Solved

Lotus Notes COM objects (Win XP/R6)

Posted on 2004-04-05
5
153 Views
Last Modified: 2013-12-18
0
Comment
Question by:llewelm
  • 2
5 Comments
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 10757371
Reiterating what I said in PB Section..

This has been a problem with R6 install.. One alternative is to re-install R6 again..

Take a look at this technote for further info on correcting this issue.. http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21127601

http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21095746

PS: It depends on how you installed R6

~Hemanth
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 10765752
I would say not to be eleted this but PAQ with 0 points
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 12207385
PAQed, with points refunded (500)

Computer101
E-E Admin
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How many GB is a good number to keep these databases? 6 179
Domino Server 2 80
Lotus notes Formula to trigger Lotusscript 1 635
problem with deleted user 14 28
  In today’s Arena we can’t imagine our lives without Internet as we are highly used to of it. If we consider our life style just for only 2 min we found that face to face communication is swapped by e-communication.  Every Where from Works place to…
For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question