April 28, 2008

How do I… Avoid e-mail spam using Outlook tools?

Date: April 22nd, 2008

Author: Susan Harkins

Nobody knows for sure how spam got its name, but we can all agree that we hate it. As more and more spam finds your Inbox, it’s harder to find legitimate mail. Regrettably, at least from the recipients’ point of view, it looks like spam is here to stay, but resistance does pay off. You can’t keep spammers from sending you e-mail, but you can make sure you don’t ever see it. You must take control of spam, because honestly, that’s all any of us can hope for at this point.

Where appropriate, this article provides instructions for Microsoft Outlook 2003, but these spam-fighting tips aren’t exclusive to Outlook. In addition, these tips are for individual users. Server administrators have more tools to choose from, including third-party filters, none of which I discuss in this article.

This blog post is also available in the PDF format in a TechRepublic download.

Start with Outlook’s Junk E-mail folder

Outlook 2003 has a decent spam filter that downloads and filters spam into an existing folder named Junk E-mail. When the filter suspects a message is spam, Outlook downloads it directly into this folder instead of cluttering up your Inbox with it. Outlook enables this filter by default. If your filter is disabled, I recommend you turn it back on:

  • Choose Options from the Tools menu.
  • Click the Preferences tab if necessary
  • Click Junk E-mail in the e-mail section and deselect the first option, No Automatic Filtering, as shown in Figure A.
  • Click OK twice.

Figure A

viagra drugs

Enable Outlook 2003’s spam filter

This dialog box offers several options:

  • Select the Low option and you’ll still see spam in your Inbox.
  • Choose High to see little to none.
  • Check the Safe Lists Only option for a strict filter that downloads mail only from addresses in your contacts list. This drastic setting will definitely eliminate spam from your Inbox, but it’s too restrictive for most people.
  • Fight the temptation to check the option that deletes all spam because sometimes what Outlook thinks is spam isn’t spam at all.

Note: Make sure you check your Junk e-mail folder frequently for false negatives — messages that the filter incorrectly identifies as spam.

When you find a message in Junk E-mail that isn’t spam, right-click it and choose Mark As Not Junk from the resulting submenu, shown in Figure B. You can do the same with spam that makes it into your Inbox. Select the Add Sender To Blocked Senders List option and Outlook will automatically move the message to Junk E-mail.

Figure B

Let Outlook know when it makes a mistake

By default, Outlook considers everyone in your Contacts lists as safe. If you’re using Microsoft Exchange Server, you can’t automatically send messages from anyone in your organization to the Junk E-mail folder — nice try.

Immobilize Web beacons

A Web beacon is a linked image that your e-mail client retrieves when you download the message. Spammers use this trick to save money and to track which e-mail addresses retrieve the image. The simple act of downloading your e-mail lets a spammer know that your e-mail address is alive and well. Congratulations — you’ve won more spam!

Outlook 2003 doesn’t download images by default. If you’re currently downloading images, you can pull the plug on beacons as follows:

  • Choose Options from the Tools menu and then click the Security tab.
  • Click Change Automatic Download Settings in the Download Pictures section.
  • Check the Don’t Download Pictures Or Other Content Automatically In HTML E-mail option, as shown in Figure C.
  • You might want to check the Permit Downloads In E-mail Messages From Senders And To Recipients Defined In The Safe Senders And Safe Recipients List Used By The Junk E-mail Filter <phew> option. If you receive HTML newsletters and the like, selecting this option will allow Outlook to download them into your Inbox (or any personal folder you select using a rule).
  • Similarly, you might want to check the Permit Downloads From The Web Sites In This Security Zone: Trusted Zone option.
  • Click OK twice.

Figure C

Block graphic files in e-mail messages

In truth, the jury’s out on beacons. Not everyone agrees that they increase spam, but I don’t see the point in finding out. A neat side benefit is that your e-mail will download quicker.

Be proactive

Fighting spam might mean a change of habits and showing a bit of restraint. The following list applies to anyone who spends anytime online, not just Outlook users:

  • Don’t post your e-mail address on a Web site, a newsgroup, or any public forum. Spiders (special software that searches the Internet for e-mail addresses) are everywhere. If you must post your address, spell it out-for example, ssharkins at gmail dot com.
  • Don’t respond to spam. Let me repeat myself just in case you don’t understand: NEVER respond to spam. I know I’m wasting my time on this particular warning because if spam didn’t work, spam wouldn’t exist.
  • Don’t try to unsubscribe from a spam “list.” Most spam comes complete with a handy dandy, “If you don’t want anymore mail from us, just click this button…” option. Don’t click it! Doing so verifies that your address is alive and well and that a (probably) warm-blooded being is reading mail. They then sell your address to other spammers for a high price because they know you read your spam. Congratulations — you’ve just won more spam!
  • Don’t open attachments that come with spam.
  • Don’t click hyperlinks in spam.
  • Don’t post your personal e-mail address on your Web site (if you have one).
  • Don’t add your e-mail address to online directories at sites such as Bigfoot, Yahoo, InfoSpace, and so on.
  • Don’t sign online guest books.
  • Don’t respond to spam with an irate message. I don’t care how offended you are by the content, responding only verifies your e-mail. Congratulations — you’ve just won more spam!
  • Don’t enter your e-mail address at any Internet site until you read the site’s privacy options. If you backtrack for any reason, be sure to check all those privacy options because most likely, the page will clear them — as a convenience to you of course.

That last one’s tricky because most of us use the Internet to shop, to research, and so on. Even when a site promises not to sell your information, it might. Go ahead and sign up for all those free samples, but be prepared for the spam avalanche. If you believe that someone has maliciously violated their own privacy agreement, report them to their host service provider.

Perhaps the easiest way to deal with spam is to use a free e-mail account for your Internet browsing and purchasing. Give your personal e-mail address to only the most trusted people, such as family, colleagues, and friends. Outlook doesn’t care how many e-mail accounts you have. Use a rule to download incoming messages by sender into appropriate personal folders to keep all that mail organized and to reduce the risk of important messages going astray.

Most free e-mail account providers have intense spam filters that do a good job. Enable the filter and very little spam will make it into your Inbox. However, I recommend that you visit their site frequently to check your account’s spam folder, just in case. My Gmail account filtered a response from a potential client into my spam folder. I didn’t find it for days and just assumed the client wasn’t interested. When I didn’t respond, the client thought I wasn’t interested.

Several companies provide free e-mail accounts these days. I use Gmail, but there are others, such as Yahoo and Hotmail. Consider using several free accounts. For instance, you might use one for technical newsletters, one for making purchases, one for signing up for free samples, and so on.

The down side to these free accounts is that the spammers will find it quicker than you can share it. Three days after signing up for Gmail, I had over 100 spam messages in my spam folder. On the average, I now receive around 100 a day, but Gmail’s spam filter catches them all.

Spam be gone!

It would be nice if you could wave a magic wand, mutter a few words, and never receive spam again. That’s just not going to happen. The simplest way to avoid spam is to close your door to it. That sounds simple enough, but you already know that it isn’t. There are two things you can do fight the surge: First, let Outlook do its job and filter spam out of sight; second, don’t spread your e-mail address all over the Internet.

Susan Sales Harkins is an independent consultant and the author of several articles and books on database technologies. Her most recent book is “Mastering Microsoft SQL Server 2005 Express,” with Mike Gunderloy, published by Sybex. Other collaborations with Mike Gunderloy are “Automating Microsoft Access 2003 with VBA,” “Upgrader’s Guide to Microsoft Office System 2003,” “ICDL Exam Cram 2,” and “Absolute Beginner’s Guide to Microsoft Access 2003″ all by Que. Currently, Susan volunteers as the Publications Director for Database Advisors at http://www.databaseadvisors.com. You can reach her at ssharkins@Gmail.com.

Permalink • Print • Comment

10 reasons to turn your Access applications into Web-based applications

Date: April 23rd, 2008

Author: Susan Harkins and Drew Wutka

An Access database often outgrows its original purpose. When that happens, you face applying band-aid technology or upgrading to a more powerful database system, such as SQL Server Express or even SQL Server. But before you toss Access out the window and start signing purchase orders for consultants, developers, licensing, and new hardware, consider one more option — turning your Access application into a Web-based application. Let’s look at some reasons why this might make sense.

Shameless disclaimer: If you truly need a more powerful database system and can afford its trappings, spend and grow!

Note: This information is also available as a PDF download.

#1: Client versus server

A server-side database, such as MySQL, SQL Server, and Oracle, evaluates requests on the server side (sent in the form of a SQL statement) and then returns data to the client. Jet, on the other hand, lets the client do all the work. Jet is the database engine behind Access. Even if the database (.mdb) is on a network server, the client still does all the work. The server simply responds to client file requests.

This arrangement retrieves more then just the data across the network. As a result, indexes and unused data clog the network and slow things down. An alternative is to place the Access database on your Web server’s local drive and then build the interface on the Web server. Doing so creates an ad hoc server-side database that handles transactions on the server (using your code). Requests from the client are in Hyper Text Transfer Protocol (HTTP) format instead of SQL.

Recommendation: Put the Access database (the .mdb file) in a folder that isn’t shared. That way, users won’t have direct access to the database. Their only access will be via the Web server. Your code will serve as the layer that allows users to interact with the actual data.

#2: No client installation

A Web-based front end minimizes installation issues. Users need only a browser. The database doesn’t care whether the user is sending requests via a Windows PC, a Mac, or a machine running Linux.

#3: Easy cross-platform usage

You’re free to use your language of choice to create the Web interface and the code that the server users to interact with the database. Users get clean and standard HTML that almost all browsers can use.

Recommendation: Keep the Web interface simple to ensure that everyone can use it. If you need the advantages of client-side tools, such as client side scripting, Flash media, and so on, go for it. Just keep in mind that not every HTML feature works in every browser. The back end can be as complex as necessary because the Web server is the only one using it.

#4: Simplified security

Storing the database in a non-shared folder (see #1) restricts access. Only the Web server’s administrator has access to the database file. That leaves security to the Web server. Now, you might argue either way as to whether this method is more or less secure than a server-side database. However, someone with direct access to a machine with a server-side database could probably also gain direct access to that database.

In addition, a server-side database requires a network connection. An Access database on a Web server isn’t directly available. You can access the Web server, but not the database. Only the Web server can access the database on the server’s local drive. On the other hand, Access has a security system known as Access User Level security (this isn’t available with Access 2007). Most server-side database security systems are more secure than Access User Level security.

Recommendation: Even though you impose an almost absolute-type form of security by placing a database on a Web server, it can’t hurt to apply Access User Level security. The database is still an .mdb that you can copy and open on any machine that has Access installed. As a developer, you will probably have local copies of that .mdb (and copies on backup tapes for your Web server). Be on the safe side and keep honest people honest by putting a little extra security in place. Users via the Web interface won’t even know the additional security is there.

#5: Easy use of NT authentication

Using Visual Basic for Applications (VBA), you can determine the NT name of users logged into an Access database and thereby restrict which users can do what. However, this method isn’t foolproof, and it doesn’t truly authenticate users. Your Web interface (on an IIS Web server) can use Integrated Windows Security to authenticate user credentials to individual web pages.

#6: Goodbye to corruption!

Most developers complain that Access is susceptible to corruption. Used incorrectly, it certainly is. With an Uninterruptible Power Source (UPS) and redundant drives, your Web-based database (.mdb file) won’t suffer from corruption.

#7: No version problems

With the quick pace of upgrades, many of us have users spread across two and three versions of Access. Unfortunately, not all versions play well together. A Web interface eliminates version incompatibility issues because the Web server uses Jet. That means the Web server doesn’t even need Access — it doesn’t load Access. Your Web server doesn’t care what version of Access the client uses.

#8: Live, behind-the-scenes interface updates

To update an Access front end, you must copy or modify an .mdb file. Access won’t let you make changes while people are using it. (Beginning with Access 2000, you can make some changes, but a few still require exclusive access to the database.) In contrast, you can change the Web interface files (.asp, .aspx, and so on) whenever you like. The changes are almost immediate.

#9: Portability

viagra dosing

Every Windows OS since Windows 98 has had personal Web server capabilities. That means you can develop and test a Web site using a laptop running Windows 98 (or later). Using an Access database as the data source has a few benefits:

  • There’s no need to install and run a heavy-duty server-side database on your laptop.
  • There’s no need to maintain a network connection to a live server.
  • You can copy the live system and its database as just a bunch of files. You don’t have to import, export, or attach database files. For example, you can build a Web site on your laptop or desktop and then move it to a Web server. To work on an update, simply copy the Access database file (.mdb) from the Web server to your laptop.

Recommendation: Jet allows many transaction type SQL statements. You can build and modify tables and views using SQL, along with the typical data reading and altering capabilities. Sometimes, if you put a system on a remote server where you no longer have the ability to get to the actual .mdb, it’s pretty simple to whip up an .asp page that lets you run SQL on the fly against the database.

#10: More users

By their very nature, Web interfaces are unbound. In other words, once a page is loaded, the interface is no longer connected to the database. But a bound Access front end maintains a connection to the source, and Jet limits you to 255 concurrent connections. Your Web application, unless you have 255 users hitting the database at the exact same moment (which would require approximately 30,000 users a minute at a transactions speed of .5 seconds) can have more concurrent users.


Susan Sales Harkins is an independent consultant and the author of several articles and books on database technologies. Her most recent book is Mastering Microsoft SQL Server 2005 Express, with Mike Gunderloy, published by Sybex. Other collaborations with Gunderloy are Automating Microsoft Access 2003 with VBA, Upgrader’s Guide to Microsoft Office System 2003, ICDL Exam Cram 2, and Absolute Beginner’s Guide to Microsoft Access 2003, all published by Que. Currently, Susan volunteers as the Publications Director for Database Advisors. You can reach her at ssharkins@gmail.com.

Drew Wutka is a Microsoft Access/Visual Basic/Web developer for Marlow Industries, Inc. He also does independent contract development and has developed many free projects, such as the Microsoft Access MiniCalendar, the Dynamic FrontPage Navigation ASP Sitemap, and the Password Enabled Enigma Encryption VB program. You can reach Drew at dwutka@marlow.com .

Permalink • Print • Comment

Find and download new fonts for Windows XP

Date: July 25th, 2007

Author: Greg Shultz

Windows XP provides a host of fonts that you can use to enhance your documents both onscreen and in printed form. When you install certain applications, you’ll find that even more fonts have been added to your operating system. Even so, you may still have a longing for more fonts.

Check out Dafont, which offers a huge repository of fonts available as freeware, shareware, demo versions, or public domain, that you can download and install at will. If you know what you want, you’ll appreciate the fact that the fonts are sorted alphabetically, by author, and by themes. If you’re just browsing, check out the new fonts and top 100 sections. viagra discount What makes this site even more intriguing is that you can type in your own text and see what it looks like in any of the available fonts.

Note: This tip applies to both Windows XP Home and Windows XP Professional.

Permalink • Print • Comment

Take charge of Windows XP with these 10+ power tips

Date: September 9th, 2007

Author: Greg Shultz

Everybody likes a good Windows XP tip — something that eliminates an annoyance, streamlines a task, or offers useful customization of a particular feature. Of course, not all tips are ideal for all people, so it’s nice when a bunch of them are pulled together so you can pick and choose. That’s the goal of this download, which provides a healthy assortment of tricks we thought might come in handy. And for those who’d rather zero in on just certain tips on the site, here’s a list of links to enable you to jump straight to items of interest:

viagra directions

Permalink • Print • Comment

Add “Copy To Folder” and “Move To Folder” Context Menu Options

I spend a lot of time copying and moving files between folders. More often than not, when I click on a file in Explorer, I want to copy or move it to another folder. That means I spend a good deal of time dragging files around or copying and pasting them.

But with a Registry hack, you can save yourself time: you can add Copy To Folder and Move To Folder viagra directions for use options to the right-click context menu. When you choose one of the options from the menu, you browse to any place on your hard disk to copy or move the file to, and then send the file there.

To add the option, run the Registry Editor [Hack #68] and go to

HKEY_CLASSES_ROOT\AllFilesystemObjects\shellex\ContextMenuHandlers

shellex tells you it's a shell extension key that lets you customize the user shell or the interface.

Create a new key called Copy To

Set the value to

{C2FBB630-2971-11d1-A18C-00C04FD75D13}

Create another new key called Move To

Set the value to

{C2FBB631-2971-11d1-A18C-00C04FD75D13}

Exit the Registry. The changes should take effect immediately. The Copy To Folder and Move To Folder options will appear. When you right-click on a file and choose one of the options, you'll be able to move or copy the file using a dialog box like the one shown in Figure 3-20.


Figure 3-20. Specifying a destination using the Copy To Folder option

Permalink • Print • Comment
Next Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy