Solved

Points for Portang

Posted on 2002-04-18
3
154 Views
Last Modified: 2010-04-13
http://www.experts-exchange.com/win2k/Q.20104441.html
Points split.
Moondancer - EE Moderator
0
Comment
Question by:Moondancer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Expert Comment

by:Netminder
ID: 7515575
This question has gone unanswered. If there is no post from the person to whom the points are to be awarded in 30 days, the question will be deleted.

Netminder
EE Administrator
0
 
LVL 6

Accepted Solution

by:
Portang earned 20 total points
ID: 7515582
Thanks.
0
 
LVL 5

Expert Comment

by:Netminder
ID: 7515585
Force-accepted.

Netminder
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you are IT support and need to work after hours to resolve customer issues then here are a few tips on how to handle after hours support
Come and listen to Percona CEO Peter Zaitsev discuss what’s new in Percona open source software, including Percona Server for MySQL (https://www.percona.com/software/mysql-database/percona-server) and MongoDB (https://www.percona.com/software/mongo-…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question