Comments
-
congrats dnerdahl. i can imagine what the jam jam box is looking like.
-
nice post datachick.
-
Great post, article, writeup....Thank you glenkemp. keep the articles coming. I am so grateful .
-
I also got day 20 wrong, which is so easy and correct. I think these 2 red X are not correct. I got both answers correctly, they are so easy. Can I get my points back?
-
i do agree ...
-
congratulations robdover bradkay Scott Sadlocha @Matt_Osmond Douglas Wuestewald ttl @Michael_Gilmore
-
you are right but i still have my reservations.......
-
Congrats nantwiched
-
Hmmh.. An important aspect of information security and risk management is recognizing the value of information and defining appropriate procedures and protection requirements for the information. Not all information is equal and so not all information requires the same degree of protection. Using the good security software…
-
Food for thought!!!!! Thanks bruce.jarrett
-
He sure does.. check his horns... ha ha
-
+1 byrona... i concur
-
nice post
-
Congrats ironman84
-
Congrats graham@childe.org.uk
-
you are right Zack, today's submission just went to a blank screen after clicking submit. Danielle and her team will work on it soon.
-
Congrats naburleson.
-
Congrats wthomashefsky
-
Congrats charlesmerritt
-
nice office space cahunt
-
I have been enlightened by all your posts so far. Thanks mfmahler . As advised, i will learn more, stay informed, be a white hacker and be willing to share.
-
Awesome. Thanks Bronx
-
Congrats dragoon231
-
Congrats Zak Kahl, Richard Hetherington and tomiannelli
-
Thanks for making this process so seamless
-
Managed File Transfer In addition to security and the ease of file sharing, automation and control of the file transfer process will result in more simplicity and operational efficiency. Employing a third-party MFT server will help you gain additional features like event-driven automation, scheduled file transfer, multiple…
-
Congrats Kurt H
-
Thank you Jiri Cvachovec
-
congrats shale2001
-
Thanks for sharing this....