Solved

To dogztar

Posted on 2002-07-19
2
234 Views
Last Modified: 2010-04-26
Just to credit the points I own you.
0
Comment
Question by:gorcutt
2 Comments
 
LVL 16

Accepted Solution

by:
Kyle Schroeder earned 100 total points
ID: 7169621
Glad to help!

-dog*
0
 

Author Comment

by:gorcutt
ID: 7170436
See you around.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best advice possible for Hdd drives 5 65
2v or 4v 4 70
Can't see Ubuntu desktop on KVM switch unless I reboot the PC 22 63
Sky and freeview box 3 37
This is about my first experience with programming Arduino.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question