Someone sent me an email about this, and thought I would share.
Via email... Alan..
Open Eaglesoft, open the database navigator.. Drop to console and run this command:
Use this:
WMIC /OUTPUT:Process.txt path win32_process get Caption,Processid,Commandline
And you will get this:
dbisqlc.exe "C:\EagleSoft\Shared Files\dbisqlc.exe" -cDBN=DENTSERV;DSN=DENTAL;UID=PDBA;PWD=fK)ZAqhDc/yvg!x`1k=IpxUC#HQKEcL4
Now you know the PDBA Password: In this case..
fK)ZAqhDc/yvg!x`1k=IpxUC#HQKEcL4
Have fun! There is more where this came from...
Patterson Dental is fuckin stupid. Regarding kicking out Demand Force from the SDK.