500 Point Question needs help today!

Posted on 2004-09-13
Last Modified: 2011-10-03

Can anyone please help on this quesiton, it has been there three weeks...

Thank you,

Wes Lennon
Director of Community Services
Experts Exchange
Question by:WesLennon
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 23

Accepted Solution

Tim Holman earned 20 total points
ID: 12044342
Sure thing.  Not usually a topic I look at much...  ;)
LVL 51

Assisted Solution

ahoffmann earned 20 total points
ID: 12044407
another example for the need of link questions, I'd suggest Security or better Unix Security TA

Author Comment

ID: 12045124
Thanks guys...a Unix Security TA is in the works, among a few dozen more in the upcoming months as we begin to add a new layer to the site.

Wes  :p
Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

LVL 23

Expert Comment

by:Tim Holman
ID: 12045894
What's a TA - is that like a page editor or something ?
LVL 51

Expert Comment

ID: 12046915
Topic Area
LVL 23

Expert Comment

by:Tim Holman
ID: 12052565
There's already a Unix Security TA here anyway, hence my confusion !!  :)
LVL 51

Expert Comment

ID: 12053142

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Suggested Courses
Course of the Month8 days, 9 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question