Solved

Points for AvonWyss

Posted on 2002-06-30
3
129 Views
Last Modified: 2010-04-13
Doing a bit of auditing

for your participation in
http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20304795

I think what threw him/her off was your link comes up all German.  I had a bit of fanagle to change it over to english, not being able to read german.  ha ha

And besides my link was a real bust - concacted two parts.
We both were at the same place at the same time.

Fair is fair.

ITsy
0
Comment
Question by:ITsheresomewhere
  • 2
3 Comments
 
LVL 14

Accepted Solution

by:
AvonWyss earned 50 total points
ID: 7122404
If you really want to....
0
 
LVL 3

Author Comment

by:ITsheresomewhere
ID: 7122452
Yes I do.  oops last time I said that it cost me a house AND a boat.

ITsy
0
 
LVL 14

Expert Comment

by:AvonWyss
ID: 7122566
Only a house and a boat? Could have been worse, I guess... anyways, this thing here will for sure not cost you more than the 50 points plus you receive a warm thank you from me! Have a nice evening.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exchange server 2003 sp2 local queue frozen mail 3 375
Print Server: NT to 2008 10 593
Dell PowerEdge raid drive replacement 13 521
Retrieve process time in memory in VB 6 130
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question