. Use "if" statements to test a specified condition.: The structure of an if statement is as follows: (CODE) Use "else" statements to allow the execution of an alternative, if the …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now