Solved

For sunray_2003 - re Q_20765846

Posted on 2003-11-23
6
307 Views
Last Modified: 2013-12-04
For your help in Q_20765846
Thank you

PashaMod
CS Moderator
0
Comment
Question by:PashaMod
  • 4
  • 2
6 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 250 total points
Comment Utility
Thanks PashaMod

Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
PashaMod,

Did you get my email which I sent you yest nite .. I sent to pashamod@ experts-exchange.com

Please check and would be great if you can reply back

Sunray
0
 

Author Comment

by:PashaMod
Comment Utility
Hi Sunray,
I got the mail and wrote you a reply over 3-4 hours ago. But I guess you didn't get it. Can you please let me know if you didn't get it so that I'll try to send it to you again
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
Dear PashaMod,

Could you please send again.. I did check but I have not recd

Sunray
0
 

Author Comment

by:PashaMod
Comment Utility
I've sent it again now :) I hope you get it, otherwise I'll send it from EE
0
 
LVL 49

Expert Comment

by:sunray_2003
Comment Utility
got it

Thanks

Sunray
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now