Wednesday, July 25, 2007

Use Word 2007 to open documents created in previous versions of Word

When you open a document in Microsoft Office Word 2007 that was created in Microsoft Office Word 2003, Word 2002, or Word 2000, Compatibility Mode is turned on, and you see Compatibility Mode in the title bar of the document window. Compatibility Mode ensures that no new or enhanced features in Office Word 2007 are available while you are working with a document, so that people who are using previous versions of Word will have full editing capabilities. Find this yourself at help center of MS Word 2007.

You can work in Compatibility Mode or you can convert your document to the Office Word 2007 file format. Converting your document allows you to access the new and enhanced features in Office Word 2007. However, people who are using previous versions of Word may be prevented from or have difficulty editing certain portions of the document that were created by using new or enhanced features in Office Word 2007.

Work in Compatibility Mode

When you open a Word 97–2003 document in Office Word 2007, Compatibility Mode is turned on, and you see Compatibility Mode in the title bar of the document window. In Compatibility Mode, you can open, edit, and save Word 97–2003 documents but you won't be able to use any of the new Office Word 2007 features.

Document elements that behave differently in Compatibility Mode

The following elements will be permanently changed when you are working in Compatibility Mode, and you cannot convert them to Office Word 2007 elements even if you convert your document later.

Office Word 2007 element

Behavior in Compatibility Mode

Heading and body fonts

Converted to static formatting.

Relative text boxes

Converted to absolute positions.

Margins

Converted to absolute tabs.

Bibliography

Converted to static text.

Citations

Converted to static text.

Placeholder text in citations

Converted to static text.

Placeholder text in content controls

Converted to static text.

Themes

Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using themes.

Theme colors

Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme colors.

Theme fonts

Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme fonts.

Theme effects

Permanently converted to styles. If the file is later opened in Office Word 2007, you cannot automatically change the style by using theme effects.

Content controls

Permanently converted to static text.

The following document elements will be changed when you are working in Compatibility Mode, but you can convert them to Office Word 2007 elements if you convert your document later.

Office Word 2007 element

Behavior in Compatibility Mode

Office Art

Only a limited set of diagram types is available..

Diagrams

Converted to images that cannot be edited.

Equations

Become graphics and cannot be changed.

 

Convert a document to Office Word 2007

1.     Click the Microsoft Office Button, and then click Convert.

2.     In the Microsoft Office Word dialog box, click OK.

3.     Do one of the following:

§  To replace the original file with a file in the Office Word 2007 file format, click the Microsoft Office Button, and then click Save.

§  To save the original document in its original file format and create another document in the Office Word 2007 file format, click the Microsoft Office Button, click Save As, and then type a new name for the file.

Friday, July 20, 2007

BIOS basics and advanced learning

Main Menu
The standard CMOS Setup menu dates back to the 286 days, when the complete BIOS Setup consisted
of only one menu. In the standard menu, you can set the system clock and record hard disk and
floppy drive parameters and the basic video type. Newer BIOSes have more complicated setups with
more menus and submenus, so the main menu often is fairly sparse compared to older systems.
The main menu in a modern system reports system information such as the BIOS version, the processor
type and speed, the amount of memory, and whether the memory or cache is configured for ECC
functionality. The main menu also can be used to set the system date and time.
 

 

Typical Main Menu Settings*

Feature

Options

Description

BIOS Version

No options

Displays the version of the BIOS

Processor Type

No options

Displays the processor type

Processor Speed

No options

Displays the processor speed

System Bus

No options

Displays the system bus frequency

Frequency

Cache RAM

No options

Displays the size of second-level (L2) cache and whether it is ECC capable

Total Memory

No options

Displays the total amount of RAM on the motherboard

Memory Bank 0

No options

Displays size and type of DIMM installed in each memory

Memory Bank 1

bank

Memory Bank 2

Language

English (default) Deutch

Selects the default language used by the BIOS

Espanol

Processor Serial

Disabled (default),

Enables/disables processor serial number (present only when

Number

enabled

a Pentium III CPU is installed)

System Time

Hour, minute, second

Specifies the current time

System Date

Month, day, year

Specifies the current date

 
 
 

Typical Advanced Menu Settings*

Feature

Options

Description

Extended Configuration

No options

If Used is displayed, User-defined has been selected in the Extended Configuration under the Maintenance menu.

PCI Configuration

No options

Configures the IRQ priority of individual PCI slots. When selected, displays the PCI Configuration submenu.

Boot Settings Configuration

No options

Configures Numlock and Plug and Play, and resets configura-tion data. When selected, displays the Boot Configuration sub-

menu.

Peripheral Configuration

No options

Configures peripheral ports and devices. When selected, displays the Peripheral Configuration submenu.

IDE Configuration

No options

Specifies type of connected IDE device.

Diskette Configuration

No options

When selected, displays the Diskette Configuration submenu.

Event Log

No options

Configures Event Logging. When selected, displays the Event Log Configuration submenu.

Video Configuration

No options

Configures video features. When selected, displays the Video Configuration submenu.

 
 
 

Additional Advanced Menu Settings*

Feature

Options

Description

Plug and Play O/S

No (default),

Specifies whether a Plug and Play operating system is being

Yes

used. No—lets the BIOS configure all devices. Yes—lets the operating system configure Plug and Play devices. Not required with a Plug and Play operating system.

Reset Configuration Data

No (default),

Clears the Plug and Play BIOS configuration data on the next

Yes

boot.

Numlock

Auto (default),

Specifies the power-on state of the Num Lock feature on the

On, Off

numeric keypad of the keyboard.

Resource Configuration

No options

Configures memory blocks and IRQs for legacy ISA devices.

When selected, displays the Resource Configuration submenu.

 
 
 
 
 
 

Additional Advanced Features Settings

Setting

Description

Auto Configuration*

Selects predetermined optimal values of chipset parameters. When Disabled, chipset parameters revert to setup information stored in CMOS. Many fields in this screen are not available when Auto Configuration is Enabled.

EDO DRAM Speed Selection

The value in this field must correspond to the speed of the EDO DRAM installed in your system. This value is access speed, so a lower value means a faster

system.

SDRAM RAS-to-CAS Delay*

This field lets you control the number of cycles between a row activate com-mand and a read or write command.

SDRAM RAS Precharge Time*

The precharge time is the number of cycles it takes for the RAS to accumulate its charge before DRAM refresh. If insufficient time is allowed, refresh might be incomplete, and the DRAM might fail to retain data.

SDRAM CAS Latency Time*

When synchronous DRAM is installed, you can control the number of cycles between when the SDRAMs sample a read command and when the controller samples read data from the SDRAMs.

SDRAM Precharge Control

When Enabled, all CPU cycles to SDRAM result in an All Banks Precharge command on the SDRAM interface.

DRAM Data Integrity Mode

Select Non-ECC or ECC (error correcting code) according to the type of installed DRAM. ECC allows for single-bit error correction and multibit error detection at a slight speed penalty to the system.

System BIOS Cacheable

Allows caching of the system BIOS ROM at F0000h–FFFFFh, resulting in better system performance. If any program writes to this memory area, a system error can result.

Video BIOS Cacheable

Allows caching of the video BIOS ROM at C0000h–C7FFFh, resulting in better video performance. If any program writes to this memory area, a system error can result.

Video RAM Cacheable*

Selecting Enabled allows caching of the video memory (RAM) at

(Video Memory Cache Mode)

A0000h–AFFFFh, resulting in better video performance. If any program writes to this memory area, a memory access error can result. Uncacheable Speculative Write-Combining (USWC) mode is the same as Enabled on some

systems.

8/16 Bit I/O Recovery Time

The I/O recovery mechanism adds bus clock cycles between PCI-originated I/O cycles to the ISA bus. This delay takes place because the PCI bus is so much faster than the ISA bus.

Memory Hole at 15M–16M

Places a 1MB empty RAM area between 15MB and 16MB. Older software sometimes would not run with 16MB or more memory in the system; enabling this provides a workaround. This is normally not used.

Passive Release

When Enabled, CPU-to-PCI bus accesses are allowed during passive release. Otherwise, the arbiter accepts only another PCI master access to local DRAM.

Delayed Transaction

The chipset has an embedded 32-bit posted write buffer to support delay transactions cycles. Select Enabled to support compliance with PCI specification version 2.1.

AGP Aperture Size (MB)

Select the size of the accelerated graphics port (AGP) aperture. The aperture is a portion of the PCI memory address range dedicated for graphics memory address space. Host cycles that hit the aperture range are forwarded to the AGP without any translation.

CPU Warning Temperature

Select the combination of lower and upper limits for the CPU temperature if

your computer contains an environmental monitoring system. If the CPU

temperature extends beyond either limit, any warning mechanism programmed

into your system is activated.

Current CPU Temperature

This field displays the current CPU temperature if your computer contains an

environmental monitoring system.

Shutdown Temperature

Select the combination of lower and upper limits for the system shutdown

temperature if your computer contains an environmental monitoring system. If

the temperature extends beyond either limit, the system shuts down.

CPUFAN Turn On IN Win98

If you are running Windows 98, which supports ACPI, selecting Enabled gives

the user a cooling choice at runtime. The user can run with the CPU fan turned

on or off, depending on deciding factors such as CPU activity, battery power

consumption, and noise tolerance.

Current System Temperature

This field displays the current system temperature if your computer contains a

monitoring system.

Current CPUFAN 1/2/3 Speed

These fields display the current speed of up to three CPU fans if your computer

contains a monitoring system.

IN0-IN6(V)

These fields display the current voltage of up to seven voltage input lines if your

computer contains a monitoring system.

Spread Spectrum

When the system clock generator pulses, the extreme values of the pulse gener-

ate excess EMI. Enabling pulse spectrum spread modulation changes the

extreme values from spikes to flat curves, thus reducing EMI. This benefit in

some cases might be outweighed by problems with timing-critical devices, such

as a clock-sensitive SCSI device.

 
 
Legacy USB support means support for USB keyboards and mice. If you are using USB keyboards and
mice, you will find that the keyboard is not functional until a USB-aware operating system is loaded.
This can be a problem when running DOS, diagnostics software, or other applications that run outside
of USB-aware operating systems, such as Windows 98, Windows Me, Windows XP, and Windows
2000. In that case, you should enable the USB legacy support via this menu.
Even with legacy support disabled, the system still recognizes a USB keyboard and enables it to work
during the POST and BIOS Setup. With USB legacy support in the default (disabled) mode, the system
operates as follows:
1. When you power up the computer, USB legacy support is disabled.
2. POST begins.
3. USB legacy support is temporarily enabled by the BIOS. This enables you to use a USB keyboard
to enter the setup program or the Maintenance mode.
4. POST completes and disables USB legacy support (unless it was set to Enabled while in Setup).
5. The operating system loads. While the operating system is loading, USB keyboards and mice are
not recognized. After the operating system loads the USB drivers, the USB devices are recognized.
To install an operating system that supports USB, enable USB legacy support in BIOS Setup and follow
the operating system's installation instructions. After the operating system is installed and the USB
drivers are configured, USB legacy support is no longer used, and the operating system USB drivers
take over. However, I recommend that you leave legacy support enabled so the USB keyboard functions
in DOS while running self-booting or DOS-based diagnostics, or when running other
non–USB-aware operating systems.
Note that if USB legacy support is enabled, you shouldn't mix USB and PS/2 port keyboards and mice.
For example, don't use a PS/2 keyboard with a USB mouse or a USB keyboard and a PS/2 mouse. Also
remember that this legacy support is for keyboards and mice only; it won't work for USB hubs or
other USB devices. For devices other than keyboards or mice to work, you need a USB-aware operating
system with the appropriate USB drivers.
 
 
 
 

Security Menu
Most BIOSes include two passwords for security, called the supervisor and user passwords. These passwords
help control who is allowed to access the BIOS Setup program and who is allowed to boot the
computer. The supervisor password is also called a setup password because it controls access to the
setup program. The user password is also called a system password because it controls access to the
entire system.
If a supervisor password is set, a password prompt is displayed when an attempt is made to enter the
BIOS Setup menus. When entered correctly, the supervisor password gives unrestricted access to view
and change all the Setup options in the Setup program. If the supervisor password is not entered or is
entered incorrectly, access to view and change Setup options in the Setup program is restricted.
If the user password is set, the password prompt is displayed before the computer boots up. The password
must be entered correctly before the system is allowed to boot. Note that if only the supervisor
password is set, the computer boots without asking for a password because the supervisor password
controls access only to the BIOS Setup menus. If both passwords are set, the password prompt is displayed
at boot time, and either the user or the supervisor password can be entered to boot the computer.
In most systems, the password can be up to seven or eight characters long.
If you forget the password, most systems have a jumper on the board that allows all passwords to be
cleared. This means that for most systems, the password security also requires that the system case be
locked to prevent users from opening the cover and accessing the password-clear jumper. This jumper
is often not labeled on the board for security reasons, but it can be found in the motherboard or system
documentation.
 
Provided you know the password and can get into the BIOS Setup, a password can also be cleared by
entering the BIOS Setup and selecting the Clear Password function. If no Clear function is available,
you can still clear the password by selecting the Set Password function and pressing Enter (for no
password) at the prompts.
 
 

Table 5.26

Typical Security Settings*

Feature

Options

Description

User Password Is

No options.

Reports whether a user password is set.

Supervisor

No options.

Reports whether a supervisor password is set.

Password Is

Set User

Password can be up to seven

Specifies the user password.

Password

alphanumeric characters.

Set Supervisor

Password can be up to seven

Specifies the supervisor password.

Password

alphanumeric characters.

Clear User

No options.

Clears the user password.

Password

User Setup

None

Controls the user's capability to run the BIOS Setup

Access

View Only Limited Access

program.

Full Access (default).

Unattended Start

Disabled (default)

Enables the unattended start feature. When enabled,

Enabled.

the computer boots, but the keyboard is locked. The user

must enter a password to unlock the computer or boot

from a disk.

*Based on the BIOS used by the Intel DB815EEA motherboard. Used by permission of Intel Corporation.

 
 
 

Plug and Play BIOS
Traditionally, installing and configuring devices in PCs has been a difficult process. During installation,
the user is faced with the task of configuring the new card by selecting the IRQ, I/O ports, and
DMA channel. In the past, users were required to move jumpers or set switches on the add-in cards to
control these settings. They needed to know exactly which resources were already in use so they could
find a set of resources that did not conflict with the devices already in the system. If a conflict exists,
the system might not boot and the device might fail or cause the conflicting hardware to fail.
PnP is technology designed to prevent configuration problems and provide users with the capability
to easily expand a PC. With PnP, the user simply plugs in the new card and the system configures it
automatically for proper operation.
PnP is composed of three principal components:
 Plug and Play BIOS
 Extended System Configuration Data (ESCD)
 Plug and Play operating system
The PnP BIOS initiates the configuration of the PnP cards during the boot-up process. If the cards previously
were installed, the BIOS reads the information from ESCD and initializes the cards and boots
the system. During the installation of new PnP cards, the BIOS consults the ESCD to determine which
system resources are available and needed for the add-in card. If the BIOS is capable of finding sufficient
available resources, it configures the card. However, if the BIOS is incapable of locating sufficient
available resources, the Plug and Play routines in the operating system complete the configuration
process. During the configuration process, the configuration registers (in flash BIOS) on the card and
the ESCD are updated with the new configuration data.
PnP Device IDs
All Plug and Play devices must contain a Plug and Play device ID to enable the operating system to
uniquely recognize the device so it can load the appropriate driver software. Each device manufacturer
is responsible for assigning the Plug and Play ID for each product and storing it in the hardware.
Each manufacturer of Plug and Play devices must be assigned an industry-unique, three-character vendor
ID. Then, the device manufacturer is responsible for assigning a unique product ID to each individual
product model. After an ID is assigned to a product model, it must not be assigned to any
other product model manufactured by the same company (that is, one that uses the same vendor ID).
 
 
BIOS Error Messages
When a PC system is first powered on, the system runs a POST. If errors are encountered during the
POST, you usually see a text error message displayed onscreen. Errors that occur very early in the
POST might happen before the video card is initialized. These types of errors can't be displayed, so the
system uses two other alternatives for communicating the error message. One is beeping—the system
beeps the speaker in a specific pattern that indicates which error has occurred.
The other alternative is to send a hexadecimal error code to I/O port address 80h, which can be read
by a special card in one of the bus slots. When the ROM BIOS is performing the POST, in most systems
the results of these tests are continuously sent to I/O Port 80h so they can be monitored by special
diagnostics cards called POST cards (see Figure 5.7). These tests sometimes are called manufacturing
tests because they were designed into the system for testing systems on the assembly line without a
video display attached.
 
The POST cards have a two-digit hexadecimal display used to report the number of the currently executing
test routine. Before executing each test, a hexadecimal numeric code is sent to the port, and
then the test is run. If the test fails and locks up the machine, the hexadecimal code of the last test
being executed remains on the card's display.
Many tests are executed in a system before the video display card is enabled, especially if the display
is EGA or VGA. Therefore, many errors can occur that would lock up the system before the system
could possibly display an error code through the video system. Because not all these errors generate
beep codes, to most normal troubleshooting procedures, a system with this type of problem (such as a
memory failure in Bank 0) would appear completely "dead." By using one of the commercially available
POST cards, however, you can often diagnose the problem.
These codes are completely BIOS dependent because the card does nothing but display the codes sent
to it. Some BIOSes have more detailed POST procedures and therefore send more informative codes.
POST cards can be purchased from JDR Microdevices or other sources and are available in both ISA
and PCI bus versions.
For simple but otherwise fatal errors that can't be displayed onscreen, most of the BIOS versions also
send audio codes that can be used to help diagnose such problems. The audio codes are similar to
POST codes, but they are read by listening to the speaker beep rather than by using a special card.
 
 
 

Thursday, July 12, 2007

Remote Desktop overview

With Remote Desktop on Windows XP Professional, you can have access to a Windows session that is running on your computer when you are at another computer. This means, for example, that you can connect to your work computer from home and have access to all of your applications, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you can see your desktop at work displayed on your home computer, with the same programs running.
When you connect to your computer at work, Remote Desktop automatically locks that computer so no one else can access your applications and files while you are gone. When you come back to your computer at work, you can unlock it by typing CTRL+ALT+DEL.
Remote Desktop also allows more than one user to have active sessions on a single computer. This means that multiple users can leave their applications running and preserve the state of their Windows session even while others are logged on.
With Fast User Switching, you can easily switch from one user to another on the same computer. For example, suppose you are working at home and have logged on to the computer at your office to update an expense report. While you are working, a family member needs to use your home computer to check for an important email message. You can disconnect Remote Desktop, allow the other user to log on and check mail, and then reconnect to the computer at your office, where you see the expense report exactly as you left it. Fast User Switching works on standalone computers and computers that are members of workgroups.

Remote Desktop enables a variety of scenarios, including:

  • Working at home - Access work in progress on your office computer from home, including full access to all local and remote devices.
  • Collaborating - Bring your desktop to a colleague's office to debug some code, update a Microsoft PowerPoint slide presentation, or proofread a document.
  • Sharing a console - Allow multiple users to maintain separate program and configuration sessions on a single computer, such as at a teller station or a sales desk.
  • To use Remote Desktop, you need the following:
    A computer running Windows XP Professional ("remote" computer) with a connection to a Local Area Network or the Internet.
  • A second computer ("home" computer) with access to the Local Area Network via network connection, modem, or Virtual Private Network (VPN) connection. This computer must have Remote Desktop Connection, formerly called the Terminal Services client, installed.
  • Appropriate user accounts and permissions.

Saturday, June 30, 2007

Registering Hyphenated Domain Names for Search Engin

Note that a registered domain name may include a hyphen (-) but no other punctuation. This is often helpful when you want to register a two-word domain name and the non-hyphenated version is already taken. For example, you may not be able to register the domain name DomainNameRegistration. com because it is likely taken.  But, you may be able to instead register the virtually identical domain name: Domain-Name-Registration. com. In fact, you may want to intentionally register domain names using hyphens as word separators as your first priority if you're looking to create websites which can be most easily found in search engines.  Yes!  Multiple studies of the internal functioning of Google and Yahoo and other search engines reveal that using the hyphen as a word separator in domain names allows a search engine to more easily determine word breaks and is thus very effective at producing significantly higher search engine placement results than non-hyphenated domain names.  So don't fear the hyphen when you register domain name!
 

On the other hand, if you wish to create a domain name which is more memorable, you can safely estimate that the vast majority of your website visitors will assume that a domain name spoken to them does not include hyphens.  Also note that when domain visitors remember domain names, they typically do not remember the hyphen as easily as a domain name consisting of all letters (or letters and numbers) and thus they often omit the hyphens when trying to remember a domain name and type it into the address bar on their browser.
 
For this reason, many webmasters will register a domain name in both a hyphenated version and non-hyphenated version.  For example, typing Hosting-Dude.com into your browser's address bar will bring you to the HostingDude.com website because we registered this alternate, hyphenated domain name in the event our customers mistakenly type it into their browser that way.   This is a good way to prevent competitors from stealing a portion of your business by registering mistypes (and alternate extensions) of your domain name.   As an example of an alternate extension, you'll find that if you type the name HostingDude.net into your browser, you'll similarly reach the HostingDude.com website because we registered that alternative extension as well.

Tuesday, June 26, 2007

Restrict permission to confidential information in e-mail messages

The purpose of IRM and its limitations

Information Rights Management (IRM) allows individuals to specify access permissions to e-mail messages. This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a message has been restricted by using IRM, the access and usage restrictions are enforced no matter where the information is, because the permissions to access an e-mail message are stored in the message file itself.

IRM helps individuals enforce their personal preferences concerning the transmission of personal or private information. IRM also helps organizations enforce corporate policy governing the control and dissemination of confidential or proprietary information.

IRM helps to do the following:

  • Prevent an authorized recipient of restricted content from forwarding, copying, modifying, printing, faxing, or cutting and pasting the content for unauthorized use
  • Prevent restricted content from being copied by using the Print Screen feature in Microsoft Windows
  • Restrict content wherever it is sent
  • Provide the same level of restriction to e-mail attachments, as long as the attachments are files created by using other Microsoft Office programs, such as Microsoft Office Word 2007, Microsoft Office Excel 2007, or Microsoft Office PowerPoint 2007
  • Support file expiration so that content in documents and e-mail messages can no longer be viewed after a specified period of time
  • Enforce corporate policies that govern the use and dissemination of content within the company

IRM can't prevent the following:

  • Content from being erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain types of spyware
  • Content from being lost or corrupted because of the actions of computer viruses
  • Restricted content from being hand-copied or retyped from a display on a recipient's screen
  • A recipient from taking a digital photograph of the restricted content displayed on a screen
  • Restricted content from being copied by using third-party screen-capture programs

Configure your computer to use IRM

To use IRM in the 2007 Office release, the minimum required software is Windows Rights Management Services (RMS) Client Service Pack 1 (SP1), which can be installed on your computer either by you or your RMS administrator. The RMS administrator can configure company-specific IRM policies that define who can access information and what level of editing is permitted for an e-mail message. For example, a company administrator might define a rights template called "Company Confidential," which specifies that an e-mail message that uses that policy can be opened only by users inside the company domain.

Install the Windows Rights Management Services (RMS) Client

  1. In Microsoft Windows, click the Start button, and then click Control Panel.
  2. Do one of the following:
    • Microsoft Windows Vista  Click Programs, and then under Installed Programs, click Install a program from the network. In the list of programs, click Windows Rights Management Services Client, and then click Add.

       Note    In Classic view, double-click Programs, and then click Get programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

    • Microsoft Windows XP  Click Add or Remove Programs, and then click Add or Remove Programs. In the left pane, click Add New Programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

       Note    In Classic view, double-click Add or Remove Programs, and then in the left pane, click Add New Programs. From the list of programs, click Windows Rights Management Services Client, and then click Add.

Alternatively, when you first try to open e-mail messages that have been rights-managed by using IRM, Office Outlook 2007 prompts you to download the Windows Rights Management Services Client. For more information about the Windows Rights Management Services Client, visit the Windows Rights Management Services Web site.

Download permissions

The first time that you attempt to open an e-mail message with restricted permission, you must connect to a licensing server to verify your credentials and to download a use license. The use license defines the level of access that you have to a file. This process is required for each file with restricted permission. In other words, content with restricted permission cannot be opened without a use license. Downloading permissions requires that Microsoft Office send your credentials (which includes your e-mail address) and information about your permission rights to the licensing server. Information contained in the e-mail message is not sent to the licensing server. For more information, read the Privacy Statement.

Send an e-mail message with restricted permission

  1. Start Outlook, and then open a new message.
  2. Click the Microsoft Office Button , and then click Permission.

    To use a custom permission policy (permission policy: An approach to restricting permission for a given document, workbook, presentation, or message. The policy defines which Office features are available, which information can be accessed, and what level of editing is allowed.) that an e-mail administrator has created for people in your company, click the arrow next to Permission, and then click a custom permission policy on the menu.

  3. The InfoBar of the new message displays Do Not Forward, indicating that the message is rights-managed. This means that recipients cannot forward, print, or copy the message content. Only the person initiating the message, known as the conversation owner, has no restrictions.

  4. Address and send the message.

    Each recipient will be able to view additional content when replies are sent by anyone on the conversation thread.

Tip  You can also restrict permission to a new message by doing the following: In the new message, on the Message tab, in the Options group, click Permission .

 Notes 

  • If you attach a document, workbook, or presentation to a message with restricted permission, Office Outlook 2007 automatically applies the same restricted permissions to the attachment.
  • If the attached document, workbook, or presentation has already been rights-managed in its originating program, such as Office Word 2007, Office Excel 2007, or Office PowerPoint 2007, those permissions remain in effect.

Set an expiration date for a message

Even though it is not an IRM feature in Office Outlook 2007, you might want to set an expiration date for the new message so that its content can no longer be viewed after a specified period of time.

  1. In the new message, on the Message tab, in the Options group, click the Options Dialog Box Launcher .
  2. In the Message Options dialog box, under Delivery options, select the Expires after check box, and then select a date and time.

Use a different Windows user account to rights-manage e-mail messages

  1. Open the message.
  2. Click the Microsoft Office Button , click the arrow next to Permission, and then click Manage Credentials.
  3. In the Select User dialog box, do one of the following:
    • Select the e-mail address for the account you want to use, and then click OK.
    • Click Add, type your credentials for the new account, and then click OK twice.

View messages with restricted permission in Outlook

Messages with restricted permission that you receive can be identified by the following icon, which appears next to the message in the message list of your Inbox.

If you attempt to open and view a message with restricted permission without first obtaining a certificate, Outlook gives you the option to obtain one. After the certificate is installed, you can view the contents of the message by opening the message.

 Note    You cannot view the contents of a rights-managed message in the Reading Pane.

 Note    If the recipient replies to the message, only the sender who restricted the message, also known as the conversation owner, has full permission to the reply content. In other words, replies have the same restrictions to recipients as the original message.

If you need to read or open content with restricted permission but the 2007 Office release is not available on the computer that you are using, you can download the Rights Management Add-on for Microsoft Windows Internet Explorer, which enables you to view the messages in Internet Explorer. With this add-on, recipients can only view messages. Recipients cannot reply to, forward, copy, or print the messages.

 Note    When using the Rights Management Add-on to view messages, attachments that might have been sent with the message cannot be viewed.

Resource adapted from Microsoft Outlook 2007 (MS Office Enterprise edition-2007)

Modem Features and Types

Modem Feature

Benefit

Who Should Buy

Cautions

MNP10EC support

Improves performance on poor-quality phone lines by quickly adjusting line speed up and down with changing conditions.

Anyone with poor-quality lines, especially if modem at other end also has MNP10EC support; users who want to use modem with cellular phones.

Don't buy MNP10 support by mistake; MNP10EC is much better and includes MNP10. Check with ISP to see whether cellular connections are supported; speed of such connections can be 14.4Kbps or slower.

PCI bus

Works in PCI slots that dominate current systems and have replaced ISA slots. PCI modems can share IRQs with other devices and be redirected to open IRQs.

Anyone without ISA slots or who is planning to move the modem to another computer in the future and prefers internal modems.

Verify one or more PCI slots are available; look for other features listed here to make change as useful as possible.

USB connection

Works with USB connectors on most current and all future computers; high-speed connection and capability to connect many devices via a hub.

Anyone who wants portability and has USB connectors along with Windows 98 or above.

Although Windows 95 OSR 2.5 (Win95"C") has USB support, many devices require Win98 or better; make sure USB ports have been activated in BIOS.

Gaming-optimized modem

Faster PING and response for gaming, which is more important than data throughput.

Anyone who plays a lot of online games or wants to get started.

Game optimizations are not useful for ordinary Web surfing. These modems are more expensive than others.

Call-waiting support

Allows you to answer the phone and not lose modem connection, instead of disabling call waiting, which most modems require.

Anyone who uses call waiting and doesn't like voice callers to get busy signals; check with manufacturer to see whether your existing modem can be upgraded with a driver.

Maximum talk time might be only a few seconds; make sure you have the phone near the computer for fast "hello, I'll call you later" answers to avoid exceeding time limit.

V.92/V.44 support

Faster uploads, faster connection negotiation, Modem-on-hold, better throughput on downloads.

Anyone whose ISP supports all V.92/V.44 features.

Check with your ISP to see when V.92/V.44 support will be introduced and to see whether all features will be supported.

Voice support

Allows digitizing of received calls; computerized answering machine and faxback; inbound and outbound phone calls via computer.

Anyone who wants to use PC as a telecommunications center.

Check quality of voice recording; can use up a lot of disk space.

 
Adapted from 12th edition of Que, Upgrading and Repairing PCs

Can Non-56Kbps Modems Achieve Throughput Speeds Above 115,200bps?

Yes. To achieve speeds above 115,200bps, a better UART chip than the standard 16550-series chip found in modern PC serial ports and internal modems is required. 16650 UARTs have a 32-byte buffer, as opposed to the 16-byte buffer found in the standard 16550 UART. The 16650 is seldom used in PCs' built-in serial ports or as part of an internal modem, but it can be added by installing a high-speed serial port interface card (which might require you to disable your current COM ports).

Thus, to achieve the highest possible speeds, you need the following: an external modem capable of running at 230.4Kbps throughput, a 16650 UART chip in the serial (COM) port connected to the modem, and appropriate software drivers for the modem. Note that a 56Kbps-compatible modem isn't required! 230.4Kbps connections are available with anything from V.34bis to ISDN modems if the device is designed for that speed and you have the correct UART chip and drivers. But, as with the lower-speed throughput rates mentioned earlier, these speeds apply only to data that has not been compressed already.
 
External modems connected to the USB port instead of a serial port are capable of speeds above 115,200bps because of the faster throughput of the USB port. If  possible, use the USB port rather than the serial port if you need to connect an external modem to your computer.

Subscribe to geeklog feed Bookmark and Share

Design by Free blogger template