Wednesday, October 29, 2008

How to move the Standard toolbar to a location that is above the Address bar in Internet Explorer 7

INTRODUCTION

This article describes how to move the Standard toolbar to a location that is above the Address bar in Windows Internet Explorer 7.

MORE INFORMATION

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 How to back up and restore the registry in Windows


When you press a keyboard combination, such as ALT+F, to open a menu on the Standard toolbar in Windows Internet Explorer 7, the Standard toolbar menu appears under the Address bar. You may want the Standard toolbar to be located above the Address bar in Internet Explorer 7. To move the Standard toolbar to a location that is above the Address bar in Internet Explorer 7, follow these steps.

Windows Vista

1. Click StartStart button, type regedit in the Start Search box, and then click regedit in the Programs list.

User Account Control permission If you are prompted for an administrator password or for confirmation, type your password, or click Continue.
2. Locate and then click the following registry subkey:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
3. Right-click WebBrowser, point to New, and then click DWORD (32-bit) Value.
4. In the New Value #1 box, type ITBar7Position, and then press ENTER.
5. Right-click ITBar7Position, and then click Modify.
6. In the Value data box, type 1, and then click OK.
7. Exit Registry Editor, and then start Internet Explorer 7.


Microsoft Windows XP


1. Click Start, click Run, type regedit, and then click OK.
2. Locate and then click the following registry subkey:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser
Note If the WebBrowser key does not exist, you must create it. To do this, follow these steps:
a. Right-click Toolbar, point to New, and then click Key.
b. In the New Key #1 box, type WebBrowser, and then press ENTER.
3. Right-click WebBrowser, point to New, and then click DWORD Value.
4. In the New Value #1 box, type ITBar7Position, and then press ENTER.
5. Right-click ITBar7Position, and then click Modify.
6. In the Value data box, type 1, and then click OK.
7. Exit Registry Editor, and then start Internet Explorer 7.

APPLIES TO
• Windows Internet Explorer 7 for Windows XP
• Windows Vista Business
• Windows Vista Enterprise
Windows Vista Home Basic
• Windows Vista Home Premium
• Windows Vista Ultimate
• Windows Vista Enterprise 64-bit Edition
• Windows Vista Home Basic 64-bit Edition
• Windows Vista Home Premium 64-bit Edition
• Windows Vista Ultimate 64-bit Edition
• Windows Vista Starter


source http://support.microsoft.com/

Tuesday, October 21, 2008

Email Delivery Codes: Errors

:: Error Delivery Codes

Now i am going to explane about Email Delevary Error, and try to give tips for Online Email Problem Support.How many times you got your outgoing emails back and wondered what is wrong with it? Every time when your email can not be delivered, the SMTP server sends you a notification, which includes a standard error message, associated with the real problem.

Each code is composed of three digits (X.X.X). The first digit gives the status of the email message:
# 2 means the email was succesfully sent;
# 4 means there was a temporary problem while sending the email (your email server may try to send it again or you have to resend it, depending on your server settings). Such error messages are using codes like 4.X.X, where X.X are used in order to give more precise information about the error;
# 5 means there is a permanent/fatal error related to the email (the email address of the receiver does not exist, it doesn't accept emails from you, etc). Such error messages are using codes like 5.X.X, where X.X are used in order to give more precise information about the error.


Here is a complete list of email delivery error codes, based on the Extended SMTP (ESMTP) standards, where X can be 4 or 5, depending on the error type (Persistent Transient or Permanent):

* X.1.0 Other address status
* X.1.1 Bad destination mailbox address
* X.2.0 Bad destination system address
* X.1.3 Bad destination mailbox address syntax
* X.1.4 Destination mailbox address ambiguous
* X.1.5 Destination mailbox address valid
* X.1.6 Mailbox has moved
* X.1.7 Bad sender's mailbox address syntax
* X.1.8 Bad sender's system address

* X.2.0 Other or undefined mailbox status
* X.2.1 Mailbox disabled, not accepting messages
* X.2.2 Mailbox full
* X.2.3 Message length exceeds administrative limit.
* X.2.4 Mailing list expansion problem

* X.3.0 Other or undefined mail system status
* X.3.1 Mail system full
* X.3.2 System not accepting network messages
* X.3.3 System not capable of selected features
* X.3.4 Message too big for system

* X.4.0 Other or undefined network or routing status
* X.4.1 No answer from host
* X.4.2 Bad connection
* X.4.3 Routing server failure
* X.4.4 Unable to route
* X.4.5 Network congestion
* X.4.6 Routing loop detected
* X.4.7 Delivery time expired

* X.5.0 Other or undefined protocol status
* X.5.1 Invalid command
* X.5.2 Syntax error
* X.5.3 Too many recipients
* X.5.4 Invalid command arguments
* X.5.5 Wrong protocol version

* X.6.0 Other or undefined media error
* X.6.1 Media not supported
* X.6.2 Conversion required and prohibited
* X.6.3 Conversion required but not supported
* X.6.4 Conversion with loss performed
* X.6.5 Conversion failed

* X.7.0 Other or undefined security status
* X.7.1 Delivery not authorized, message refused
* X.7.2 Mailing list expansion prohibited
* X.7.3 Security conversion required but not possible
* X.7.4 Security features not supported
* X.7.5 Cryptographic failure
* X.7.6 Cryptographic algorithm not supported
* X.7.7 Message integrity failure

Click For more Online Email Error Support

Monday, October 13, 2008

Benefits of Creating Email Rules in Microsoft Outlook

Microsoft Outlook is one of the most preferred e-mail clients which offer a calendar, a journal, web browsing, task and contact management. It comes bundled with the Microsoft Office suite.

Computer savvys use Outlook the most as it helps them to communicate through email, offers phone support and other features like group scheduling. Users can customize every mail they send or receive. This is done by creating rules for handling of incoming email messages. Email rules serve as etiquette guides and differ according to personal choice or nature of users’ business. In other words, an email rule is a set of conditions that help in processing and organizing messages automatically. The condition will specify the messages that the rule will apply to.

Outlook will compare every incoming/outgoing messages to the conditions and rules set. Messages fulfilling the conditions are the handled according to the rules defined actions. This is why it is always suggested to create email rules based on the content of the e-mail.

Creating email rules help users to designate all emails from a particular sender or email service provider to a particular folder. Rules can be used to set up notification, such as an email alert tone when any important email comes. The user can assign different categories to messages to be sent depending on contents of the email. Overall, setting email rules allows easy mail management and simplify the task to a great extent.

Although sending and receiving emails work efficiently in Outlook, but some un-explained error may pop up sometime. Some error messages do not feature usable information for analyzing the problem. Outlook email errors and other email problems can easily be troubleshooted through Outlook Support which is easily available on the Internet nowadays. Such support services are also known as online tech support and is certainly cheaper than calling an expensive technician to premises.

The advantage of tech support lies in its simplicity to offer the customer to control all actions taken on his/her system. Speaking of the online support services, the customer can pick the brains of an expert technician to get their problem solved within a few minutes.

Thursday, October 2, 2008

Learning from the Congressional E-Mail Bottleneck

In the U.S., people are so upset with their congressional leaders with regard to the economic bailout measure that they are overwhelming the e-mail Support system contacting their representatives. As a result, many are getting a message similar to what they would get if they overwhelmed a phone system: “Try back later.” This creates a bigger problem for Congress; voters who are already upset with their congressional leaders are given the impression that those leaders don’t have the time for them during a crucial period, and mail that may be critical on other subjects isn’t getting through. Unfortunately, even when the mail does get through, it is coming in such massive numbers that there may be no real way to analyze it in time to respond effectively.

In addition, it is likely that a relatively few panicked constituents are generating most of the traffic and that spam is significantly exacerbating this problem. There are tools that can help with all of this.

Anti-Spam Tools Applied to the Email Problem

SonicWall has one of the leading tools used to address traffic management issued. While it is primarily designed to address directory harvest and denial of service attacks, this same tool could be applied to the problem that Congress is experiencing by removing not only the spam but blocking only the individuals who feel the need to e-mail several times a day and thus overload the system.

SonicWall works at both the e-mail and the connection level to do pattern analysis so that it can deal with massive volumes and keep an e-mail system from being buried by a wave.

A similar product called Praetor G2, while more closely aligned with anti-spam activities, promotes a rule wizard feature that could be used to aggregate waves of messages into buckets automatically and help set up the result for analysis.

The Appeal of Hosted

BoldMail was developed to address sales-oriented problems and appears designed primarily for marketing campaigns that could create high loading levels on e-mail systems. This, coupled with a lot of volunteers, could be very useful. Assuming you had the manpower, it could take the remaining inbound e-mail, route it to a volunteer for response, and provide metrics as to how quickly and effectively the responses were handled.

BoldMail is a hosted solution, which means it could be used as a stop gap measure so that extra resources would be available during a crisis, but those extra costs wouldn’t be incurred during times when traffic was at more normal levels. This could be particularly useful during a proxy fight, when new products are rolled out to mass markets for both sales and service support, and any time traffic loading exceeded system capabilities.

Analyze What You Have

Tools like HP’s RISS (one of the most powerful), Clearwell Email Intelligence (one of the most innovative), and EMC’s tools (richest tool set) can then be used for e-mail analysis. Part of the problem isn’t just getting back to the constituent, it is rapidly rolling up what these voters want and voting on the bailout program in a timely fashion. These tools are designed to analyze large mail repositories for regulatory compliance, but they can be applied to this problem as well to determine trends and rapidly form opinions based on what is coming in real time.

These tools do appear to require a substantial amount of expertise but that, in my experience, is true of any good analysis tool. The person using it needs to know how to do so properly or the results won’t be reliable.

Wrapping Up

Each of the tools I’ve identified has peers; in some cases, I’ve listed them, but the time to have a plan in place to deal with a problem like the one the U.S. Congress is dealing with is before that problem occurs. The fact that congressional IT managers have to block critical e-mail and put the politicians’ jobs and effectiveness at risk suggests this planning wasn’t done and lowers the overall impression of congressional effectiveness. With approval ratings already at an all-time low, this doesn’t bode well for reelections.

So too in business, if stockholders or customers can’t get through to the company, they are likely to make decisions that will result in layoffs or even company failures. I recall that a similar problem during the Windows 95 launch caused sales for that product to crater. This was one of the big turning points in Microsoft’s history, when it went from a firm that folks stood in line for towards being one that created product concerns.

It might be wise to make sure you have a plan to deal with an e-mail wave, and it probably is a good idea to be able to analyze e-mail more effectively, if only to make sure people are being responsive to customer needs.