Demoting W2K Server DC via DCPROMO

E

Enrique

We have 4 servers in one of our locations. One of the
servers has been slated to become part of another domain
in order to interconnect all our sites.

Currently the server in question (named Virginia) belongs
to the LAB domain. When I run DCPROMO to remove it from
that domain, I get an error stating that the domain cannot
be located. I have the LAB DC set up as a DNS server as
well and Virginia refereces the LAB DC server as its
primary DNS server. The secondary DNS server is one that
our ISP gave us.

When I run DCPROMO apart from getting the error that it
cannot contact the domain in question, I also lose the
possibility of locking the server with CTRL+ATL+DEL. I
have to log off.

Any idea on how to proceed? I am tempted to just remove
the server from AD on the LAB DC and rebuid the Virginia
server, but I suspect I have to do things differently. Any
suggestions would be greatly appreciated. Thanks!
 
P

ptwilliams

First things first: get the ISPs DNS server out of the TCP/IP settings!!
That's a real no-no!

When you've done that, and you can be sure that this DC and the main DC with
the DNS on it can communicate, try again.

If you're still getting errors such as this, I would restart netlogon on
both DCs. Please ensure that the main DNS DC is also pointing to itself for
DNS, and also doesn't have the ISPs DNS server listed.

--

Paul Williams
_________________________________________
http://www.msresource.net


Join us in our new forums!
http://forums.msresource.net
_________________________________________


We have 4 servers in one of our locations. One of the
servers has been slated to become part of another domain
in order to interconnect all our sites.

Currently the server in question (named Virginia) belongs
to the LAB domain. When I run DCPROMO to remove it from
that domain, I get an error stating that the domain cannot
be located. I have the LAB DC set up as a DNS server as
well and Virginia refereces the LAB DC server as its
primary DNS server. The secondary DNS server is one that
our ISP gave us.

When I run DCPROMO apart from getting the error that it
cannot contact the domain in question, I also lose the
possibility of locking the server with CTRL+ATL+DEL. I
have to log off.

Any idea on how to proceed? I am tempted to just remove
the server from AD on the LAB DC and rebuid the Virginia
server, but I suspect I have to do things differently. Any
suggestions would be greatly appreciated. Thanks!
 
S

S.J.Haribabu

Hi Enrique,

Thanks for posting. I did some research and found the KB articles. Since
you are unable to demote the domain controller, look at the article which
explains on how to demote the DC forcefully.(though you get some errors
like network connectivity, name resolution, authentication, Active
Directory directory service replication, or the location of a critical
object in Active Directory.

The following article is available at
http://support.microsoft.com/default.aspx?kbid=332199.

CAUSE
============
This behavior may occur if a required dependency or operation fails. These
include network connectivity, name resolution, authentication, Active
Directory directory service replication, or the location of a critical
object in Active Directory.

RESOLUTION
===============
To resolve this behavior, determine what is preventing the graceful
demotion of the Windows 2000 or the Windows Server 2003 domain controller,
and then try to demote the domain controller by using the Active Directory
Installation Wizard again.

WORKAROUND
===================
If you cannot resolve the behavior, you can use the following workarounds
to perform a forced demotion of the domain controller to preserve the
installation of the operating system and of any applications on it.

Warning Before you use either of the following workarounds, make sure that
the you can successfully start in Directory Services Restore mode.
Otherwise, you will not be able to log on after you forcefully demote the
computer. If you do not remember the Directory Services Restore mode
password, you can reset the password by using the Setpwd.exe utility that
is located in the Winnt\System32 folder. In Windows Server 2003, the
functionality of the Setpwd.exe utility has been integrated into the Set
DSRM Password command of the NTDSUTIL tool.

For additional information how to perform this procedure, click the
following article number to view the article in the Microsoft Knowledge
Base:
271641 The Configure Your Server Wizard sets blank Recovery mode password

Windows 2000 Domain Controllers
==============================
Install the Q332199 hotfix on a Windows 2000 domain controller that is
running Service Pack 2 (SP2) or later, or install Windows 2000 Service Pack
4 (SP4). SP2 and later support forced demotion. Then, restart your computer.
Click Start, click Run, and then type the following command:
dcpromo /forceremoval

Click OK.
At the Welcome to the Active Directory Installation Wizard page, click Next.
If the computer that you are removing is a global catalog server, click OK
in the message window.

Note Promote additional global catalogs in the forest or in the site if the
domain controller that you are demoting is a global catalog server, as
required.
At the Remove Active Directory page, make sure that the This server is the
last domain controller in the domain check box is cleared, and then click
Next.
At the Network Credentials page, type the name, password, and domain name
for a user account with enterprise administrator credentials in the forest,
and then click Next.
In Administrator Password, type the password and confirmed password that
you want to assign to the Administrator account of the local SAM database,
and then click Next.
On the Summary page, click Next.
Perform a metadata cleanup for the demoted domain controller on a surviving
domain controller in the forest.

If you removed a domain from the forest by using the remove selected domain
command in Ntdsutil, verify that all the domain controllers and the global
catalog servers in the forest have completely removed all the objects and
the references to the domain that you just removed before you promote a new
domain into the same forest with the same domain name. Tools such as
Replmon.exe or Repadmin.exe from Windows 2000 Support Tools may help you
determine if end-to-end replication has occurred. Windows 2000 SP3 and
earlier global catalog servers are noticeably slower to remove objects and
naming contexts than Windows Server 2003 is.

If the domain controller cannot start in normal mode
Note Follow these steps only as a last resort if the domain controller
cannot start in normal mode.

Warning If you use Registry Editor incorrectly, you may cause serious
problems that may require you to reinstall your operating system. Microsoft
cannot guarantee that you can solve problems that result from using
Registry Editor incorrectly. Use Registry Editor at your own risk.

To remove Active Directory from a domain controller, follow these steps:
Restart the computer, and then press F8 to display the Windows 2000
Advanced Options menu.
Choose Directory Services Restore Mode, press ENTER, and then press ENTER
again to continue restarting.
Modify the ProductType entry in the registry. To do this, follow these
steps:
Start Registry Editor.
Click the ProductType entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions

On the Edit menu, click String, type ServerNT, and then click OK.

Note If this value is not set correctly or is misspelled, you may receive
the following error message:

System Process - License Violation: The system has detected tampering with
your registered product type. This is a violation of your software license.
Tampering with product type is not permitted.
Quit Registry Editor.
Restart the computer.
Log on with the administrator account and password that is used for
Directory Service Repair mode.

The computer will behave as a member server. However, there are still some
remaining files and registry entries on the computer that are associated
with the domain controller.
Remove the remaining files and registry entries. To do this, follow these
steps:
Start the Active Directory Installation Wizard.
Install Active Directory to make the computer a domain controller for a
new, temporary domain, such as "psstemp.deleteme".

Note Make sure that you make the computer a domain controller in a
different forest.
After you install Active Directory, start the Active Directory Installation
Wizard again, and then remove Active Directory from the domain controller.
After you remove Active Directory from a domain controller, remove metadata
that is left in the domain.

For additional information about how to remove this metadata, click the
following article number to view the article in the Microsoft Knowledge
Base:
216498 HOW TO: Remove Data in Active Directory After an Unsuccessful Domain
Controller Demotion

If resource access control entries (ACEs) on the computer that you removed
Active Directory from were based on domain local groups, these permissions
may have to be reconfigured, because these groups will not be available to
member or stand-alone servers. If you plan to install Active Directory on
the computer to make it a domain controller in the original domain, you do
not have to configure access control lists (ACLs) any more. If you prefer
to leave the computer as a member or stand-alone server, any permissions
that are based on domain local groups must be translated or replaced.

For additional information about how permissions are affected after you
remove Active Directory from a domain controller, click the following
article number to view the article in the Microsoft Knowledge Base:
320230 Permissions Are Affected After You Demote a Domain Controller

STATUS
========
Microsoft has tested and supports the forced demotion of domain controllers
that are running Windows 2000 or Windows Server 2003.

MORE INFORMATION
===================
The Active Directory Installation Wizard creates Active Directory domain
controllers on Windows 2000-based and Windows Server 2003-based computers.
Operations that are performed by the Active Directory Installation Wizard
include the installation of new services, changes to the startup values of
existing services, and the transition to Active Directory as a security and
authentication realm.

With forced demotion, a domain administrator can forcibly remove Active
Directory and roll back locally held system changes without having to
contact or replicate any locally held changes to another domain controller
in the forest.

Because forced demotion results in the loss of any locally held changes,
use it only as a last resort in production or test domains. You can
forcibly demote domain controllers when connectivity, name resolution,
authentication, or replication engine dependencies cannot be resolved so
that graceful demotion can be performed. Valid scenarios for forced
demotions include:
There are no domain controllers currently available in the parent domain
when you try to demote the last domain controller in an immediate child
domain.
The Active Directory Installation Wizard cannot complete because there is a
name resolution, authentication, replication engine, or Active Directory
object dependency that you cannot resolve after you perform detailed
troubleshooting.
A domain controller has not replicated inbound Active Directory changes in
Tombstone Lifetime (Default Tombstone Lifetime is 60 days) number of days
for one or more naming contexts.

Important Do not recover such domain controllers unless they are the only
chance of recovery for a particular domain.
Time does not permit more detailed troubleshooting because you must
immediately bring into service the domain controller.
Forced demotions may be useful in lab and classroom environments where you
can remove domain controllers out of existing domains, yet you do not have
to demote each domain controller serially.

If you force the demotion of a domain controller, you will lose any unique
changes that reside in the Active Directory of the domain controller that
you are forcibly demoting, including the addition, deletion, or
modification of users, computers, groups, trust relationships, and Group
Policy or Active Directory configuration that did not replicate off before
you ran the dcpromo /forceremoval command. Additionally, you will lose
changes to any of the attributes on these objects, such as passwords for
users, computers, and trust relationships and group membership.

However, if you force the demotion of a domain controller, you return the
operating system to a state that is the same as the successful demotion of
the last domain controller in a domain (service start values, installed
services, use of a registry based SAM for the account database, computer is
a member of a workgroup). Programs that are installed on the demoted domain
controller remain installed.

The System event log identifies forcibly demoted Windows 2000 domain
controllers (and instances of the dcpromo /forceremoval operation) by event
ID 29234. For example:
Event Type: WARNING
Event Source: lsasrv
Event Category: None
Event ID: 29234
Date: MM/DD/YYYY
Time: HH:MM:SS AM|PM
User: N/A
Computer: computername Description: The server was force demoted. It is no
longer a Domain controller.

The System event log identifies forcibly demoted Windows Server 2003 domain
controllers by event ID 29239. For example:
Event Type: WARNING
Event Source: lsasrv
Event Category: None
Event ID: 29239
Date: MM/DD/YYYY
Time: HH:MM:SS AM|PM
User: N/A
Computer: computername Description: The server was force demoted. It is no
longer a Domain controller.

After you use the dcpromo /forceremoval command, metadata for the demoted
computer is not deleted on surviving domain controllers. For additional
information, click the following article number to view the article in the
Microsoft Knowledge Base:
216498 HOW TO: Remove Data in Active Directory After an Unsuccessful Domain
Controller Demotion

The following are items that you must address, if applicable, after
forcibly demoting a domain controller:
Remove the computer account from the domain.
Verify that DNS records, including A, CNAME, and SRV Records, are removed,
and remove them if they are present.
Verify that FRS member objects (FRS and DFS) are removed, and remove them
if they are present. For additional information, click the following
article number to view the article in the Microsoft Knowledge Base:
296183 Overview of Active Directory Objects That Are Used by FRS

If the demoted computer is a member of any security groups, remove it from
those groups.
Remove any DFS references to the demoted server (links or root replicas).
A surviving domain controller must seize any operations master roles (also
known as flexible single master operations or FSMO) that were previously
held by the forcibly demoted domain controller. For additional information,
click the following article number to view the article in the Microsoft
Knowledge Base:
255504 Using Ntdsutil.exe to Seize or Transfer FSMO Roles to a Domain
Controller

If the domain controller that you are demoting is a DNS Server or Global
Catalog server, you must create a new GC or DNS Server to satisfy load
balancing, fault tolerance, and configuration settings in the forest.
When you use the remove selected server command in NTDSUTIL, the NTDSDSA
object (the parent object for inbound connections to the domain controller
that you forcibly demoted) is removed. The command does not remove the
parent server objects that appear in the Sites and Services snap-in. Use
the Active Directory Sites and Services MMC snap-in to remove the server
object if the domain controller will not be promoted into the forest with
the same computer name.

Thanks,

(e-mail address removed)

This posting is provided "AS IS" with no warranties, and confers no rights.
 
P

ptwilliams

It would probably be more beneficial to try and determine what is causing
this error than to simply blat the box and metadata cleanup. Otherwise,
there may be an underlying DNS issue left unresolved...

--

Paul Williams
_________________________________________
http://www.msresource.net


Join us in our new forums!
http://forums.msresource.net
_________________________________________


Hi Enrique,

Thanks for posting. I did some research and found the KB articles. Since
you are unable to demote the domain controller, look at the article which
explains on how to demote the DC forcefully.(though you get some errors
like network connectivity, name resolution, authentication, Active
Directory directory service replication, or the location of a critical
object in Active Directory.

The following article is available at
http://support.microsoft.com/default.aspx?kbid=332199.

CAUSE
============
This behavior may occur if a required dependency or operation fails. These
include network connectivity, name resolution, authentication, Active
Directory directory service replication, or the location of a critical
object in Active Directory.

RESOLUTION
===============
To resolve this behavior, determine what is preventing the graceful
demotion of the Windows 2000 or the Windows Server 2003 domain controller,
and then try to demote the domain controller by using the Active Directory
Installation Wizard again.

WORKAROUND
===================
If you cannot resolve the behavior, you can use the following workarounds
to perform a forced demotion of the domain controller to preserve the
installation of the operating system and of any applications on it.

Warning Before you use either of the following workarounds, make sure that
the you can successfully start in Directory Services Restore mode.
Otherwise, you will not be able to log on after you forcefully demote the
computer. If you do not remember the Directory Services Restore mode
password, you can reset the password by using the Setpwd.exe utility that
is located in the Winnt\System32 folder. In Windows Server 2003, the
functionality of the Setpwd.exe utility has been integrated into the Set
DSRM Password command of the NTDSUTIL tool.

For additional information how to perform this procedure, click the
following article number to view the article in the Microsoft Knowledge
Base:
271641 The Configure Your Server Wizard sets blank Recovery mode password

Windows 2000 Domain Controllers
==============================
Install the Q332199 hotfix on a Windows 2000 domain controller that is
running Service Pack 2 (SP2) or later, or install Windows 2000 Service Pack
4 (SP4). SP2 and later support forced demotion. Then, restart your computer.
Click Start, click Run, and then type the following command:
dcpromo /forceremoval

Click OK.
At the Welcome to the Active Directory Installation Wizard page, click Next.
If the computer that you are removing is a global catalog server, click OK
in the message window.

Note Promote additional global catalogs in the forest or in the site if the
domain controller that you are demoting is a global catalog server, as
required.
At the Remove Active Directory page, make sure that the This server is the
last domain controller in the domain check box is cleared, and then click
Next.
At the Network Credentials page, type the name, password, and domain name
for a user account with enterprise administrator credentials in the forest,
and then click Next.
In Administrator Password, type the password and confirmed password that
you want to assign to the Administrator account of the local SAM database,
and then click Next.
On the Summary page, click Next.
Perform a metadata cleanup for the demoted domain controller on a surviving
domain controller in the forest.

If you removed a domain from the forest by using the remove selected domain
command in Ntdsutil, verify that all the domain controllers and the global
catalog servers in the forest have completely removed all the objects and
the references to the domain that you just removed before you promote a new
domain into the same forest with the same domain name. Tools such as
Replmon.exe or Repadmin.exe from Windows 2000 Support Tools may help you
determine if end-to-end replication has occurred. Windows 2000 SP3 and
earlier global catalog servers are noticeably slower to remove objects and
naming contexts than Windows Server 2003 is.

If the domain controller cannot start in normal mode
Note Follow these steps only as a last resort if the domain controller
cannot start in normal mode.

Warning If you use Registry Editor incorrectly, you may cause serious
problems that may require you to reinstall your operating system. Microsoft
cannot guarantee that you can solve problems that result from using
Registry Editor incorrectly. Use Registry Editor at your own risk.

To remove Active Directory from a domain controller, follow these steps:
Restart the computer, and then press F8 to display the Windows 2000
Advanced Options menu.
Choose Directory Services Restore Mode, press ENTER, and then press ENTER
again to continue restarting.
Modify the ProductType entry in the registry. To do this, follow these
steps:
Start Registry Editor.
Click the ProductType entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptions

On the Edit menu, click String, type ServerNT, and then click OK.

Note If this value is not set correctly or is misspelled, you may receive
the following error message:

System Process - License Violation: The system has detected tampering with
your registered product type. This is a violation of your software license.
Tampering with product type is not permitted.
Quit Registry Editor.
Restart the computer.
Log on with the administrator account and password that is used for
Directory Service Repair mode.

The computer will behave as a member server. However, there are still some
remaining files and registry entries on the computer that are associated
with the domain controller.
Remove the remaining files and registry entries. To do this, follow these
steps:
Start the Active Directory Installation Wizard.
Install Active Directory to make the computer a domain controller for a
new, temporary domain, such as "psstemp.deleteme".

Note Make sure that you make the computer a domain controller in a
different forest.
After you install Active Directory, start the Active Directory Installation
Wizard again, and then remove Active Directory from the domain controller.
After you remove Active Directory from a domain controller, remove metadata
that is left in the domain.

For additional information about how to remove this metadata, click the
following article number to view the article in the Microsoft Knowledge
Base:
216498 HOW TO: Remove Data in Active Directory After an Unsuccessful Domain
Controller Demotion

If resource access control entries (ACEs) on the computer that you removed
Active Directory from were based on domain local groups, these permissions
may have to be reconfigured, because these groups will not be available to
member or stand-alone servers. If you plan to install Active Directory on
the computer to make it a domain controller in the original domain, you do
not have to configure access control lists (ACLs) any more. If you prefer
to leave the computer as a member or stand-alone server, any permissions
that are based on domain local groups must be translated or replaced.

For additional information about how permissions are affected after you
remove Active Directory from a domain controller, click the following
article number to view the article in the Microsoft Knowledge Base:
320230 Permissions Are Affected After You Demote a Domain Controller

STATUS
========
Microsoft has tested and supports the forced demotion of domain controllers
that are running Windows 2000 or Windows Server 2003.

MORE INFORMATION
===================
The Active Directory Installation Wizard creates Active Directory domain
controllers on Windows 2000-based and Windows Server 2003-based computers.
Operations that are performed by the Active Directory Installation Wizard
include the installation of new services, changes to the startup values of
existing services, and the transition to Active Directory as a security and
authentication realm.

With forced demotion, a domain administrator can forcibly remove Active
Directory and roll back locally held system changes without having to
contact or replicate any locally held changes to another domain controller
in the forest.

Because forced demotion results in the loss of any locally held changes,
use it only as a last resort in production or test domains. You can
forcibly demote domain controllers when connectivity, name resolution,
authentication, or replication engine dependencies cannot be resolved so
that graceful demotion can be performed. Valid scenarios for forced
demotions include:
There are no domain controllers currently available in the parent domain
when you try to demote the last domain controller in an immediate child
domain.
The Active Directory Installation Wizard cannot complete because there is a
name resolution, authentication, replication engine, or Active Directory
object dependency that you cannot resolve after you perform detailed
troubleshooting.
A domain controller has not replicated inbound Active Directory changes in
Tombstone Lifetime (Default Tombstone Lifetime is 60 days) number of days
for one or more naming contexts.

Important Do not recover such domain controllers unless they are the only
chance of recovery for a particular domain.
Time does not permit more detailed troubleshooting because you must
immediately bring into service the domain controller.
Forced demotions may be useful in lab and classroom environments where you
can remove domain controllers out of existing domains, yet you do not have
to demote each domain controller serially.

If you force the demotion of a domain controller, you will lose any unique
changes that reside in the Active Directory of the domain controller that
you are forcibly demoting, including the addition, deletion, or
modification of users, computers, groups, trust relationships, and Group
Policy or Active Directory configuration that did not replicate off before
you ran the dcpromo /forceremoval command. Additionally, you will lose
changes to any of the attributes on these objects, such as passwords for
users, computers, and trust relationships and group membership.

However, if you force the demotion of a domain controller, you return the
operating system to a state that is the same as the successful demotion of
the last domain controller in a domain (service start values, installed
services, use of a registry based SAM for the account database, computer is
a member of a workgroup). Programs that are installed on the demoted domain
controller remain installed.

The System event log identifies forcibly demoted Windows 2000 domain
controllers (and instances of the dcpromo /forceremoval operation) by event
ID 29234. For example:
Event Type: WARNING
Event Source: lsasrv
Event Category: None
Event ID: 29234
Date: MM/DD/YYYY
Time: HH:MM:SS AM|PM
User: N/A
Computer: computername Description: The server was force demoted. It is no
longer a Domain controller.

The System event log identifies forcibly demoted Windows Server 2003 domain
controllers by event ID 29239. For example:
Event Type: WARNING
Event Source: lsasrv
Event Category: None
Event ID: 29239
Date: MM/DD/YYYY
Time: HH:MM:SS AM|PM
User: N/A
Computer: computername Description: The server was force demoted. It is no
longer a Domain controller.

After you use the dcpromo /forceremoval command, metadata for the demoted
computer is not deleted on surviving domain controllers. For additional
information, click the following article number to view the article in the
Microsoft Knowledge Base:
216498 HOW TO: Remove Data in Active Directory After an Unsuccessful Domain
Controller Demotion

The following are items that you must address, if applicable, after
forcibly demoting a domain controller:
Remove the computer account from the domain.
Verify that DNS records, including A, CNAME, and SRV Records, are removed,
and remove them if they are present.
Verify that FRS member objects (FRS and DFS) are removed, and remove them
if they are present. For additional information, click the following
article number to view the article in the Microsoft Knowledge Base:
296183 Overview of Active Directory Objects That Are Used by FRS

If the demoted computer is a member of any security groups, remove it from
those groups.
Remove any DFS references to the demoted server (links or root replicas).
A surviving domain controller must seize any operations master roles (also
known as flexible single master operations or FSMO) that were previously
held by the forcibly demoted domain controller. For additional information,
click the following article number to view the article in the Microsoft
Knowledge Base:
255504 Using Ntdsutil.exe to Seize or Transfer FSMO Roles to a Domain
Controller

If the domain controller that you are demoting is a DNS Server or Global
Catalog server, you must create a new GC or DNS Server to satisfy load
balancing, fault tolerance, and configuration settings in the forest.
When you use the remove selected server command in NTDSUTIL, the NTDSDSA
object (the parent object for inbound connections to the domain controller
that you forcibly demoted) is removed. The command does not remove the
parent server objects that appear in the Sites and Services snap-in. Use
the Active Directory Sites and Services MMC snap-in to remove the server
object if the domain controller will not be promoted into the forest with
the same computer name.

Thanks,

(e-mail address removed)

This posting is provided "AS IS" with no warranties, and confers no rights.
 
E

Enkidu

I have the LAB DC set up as a DNS server as
well and Virginia refereces the LAB DC server as its
primary DNS server. The secondary DNS server is one that
our ISP gave us.
This, as others have said, is wrong. You should not reference the
ISP's DNS server as second DNS server in the clients, even if the
*client* is a server box.

Your machines should reference the rest of the world *through the
forwarders* in the internal DNS server(s). The DNS servers themselves
should have themselves as DNS servers in the TCP/IP properties of the
NICs. They are DNS clients of the DNS running on themselves.

The reason is as follows: When a DNS client requests the IP address
for a Domain Name, it queries the first DNS server (natch!). If it
gets a response it doesn't try the second DNS server. Here's the crux
- a response may be positive ("Here's the IP") or negative ("Don't
know that Domain Name"). It is still counted as a response.

If the server does not respond *AT ALL*, (eg is down) then and only
then will the client try the second DNS entry. And in Windows 2000 it
is "sticky". The second DNS effectively becomes the first DNS, and all
subsequent queries go to the ISP's DNS (and get "Not found" for your
internal boxes of course).

Cheers,

Cliff

{MVP Directory Services}
 
P

ptwilliams

More than likely yes. You probably don't *need* to start, but it will rule
things out if you do!

Bin the ISP setting in TCP/IP, reboot and see how that fares...

--

Paul Williams
_________________________________________
http://www.msresource.net


Join us in our new forums!
http://forums.msresource.net
_________________________________________


Would removing the secondary and restarting clear that
problem? Thanks!
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top