MAIL-2-TRACY USER GUIDE. This document replaces revision D of this document.

Size: px
Start display at page:

Download "MAIL-2-TRACY USER GUIDE. This document replaces revision D of this document."

Transcription

1 DESCRIPTION 1 (5) MAIL-2-TRACY USER GUIDE This document replaces revision D of this document. Abstract This document describes the use of MAIL-2-TRACY to transfer tracability data from Contract Manufacturers ( CM ) to the Ericsson central tracability database TRACY. This document does not cover the interface between the local system Bartrack and TRACY. Please ask the supplier for Bartrack (Prevas AB) for information about Bartrack. The interface between the CM and Ericsson is built on . The sent from the CM will be processed automatically by the MAIL-2-TRACY server. A message will be returned from the MAIL-2-TRACY server to acknowledge that the tracability data has been received by Ericsson. This message will always be sent back to the original sender. Results from request and subscriptions will also be sent to the CM using the Mail-2-TRACY server.

2 DESCRIPTION 2 (5) 1 FORMAT OF THE TRACABILITY (TRACY) FILE The file sent to MAIL-2-TRACY shall follow the format defined for tracability files as described in the Ericsson Corporate Standard document Transmission of Information on Individual Marking to the central Data Base TRACY (Ericsson document no CRL Uen). All records types may be mixed in the same transfer, if needed. The files with the TRACY information should have unique names as they are saved as a backup in MAIL-2-TRACY. Max length of file name = 30! 2 MAIL FORMAT Depending on the platform used at the client side, a number of differentmethods and tools may be used to transfer the TRACY file to Ericsson. The table below gives an overview of this for three different client types : Client typ Direction File compression tool Mail encoding PC / Windows To Ericsson PKZIP / WinZip MIME attachment PC / Windows From Ericsson PKZIP / WinZip MIME attachment UNIX To Ericsson Compress or ZIP uuencode UNIX From Ericsson Compress or ZIP uuencode OpenVMS To Ericsson ZIP MFTU OpenVMS From Ericsson ZIP MFTU 2.1 NOTES ABOUT THE PC CLIENT TYPE Before being sent, the file should be compressed by PKZIP or WinZip. Note that gzip will not work and should be avoided. When sent, the ZIP file shall be attached to the mail as a MIME compliant BASE64 encoded attachment (standard attachment format in most mail client tools, such as Microsoft Outlook). Each ZIP file should contain just one (1) TRACY file. Each mail should contain just one (1) ZIP file.

3 DESCRIPTION 3 (5) 2.2 NOTES ABOUT THE UNIX CLIENT TYPE The Compress/Uncompress and UUencode/UUdecode tools are standard tools included in most or all different UNIX implementations. ZIP can also be used instead of Compress. Since there may be minor differences between UNIX es, some testing may be needed to verify that all is working as expected. Each compressed file should contain just one (1) TRACY file. Each mail should contain just one (1) compressed file. 2.3 NOTES ABOUT THE OPENVMS CLIENT TYP ZIP and UNZIP is the version of ZIP/UNZIP that is ported to OpenVMS. (Note that this is not the same tool as the gzip. gzip should not be used.) MFTU (Mail File Transfer Utility) is a tool for OpenVMS that codes binary files in a way so they can be sent by . Each ZIP file should contain just one (1) TRACY file. Each mail should contain just one (1) ZIP file.

4 DESCRIPTION 4 (5) 3 THE SUBJECT OF THE MAIL The Subject of the mail should include a string consisting of the site code and the text -FILE. E.g. if the site code is A01, the Subject must include A01-FILE. It could include other text, but the string as described above must also be included in the subject. N.B. Do not replace the text -FILE with the actual filename in the mail! 4 MAIL ADDRESS The mail shall be sent to: 5 RESULT MAIL When the mail have been processed by the MAIL-2-TRACY server, a result mail with a log is returned to the sender of the mail. An example of one of this messages follows: :21 Processing of MAIL-2-TRACY started :21 Mail received from : [mail address] :21 Subject of mail : [file name} :21 Site code : [site code] :21 (Using new TRACY format) :21 Unique ID : :21 Bartrack ID : :21 Processing of file TRCY SAV started :21 Number of E-records in file : :21 Transferred to TRACY OK :21 File TRCY SAV sent :21 Processing of MAIL-2-TRACY ended Any questions about Mail-2-TRACY can be forwardedto: Regards Mail-2-TRACY operations The actual content of this message may vary depending on the content of the file sent to Ericsson. The texts [mail address], [site code], [file name] are replaced with values from the actual transfer. There may be one or more lines with Number of?-records in file : nnn depending on the record types sent in the TRACY file. The text Transferred to TRACY OK shows that all has been processed successfully.

5 DESCRIPTION 5 (5) The Unique ID : is used to identify each transfer and may be used in communications with the Mail-2-TRACY support at Ericsson to make fault tracing easier. 6 REQUEST ANSWER When sending Y-records, a mail will be sent back to the sender with the basic individual information that corresponds to the actual Y-records. The subject of the mail will be TRACY-file <site> <Unique-ID>, where <site> is the actual site code and <Unique-ID> is the same unique ID as in the Result mail described in chapter 4. The TRACY file will be coded according to the table in chapter MAIL FORMAT depending on the client type of the actual site. 7 SUBSCRIPTIONS External sites that have subscriptions set up in TRACY to receive tracability information from other sites, will get this as s coded according to the table in chapter MAIL FORMAT depending on the client type of the actual site. 8 GETTING HELP 8.1 SUPPORT. Problems and other questions regarding the use of MAIL-2-TRACY, may be sent the MAIL-2-TRACY support mail address. See mail address below. Problems or questions regarding tracability in general or other matters regarding the business relation between the Contract Manufacturer and Ericsson, must be directed through proper channels, not through the support mail address mentioned below. Matters about MAIL-2-TRACY may be sent (by the local contact person) to : Specify the following in the mail : The Unique ID :, if available. Your site code. A description of the actual problem or question. The name of the file transmitted and when the original mail was sent.

File Transfer Protocol. What is Anonymous FTP? What is FTP?

File Transfer Protocol. What is Anonymous FTP? What is FTP? File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.

More information

tips A quick and easy guide to securing your private information www.pkware.com

tips A quick and easy guide to securing your private information www.pkware.com tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

EDI Support Services

EDI Support Services EDI Support Services User Documentation: Bulletin Board System (BBS) Dialing and Logging into the BBS To submit electronic files to EDISS, Trading Partners log into the BBS with a unique ID issued by EDISS.

More information

www.faxmyway.com USER MANUAL www.faxmyway.com Online Faxing Anywhere, Anytime sales@faxmyway.com Paperless Secure Faxing Anytime, Anywhere

www.faxmyway.com USER MANUAL www.faxmyway.com Online Faxing Anywhere, Anytime sales@faxmyway.com Paperless Secure Faxing Anytime, Anywhere www.faxmyway.com www.faxmyway.com Paperless Secure Faxing Anytime, Anywhere Online Faxing Anywhere, Anytime USER MANUAL sales@faxmyway.com sales@faxmyway.com GETTING STARTED Faxmyway is an email and web-based

More information

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail

More information

How to Backup and FTP your SQL database using E2.

How to Backup and FTP your SQL database using E2. How to Backup and FTP your SQL database using E2. To follow these instructions steps 1 14 must be completed either on the SQL Server or on a workstation that has the SQL Client Tools installed. You may

More information

Centers for Medicare and Medicaid Services. Connect: Enterprise Secure Client (SFTP) Gentran. Internet Option Manual 2006-2007

Centers for Medicare and Medicaid Services. Connect: Enterprise Secure Client (SFTP) Gentran. Internet Option Manual 2006-2007 Centers for Medicare and Medicaid Services Connect: Enterprise Secure Client (SFTP) Gentran Internet Option Manual 2006-2007 Version 8 The Connect: Enterprise Secure Client (SFTP) Manual is not intended

More information

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your

More information

Module 16: Some Other Tools in UNIX

Module 16: Some Other Tools in UNIX Module 16: Some Other Tools in UNIX We have emphasized throughout that the philosophy of Unix is to provide - (a) a large number of simple tools and (b) methods to combine these tools in flexible ways.

More information

This page left blank intentionally.

This page left blank intentionally. OWA 2010 This page left blank intentionally. Table of Contents What is OWA?... 5 Sending Mail... 5 How do I compose a message?... 5 How do add a signature to my outgoing mail?... 5 How do I check spelling

More information

FTP File Transfer Protocol A Method to Send and Receive Files via the Internet.

FTP File Transfer Protocol A Method to Send and Receive Files via the Internet. Page 1 - FTP Instructions Central Address Systems, Inc. 10303 Crown Point Avenue Omaha, Nebraska 68134-1061 402-964-9998 / 800-524-0908 402-963-2100 fax www.cas-online.com FTP File Transfer Protocol A

More information

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using

More information

What is SOAP MTOM? How it works?

What is SOAP MTOM? How it works? What is SOAP MTOM? SOAP Message Transmission Optimization Mechanism (MTOM) is the use of MIME to optimize the bitstream transmission of SOAP messages that contain significantly large base64binary elements.

More information

InformationNOW SQL 2008 Database Backup and Restoration

InformationNOW SQL 2008 Database Backup and Restoration InformationNOW SQL 2008 Database Backup and Restoration Backing up a SQL 2008 Database Users are advised to create frequent multiple offsite backups. Occasionally, it may be necessary to manually initiate

More information

PREPARATION OF ROYALTY PAYMENT SUMMARY

PREPARATION OF ROYALTY PAYMENT SUMMARY 5.03 Electronic Reporting File a separate Royalty Payment Summary (UT-3) for each oil or gas royalty payment electronically transmitted. Using the Internet, submit UT-3 information by one of the following

More information

How to configure your email client

How to configure your email client How to configure your email client This guide will teach you how to set up your email client. In this guide we will cover both Outlook and Windows Live mail, which are two of the major email clients used

More information

Backing up your WebCT Course

Backing up your WebCT Course Backing up your WebCT Page 1/6 BACKING UP YOUR WEBCT COURSE This document provides WebCT designers with a step-by-step guide to creating archive backups of the WebCT courses for which they have responsibility.

More information

The FTP Monitor application performs the following main functions:

The FTP Monitor application performs the following main functions: FTP Monitor Application The FTP Monitor application performs the following main functions: 1. Periodically monitors the files to be uploaded. 2. Automatically compresses and encrypts the files to be uploaded.

More information

Internet E-Mail Encryption S/Mime Standard

Internet E-Mail Encryption S/Mime Standard Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring

More information

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections : the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

Event Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.

Event Center (rev b) EVENT CENTER. VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp. EVENT CENTER 1 VPI 160 Camino Ruiz, Camarillo, CA 93012-6700 (Voice) 800-200-5430 805-389-5200 (Fax) 805-389-5202 www.vpi-corp.com All information in this manual is Copyright protected material by Voice

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2007 Email Signing and Encryption using Microsoft outlook 2007 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

Microsoft Outlook Web Access Handbook

Microsoft Outlook Web Access Handbook Microsoft Outlook Web Access Handbook Introduction Outlook Web access allows you to use a web browser (Internet Explorer or Firefox) to read your email, send email, and check your online calendar. This

More information

Attachment 6 - Email Interface For External Systems Wersja: 4.0

Attachment 6 - Email Interface For External Systems Wersja: 4.0 MINISTRY OF FINANCE SYSTEM INTEGRATION PLAN ATTACHMENT 6 SEAP SPECIFICATION EMAIL INTERFACE FOR EXTERNAL SYSTEMS PROJECT ECIP/SEAP VERSION 1 z 15 Table of Contents 1. Email Interface for External

More information

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010

Prerequisite. Getting Started. Email Signing and Encryption using Microsoft outlook 2010 Email Signing and Encryption using Microsoft outlook 2010 Prerequisite a. The user s email account has been added and correctly configured into Microsoft outlook. b. The user has an authentication certificate.

More information

Configuring the CyberData VoIP 4-Port Zone Controller with Audio Out

Configuring the CyberData VoIP 4-Port Zone Controller with Audio Out NetVanta Unified Communications Technical Note Configuring the CyberData VoIP 4-Port Zone Controller with Audio Out Introduction The CyberData Voice over Internet Protocol (VoIP) zone controller enables

More information

InformationNOW SQL 2005 Database Backup and Restoration

InformationNOW SQL 2005 Database Backup and Restoration InformationNOW SQL 2005 Database Backup and Restoration Backing up a SQL 2005 Database Users are advised to create an hourly or nightly database backup maintenance plan. Occasionally, it may be necessary

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Client/Server Messaging System v3.28 Client User's Guide

Client/Server Messaging System v3.28 Client User's Guide Client/Server Messaging System v3.28 Client User's Guide Client/Server Messaging System v3.28 Client User's Guide Page 1 Contents 1 Introduction...3 2 Glossary...3 3 What is the Messaging System?...4 4

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

emedny FTP Batch Dial-Up Number 866 488 3006 emedny SUN UNIX Server ftp 172.27.16.79

emedny FTP Batch Dial-Up Number 866 488 3006 emedny SUN UNIX Server ftp 172.27.16.79 This document contains most of the information needed to submit FTP Batch transactions with emedny. It does not contain the unique FTP User ID/Password required to log in to the emedny SUN UNIX Server.

More information

Recalling A Sent Message in Outlook 2010

Recalling A Sent Message in Outlook 2010 Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft

More information

Chapter 6 Electronic Mail Security

Chapter 6 Electronic Mail Security Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,

More information

Set up Outlook for your new student e mail with IMAP/POP3 settings

Set up Outlook for your new student e mail with IMAP/POP3 settings Set up Outlook for your new student e mail with IMAP/POP3 settings 1. Open Outlook. The Account Settings dialog box will open the first time you open Outlook. If the Account Settings dialog box doesn't

More information

Domainz Mail Client Setup User Guide Version 3.0 06 July 2011

Domainz Mail Client Setup User Guide Version 3.0 06 July 2011 Domainz Mail Client Setup User Guide Version 3.0 06 July 2011 1 1 Domainz Limited Level 1, 138 The Terrace Private Bag 1810 Wellington New Zealand Phone: +64 4 473 4567 Fax: +64 4 4734569 Email: getonline@domainz.net.nz

More information

Chapter 2 Managing Your Modem Router

Chapter 2 Managing Your Modem Router Chapter 2 Managing Your Modem Router This chapter describes how to perform management tasks on your ADSL2+ Modem Router DM111PUSP. To use the features described in this chapter, log in to the modem router

More information

Email Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming

Email Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming Email Setup Guide 1. Entourage 2008 Page 2 2. ios / iphone Page 5 3. Outlook 2013 Page 10 4. Outlook 2007 Page 17 5. Windows Live Mail a. New Account Setup Page 21 b. Change Existing Account Page 25 Entourage

More information

Extracting an S/MIME certificate from a digital signature

Extracting an S/MIME certificate from a digital signature Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

Communications and Connectivity

Communications and Connectivity Chapter V Communications and Connectivity Trading partners are responsible for the purchase of communication protocol packages and access support for the dial-up process to the Enterprise EDI Gateway/Clearinghouse.

More information

Configuring Email Notification for Business Glossary

Configuring Email Notification for Business Glossary Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

GFI MailArchiver for Exchange 4. Manual. By GFI Software

GFI MailArchiver for Exchange 4. Manual. By GFI Software GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

ClearView Connects Help

ClearView Connects Help ClearView Connects Help Table of Contents General... 1 1. How does this system work?... 1 2. How do I make a report?... 1 3. Can I use my computer at home?... 1 4. Who receives the information in my report?...

More information

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?... FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2

More information

FTP and email. Computer Networks. FTP: the file transfer protocol

FTP and email. Computer Networks. FTP: the file transfer protocol Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

StreamServe Encryption and Authentication

StreamServe Encryption and Authentication StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A StreamServe Encryption and Authentication User Guide 4.1.2 SP2 Rev A 2007 StreamServe, Inc. StreamServe is a trademark of StreamServe,

More information

VRM Monitor. Online Help

VRM Monitor. Online Help VRM Monitor en Online Help VRM Monitor Table of Contents en 3 Table of Contents 1 Introduction 3 2 System overview 3 3 Getting started 4 3.1 Starting VRM Monitor 4 3.2 Starting Configuration Manager 4

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

CompleteView Admin Console Users Guide. Version 3.0.0 Revised: 02/15/2008

CompleteView Admin Console Users Guide. Version 3.0.0 Revised: 02/15/2008 CompleteView Admin Console Users Guide Version 3.0.0 Revised: 02/15/2008 Table Of Contents Configuration... 3 Starting the Admin Console... 3 Adding a Server... 4 Monitoring Server Status... 6 Menus...

More information

mailtunnel Quick Guide ENCRYPTED TUNNEL COMENDO DATA CENTER SECURITY CENTER SPAM+VIRUS LOGS

mailtunnel Quick Guide ENCRYPTED TUNNEL COMENDO DATA CENTER SECURITY CENTER SPAM+VIRUS LOGS COMENDO CUSTOMER ENCRYPTED TUNNEL INBOUND E-MAIL COMENDO DATA CENTER RECEIVED E-MAIL SECURITY CENTER SPAM+VIRUS LOGS Comendo offers encryption of your e-mail connection. It ensures that all e-mail communication

More information

Configuring a mailbox. 2012-10 Version 1-800-360-8555. Configuring a mailbox

Configuring a mailbox. 2012-10 Version 1-800-360-8555. Configuring a mailbox Hi-Speed INTERNET USER GUIDE 2012-10 Version 1-800-360-8555 Table of contents 5....3 5.1 Configuring Outlook Express...3 5.2 Configuring Outlook 2000/XP...7 5.3 Configuring Windows Mail 6.0...10 5.4 Configuring

More information

Email Electronic Mail

Email Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Instructions Microsoft Outlook Express Page 1

Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express Page 1 Instructions Microsoft Outlook Express This manual is written for users who already have an e-mail account configured in Outlook Express and will therefore

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE

Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3

Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need

More information

Quick DDNS Quick Start Guide

Quick DDNS Quick Start Guide Quick DDNS Quick Start Guide DDNS 快 速 指 导 手 册 1 / 11 Before Use The device must be connected to the Internet, please check if the connection works properly. Please confirm Internet access port is open

More information

Supplement 113 Email Transport

Supplement 113 Email Transport Digital Imaging and Communications in Medicine (DICOM) Supplement 113 Email Transport Prepared by: DICOM Standards Committee, Working Group 1300 N. 17th Street Suite 175 Rosslyn, Virginia 09 USA VERSION:

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

Application Notes for Configuring a SonicWALL Continuous Data Protection (CDP) backup solution with Avaya VoiceMail Pro - Issue 1.

Application Notes for Configuring a SonicWALL Continuous Data Protection (CDP) backup solution with Avaya VoiceMail Pro - Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL Continuous Data Protection (CDP) backup solution with Avaya VoiceMail Pro - Issue 1.0 Abstract These Application

More information

johnireland@eircom.net

johnireland@eircom.net Email Electronic mail is the transmission of mainly text based messages across networks. This can be within a particular network - internal mail - or between networks - external mail. The most common network

More information

EDGAR. EDGAR Public Dissemination Service New Subscriber Document

EDGAR. EDGAR Public Dissemination Service New Subscriber Document EDGAR ELECTRONIC DATA GATHERING, ANALYSIS, AND RETRIEVAL EDGAR Public Dissemination Service New Subscriber Document Updated Jul-01-14 Table of Contents 1.0 PDS System Overview...2 1.1 PDS Points of Contact...

More information

Scala InfoChannel Content Manager 5 Backup and Restore Instructions

Scala InfoChannel Content Manager 5 Backup and Restore Instructions 4 Scala InfoChannel Content Manager 5 Backup and Restore Instructions This document describes how to backup and restore Scala InfoChannel Content Manager 5. Databases currently supported are: PostgreSQL

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com.

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com. 700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Email Setup Guide 1. Entourage 2008 Page 2 2. Outlook 2007 Page 5 3. Outlook 2003 Page

More information

PC Instructions for Miller LiveArc Software

PC Instructions for Miller LiveArc Software PC Instructions for Miller LiveArc Software Contents Instructions for Installing LiveArc Software on a PC... 2 Instructions for Loading Data from the LiveArc System onto a PC... 10 Instructions for Transferring

More information

Corporate Access File Transfer Service Description Version 1.0 01/05/2015

Corporate Access File Transfer Service Description Version 1.0 01/05/2015 Corporate Access File Transfer Service Description Version 1.0 01/05/2015 This document describes the characteristics and usage of the Corporate Access File Transfer service, which is for transferring

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Using AppMetrics to Handle Hung Components and Applications

Using AppMetrics to Handle Hung Components and Applications Using AppMetrics to Handle Hung Components and Applications AppMetrics has the ability to detect hung COM+ components and applications, providing a means of alerting staff to situations where critical

More information

94x MeF e-file Application Guidelines

94x MeF e-file Application Guidelines Step 1: Registration for the e-file Application Transmitters, Software Developers and Reporting Agents who have not submitted an online e-file Application must do so through e-services. Publication 3112

More information

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers

More information

Microsoft Office 365 with MailDefender

Microsoft Office 365 with MailDefender (PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland

More information

Hooks could have been left around for the imposter to regain control. A.Arpaci-Dusseau. Remove all files from disk and reinstall all software

Hooks could have been left around for the imposter to regain control. A.Arpaci-Dusseau. Remove all files from disk and reinstall all software UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 537 A. Arpaci-Dusseau Intro to Operating Systems Spring 2000 Security Solutions and Encryption Questions answered in these notes: How does

More information

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015 CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,

More information

User Manual of Web Client

User Manual of Web Client User Manual of Web Client 1 Index Chapter 1 Software Installation... 3 Chapter 2 Begin to Use... 5 2.1 Login and Exit... 5 2.2 Preview Interface Instruction... 6 2.3 Preview Image... 7 Chapter 3 Playback...

More information

StreamServe Persuasion SP4 Encryption and Authentication

StreamServe Persuasion SP4 Encryption and Authentication StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP4 Encryption and Authentication User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United

More information

Product Line Overview

Product Line Overview Product Line Overview What s on the menu Product Line overview Introducing WinZip V14 Positioning Solutions What s New? Value proposition Customers Our Competitors WinZip E-Mail Companion 2.0 Zips and

More information

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK. Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...

More information

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling

Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling Erado Archiving & Setup Instruction Microsoft Exchange 2007 Push Journaling This document covers the following Microsoft Exchange Server Editions Microsoft Exchange Enterprise Edition 2007 Microsoft Exchange

More information

FILE TRANSFER PROTOCOL (FTP) SITE

FILE TRANSFER PROTOCOL (FTP) SITE FILE TRANSFER PROTOCOL (FTP) SITE Section 1 - SPIN System Overview As part of the digital plan submission process that Registries is currently implementing a File Transfer Protocol (FTP) site has been

More information

Guidance for IA DMM: Connecting Your Computer to FSU Video File Server

Guidance for IA DMM: Connecting Your Computer to FSU Video File Server 1 Guidance for IA DMM: Connecting Your Computer to FSU Video File Server This guide will walk you through the process of connecting your computer to the FSU Video File Server and then uploading video files

More information

CA Workload Automation Agent for Databases

CA Workload Automation Agent for Databases CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

SmartWatch Eco/Eco Compact

SmartWatch Eco/Eco Compact SmartWatch Eco/Eco Compact Digital Video Recorders SmartWatch Eco SmartWatch Eco Compact Mobile Application Installation & Operation Manual Table of Contents Introduction...3 Installation and Operation

More information

orrelog SNMP Trap Monitor Software Users Manual

orrelog SNMP Trap Monitor Software Users Manual orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

StreamServe Persuasion SP5 Encryption and Authentication

StreamServe Persuasion SP5 Encryption and Authentication StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A StreamServe Persuasion SP5 Encryption and Authentication User Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United

More information

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows

Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the

More information

Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise. Citrix EasyCall Gateway 2.1Q

Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise. Citrix EasyCall Gateway 2.1Q Citrix EasyCall Gateway Telephony System Integrator s Guide for Alcatel OmniPCX Enterprise Citrix EasyCall Gateway 2.1Q Copyright and Trademark Notice Use of the product documented in this guide is subject

More information

UltraSMS. Introduction. 1. First Run 1.1 Setup 1.2 Settings

UltraSMS. Introduction. 1. First Run 1.1 Setup 1.2 Settings UltraSMS Introduction 1. First Run 1.1 Setup 1.2 Settings 2. Manage Contacts 2.1 Insert/modify/cancel a contact 2.2 Import contacts from Outlook 2.3 Create a list of numbers and import it in UltraSMS software

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information