As a member of the Air Force, I have to agree with chiph about the CYA rule. In my service experience, I have rarely saw a troop go to the commander by him/her self. It is always with their immediate supervisor. My advice, no matter how hard it may be to do, you need to cut your losses and...
I have to agree with both jimbopalmer and cadaveca. It definately sounds like a DNS issue instead of a mail/internet issue. Make sure that you are using the correct DNS ip addresses for the computer.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda
[yoda]
Since he had it stored on his hard drive, I'm guess that you didn't have recent backups of the files? To prevent future problems, I would recommend backing up his computer on a constant basis, or having him move his information to a server.
Brian
USAF
Network +, Win2k Pro
No try not. Do...
I must admit that I'm still fairly new with Access, but I have taught myself the basic; forms, queries, tables, etc... I have designed a simple database for our work environment that basically tracks all of our jobs. The final output is a report that comes up on screen with all the information...
jeffbouldin is correct. This is the standard color scheme used for making CAT5 cables. You could use your own scheme, but just make sure that both ends of the cable are wired the same i.e. pin 1 - pin 1, pin 2 - pin 2, etc...
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda...
You can use the command deltree to delete folders. I would be extremely careful with this though. Make sure that you're not deleting program or systems folders when you use this, or you'll end up with a mess on your hands.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda...
bcastner is right. The PXE ROM allows a computer to perform a network boot. This is useful if you are using a computer without a hard drive. The chip on the NIC is what controls the network boot. Pop the chip out and see what happens.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do...
Is that the unix based "hack disk"? I've used it a lot, just didn't know where you could go to actually download it.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda
[yoda]
I agree with MontrealSoft. It sounds like you have a virus. I'd start with doing a virus scan with updated virus definations. If it comes back clean check the startup folder in the start menu to make sure that there aren't any bogus programs set to run at startup.
Brian
USAF
Network +, Win2k...
The allow inheritable permissions box is on the security tab at the very bottom when you look at the folder properties.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda
[yoda]
Have you tried copying the explorer.exe file from a computer that rarly has problems? It sounds corny, but I've had it work for me a couple of times.
Brian
USAF
Network +, Win2k Pro
No try not. Do or do not. --Yoda
[yoda]
STP (Shielded Twisted Pair) is used mainly for protection against EMI (electo-magnetic interference) which can degrade and sometimes completely destroy a signal. It can also be used for security reasons to help prevent cross-talk. Good cable to have, but it will cost you an arm and a leg...
My company wears uniforms, and they don't actually provide them, rather they give you an allowance each year to get new uniforms. We have no such thing as a casual Friday, and if you get called in after hours, you wear your "civies" into work. Granted that our work uniforms are...
If you have an older CRT monitor (and you don't get any POST errors) you may want to try booting up in safe mode and then dropping the resolution. The default resolution may be too high for the moniter to display. Just a thought.
Brian
USAF
Network +, Win2k Pro
Mail merge is really easy to explain. Say you have a letter that needs to be sent out to 20 different people. Instead of typing up the exact same letter 20 times, each time with a different person's name, you type the letter one time and instead of typing a person's name you insert a field...
The command is right, but the path is wrong. WBG34 is on the right track. The only thing that you need to do is use the path C:\Documents and Settings\%username%\Local settings\temp. That will make the script look at the username of the person logging in and delete only his/her temp files...
True that password resets are allowed in OWA, but the only problem with that is that you have to login to OWA to change your password. If the password is already disabled due to a password expiring you will not be able to login to change the password. The only way that I know how to fix it is...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.