[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Points for andyalder

Posted on 2002-05-02
3
Medium Priority
?
218 Views
Last Modified: 2010-04-26
0
Comment
Question by:Subhuman
3 Comments
 
LVL 56

Accepted Solution

by:
andyalder earned 200 total points
ID: 6986277
Woo-hoo. Thanks.
0
 
LVL 3

Expert Comment

by:Cokane
ID: 6986321
Thanks guys!!!
I'll return the favour Subhuman...
0
 
LVL 1

Author Comment

by:Subhuman
ID: 6986452
No need, I'm not using them for anything. :)
0

Featured Post

Upgrade your Question Security!

Add Premium security features to your question to ensure its privacy or anonymity. Learn more about your ability to control Question Security today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Backups and Disaster RecoveryIn this post, we’ll look at strategies for backups and disaster recovery.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question