What is Microsoft Office Outlook Connector


The Outlook Connector enables two-way synchronization of e-mail messages, calendar items, contacts, tasks, and notes between Outlook and Windows Live Hotmail.

Note Calendar synchronization with Outlook is a paid, subscription-only feature. When you subscribe to Windows Live Hotmail, you get to synchronize notes and tasks as well as your calendar.

If you do not have a Windows Live Hotmail account, you can either sign up for a new account or update your existing MSN Hotmail account to be a Windows Live Hotmail account.

To update from MSN Hotmail to Windows Live Hotmail, click the Join Windows Live Hotmail link when you log on to your account. All of your messages, folders, and contacts will automatically appear in your new account. Your e-mail address will not change.

I have to sketch out the details once again before this Monday for a official presentation. But then what i want to share here with you is my experience of sharing the Microsoft Outlook and providing Computer Help

Install IRM for e-mail messages


Information Rights Management (IRM), available in Microsoft Office Outlook 2007, allows individuals to specify access permissions to e-mail messages. By using IRM, it helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. Your organization must install and deploy IRM before you can use it.

For more information about IRM in Office Outlook 2007, see Introduction to using IRM for e-mail messages.

Running Windows Vista The Windows Rights Management Services (RMS) Client is already installed. Go to the following section, Step 2: Download permissions.

Running Microsoft Windows XP The Windows Rights Management Services (RMS) Client Service Pack 1 (SP1) must be installed on your computer either by you or your RMS administrator. To install IRM, you should start with Step 1: Install the Windows Rights Management Services (RMS) Client.

Install the Windows Rights Management Services (RMS) Client

If you use a computer that is running Windows Vista, the Windows Rights Management Services (RMS) Client is already installed.

  1. In Windows XP, click the Start button, and then click Control Panel.
  2. Click Add or Remove Programs, and then click Add or Remove Programs.
  3. Click Add New Programs.
  4. In the list of programs, click Windows Rights Management Services Client, and then click Add.

Note In Classic view, double-click Add or Remove Programs, and then in the left pane, click Add New Programs. In the list of programs, click Windows Rights Management Services Client, and then click Add.

Alternatively, when you first try to open files that have been rights managed by using IRM, the 2007 Office release prompts you to download the Windows Rights Management Services Client if you are running a computer without that software. For more information about the Windows Rights Management Services Client, visit the Windows Rights Management Services Web site.

Download permissions

The first time that you try to open an e-mail message that uses restricted permission, you must connect to a licensing server to verify your credentials and to download a use license. The use license defines the level of access that you have to a file. This process is required for each file that uses restricted permission. In other words, content with restricted permission cannot be opened without a use license. Downloading permissions requires that Microsoft Office send your credentials (which includes your e-mail address) and information about your permission rights to the licensing server. Information that is contained in the e-mail message is not sent to the licensing server. For more information, read the Privacy Statement.

Configuring IRM policies and permissions

A Windows Rights Management Services (RMS) administrator configures company-specific IRM policies that define who can access information and what level of editing is permitted for an e-mail message. For example, a company administrator might define a rights template called "Company Confidential," which specifies that an e-mail message that uses that policy can be opened only by users inside the company domain. For more information about the Windows Rights Management Services Client, visit the Windows Rights Management Services Web site.

After installing and configuring IRM on your computer, you can view the permission levels available to you by clicking the Microsoft Office Button, and then pointing to

Permission

Custom permissions are those created by your e-mail administrator and based on company policies. If you do not see a specific permission in the Set permission on this item list, it might be because one of the following reasons.

  • You must use a different Windows user account. For more information, see the "Change the Windows user account used to send rights-managed e-mail messages" section in the Send an e-mail message with restricted permission by using IRM article.
  • The permission level is not available to you or might not be included in your company's IRM policy. You should submit a request to your e-mail administrator to make any changes.
I want to share my Experience with Microsoft Outlook and Computer Help


How to format Disk

|

Formatting a disk erases all information on that disk.

Do one of the following:

Windows Vista

  1. If the disk that you want to format is a floppy disk, insert it into its drive. Otherwise, skip to step 2.
  2. Click the Start button, and then click Computer.
  3. Right-click the disk that you want to format, and then click Format.
  4. Select the options that you want.
  5. Click Start.

Microsoft Windows XP

  1. If the disk that you want to format is a floppy disk, insert it into its drive. Otherwise, skip to step 2.
  2. In Windows XP, click Start, and then click My Computer.
  3. Click the disk that you want to format.
  4. On the File menu, click Format.
  5. Select the options that you want.
  6. Click Start.

Notes

The Quick Format option (Format dialog box) removes files from the disk without scanning the disk for bad sectors. Select this check box only if the disk has been previously formatted and you are sure that the disk is not damaged.

For information about any of the options in the Format dialog box, click the question mark in the upper-right corner of the dialog box, and then click the option.

You cannot format a disk if files are open on the disk, if the contents of the disk are displayed or if the disk contains the system or boot partition. If you are facing any problem to do it you can take Computer Help

How to Reduce Spam

|

There are some guidelines given below which is help to reduce Spam. These are following….
  1. Take advantage of the Junk E-mail Filter in Microsoft Office Outlook 2007 Office Outlook 2007 helps to mitigate the problem of spam by providing the Junk E-mail Filter, which automatically evaluates incoming messages and sends those identified as spam to the Junk E-mail folder.
  2. Block pictures in HTML messages that spammers use as Web beacons Office Outlook 2007 has an additional anti-spam feature. By default, this feature blocks automatic picture downloads and other external content in messages if the content is linked to a server. If you open a message that has external content when this feature is turned off, the external content downloads automatically, inadvertently verifying to the server that your e-mail address is a valid one. Your e-mail address can then be sold to a spammer. You can unblock external content for messages that come from sources that you trust. For details, see Block or unblock automatic picture downloads in e-mail messages.
  3. Turn off read and delivery receipts and automatic processing of meeting requests Spammers sometimes resort to sending meeting requests and messages that include requests for read and delivery receipts. Responding to such meeting requests and read receipts might help spammers to verify your e-mail address. You can turn off this functionality. However, read and delivery receipts and automatic processing of meeting requests are useful features that you should not be afraid to use within a secure corporate network.

Note Delivery receipts can be turned off only by your e-mail server administrator.

Turn off read receipts

    1. On the Tools menu, click Options.
    2. Click E-mail Options.
    3. Click Tracking Options.
    4. Under Use this option to decide how to respond to requests for read receipts. Only applies to Internet Mail accounts, click Never send a response.

Turn off automatically acceptance of meeting requests

1. In Outlook, on the Tools menu, click Options, and then click Calendar Options.

2. Under Advanced options, click Resource Scheduling.

3. Clear the Automatically accept meeting requests and process cancellations check box.

4. Limit the places where you post your e-mail address Be cautious about posting your e-mail address on public Web sites, such as newsgroups, chat rooms, bulletin boards, and so forth. When visiting public sites, you might want to use an e-mail address that is different from your main e-mail address. Remove your e-mail address from your personal Web site. Whenever you list or link to your e-mail address, you increase your chances of being spammed.

5. Review the privacy policies of Web sites When you sign up for online banking, shopping, or newsletters, review the privacy policy of the site carefully before you reveal your e-mail address or other personal information. Look for a link or section (usually at the bottom of the Web site's home page) called "Privacy Statement," "Privacy Policy," "Terms and Conditions," or "Terms of Use." If the Web site does not explain how your personal information will be used, consider not using the services at that site.

6. Watch out for check boxes that are already selected When you shop online, companies sometimes add a check box that is already selected, which indicates that it is fine with you if the company sells or gives your e-mail address to other businesses (or "third parties"). Clear this check box so that your e-mail address is not shared.

7. Don't reply to spam Never reply to an e-mail message — not even to unsubscribe from a mailing list — unless you know and trust the sender, such as when the e-mail message comes from a service, an online store, or newsletter that you have signed up with. Answering spam just confirms to the spammer that your e-mail address is an active one.

8. If a company uses e-mail messages to ask for personal information, don't respond by sending a message Most legitimate companies will not ask for personal information to be sent in e-mail. Be suspicious if they do. Such a request could be a spoofed e-mail message disguised to look like a legitimate one. This tactic is known as phishing. If the possible spam appears to be sent by a company that you do business with — for example, your credit card company — then call the company to verify that they sent it, but don't use any phone number that is provided in the e-mail. Instead, use a number that you find by using other means, such as directory assistance, a statement, or a bill. If the request is a legitimate one, the company's customer service representative should be able to assist you. The Junk E-mail Filter also includes phishing protection to help identify and disable suspicious messages.

9. Don't contribute to a charity in response to a request sent in e-mail Unfortunately, some spammers prey on your goodwill. If you receive an e-mail appeal from a charity, treat it as spam. If the charity is one that you want to support, locate their telephone number or Web site to find out how you can make a contribution.

10. Don't forward chain e-mail messages Besides increasing overall e-mail volume, by forwarding a chain e-mail message you might be furthering a hoax — and meanwhile, you lose control over who sees your e-mail address.

I hope It is useful to Getting information about Spam and I want to share my experience with Microsoft Outlook Support and Computer Help.

What is Translate text feature?

|

Using the Research feature, you can translate single words or short phrases by using bilingual dictionaries or translate your entire document by using Web-based machine translation services. To translate text, you may also need to satisfy the operating system requirements for specific languages.

Machine translation is helpful for conveying the basic subject matter of the content and for confirming whether the content is relevant to you. For important or sensitive documents, human translation is recommended, because machine translation may not preserve the full meaning and tone of the text.

How to use in Microsoft Outlook

  1. Right-click the message body, and then click Translate on the shortcut menu.

Note You can do this in any new item and in the Reading Pane.

  1. Alternatively, in a new message, click the message body, and then on the Message tab, in the Proofing group, click Spelling, and then click Translate

· If this is the first time you have used translation services, click OK to install the bilingual dictionaries and enable the translation service through the Research task pane.

· To change the languages that are used for translation, in the Research task pane, under Translation, select the languages that you want to translate from and to. For example, to translate English to French, click English (U.S.) in the from list and French (France) in the to list.

Note To customize which resources are used for translation, click Translation options, and then select the look-up options that you want.

· Do one of the following:

  • To translate a specific word, press ALT and click a word. The results appear in the Research task pane under Translation.
  • To translate a short phrase, select the words press ALT and click the selection. The results appear in the Research task pane under Translation.
  • To translate a word or phrase, type the word or phrase in the Search for box, and then click Start Searching.

If you are facing any kind of computer problem then go for Computer Repair. I want to share my experience with Microsoft Outlook Support and Computer Help.

Create custom actions rules


A rule is an action that Microsoft Office Outlook automatically performs on sent or received e-mail messages, and the action is based on conditions that you specify in the Rules and Alerts Wizard. There are third-party add-ins, however, that permit Outlook to perform additional, custom actions based on a rule condition.

What is a custom rule?

The Rules and Alerts Wizard in Outlook includes a number of actions that Microsoft Outlook can perform based on conditions that you define, such as moving all e-mail messages from a specific person into a folder other than your Inbox. Some third parties offer add-ins that permit custom actions, such as automatically printing new e-mail messages. Microsoft does not provide these add-ins. They are written by third-party developers as dynamic-link library (.dll) files that must be installed on the computer running Outlook.

To find Outlook add-ins on the Web, use your Web browser to search for Outlook custom actions. With this I want to share my experience to Microsoft Outlook Support, Technical Support and Computer Help

The following instructions will help you create a rule that runs a custom action add-in.

To create a rule by choosing your own conditions, actions, and exceptions, do the following:

Steps to create a custom action rule

  1. In the Navigation, click Mail.
  2. On the Tools menu, click Rules and Alerts.
  3. If you own more than one e-mail account, in the Apply changes to this folder list, select the Inbox that you want.
  4. Click New Rule.
  5. Under Start from a blank rule, select either Check messages when they arrive or Check messages after sending, and then click Next.
  6. Under Step 1: Select condition(s), select the conditions that you want the messages to meet for the rule to apply.
  7. Under Step 2: Edit the rule description, click each underlined value, enter the criteria for each condition, and then click Next.
  8. Under Step 1: Select action(s), scroll down the actions list, and then select the perform a custom action check box.
  9. Under Step 2: Edit the rule description, click the underlined value a custom action.
  10. Under Choose an action to be performed, select the add-in that you want to run.

Note If the add-in does not appear, the add-in is not properly installed for use by Outlook. You must contact the add-in developer for assistance.

  1. To change the Action value, click Change.
  2. Click OK to close the dialog box, and then click Next.
  3. Under Step 1: Select exception(s), select any exceptions to the rule, and then click Next.
  4. To finish creating the rule, enter a name for the rule, and then select any other options that you want.
    • If you want to run this rule on messages that are in one of your folders, select the Run this rule now on messages already in "folder" check box.
    • To apply this rule to all of your e-mail accounts and the Inbox associated with each account, select the Create this rule on all accounts check box.
  5. Click Finish.

Outlook Protection from spam


Anyone who has been using e-mail for some time is familiar with the flood of bulk e-mail that can come to your Inbox, most of it being junk. Outlook helps to mitigate the problem of spam with the Junk E-mail Filter, which automatically evaluates incoming messages and sends those considered to be spam to the Junk E-mail folder.

Microsoft Outlook also has an additional anti-spam feature. Messages in HTML format often include pictures or sounds from an external source on the Internet. This is typically done by legitimate senders to avoid embedding large graphics in the message itself. However, junk e-mail senders use this capability as a "Web beacon" that collects your e-mail address. When you open the message and the content is downloaded automatically, you are inadvertently verifying to the sender's server that your e-mail address is valid. Your e-mail address can then be sold to spammers, often resulting in more junk messages being sent to you. By default, Outlook blocks automatic picture downloads. If you think that the message is from a trustworthy source, you can unblock pictures or other external content.

Also, Outlook uses a technology called Outlook E-mail Postmarking to further reduce the spam in your Inbox. I have to sketch out the details once again before this Monday for a official presentation. But then what i want to share here with you is my experience of sharing the Microsoft Outlook and providing a computer Help