exe.1.drīinary string: C:\BuildAg ent\work\O A81\win64\ OAforSL\op enrda\isql \odbcisql\ 圆4\Releas e\odbcisql _64.pdb so urce: Serv iceNow-ODB C-64-bit_1. exe.1.drīinary string: C:\BuildAg ent\work\O A81\win64\ SWIPE\bin6 4\iperptn. Source: C:\Users\u ser\Deskto p\ServiceN ow-ODBC-64 -bit_1.0.1 5.exeįile created: C:\Users\u ser\AppDat a\Local\Te mp\ckz_KIS G\Service- now ODBC 6 4-bit\read me.txtįile created: C:\Users\u ser\AppDat a\Local\Te mp\ckz_KIS G\Service- now ODBC 6 4-bit\lice nse.txtįile created: C:\Users\u ser\AppDat a\Local\Te mp\ckz_KIS G\Service- now ODBC 6 4-bit\admi n\openssll icense.txtīinary string: C:\BuildAg ent\work\O A81\win64\ SWSEC\oabi n64\cmgss_ hu.pdb sou rce: Servi ceNow-ODBC -64-bit_1. Static PE information: LOCAL_SYMS _STRIPPED, 32BIT_MAC HINE, EXEC UTABLE_IMA GE, LINE_N UMS_STRIPP ED, RELOCS _STRIPPED Alternately you can also click the Hamburger > Copy URLįor example, an Incident with the following URL: Right click the header bar and select Copy URL. Navigate to the record where you are looking for a sys_id Since the sys_id of a record is always part of the URL for a link to that record, it is possible to retrieve the sys_id by viewing the URL.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |