... to Handle
Messages
Each message also
has a context menu with options including Reply and
Forward. To display the context menu, right-click the
message in the mail list. |
|
If you
come across a tip in an article or on the Internet
involving editing the Registry, make sure the article is
talking about the Windows XP Registry. The Registry in
different versions of Windows may work differently. |
|
... to Create a New
Folder
If you don't have
the Folder List displayed, you can also create a folder
from the File menu. In the File menu, click
Folder, then click
New. To then add the
folder to the Outlook Bar, right-click the
Outlook Bar, then click
New Outlook Bar Shortcut.
Select the folder, then click
OK. |
|
Keep in mind that separating
the Internet from your internal network traffic is the
default behavior of most firewalls. Since what you
want to be able to do is access the Internet,
probably the first thing you will do after installing a
firewall is change the defaults and allow selected
traffic through. |
|
You can
also duplicate a connection file, rename that duplicate
file, and change the phone number in the Properties
dialog box to create additional connections to your
ISP's other POPs (or point of presence), which are
connecting phone lines. |
|
Do not enable Internet
Connection Firewall (ICP) on any connection that does
not directly connect to the Internet as it will
interfere with communications with other computers on
the network. For example, if you have a small office or
home office network and each computer connects through a
hub or gateway to the Internet, ICF should not be
enabled. |
|
... to Share a Folder
Click the folder you wish to share, and then click the
Share
this folder
link in the left pane of the Windows Explorer window.
This will open the folder's Properties dialog box with
the Sharing tab opened. Click the
Share this
folder
on the network check box, then click
OK. |
|
If a program
is regularly not responding, you should determine
exactly what type of task it is that causes this, make
note of it, and attempt to get the problem fixed, by
contacting either the manufacturer or someone within
your organization. The Task manager is designed to take
care of occasional problems, not for regular use to
perform a task. Program files can become corrupted if
they are subjected to repeated forced closings.
Corrupted programs can sometimes be fixed by
uninstalling and then reinstalling them from the
original source. |
|
... to Search for a Computer on Your Network
Click
Start,
then click
Search.
Click the link named
Computers or
people
in the Search companion in the left pane. Click the
A
computer on the network
link. Then proceed with searching as described above. |
|
The term
"hacker" has become notorious to describe a person who
breaks into a computer system without authorization in
order to do damage (destroy files, steal credit card
numbers, plant viruses, etc.). Originally, however, a
hacker was someone who wrote detailed programming code
in the sense that the person was sitting there "hacking
away" at a large, boring chore. The original term for
someone who commits the illegal act of breaking into a
computer system without invitation is a "cracker",
meaning someone who has some hacking skill but is using
it to "crack into" a network, and in that sense being a
criminal hacker. Because a cracker uses low-level hacker
skills to do cracking, the terms cracker and hacker
became synonymous. Sadly, today the term hacker is more
commonly used to describe the malicious individual
rather than the honest, hard-working professional who
performs skilled computer work. |
|
... to Delete and Rename Favorites
In the Favorites menu and Favorites tool, the context
menu includes options for renaming and deleting
Favorites. Right-click the Favorite or folder, then
click
Rename
or
Delete
in the context menu. |
|
... on Network Settings
If you're not sure about the
settings or don't have all of the information, you can
always change these settings after the installation. |
|