GreenBlack® Corporation: Another Way and Another Word

 

 

 
GreenBlack® Corporation 
Another Way and Another Word
Another Way  

Another Word

 

... to Handle Messages

Each message also has a context menu with options including Reply and Forward. To display the context menu, right-click the message in the mail list.

 

If you come across a tip in an article or on the Internet involving editing the Registry, make sure the article is talking about the Windows XP Registry. The Registry in different versions of Windows may work differently.

... to Create a New Folder

If you don't have the Folder List displayed, you can also create a folder from the File menu. In the File menu, click Folder, then click New. To then add the folder to the Outlook Bar, right-click the Outlook Bar, then click New Outlook Bar Shortcut. Select the folder, then click OK.

 

Keep in mind that separating the Internet from your internal network traffic is the default behavior of most firewalls. Since what you want to be able to do is access the Internet, probably the first thing you will do after installing a firewall is change the defaults and allow selected traffic through.

You can also duplicate a connection file, rename that duplicate file, and change the phone number in the Properties dialog box to create additional connections to your ISP's other POPs (or point of presence), which are connecting phone lines.

 

Do not enable Internet Connection Firewall (ICP) on any connection that does not directly connect to the Internet as it will interfere with communications with other computers on the network. For example, if you have a small office or home office network and each computer connects through a hub or gateway to the Internet, ICF should not be enabled.

... to Share a Folder

Click the folder you wish to share, and then click the Share this folder link in the left pane of the Windows Explorer window. This will open the folder's Properties dialog box with the Sharing tab opened. Click the Share this folder on the network check box, then click OK.

 

If a program is regularly not responding, you should determine exactly what type of task it is that causes this, make note of it, and attempt to get the problem fixed, by contacting either the manufacturer or someone within your organization. The Task manager is designed to take care of occasional problems, not for regular use to perform a task. Program files can become corrupted if they are subjected to repeated forced closings. Corrupted programs can sometimes be fixed by uninstalling and then reinstalling them from the original source.

... to Search for a Computer on Your Network

Click Start, then click Search. Click the link named Computers or people in the Search companion in the left pane. Click the A computer on the network link. Then proceed with searching as described above.

 

The term "hacker" has become notorious to describe a person who breaks into a computer system without authorization in order to do damage (destroy files, steal credit card numbers, plant viruses, etc.). Originally, however, a hacker was someone who wrote detailed programming code in the sense that the person was sitting there "hacking away" at a large, boring chore. The original term for someone who commits the illegal act of breaking into a computer system without invitation is a "cracker", meaning someone who has some hacking skill but is using it to "crack into" a network, and in that sense being a criminal hacker. Because a cracker uses low-level hacker skills to do cracking, the terms cracker and hacker became synonymous. Sadly, today the term hacker is more commonly used to describe the malicious individual rather than the honest, hard-working professional who performs skilled computer work.

... to Delete and Rename Favorites

In the Favorites menu and Favorites tool, the context menu includes options for renaming and deleting Favorites. Right-click the Favorite or folder, then click Rename or Delete in the context menu.

 

... on Network Settings

If you're not sure about the settings or don't have all of the information, you can always change these settings after the installation.

BACK | NEXT

 

 

 

Copyright of all documents and scripts belonging to this site by GreenBlack® Corporation 1998 - 2004. Most of the information contained on this site is copyrighted material. It is illegal to copy or redistribute this information in any way without the expressed written consent of GreenBlack® Corporation. This site is NOT responsible for any damage that the information on this site may cause to your system. Use at your own risk! Site Design by Prof. O.T.