?
Solved

For mass2612

Posted on 2006-07-18
1
Medium Priority
?
186 Views
Last Modified: 2010-04-18
For you help in totally rewriting the script for me =]
0
Comment
Question by:Terr0r
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 29

Accepted Solution

by:
mass2612 earned 2000 total points
ID: 17134740
Hi Terr0r,

I appreciate the feedback. The original work was done by 4auHuk so a big thanks to 4auHuk. I'm glad its working for you and once again sorry for the delay. It's been a busy week and I'm studying for an exam that I'm doing on Monday so I haven't had as much time as I'd like to spend on the site. I love spending time on this site as it gives me the chance to work on issues that I don't get to deal with in the office so helping others is helping me to learn more. Thanks to all the other members of the site for the info you provide.
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question