I know in my experience, you usually arent allowed to access a network resource if someone else has already accessed it and if you are, you are only allowed to open a read only copy. Is this right? Also how does UNIX handle this problem?
I am currently wanting to import a .csv file from an email received in Outlook 2000 into Access 2000 - this is fine, but as the file can only be from a certain few select people (there are over 14000 users who could possibly send the data we need), we need to read their alias instead of their...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.