12 Tips for better e-mail etiquette

Monday, April 28, 2008

I remember opening my first e-mail account and thinking how much fun it was to send a message to a friend. However, most people now no longer find e-mail simple or fun. E-mail messaging now exceeds telephone traffic and is the dominant form of business communication. Some workers tell me that handling e-mail consumes half of their day. A recent Wall Street Journal report indicates that soon employees will spend three to four hours a day on e-mail.

Don't you wish that every person who received a new Microsoft Outlook e-mail account had to agree to follow certain rules to use it? There are certain professional standards expected for e-mail use. Here are some things to keep in mind regarding professional e-mail conduct:

  1. Be informal, not sloppy. Your colleagues may use commonly accepted abbreviations in e-mail, but when communicating with external customers, everyone should follow standard writing protocol. Your e-mail message reflects you and your company, so traditional spelling, grammar, and punctuation rules apply.
  2. Keep messages brief and to the point. Just because your writing is grammatically correct does not mean that it has to be long. Nothing is more frustrating than wading through an e-mail message that is twice as long as necessary. Concentrate on one subject per message whenever possible.
  3. Use sentence case. USING ALL CAPITAL LETTERS LOOKS AS IF YOU'RE SHOUTING. Using all lowercase letters looks lazy. For emphasis, use asterisks or bold formatting to emphasize important words. Do not, however, use a lot of colors or graphics embedded in your message, because not everyone uses an e-mail program that can display them.
  4. Use the blind copy and courtesy copy appropriately. Don't use BCC to keep others from seeing who you copied; it shows confidence when you directly CC anyone receiving a copy. Do use BCC, however, when sending to a large distribution list, so recipients won't have to see a huge list of names. Be cautious with your use of CC; overuse simply clutters inboxes. Copy only people who are directly involved.
  5. Don't use e-mail as an excuse to avoid personal contact. Don't forget the value of face-to-face or even voice-to-voice communication. E-mail communication isn't appropriate when sending confusing or emotional messages. Think of the times you've heard someone in the office indignantly say, "Well, I sent you e-mail." If you have a problem with someone, speak with that person directly. Don't use e-mail to avoid an uncomfortable situation or to cover up a mistake.
  6. Remember that e-mail isn't private. I've seen people fired for using e-mail inappropriately. E-mail is considered company property and can be retrieved, examined, and used in a court of law. Unless you are using an encryption device (hardware or software), you should assume that e-mail over the Internet is not secure. Never put in an e-mail message anything that you wouldn't put on a postcard. Remember that e-mail can be forwarded, so unintended audiences may see what you've written. You might also inadvertently send something to the wrong party, so always keep the content professional to avoid embarrassment.
  7. Be sparing with group e-mail. Send group e-mail only when it's useful to every recipient. Use the "reply all" button only when compiling results requiring collective input and only if you have something to add. Recipients get quite annoyed to open an e-mail that says only "Me too!"
  8. Use the subject field to indicate content and purpose. Don't just say, "Hi!" or "From Laura." Agree on acronyms to use that quickly identify actions. For example, your team could use to mean "Action Required" or for the Monthly Status Report. It's also a good practice to include the word "Long" in the subject field, if necessary, so that the recipient knows that the message will take time to read.
  9. Don't send chain letters, virus warnings, or junk mail. Always check a reputable antivirus Web site or your IT department before sending out an alarm. If a constant stream of jokes from a friend annoys you, be honest and ask to be removed from the list. Direct personal e-mail to your home e-mail account.
  10. Remember that your tone can't be heard in e-mail. Have you ever attempted sarcasm in an e-mail, and the recipient took it the wrong way? E-mail communication can't convey the nuances of verbal communication. In an attempt to infer tone of voice, some people use emoticons, but use them sparingly so that you don't appear unprofessional. Also, don't assume that using a smiley will diffuse a difficult message.
  11. Use a signature that includes contact information. To ensure that people know who you are, include a signature that has your contact information, including your mailing address, Web site, and phone numbers.
  12. Summarize long discussions. Scrolling through pages of replies to understand a discussion is annoying. Instead of continuing to forward a message string, take a minute to summarize it for your reader. You could even highlight or quote the relevant passage, then include your response. Some words of caution:
    • If you are forwarding or reposting a message you've received, do not change the wording.
    • If you want to repost to a group a message that you received individually, ask the author for permission first.
    • Give proper attribution.

Use these suggestions as a starting point to create e-mail etiquette rules that will help your team stay efficient and professional. I want to share my experience with Microsoft outlook Help Computer Help and Technical Support.

How to use Command-line switches

Thursday, April 24, 2008

The command that starts Microsoft Outlook is Outlook.exe. A command-line switch is the addition of a forward slash (/) followed by the switch name and any parameters the switch has.

  1. Search for the Microsoft Outlook executable file, Outlook.exe, and make a note of the path to Outlook.exe. For example, the path might be C:\Program Files\Microsoft Office\Office11\Outlook.exe.
  2. Click Start, and then click Run.
  3. In the Open box, type the complete path you noted in step 1, including the file name. Press the SPACEBAR once, and then type a forward slash mark (/) followed by the switch.

For example, if you want to use the Clean Reminders switch, the command you type in the Open box should look like this:

"C:\Program Files\Microsoft Office\Office11\Outlook.exe" /Cleanreminders

Note Paths that include spaces between words must be enclosed in quotation marks (") and are case sensitive.

  1. To run the command, click OK.

It post describes How to use Command line Switches in Microsoft Outlook. I want to share My Experience computer Support and Technical Support

HTML and RTF message security

Sunday, April 20, 2008

To help protect you from viruses that might be contained in HTML-format and RTF-format messages, both scripts and ActiveX controls contained in these kinds of messages are deactivated automatically, regardless of the security zone setting. This is because Microsoft Outlook places all incoming messages in the Restricted Sites security zone by default. The default setting for the Restricted Sites zone is High. This disables automatic scripting and prevents ActiveX controls from opening without permission.

Changing the zone setting to something other than the default is not recommended.

If you need to run the script on an individual message when the security zone is set to Restricted Sites, you can work around the default protection by following these steps:

  1. Open the message.
  2. On the View menu, click View in Internet Zone.
  3. Click Yes when you are prompted about running the script.

You can now run the script.

This post help to HTML and RTF massage Security.But what i want to share here with you is my experience of sharing the Microsoft Outlook and providing a computer support assistance.


Outlook Mail Attachment security

Monday, April 14, 2008

To prevent the spread of viruses from program files (considered a Level 1 threat), Microsoft Outlook automatically blocks attachments that contain file types that can run programs. These blocked file types include .exe, .bat, .com, .vbs, and .js. Your Inbox displays the paperclip icon in the Attachment column to let you know that the message has an attachment. A list of the blocked attachment files appears in the InfoBar at the top of the message.

If you try to send an attachment that has a file type extension that is on the Level 1 restricted list, you receive a message that other Outlook users may not be able to access this type of attachment.

Only an e-mail server administrator can change this default setting and unblock certain file types. This setting is often used on an organization's intranet, not on the Internet.

Data files, such as .doc, .xls, .ppt, and .txt files, are not blocked. However, you receive an Opening Mail Attachment message when you try to open an attachment.

This message gives you the opportunity to consider the safety of the file you are opening and a chance to save the file and scan it for viruses before opening it.

To be able to send any file type by using e-mail, you can use a third-party program, such as WinZip, to package files before you attach them to your e-mail message. WinZip can create a new Outlook message and attach the .zip package for you.

In your message, you can include instructions explaining how to extract the files from the package to make it easy for recipients to access the files.



source office.microsoft.com


Outlook Address Book security

Thursday, April 10, 2008

The Outlook Address Book is guarded programmatically. This helps to prevent another program from automatically accessing your Address Book or Contacts list or from sending messages on your behalf without your permission. It is very useful to allow some programs (like Microsoft ActiveSync® or Palm Desktop) to access your contact information so that you can synchronize your personal digital assistant (PDA). However, a virus or other malicious program file can use the same functionality to propagate itself. If a program attempts to access your Address Book, a warning appears on screen.
This message appears if a program tries to access your Address Book. In general, you cannot prevent this caution from appearing. However, check with your synchronization software vendor to see if recent updates to the vendor's software include interacting with Outlook in a trusted manner. This message is not displayed when Outlook interacts with trusted synchronization software.




•Unless you clicked a command or started a program that is expected to interact with Outlook Address Book information or if you are just not sure, click No.
•If you clicked a command or started a program that is expected to interact with Outlook Address Book information, select the Allow access for check box, and then specify the amount of time you grant access for.

Outlook security features

Monday, April 7, 2008

Outlook is designed to help protect your computer from viruses and junk e-mail messages. The following information focuses on the virus protection features in Outlook.

Macro security

Outlook itself cannot detect whether a virus is present. Macro viruses are spread through attachments, not the e-mail message itself. Microsoft Office achieves macro virus protection by using the High macro security setting as the default. With the High setting, you can run only digitally signed macros from trusted sources or macros that you created yourself, as long as the installed add-ins and templates are trusted. Unsigned macros are automatically disabled.

Note Signing a macro is similar to getting a legal document notarized by a legal authority or getting your passport stamped by a government official. Electronic certificates are used to sign the macro code. Certificates are issued by a certificate authority, such as a bank, government, or software company, which should be trusted sources. For example, all macros that are pre-installed with Office are signed by the developers who created them using certificates issued by Microsoft that vouch for their authenticity.

If you change the macro security level to the less secure Medium setting, you automatically receive a warning each time you open a document that contains a macro. You can select an option in the Security Warning dialog box about whether to run the macro. Disable Macros is the default button.

Note If the security setting is set to Low, Outlook will not warn you before running a macro. Therefore, all macros are run automatically without your intervention. Because of the potential security risk, Microsoft does not recommend that you use the Low setting.


source office.microsoft.com

Troubleshoot opening files

Wednesday, April 2, 2008

The file you are trying to open may be damaged. Your Microsoft Office program may let you try to recover the text from the damaged file, or if recovery doesn't work, you can delete the damaged file and open a backup copy.

  1. If the Microsoft Office program you are using is not responding, recover the program.
    1. On the Microsoft Windows Start menu, point to Programs, point to Microsoft Office Tools, and then click Microsoft Office Application Recovery.
    2. In the Application list, click the program or document that is not responding.
    3. Do one of the following:
      • To attempt to recover the files you were working on, click Recover Application or Restart Application.
      • If you just want to close the program, and lose recent changes to the files, click End Application.
    4. The error that caused the problem can be reported to Microsoft for use in improving future versions of the program. Click Send Error Report or Don't Send.

Note If you are not connected to the internet you can click Send Error Report Later to be prompted to send the report the next time you connect.

  1. Open the Office program.
  2. Review the files listed in the Document Recovery task pane (task pane: A window within an Office application that provides commonly used commands. Its location and small size allow you to use these commands while still working on your files.), and decide which to keep.

o If a file has [Recovered] in the title it is usually a file that contains more recent changes than a file with [Original] in the title.

    • If you want to view what repairs were made to a file, point to the file in the Document Recovery task pane, click the arrow next to the file's name, and then click Show Repairs.
    • If you want to review the versions that were recovered, open all of the versions and save the best one.
  1. For each file you want to keep, point to the file in the Document Recovery task pane, click the arrow next to the file's name, and then do one of the following:
    • To work with the file, click Open.
    • To save the file, click Save As, and then enter a name for the file. By default, the file is saved in the same folder as the original file. If you use the same name as the original file, the original is overwritten. When you see a message asking whether you want to replace the existing file (with the changes you made up to the last time you saved the file), click Yes.
  2. When you have opened or saved all of the files you want to keep, click Close in the Document Recovery task pane.

The file name may be too long

The file name or the path name may exceed 223 characters. Do one of the following:

· Shorten the file name.

· Move the file to another folder that is closer to the top of the folder hierarchy.

Try to open the file again.

The disk the file is on may be too full

Try moving files to another disk to make more space available.

The Open dialog box doesn't list the file I'm looking for.

Check the file type

Make sure you have the correct file type selected in the Files of type box.

Conduct a search

In the Open dialog box, click Tools, and then click Search. Select the options you want, and then click Search.

Check the network connection

If you're looking for a file on the network and the network drive doesn't appear in the Open dialog box under Look in, do the following:

1. Click Tools, and then click Map Network Drive.

2. In the Drive box, click the drive letter you want to use to connect to the network.

3. In the Folder box, enter the path where the file is located on the network— for example, type \\server\share.

You can also look for files on a network drive if your network supports the UNC (universal naming convention (UNC): A naming convention for files that provides a machine-independent means of locating the file. Rather than specifying a drive letter and path, a UNC name uses the syntax \\server\share\path\filename.). Just type the UNC path in the File name box in the Open dialog box— for example, type \\plans\documents.

Look in My Network Places

If you're looking for files on a Web server (Web server: A computer that hosts Web pages and responds to requests from browsers. Also known as an HTTP server, a Web server stores files whose URLs begin with http://.):

· In the Open dialog box, click My Network Places on the My Places bar (Places bar: The bar on the left side of certain dialog boxes (such as Open, Save As, or Insert Picture) that contains shortcuts to the My Recent Documents, Desktop, My Documents, My Computer, and My Network Places folders.) to display folders on the Web server. Double-click the folders until you open the folder that contains the document you want.

You can also type the folder path in the File name box in the Open dialog box— for example, type http://myserver/public.

I can't open a password protected file.

Passwords (password: A sequence of characters needed to access computer systems, files, and Internet services. Strong passwords combine uppercase and lowercase letters, numbers, and symbols.) are case-sensitive. Check to see whether the CAPS LOCK key is on, or retype the password to make sure that you didn't mistype it.

My file opened in a separate window.

When you create or open a file in a Microsoft Office program, the file opens in a separate window. You can quickly switch from one file to another by clicking the file's button on the taskbar or by pressing ALT+TAB.

The shortcut to my file doesn't work anymore.

The file may have been renamed or deleted

The shortcut will not work if there has been any change to the target file's name or extension. Use the Microsoft Office Search feature to look for files that have similar names or that were created or modified on the same date as the file you are trying to open.

Conduct a search

In the Open dialog box, click Tools, and then click Search. Select the options you want, and then click Search.

The file may be temporarily unavailable
  • If the file is located on a network server, consult your network administrator to find out if the server drive is unavailable.
  • If the file is located on removable media such as a floppy disk, make sure the media with the target file is properly inserted in the drive or device.

source office.microsoft.com