Solved

Points for oldgreyguy

Posted on 2002-05-15
2
221 Views
Last Modified: 2012-05-04
For your assistance in question

http://www.experts-exchange.com/jsp/qManageQuestion.jsp?qid=20298430

Thanks a million Bill
0
Comment
Question by:Cokane
2 Comments
 
LVL 13

Accepted Solution

by:
oldgreyguy earned 150 total points
ID: 7011004
you are more than welcome, glad to have helped

thanks, bill
0
 
LVL 3

Author Comment

by:Cokane
ID: 7011460
Cheers
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Paper feed problems Epson Stylus Photo R800 4 67
110V Lasko bladeless fan blows with a burning smell 5 76
tv problems 3 39
Multiple monitors 4 39
Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question