Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Points for NickLo

Posted on 2002-06-21
2
171 Views
Last Modified: 2010-04-26
http://www.experts-exchange.com/hardgen/Q_20144768.html
Points shared.
Moondancer - EE Moderator
0
Comment
Question by:Moondancer
2 Comments
 
LVL 1

Accepted Solution

by:
NickLo earned 20 total points
ID: 7100611
Thanks.  I did not expect timsenco to reply to all the angry comments.
0
 
LVL 1

Author Comment

by:Moondancer
ID: 7100835
timsenco has significantly violated the Member Agreement here and the account has been closed.  We are working to finalize open items, and this was one.

Thank you for your help in this question.

Moondancer - EE Moderator
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question