There are multiple causes of blocked email and attachments in outlook express. Before changing settings, please consider these:
You may have SPAM (junk mail) blocked using any of these three methods:
1. Did you turn on SpamAssassin at the email server? It blocks certain messages.
2. You may have installed a personal SPAM blocker program for the email client on your computer .
3. You may be using your email client's SPAM blocking. Outlook Express has this capability .
The Problem
After installing IE SP1 or XP SP1 , Outlook Express 6 will lock certain attachments. You cannot save or open them. After following this procedure, you should be able to save attachments. Then you can minimize Outlook Express, find the document and open it. Opening from within the email program is a security risk.
One Possible Cure - Stopping All Attachment Security
Note: This is the easiest but not the only option. See below: "Another Cure - Adjust Settings ...."
1. Apply the latest Windows Update critical security patches: run IE > Tools menu > Windows Update
2. Run Outlook Express 6
3. Tools menu
4. Options
5. Security tab
6. Remove the check from "Do not allow attachments to be saved ...."
7. Click the OK button.
8. Quit and restart Outlook Express . The changed setting should take effect after the restart.
Another Cure - Adjust Settings while Retaining Attachment Security
Note: If you turned off attachment security in the above procedure, these steps are irrelevant. If you want to follow these steps, go back to the previous procedure and check the "Do not allow attachments..." box.
Y ou can block some attachments and release others. In other words, rather than accepting Microsoft's list of suspicious files, you can selectively unblock certain types. Therefore, if Outlook Express blocks Word documents, you can change a setting that will let them through while continuing to block other suspicious types.
1. Start menu
2. In Windows 2000 , choose Settings and then Control Panel .
In Windows XP, you may be able to choose Control Panel without going to Settings first.
3. If you have Windows XP, choose Switch to Classic View (if showing) in the upper left corner.
4. Double-click Folder Options in the Control Panel.
5. Choose the File Types tab and scroll to the type of attachment that should not be blocked.
6. Click the Advanced button.
7. To block this type of attachment: do check the box for "Confirm open after download."
- or -
To allow this type of attachment: do not check the box.
8. Click the OK button.
9. Click the OK button again.
10. Close the Control Panel.
11. Restart Outlook Express . Attachments of this type, which had been blocked, may now be available in messages you had received before.
Sunday, December 11, 2005
Monday, November 14, 2005
digit.xml
-
-
http://digit-it.blogspot.com/feeds/posts/default
-
http://digit-it.blogspot.com/2007/11/sony-ericsson-w910i.html
-
http://digit-it.blogspot.com/2007/11/google912944955e50c860.html
-
http://digit-it.blogspot.com/2007/11/nero-photoshow-deluxe-4.html
-
http://digit-it.blogspot.com/2007/11/pc-performance-6-tips-you-must-know.html
-
http://digit-it.blogspot.com/2007/11/computer-satellite-tv-review-of.html
-
http://digit-it.blogspot.com/2007/11/shift-delete-not-permanent-deletion.html
-
http://digit-it.blogspot.com/2007/11/removable-storage-drive-recovery.html
-
http://digit-it.blogspot.com/2007/11/windowblinds-6.html
-
http://digit-it.blogspot.com/2007/11/six-tips-to-organize-your-digital.html
-
http://digit-it.blogspot.com/2007/11/nero-mobile-pro.html
-
http://digit-it.blogspot.com/2007/11/spyware-virus-protection.html
Friday, July 22, 2005
Explore the Earth From Home
What the!!?? Google Earth? Has a company taken over our world? No, just mapped it out for you to look at.
I was over at a friend's house the other day and on his computer he showed me his own house as viewed by a satellite in Earth's orbit. It was awesome. The screen started out looking at our great blue planet, then he typed in his house's address (he had programmed it in, as only the USA, UK, and Canada have the ability to find an address automatically so far) and the planet turned to our country. Then it zoomed in further and further until we could see the roof of his house! My genetic father (mother has been married thrice) lives in Atlanta, Georgia, USA, so I typed in his address, the world shifted around, zoomed in, and all of a sudden I could see the roof of his house, the swimming pool in the backyard, driveway and street, trees etc. It was a real mind-blower. One of the best things about www.google.earth.com is that we can now look at real photographs of any part of the world: pyramids in Egypt, Shanghai city, beaches in Jamaica, you can go and look at any place on the globe. All you need to do is point and click your computer's mouse on any spot (address unnecessary), and it's free.
I eventually found my own house (it will be much easier when the whole world has been mapped by street names on the free downloadable version) and I think that the 20$ version has a GPS (Global positioning system) which must make finding things a lot easier. You can also get directions to local areas such as restaurants, parks, hospitals, schools and hotels. The idea is to combine Google's search abilities with imagery and mapping and I think it has great ramifications for the future of location information. You can then save and share your location searches with your friends and colleagues as well as adding your own data, as in my friend's case. Google Earth's users have already saved thousands of personal data points for you to look at and add to: EG: Show people where your business is located.
Another neat aspect of the technology is that you can tilt and rotate the satellite's view to give you a more 3-D perspective on buildings, mountains and landmarks on the terrain. Many people have asked me if the photos are real time and if you run out front of your house will you see yourself? We would need a lot of satellites out in orbit if we hoped to have this kind of 'Big Brother' capability and I'm sure ethical questions would also be raised.
If you are looking for directions the program will actually drive or fly you on the best route to get where you are going. The website has photos of ten of the most popular 'destinations' so you can check out the quality of the high-resolution photos. With the 'Measure' tool you can see how far it is to the local airport or from Paris to London. With the 'Pro' version at $200 (there are three versions) you can also measure area, radius, and perimeter, which can have many applications in professional situations. There are also different layers of mapping information you can click on so all the volcanoes or golf courses will come up automatically if they are what you choose to see in a specific area. If you are searching for places to dine, when a restaurant comes up on the screen you can click on 'more' and information such as hours of operation, menus, reviews, and links to the business website become available.
Pretty cool huh! The only problem you may have is that your computer may not be powerful enough to handle the software or 3-D graphics capability. You also miss out if you own a Macintosh, as a compatible version hasn't been built for them yet. Don't take my word for it, go to the site and check it out. You may find that it has applications that could change the face of your business as well as the way you look at traversing our world, not to mention the ease to which you will be able to locate pizzas anywhere on Earth.
I was over at a friend's house the other day and on his computer he showed me his own house as viewed by a satellite in Earth's orbit. It was awesome. The screen started out looking at our great blue planet, then he typed in his house's address (he had programmed it in, as only the USA, UK, and Canada have the ability to find an address automatically so far) and the planet turned to our country. Then it zoomed in further and further until we could see the roof of his house! My genetic father (mother has been married thrice) lives in Atlanta, Georgia, USA, so I typed in his address, the world shifted around, zoomed in, and all of a sudden I could see the roof of his house, the swimming pool in the backyard, driveway and street, trees etc. It was a real mind-blower. One of the best things about www.google.earth.com is that we can now look at real photographs of any part of the world: pyramids in Egypt, Shanghai city, beaches in Jamaica, you can go and look at any place on the globe. All you need to do is point and click your computer's mouse on any spot (address unnecessary), and it's free.
I eventually found my own house (it will be much easier when the whole world has been mapped by street names on the free downloadable version) and I think that the 20$ version has a GPS (Global positioning system) which must make finding things a lot easier. You can also get directions to local areas such as restaurants, parks, hospitals, schools and hotels. The idea is to combine Google's search abilities with imagery and mapping and I think it has great ramifications for the future of location information. You can then save and share your location searches with your friends and colleagues as well as adding your own data, as in my friend's case. Google Earth's users have already saved thousands of personal data points for you to look at and add to: EG: Show people where your business is located.
Another neat aspect of the technology is that you can tilt and rotate the satellite's view to give you a more 3-D perspective on buildings, mountains and landmarks on the terrain. Many people have asked me if the photos are real time and if you run out front of your house will you see yourself? We would need a lot of satellites out in orbit if we hoped to have this kind of 'Big Brother' capability and I'm sure ethical questions would also be raised.
If you are looking for directions the program will actually drive or fly you on the best route to get where you are going. The website has photos of ten of the most popular 'destinations' so you can check out the quality of the high-resolution photos. With the 'Measure' tool you can see how far it is to the local airport or from Paris to London. With the 'Pro' version at $200 (there are three versions) you can also measure area, radius, and perimeter, which can have many applications in professional situations. There are also different layers of mapping information you can click on so all the volcanoes or golf courses will come up automatically if they are what you choose to see in a specific area. If you are searching for places to dine, when a restaurant comes up on the screen you can click on 'more' and information such as hours of operation, menus, reviews, and links to the business website become available.
Pretty cool huh! The only problem you may have is that your computer may not be powerful enough to handle the software or 3-D graphics capability. You also miss out if you own a Macintosh, as a compatible version hasn't been built for them yet. Don't take my word for it, go to the site and check it out. You may find that it has applications that could change the face of your business as well as the way you look at traversing our world, not to mention the ease to which you will be able to locate pizzas anywhere on Earth.
Friday, May 6, 2005
Spyware Statistics -- What's New in May
The results of Spy Audit survey made by ISP Earthlink and Webroot Software are still fresh in memory of IT security experts. The study lasted for the whole last year; more than 4.6 million system scans were made in 2004. On May 3, 2005 the Webroot's State of Spyware Report was released. What's new in Q1 2005?
Although statistics often is blamed for various deadly sins -- from being biased to being inaccurate -- there is nothing left to those who are anyhow connected with IT but to keep up with fresh data. Since spyware is literally ubiquitous, nobody who owns or uses a PC can say that it is none of his business. So general public also has to keep an eye on the news about spyware.
On May 3 Webroot Software, a privately held anti-spyware company based in Boulder, Colorado, released a comprehensive report on spyware, The State of Spyware Report, -- an in-depth review and analysis of the impact of spyware, adware and other types of unwanted software on consumers and enterprises.
The results of Spy Audit survey made by ISP Earthlink and Webroot Software are still fresh in memory of IT security experts. The study lasted for the whole last year; more than 4.6 million system scans were made in 2004. What's new in 2005?
"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" that's the quote from the last year's Spy Audit survey. The first quarter of 2005, alas, confirmed these suggestions.
During Q1, 2005, 88% of scans made with Webroot's SpyAudit software found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumers' computers. The majority (87%) of corporate PCs also had unwanted programs or cookies.
Excluding cookies, which are not such a serious problem as key logger programs or Trojan horses, more than 55% of corporate PCs contained unwanted programs. There were an average of 7.2 non-cookie infections per PC.
System monitors (key logger programs) were found in 7% cent of consumer and enterprise PCs scanned by Webroot's software. In Q4 2004 there were 19%. Trojan horse programs were found on 19% of consumer PCs and 7% of enterprise PCs, the same figures as in Q4 2004.
This year's State of Spyware Report data come from Webroot's SpyAudit results and from online research made by Phileas, Webroot's automated spyware research system. Phileas has identified 4,294 sites (with almost 90,000 pages) containing some form of spyware.
This report for the first quarter of 2005 entirely confirmed the concept that had become as clear as day in 2004 -- from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security. Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing passwords, SSNs and other valuable information (keyloggers and keylogger-containing malware), certainly facilitate these crimes.
The complete report for Q1 2005 is available at http://www.webroot.com/stateofspyware (Registration is required) In the future an updated version of Webroot's State of Spyware Report will be released at the end of each quarter. Keep an eye on the news!
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc.
Although statistics often is blamed for various deadly sins -- from being biased to being inaccurate -- there is nothing left to those who are anyhow connected with IT but to keep up with fresh data. Since spyware is literally ubiquitous, nobody who owns or uses a PC can say that it is none of his business. So general public also has to keep an eye on the news about spyware.
On May 3 Webroot Software, a privately held anti-spyware company based in Boulder, Colorado, released a comprehensive report on spyware, The State of Spyware Report, -- an in-depth review and analysis of the impact of spyware, adware and other types of unwanted software on consumers and enterprises.
The results of Spy Audit survey made by ISP Earthlink and Webroot Software are still fresh in memory of IT security experts. The study lasted for the whole last year; more than 4.6 million system scans were made in 2004. What's new in 2005?
"Industry experts suggest that these types of programs [i.e. spyware in general] may reside on up to 90 percent of all Internet-connected computers" that's the quote from the last year's Spy Audit survey. The first quarter of 2005, alas, confirmed these suggestions.
During Q1, 2005, 88% of scans made with Webroot's SpyAudit software found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumers' computers. The majority (87%) of corporate PCs also had unwanted programs or cookies.
Excluding cookies, which are not such a serious problem as key logger programs or Trojan horses, more than 55% of corporate PCs contained unwanted programs. There were an average of 7.2 non-cookie infections per PC.
System monitors (key logger programs) were found in 7% cent of consumer and enterprise PCs scanned by Webroot's software. In Q4 2004 there were 19%. Trojan horse programs were found on 19% of consumer PCs and 7% of enterprise PCs, the same figures as in Q4 2004.
This year's State of Spyware Report data come from Webroot's SpyAudit results and from online research made by Phileas, Webroot's automated spyware research system. Phileas has identified 4,294 sites (with almost 90,000 pages) containing some form of spyware.
This report for the first quarter of 2005 entirely confirmed the concept that had become as clear as day in 2004 -- from being not much more than a nuisance for PC users, spyware turned into one of the major threats to information security. Since the Internet has become a part of daily life and business, rapid growth of such kinds of cybercrime as identity theft and phishing endanger the whole society. Some types of spyware, namely software capable of stealing passwords, SSNs and other valuable information (keyloggers and keylogger-containing malware), certainly facilitate these crimes.
The complete report for Q1 2005 is available at http://www.webroot.com/stateofspyware (Registration is required) In the future an updated version of Webroot's State of Spyware Report will be released at the end of each quarter. Keep an eye on the news!
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company that provides various solutions for information security.
The company's R&D department created an innovative technology, which disables the very processes of information capturing -- keylogging, screenshoting, etc.
Subscribe to:
Posts (Atom)