How to Update a Windows Live Hotmail account password

Posted by Jonh on Wednesday, May 28, 2008

If you change your Windows Live Hotmail account password, you must also update the information in Outlook. You first change your password at the Windows Live Hotmail Web site, and then you update the password that is saved in Outlook.

Follow the instructions for the version of Office Outlook you are using.

Office Outlook 2007

  1. On the Tools menu, click Account Settings

2. On the E-mail tab, click the Windows Live Hotmail account you want to update.

3. Click Change.

4. On the E-mail tab, click the Windows Live Hotmail account, and then click Change.

5. In the Password box, type your new password.

6. Click OK.

7. On the Account Settings dialog box, click Close.

If you want to go for troubleshoot your computer problem, for fix computer problem i want to share my experience with Outlook Support and Computer help

Create custom holiday and event files

Posted by Jonh on Sunday, May 25, 2008

Outlook comes with predefined holidays. However, what if you want everyone on your team to display company holidays and events, such as corporate paydays and quarterly expense due dates, in their calendars? You can create your own custom holiday set and distribute it to other people on your team.

Tip Instead of creating custom holiday files, consider creating and sharing custom calendars. Find links to more information about sharing calendar information in the See also section.

Warning Modify the Outlook.hol file at your own risk. Microsoft provides this procedure "as is" without warranty of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability and/or fitness for a particular purpose.

Note If you add the same custom set of holidays again, you will get a duplicate set of the holidays in your calendar. Therefore, you should create a custom holiday set rather than customizing an existing set.

  1. Exit Outlook if it is running.
  2. In Microsoft Windows Explorer, locate the following file:
    drive:\Program Files\Microsoft Office\Office 12\LCID\outlook.hol
  3. Make a backup copy of the file.
  4. Using a text editor, such as Microsoft Notepad, open the Outlook.hol file.
  5. Press CTRL+END to position the insertion point at the end of the file.
  6. Type a new header and custom events by using the format described below.
[Country or Description] ###

Holiday or event description, yyyy/mm/dd

Holiday or event description, yyyy/mm/dd

In the above format,

###

is the total number of items listed for a particular country/region or description. There is a space between the closing bracket and the number, as well as a carriage return at the end of the line. On each holiday line, there are a comma and a space between the holiday description and the date, as well as a carriage return at the end of the line. For example:

[Expense Reports] 4
Q1 Expense Reports Due, 2007/04/15
Q2 Expense Reports Due, 2007/11/15
Q3 Expense Reports Due, 2007/12/15
Q4 Expense Reports Due, 2007/01/15

  1. Save and close Outlook.hol.

The next time you run Outlook, the new Expense Reports dates are available for adding to your calendar.

Distribute custom holiday and event files

You can distribute a customized holiday and event file to other people in the following ways:

  • Send an e-mail message with the Outlook.hol file attached.
  • Place the file in a commonly accessible location or shared drive on your network where other people can copy the file.

By default, no holidays are added to your calendar when you begin using Microsoft Office Outlook. I want to share my Experience with Microsoft Outlook Support, Computer Help and Technical Support

Outlook Mail Attachment security

Posted by Jonh on Tuesday, May 20, 2008

To prevent the spread of viruses from program files (considered a Level 1 threat), Microsoft Outlook automatically blocks attachments that contain file types that can run programs. These blocked file types include .exe, .bat, .com, .vbs, and .js. Your Inbox displays the paperclip icon in the Attachment column to let you know that the message has an attachment. A list of the blocked attachment files appears in the InfoBar at the top of the message.

If you try to send an attachment that has a file type extension that is on the Level 1 restricted list, you receive a message that other Outlook users may not be able to access this type of attachment.

Only an e-mail server administrator can change this default setting and unblock certain file types. This setting is often used on an organization's intranet, not on the Internet.

Data files, such as .doc, .xls, .ppt, and .txt files, are not blocked. However, you receive an Opening Mail Attachment message when you try to open an attachment.

This message gives you the opportunity to consider the safety of the file you are opening and a chance to save the file and scan it for viruses before opening it.

To be able to send any file type by using e-mail, you can use a third-party program, such as WinZip, to package files before you attach them to your e-mail message. WinZip can create a new Outlook message and attach the .zip package for you.

In your message, you can include instructions explaining how to extract the files from the package to make it easy for recipients to access the files.

I want to share My Experience with Microsoft Outlook mail Security with computer Help and Technical Support

Outlook Address Book security

Posted by Jonh on Wednesday, May 14, 2008

The Outlook Address Book is guarded programmatically. This helps to prevent another program from automatically accessing your Address Book or Contacts list or from sending messages on your behalf without your permission. It is very useful to allow some programs (like Microsoft ActiveSync® or Palm Desktop) to access your contact information so that you can synchronize your personal digital assistant (PDA). However, a virus or other malicious program file can use the same functionality to propagate itself. If a program attempts to access your Address Book, a warning appears on screen.

This message appears if a program tries to access your Address Book. In general, you cannot prevent this caution from appearing. However, check with your synchronization software vendor to see if recent updates to the vendor's software include interacting with Outlook in a trusted manner. This message is not displayed when Outlook interacts with trusted synchronization software.



  • Unless you clicked a command or started a program that is expected to interact with Outlook Address Book information or if you are just not sure, click No.
  • If you clicked a command or started a program that is expected to interact with Outlook Address Book information, select the Allow access for check box, and then specify the amount of time you grant access for.
I have to sketch out the details once again before this Monday for a official presentation. But then what i want to share here with you is my experience of sharing the Microsoft Outlook and providing computer help.

Outlook security features

Posted by Jonh on Sunday, May 11, 2008

Outlook is designed to help protect your computer from viruses and junk e-mail messages. The following information focuses on the virus protection features in Microsoft Outlook.

Macro security

Outlook itself cannot detect whether a virus is present. Macro viruses are spread through attachments, not the e-mail message itself. Microsoft Office achieves macro virus protection by using the High macro security setting as the default. With the High setting, you can run only digitally signed macros from trusted sources or macros that you created yourself, as long as the installed add-ins and templates are trusted. Unsigned macros are automatically disabled.

Note Signing a macro is similar to getting a legal document notarized by a legal authority or getting your passport stamped by a government official. Electronic certificates are used to sign the macro code. Certificates are issued by a certificate authority, such as a bank, government, or software company, which should be trusted sources. For example, all macros that are pre-installed with Office are signed by the developers who created them using certificates issued by Microsoft that vouch for their authenticity.

If you change the macro security level to the less secure Medium setting, you automatically receive a warning each time you open a document that contains a macro. You can select an option in the Security Warning dialog box about whether to run the macro. Disable Macros is the default button.

Note If the security setting is set to Low, Outlook will not warn you before running a macro. Therefore, all macros are run automatically without your intervention. Because of the potential security risk, Microsoft does not recommend that you use the Low setting. I want to share my Experience with Microsoft Outlook and Computer Help

What is Macro viruses

Posted by Jonh on Tuesday, May 6, 2008

A macro is a series of commands and instructions that are grouped together as a single command to accomplish a task automatically. If you perform a task repeatedly in an application, you can automate the task by using a macro. You can store macros in documents, worksheets, or templates, which makes them available whenever a new file based on that template is created. For example, Microsoft Word stores user-recorded macros in the Normal template (Normal.dot) by default, so that they are available for use with every Word document. When you open the Word document, the macro runs. A macro virus is a virus program written in Microsoft Visual Basic® for Applications, the same macro language used in legitimate macros. A macro virus can also run automatically when you open a document unless there are safeguards in place. Most Microsoft Office programs display a confirmation dialog box when you choose to open a document that contains macros.

How do viruses spread?

The Melissa virus in March 1999 spread in the form of an e-mail message with an attached Word document that contained a macro virus. Anyone who opened the attachment triggered the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's address book. As a result, the Melissa virus was the fastest-spreading virus ever seen and forced a number of large companies to shut down their e-mail systems.

The important thing to remember is that just because an e-mail message appears to come from someone you trust, this does not mean the file is safe or that the sender had anything to do with it. Also, keep in mind that when you share files with another user, the attached macro or script is included with the file. Therefore, be careful when you share files, and scan the files with an antivirus program before you open them. You can choose from many antivirus application vendors.

Important Before you scan Outlook e-mail messages, check with the antivirus program vendor to make sure it is compatible with Outlook. Some antivirus programs can cause problems with Microsoft Outlook. If want to protect your pc to unwanted programs (Virus). So I want to share my Experience to protection to virus and Computer support assistance.