How to Enable the Wireless Zero Configuration

 

You can use the Wireless Zero Configuration service to use 802.x Authentication in Windows. This can be a lifesaver if your third party wireless connection manager is not working.

 To start Wireless Zero Configuration use the directions for your version of Windows listed below. Then skip down to the last section showing how to enable it.


Windows Vista

To start Wireless Zero Configuration in Windows Vista you need to log in as an Administrator.

  • Click on Start and Control Panel
  • Select Administrative Tools and then Services
  • In the Services box scroll down the list of Services (Local) until you find the one labelled Wired AutoConfig and double click it.
  • In the Wired AutoConfig Properties (Local Computer) box change the Startup type to Automatic
  • Click on Start and once the service has started click on OK
  • Now find the service labelled WLAN AutoConfig and double click it.
  • In the WLAN AutoConfig Properties (Local Computer) box change the Startup type to Automatic
  • Click on Start and once the service has started click on OK
  • Go to File and Exit to close the Services window


Windows XP

Windows XP users must have Service Pack 2 installed to activate the Wireless Zero Configuration.

  • Go to Start and Control Panel
  • Click on Administrative Tools and Services
  • In the Services box scroll down the list of Services (Local) until you find the one labelled Wireless Zero Configuration and double click it.
  • In the Wireless Zero Configuration Properties (Local Computer) box change the Startup type to Automatic
  • Click on Start and once the service has started click on OK
  • Go to File and Exit to close the Services box.


Windows 2000

Windows 2000 users must have Service Pack 4 installed to activate Wireless Zero Configuration.

  • Click on Start and Settings and Control Panel
  • Choose Administrative Tools and Services
  • In the Services box scroll down the list of Services until you find the one labelled Wireless Configuration and double click it.
  • In the Wireless Configuration Properties (Local Computer) window change the Startup type to Automatic
  • Click on Start , once the service has started click on OK
  • Click on the X in the top right corner to close the Window

________________________________________________________________

 Enable It.

Click on Start and Settings and Control Panel open Network Connections

From here, right click on your Wireless Network Connection and select Properties

On the Wireless Networks Tab. Check the “Use Windows to configure my wireless network settings” check box. This will alow “Zero Config” or the Windows Wireless Zero configuration utility to control the wireless card. Click ok. You can now use windows to manage your wireless connection.

How to Reset Internet Explorer 7

Windows Internet Explorer 7 for Microsoft Windows XP and Windows Internet Explorer 7 in Microsoft Windows Vista have many security enhancements that make Internet Explorer 7 less susceptible to spyware and to malware. Typically, badly written add-ons can affect the browsing experience in Internet Explorer 7. RIES enables Internet Explorer 7 to recover from such situations.

 

To use RIES in Internet Explorer 7, follow these steps:1. Click the Tools menu, and then click Internet Options.

2. On the Advanced tab, click Reset.

3. In the Reset Internet Explorer Settings dialog box, click Reset. 

4. When Internet Explorer 7 finishes restoring the default settings, click Close, and then click OK two times. 

5. Close Internet Explorer 7. The changes take effect the next time that you open Internet Explorer 7. 

Note If you cannot start Internet Explorer 7 for some reason, use RIES from Internet Options in Control Panel.

 

RIES restores the default settings of the following features: • Home pages

• Search scopes

• Browsing history

• Form data

• Passwords

• Appearance settings

• Toolbars

• ActiveX controls

 

 

 How RIES works

RIES resets the following settings:

 

• Browser settings

 

RIES resets all user-defined browser settings to Internet Explorer 7 defaults. These settings include those that are set by installed extensions, toolbars, and other add-ons. If you have administrative credentials when you are running RIES, the corresponding computer settings are located in the HKEY_LOCAL_MACHINE registry subtree. RIES resets these settings to Internet Explorer 7 defaults. These settings include all the customizations that you can make to Internet Explorer 7 by using the Internet Options dialog box. For example, this resets security settings, privacy settings, and zone settings. 

• Extensibility

 

All extensibility entry points that you install are prevented from running automatically. If you load extensions such as toolbars, browser extensions, and Browser Helper Objects when you start Internet Explorer 7, the extensions are disabled. Additionally, the ActiveX Opt-in state of ActiveX controls are restored. 

• Browsing history

 

RIES clears temporary Internet files, cookies, browsing history, form data, passwords, and auto-complete data. 

• Manufacturer settings

 

RIES restores Internet Explorer 7 customizations that are applied by the OEM in the initial package. These customizations are applied to Internet Explorer 7 by using the Internet Explorer Administration Kit (IEAK). Alternatively, these customizations are applied by using the settings that are applied by the OEM during the installation of the operating system. 

 

Things you should know about REIS

 

• RIES disables all toolbars, browser extensions, and customizations that you install. To use any of these disabled customizations, you must selectively enable each customization through the Manage Add-ons dialog box. Some toolbars may require that two or more controls are enabled to work correctly. These toolbars have controls for the corresponding Browser Helper Object and toolbar extensions. You can easily enable all the disabled controls that are from a trusted publisher from the Manage Add-ons dialog box. 

• For Web pages that have ActiveX controls, you must approve running specific ActiveX controls. You approve running specific controls the first time that you encounter these controls. 

• RIES neither clears the favorites nor clears the feeds. Also, RIES does not reset connection settings because the settings can be used from other programs. 

• RIES does not affect Group Policy settings. After you use RIES, all the policies and restrictions that administrators control on a domain are still respected in Internet Explorer 7. However, RIES does not respect some policies that affect how RIES works when RIES is in progress. For example, when you enable the Turn off Delete Browsing History functionality Group Policy, RIES clears temporary Internet files. The policy continues to work after you use RIES by disabling UI entry points to the Delete Browsing History dialog box. However, from the RIES context, this Group Policy is not in effect. You can disable RIES features on end-user computers by using the Do not allow resetting Internet Explorer settings Group Policy. 

• When you run RIES with administrative credentials, the HKEY_LOCAL_MACHINE registry subtree settings are reset. These settings apply to all the users on this computer. This affects the browsing experience of users who are currently using Internet Explorer 7 and users who open a new browsing session. If users do not change the settings, Internet Explorer 7 reads those settings from HKLM, and then the settings are cleaned. However, RIES does not touch the settings that users specifically customize. Therefore, we recommend that administrators use RIES after they communicate with all affected end-users.

 

• Many applications interact with Internet Explorer 7. These applications may start Internet Explorer 7, or these applications may embed Internet Explorer 7 as needed. For example, Microsoft Outlook opens Internet Explorer7 when you click a hyperlink in an e-mail message. Such interactions with Internet Explorer 7 during an RIES operation could lead to unexpected results. Therefore, we recommend that you close all other applications and windows before you run RIES.

 

• If one or more RIES tasks fail, the tasks are identified by an X that is located next to the tasks in the Progress dialog box. Additionally, the details of failed actions are logged in the Ried.log log file and the Brndlog.txt log file. You can find these files in the %USERPROFILE%\Local Settings\Application Data\Microsoft\Internet Explorer\ folder.

How to troubleshoot TCP/IP connectivity with Windows XP/Vista

This is a comprehensive guide for using the tools that are built into Windows when you are trying to determine the cause of TCP/IP networking problems. This article lists recommendations for using these tools to diagnose network problems. Although this list is not complete, the list does provide examples that show how you can use these tools to track down problems on the network.

 

 

 

TCP/IP troubleshooting tools

The following list shows some of the TCP/IP diagnostic tools that are included with Windows XP:

 

 

Basic tools

• Network Diagnostics in Help and Support

Contains detailed information about the network configuration and the results of automated tests.

• Network Connections folder

Contains information and configuration for all network connections on the computer. To locate the Network Connections folder, click Start, click Control Panel, and then click Network and Internet Connections.

• IPConfig command

Displays current TCP/IP network configuration values, updates, or releases, Dynamic Host Configuration Protocol (DHCP) allocated leases, and display, register, or flush Domain Name System (DNS) names.

Ping command

Sends ICMP Echo Request messages to verify that TCP/IP is configured correctly and that a TCP/IP host is available.

 

Advanced tools

• Hostname command

Displays the name of the host computer.

• Nbtstat command

Displays the status of current NetBIOS over TCP/IP connections, updates the NetBIOS name cache, and displays the registered names and scope ID.

• PathPing command

Displays a path of a TCP/IP host and packet losses at each router along the way.

• Route command

Displays the IP routing table and adds or deletes IP routes.

• Tracert command

Displays the path of a TCP/IP host.

To view the correct command syntax to use with each of these tools, type -? at a command prompt after the name of the tool.

 

 

Windows XP Professional tools

Windows XP Professional contains the following additional tools: • Event viewer

Records system errors and events.

• Computer Management

Changes network interface drivers and other components.

 

 

Troubleshooting

The procedure that you use to troubleshoot TCP/IP issues depends on the type of network connection that you are using and the connectivity problem that you are experiencing.

 

 

Automated troubleshooting

For most issues that involve Internet connectivity, start by using the Network Diagnostics tool to identify the source of the issue. To use Network Diagnostics, follow these steps: 1. Click Start, and then click Help and Support.

2. Click the link to Use Tools to view your computer information and diagnose problems, and then click Network Diagnostics in the list on the left.

3. When you click Scan your system, Network Diagnostics gathers configuration information and performs automated troubleshooting of the network connection.

4. When the process is completed, look for any items that are marked “FAILED” in red, expand those categories, and then view the additional details about what the testing showed.

You can either use that information to resolve the issue or you can provide the information to a network support professional for help. If you compare the tests that failed with the documentation in the Manual Troubleshooting section later in this article, you may be able to determine the source of the issue. To interpret the results for TCP/IP, expand the Network Adapters section of the results, and then expand the network adapter that failed the testing.

 

You can also start the Network Diagnostics interface directly by using the following command:

netsh diag gui

Manual troubleshooting

To manually troubleshoot your TCP/IP connectivity, use the following methods in the order that they appear:

 

 

Method 1: Use the IPConfig tool to verify the configuration

 

 

To use the IPConfig tool to verify the TCP/IP configuration on the computer that is experiencing the problem, click Start, click Run, and then type cmd. You can now use the ipconfig command to determine the host computer configuration information, including the IP address, the subnet mask, and the default gateway.

 

The /all parameter for IPConfig generates a detailed configuration report for all interfaces, including any remote access adapters. You can redirect IPConfig output to a file to paste the output into other documents. To do this, type:

ipconfig > \folder_name\file_name

The output receives the specified file name and is stored in the specified folder.

 

You can review the IPConfig output to identify issues that exist in the computer network configuration. For example, if a computer is manually configured with an IP address that duplicates an existing IP address that is already detected, the subnet mask appears as 0.0.0.0.

 

If your local IP address is returned as 169.254.y.z with a subnet mask of 255.255.0.0, the IP address was assigned by the Automatic Private IP Addressing (APIPA) feature of Windows XP Professional. This assignment means that TCP/IP is configured for automatic configuration, that no DHCP server was found, and that no alternative configuration is specified. This configuration has no default gateway for the interface.

 

If your local IP address is returned as 0.0.0.0, the DHCP Media Sensing feature override turned on because the network adapter detected its lack of connection to a network, or TCP/IP detected an IP address that duplicates a manually configured IP address.

 

 

If you do not identify any issues in the TCP/IP configuration, go to Method 2.

 

 

Method 2: Use the Ping tool to test your connectivity

 

 

If you do not identify any issues in the TCP/IP configuration, determine whether the computer can connect to other host computers on the TCP/IP network. To do this, use the Ping tool.

 

The Ping tool helps you verify IP-level connectivity. The ping command sends an ICMP Echo Request message to a destination host. Use Ping whenever you want to verify that a host computer can send IP packets to a destination host. You can also use Ping to isolate network hardware problems and incompatible configurations.

 

Note If you ran the ipconfig /all command, and the IP configuration appeared, you do not have to ping the loopback address and your own IP address. IPConfig has already performed these tasks to display the configuration. When you troubleshoot, verify that a route exists between the local computer and a network host. To do this, use the following command:

ping IP address

NoteIP address is the IP address of the network host that you want to connect to.

 

To use the ping command, follow these steps: 1. Ping the loopback address to verify that TCP/IP is installed and correctly configured on the local computer. To do this, type the following command:

ping 127.0.0.1

If the loopback test fails, the IP stack is not responding. This problem may occur if any one or more of the following conditions is true: • The TCP drivers are corrupted.

• The network adapter is not working.

• Another service is interfering with IP.

 

2. Ping the IP address of the local computer to verify that the computer was correctly added to the network. If the routing table is correct, this procedure just forwards the packet to the loopback address of 127.0.0.1. To do this, type the following command:

ping IP address of local host

If the loopback test succeeds but you cannot ping the local IP address, there may be an issue with the routing table or with the network adapter driver.

3. Ping the IP address of the default gateway to verify that the default gateway is working and that you can communicate with a local host on the local network. To do this, type the following command:

ping IP address of default gateway

If the ping fails, you may have an issue with the network adapter, the router or gateway device, the cabling, or other connectivity hardware.

4. Ping the IP address of a remote host to verify that you can communicate through a router. To do this, type the following command:

ping IP address of remote host

If the ping fails, the remote host may not be responding, or there may be a problem with the network hardware between computers. To rule out an unresponsive remote host, use Ping again to a different remote host.

5. Ping the host name of a remote host to verify that you can resolve a remote host name. To do this, type the following command:

ping Host name of remote host

Ping uses name resolution to resolve a computer name into an IP address. Therefore, if you successfully ping an IP address but you cannot ping a computer name, there is a problem with host name resolution, not with network connectivity. Verify that DNS server addresses are configured for the computer, either manually in the properties of TCP/IP, or by automatic assignment. If DNS server addresses are listed when you type the ipconfig /all command, try to ping the server addresses to make sure that they are accessible.

If you cannot use Ping successfully at any point, verify the following configurations: • Make sure that the local computer’s IP address is valid and that it is correct on the General tab of the Internet Protocol (TCP/IP) Properties dialog box or when it is used with the Ipconfig tool.

• Make sure that a default gateway is configured and that the link between the host and the default gateway is working. For troubleshooting purposes, make sure that only one default gateway is configured. Although you can configure more than one default gateway, gateways after the first gateway are used only if the IP stack determines that the original gateway is not working. The purpose of troubleshooting is to determine the status of the first configured gateway. Therefore, you can delete all the other gateways to simplify your task.

• Make sure that Internet Protocol security (IPSec) is not turned on. Depending on the IPSec policy, Ping packets may be blocked or may require security. For more information about IPSec, go to Method 7: Verify Internet Protocol security (IPSec).

Important If the remote computer that you are pinging is across a high-delay link such as a satellite link, response may take longer. You can use the -w (wait) parameter to specify a longer timeout period than the default timeout of four seconds.

 

 

Method 3: Use the PathPing tool to verify a route

 

 

The PathPing tool detects packet loss over multiple-hop paths. Run a PathPing analysis to a remote host to verify that the routers on the way to the destination are operating correctly. To do this, type the following command:

pathping IP address of remote host

Method 4: Use the Arp tool to clear the ARP cache

 

 

If you can ping both the loopback address (127.0.0.1) and your IP address but you cannot ping any other IP addresses, use the Arp tool to clear out the Address Resolution Protocol (ARP) cache. To view the cache entries, type any one of the following commands:

arp -a

 

arp -g

To delete the entries, type the following command:

arp -d IP address

How to turn off Aero effects in Vista

Windows Aero is sleek and looks great but, it can hinder the performance of your system if you have limited RAM or a slower processor. Here are a few simple changes that can boost system performance.

Right click your desktop and click “Personalize” .
Click “Window Color and Appearance”.
Uncheck the box next to “Enable Transparency”.
This will give your system a little boost but if you want to go all out, you can turn off all of the Aero effects. To do this, follow these steps.

From the “Windows Color and Appearance” box select “Open classic appearance properties for modem color options”.
On the list under Color scheme select “Windows Vista Basic”.
This will give a slower system a noticable poerformance boost.

Hacking Internet Explorer’s Kiosk Mode

Internet Explorer offers a Full Screen mode, invoked by pressing F11. In this mode it has no title bar or border and it fills the whole screen. This is sometimes called kiosk mode, suggesting you could use it to turn your PC into a self-service Internet kiosk for use by the public. However, it gives the user too much power. The navigation toolbar remains at the top, and any user can right-click it to restore the Address bar. Worse, pressing F11 again restores the normal view.

You can get a lot closer to a practical Internet kiosk by launching IE in its true Kiosk mode. To do so, simply enter iexplore -k in the Start menu’s Run dialog, appending the URL of the Web site you want it to open. You could also create a shortcut containing this command line. The resulting window will totally fill the screen with the selected page—no frame, no title bar, no menu, and no toolbar. If the page in question is a local HTML page with only local links, users can’t click to navigate elsewhere.

Savvy users could still get around this limitation by controlling IE through the keyboard. By typing Ctrl-O or Ctrl-L they could invoke the Open dialog, which would allow them to open any Web site (effectively restoring the Address bar’s functionality). Ctrl-N would open a new window that’s not in Kiosk mode, and Shift-clicking a link would open that link in a non-Kiosk window. Finally, Alt-F4 or Ctrl-W would close the Kiosk-mode window.

You can lock down these subversive key combinations using restrictions in the Registry. Launch RegEdit from the Start menu’s Run dialog; navigate to HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Microsoft Internet Explorer\Restrictions; and find or create each of the following DWORD values, setting its data to 1 to enable the restriction:

·  NoBrowserClose (disables closing the browser window)

·  NoBrowserContextMenu (disables right-click context menu)

·  NoFileOpen (disables use of Ctrl-O or Ctrl-L to launch an arbitrary URL)

·  NoOpenInNewWnd (disables opening a link in a new window via Ctrl-N or Shift-click)

A user who attempts one of these restricted actions will get a warning stating “This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.” You may need to restart the computer to make it recognize changes in these values. Of course users can still enter Ctrl-Alt-Del to bring up Task Manager and end the process.

How to Disable Some Common Firewalls

Windows XP

  1. Log on as a user that is a member of the Administrators group.
  2. Open the Network Connections folder, right click the desired connection, and then click Properties.
  3. Click the Advanced tab, and remove the check from Protect my computer and network by limiting or preventing access to this computer from the Internet.
  4. Click Yes to the dialog windows that asks you to confirm your decision to disable the firewall.

Norton Internet Security
http://www.symantec.com/sabu/nis/nis_pe/

  1. Log on using an account with Adult or Supervisor rights. Open Norton Internet Security.
  2. On the left side of the window, click Internet Status and then click Current Status.
  3. In the Current Status window, click Disable.

Norton Personal Firewall
http://www.symantec.com/sabu/nis/npf/

  1. Open Norton Personal Fireall.
  2. On the left side of the window, click Internet Status and then click Current Status.
  3. In the Current Status window, click Disable.

You can also disable Norton Personal Firewall by right-clicking on the Norton Personal Firewall icon in the notification area of the taskbar and selecting disable.

McAfee Internet Security
http://www.mcafee.com/myapps/is5/default.asp

  1. Right-click the McAfee icon.
  2. Point to Personal Firewall and then click Options.
  3. Click the Security tab.
  4. Set the Security Level by moving the slider to the desired level.
  5. Set Access to Low.
  6. Click OK to save changes.

McAfee Firewall

  1. Click Stop McAfee Firewall to disable the software

Cisco Router Configuration

Enter one command per line

At the > prompt type enable

At the # prompt type config t

 

At the <config># prompt type hostname lab-xAt the <config># prompt type enable secret (your chosen password)

At the <config># prompt type enable password (your chosen password)

At the <config># prompt type line con 0

At the <config-line># type login

At the <config-line># type password cisco 

At the <config-line># type line aux 0

At the <config-line># type login

At the <config-line># type password cisco

At the <config-line># type line vty 0 4

At the <config-line># type login

At the <config-line># type password cisco

To exit <config-line> mode, type exit

At the <config># prompt type interface (which ever one)

At the <config-if># type ip address —.—.—.— 255.255.255.0

At the <config-if># type no shutdown

At the <config-if># (only S0) type clockrate 56000

To exit <config-line> mode, type exit

 

At the <config># prompt type router (rip) or (IGRP + autonomous system number)

At the <config-router> # type Network —.—.—.— (all connected networks—not interfaces)

To exit the <config-router> # mode, type exit

At the <config># prompt type ip host lab-x1 (type all the interfaces on lab-x1)

At the <config># prompt type ip host lab-x2 (type all the interfaces on lab-x2)

At the <config># prompt type ip host lab-x3 (type all the interfaces on lab-x3)

At the <config># prompt type ip host lab-x4 (type all the interfaces on lab-x4)

Outlook Express Troubleshooting

Outlook Express (OE), which is bundled with the Windows operating system, is probably the email client most commonly used by the average home PC user. Here are some tips on how OE works and how to use it better.

 


How Outlook Express stores mail

A peculiarity of OE that many are not aware of is the proprietary way that email is stored. OE is organized with folders such as “Inbox”, “Outbox”, “Sent”, and “Deleted”. Rather than store individual messages as separate files, OE stores the contents of each of these folders in one proprietary binary file with the extension DBX. Thus there is a file Inbox.dbx, a file Outbox.dbx, a file Sent.dbx, and so forth. These files cannot be read by simply clicking on them. All of these files are kept in a hidden folder called “Outlook Express” that is buried deep down in the Documents and Settings folder with a very long and arcane path. Each user account has its own folder. Also, if you use more than one identity, each identity will have its own folder. Identities are assigned a long hexadecimal name called a GUID or Globally Unique Identifier. Here is an example of a path to an email store folder:

C:\Documents and Settings\UserName\Local Settings\Application Data\Identities\{ACEF249B-0C16-491C-B19E-347F8295C81C}\Microsoft\Outlook Express

A more convenient place for Outlook Express mail

It is possible to move the store folder to a much simpler path. This makes copying or backing up the email files much easier. The easiest way to find where your Outlook Express mail is currently stored is to open Outlook Express, go to the Tools-Options menu and click the “Maintenance” tab. There will be a button “Store Folder”. If you click that, a dialog box “Store Location” will open. It will list where your mail is currently being kept. Use the “Change” button to move the store folder for mail to a more accessible location. Choose a new location by typing in the box or use the Browse function.

 

How to add special characters to email

Did you ever want to put a special character like the cent sign (¢) or the British pound sign (£) into an email? Or use the correct symbols for Spanish or other languages? Regular users of word processing programs like Microsoft Word probably already know how to do this but many average PC users are not aware that two easy methods of inserting special characters are readily available. The first and more comprehensive way is to use the Windows accessory called Windows Character Map. On most XP machines this can be found either in All Programs-Accessories-System Tools or in All Programs-Accessories.

Another method makes use of the Numeric Keypad. That is the section on the right of many keyboards that is ignored by a lot of PC users. It actually has some useful functions and here is one of them. First, make sure the “Num Lock’ light is on. This function is toggled by the “Num Lock” key. With Num Lock on, you can enter special characters into Word documents, Outlook Express messages, and other documents by holding down the Alt key and entering a number code for a variety of special characters, and then releasing the Alt key. For example, to enter the cent sign (¢) hold down the Alt key, enter the numbers 0162 into the Numeric Keyboard, and then release the Alt key.

Combining and archiving emails in Outlook Express

If you ever want to archive a collection of emails, you can make use of a feature in OE for combining a bunch of emails into one file. The feature was originally intended for combining emails or newsgroup messages that were sent in encoded pieces (necessary for big files back in the days of narrow bandwidth) but it works for regular emails as long as they don’t contain graphics.

Select the emails to be combined by using either the Shift or Ctrl keys and open the OE menu “Message”. Choose “Combine and Decode” from the menu. A dialog box called “Order for decoding” will appear, listing all the messages. Don’t let the term “decoding” put you off. If you have some reason for doing so, you can change the order in which the different messages are combined but normally they will be in whatever order you use in your mailbox. Mine are chronological and I just leave them that way. When you are ready to combine the messages, click the button “OK”. The combined file will then be displayed in an OE window. Go to the “File” menu, click “Save as” and put the file wherever on your computer you want to keep it with an appropriate file name. The default format is the OE email format with extension “eml” but you can also choose a text format if your emails are pure text. The advantage of the eml format is that it preserves any hyperlinks in the original messages. Note that all the original messages are not affected and will still be in their original form and location.

I also use this method for transferring a bunch of messages from one computer to another. It is often easier than messing with the binary DBX files where OE messages are stored.

More on archiving or transferring email

The method given above works nicely as long as no message contains a picture. Hypertext links are OK but mail with embedded pictures doesn’t work. Either the combination process stops with the first email or the combined file ends up displaying the underlying HTML code instead.

However, there is another way to combine emails that I sometimes use to transfer mail from one computer to another or to archive a bunch of email in one file. This one works fine with graphics. Select the emails you are interested in and then click the “Forward” button. All the messages will be attached in a single new message. You do not have to actually forward the new message with all the attachments but can save it anywhere on your computer that you like. I do not know what limit OE itself might place on the number of attachments but I have attached as many as 30 emails to a single message. If you do wish to forward a combined message, keep in mind that not all ISPs may allow multiple attachments. Also, ISPs usually limit the size of an email, with 10 MB being a common number.

When OE pictures don’t send properly

I have had it happen to me that I send out email with a picture in it only to find that the picture didn’t accompany the email. This happens if a particular setting in OE gets accidentally changed. Instead of a picture being embedded in OE, only a reference to the picture is placed in the message. The message looks fine when viewed locally becuse the reference loads the graphics file. On somebody else’s computer, there is no file to load so they get a red X. The setting is reached by going to the OE menu Tools-Options and clicking the “Send” tab. In the dialog box that opens, click the button “HTML Settings” that is in the section “Mail Sending Format”. The dialog shown below will open. Make sure a check is by ” Send pictures with messages”. Then Click “OK” and “OK’ again.

Linux BASH Command Reference

An A-Z Index of the Linux BASH command line

alias    Create an alias
apropos  Search Help manual pages (man -k)
awk      Find and Replace text, database sort/validate/index
break    Exit from a loop
builtin  Run a shell builtin
bzip2    Compress or decompress named file(s)

cal      Display a calendar
case     Conditionally perform a command
cat      Display the contents of a file
cd       Change Directory
cfdisk   Partition table manipulator for Linux
chgrp    Change group ownership
chmod    Change access permissions
chown    Change file owner and group
chroot   Run a command with a different root directory
cksum    Print CRC checksum and byte counts
clear    Clear terminal screen
cmp      Compare two files
comm     Compare two sorted files line by line
command  Run a command - ignoring shell functions
continue Resume the next iteration of a loop
cp       Copy one or more files to another location
cron     Daemon to execute scheduled commands
crontab  Schedule a command to run at a later time
csplit   Split a file into context-determined pieces
cut      Divide a file into several parts

date     Display or change the date & time
dc       Desk Calculator
dd       Data Dump - Convert and copy a file
ddrescue Data recovery tool
declare  Declare variables and give them attributes
df       Display free disk space
diff     Display the differences between two files
diff3    Show differences among three files
dig      DNS lookup
dir      Briefly list directory contents
dircolors Colour setup for `ls'
dirname  Convert a full pathname to just a path
dirs     Display list of remembered directories
du       Estimate file space usage

echo     Display message on screen
egrep    Search file(s) for lines that match an extended expression
eject    Eject removable media
enable   Enable and disable builtin shell commands
env      Environment variables
ethtool  Ethernet card settings
eval     Evaluate several commands/arguments
exec     Execute a command
exit     Exit the shell
expand   Convert tabs to spaces
export   Set an environment variable
expr     Evaluate expressions

false    Do nothing, unsuccessfully
fdformat Low-level format a floppy disk
fdisk    Partition table manipulator for Linux
fgrep    Search file(s) for lines that match a fixed string
file     Determine file type
find     Search for files that meet a desired criteria
fmt      Reformat paragraph text
fold     Wrap text to fit a specified width.
for      Expand words, and execute commands
format   Format disks or tapes
free     Display memory usage
fsck     File system consistency check and repair
ftp      File Transfer Protocol
function Define Function Macros

gawk     Find and Replace text within file(s)
getopts  Parse positional parameters
grep     Search file(s) for lines that match a given pattern
groups   Print group names a user is in
gzip     Compress or decompress named file(s)

hash     Remember the full pathname of a name argument
head     Output the first part of file(s)
history  Command History
hostname Print or set system name

id       Print user and group id's
if       Conditionally perform a command
ifconfig Configure a network interface
import   Capture an X server screen and save the image to file
install  Copy files and set attributes

join     Join lines on a common field

kill     Stop a process from running

less     Display output one screen at a time
let      Perform arithmetic on shell variables
ln       Make links between files
local    Create variables
locate   Find files
logname  Print current login name
logout   Exit a login shell
look     Display lines beginning with a given string
lpc      Line printer control program
lpr      Off line print
lprint   Print a file
lprintd  Abort a print job
lprintq  List the print queue
lprm     Remove jobs from the print queue
ls       List information about file(s)
lsof     List open files

make     Recompile a group of programs
man      Help manual
mkdir    Create new folder(s)
mkfifo   Make FIFOs (named pipes)
mkisofs  Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod    Make block or character special files
more     Display output one screen at a time
mount    Mount a file system
mtools   Manipulate MS-DOS files
mv       Move or rename files or directories

netstat  Networking information
nice     Set the priority of a command or job
nl       Number lines and write files
nohup    Run a command immune to hangups
nslookup Query Internet name servers interactively

passwd   Modify a user password
paste    Merge lines of files
pathchk  Check file name portability
ping     Test a network connection
popd     Restore the previous value of the current directory
pr       Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf   Format and print data
ps       Process status
pushd    Save and then change the current directory
pwd      Print Working Directory

quota    Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas

ram      ram disk device
rcp      Copy files between two machines.
read     read a line from standard input
readonly Mark variables/functions as readonly
remsync  Synchronize remote files via email
return   Exit a shell function
rm       Remove files
rmdir    Remove folder(s)
rsync    Remote file copy (Synchronize file trees)

screen   Multiplex terminal, run remote shells via ssh
scp      Secure copy (remote file copy)
sdiff    Merge two files interactively
sed      Stream Editor
select   Accept keyboard input
seq      Print numeric sequences
set      Manipulate shell variables and functions
sftp     Secure File Transfer Program
shift    Shift positional parameters
shopt    Shell Options
shutdown Shutdown or restart linux
sleep    Delay for a specified time
sort     Sort text files
source   Run commands from a file `.'
split    Split a file into fixed-size pieces
ssh      Secure Shell client (remote login program)
strace   Trace system calls and signals
su       Substitute user identity
sudo     Execute a command as another user
sum      Print a checksum for a file
symlink  Make a new name for a file
sync     Synchronize data on disk with memory

tail     Output the last part of files
tar      Tape ARchiver
tee      Redirect output to multiple files
test     Evaluate a conditional expression
time     Measure Program running time
times    User and system times
touch    Change file timestamps
top      List processes running on the system
traceroute Trace Route to Host
trap     Run a command when a signal is set(bourne)
tr       Translate, squeeze, and/or delete characters
true     Do nothing, successfully
tsort    Topological sort
tty      Print filename of terminal on stdin
type     Describe a command

ulimit   Limit user resources
umask    Users file creation mask
umount   Unmount a device
unalias  Remove an alias
uname    Print system information
unexpand Convert spaces to tabs
uniq     Uniquify files
units    Convert units from one scale to another
unset    Remove variable or function names
unshar   Unpack shell archive scripts
until    Execute commands (until error)
useradd  Create new user account
usermod  Modify user account
users    List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created by uuencode

v        Verbosely list directory contents (`ls -l -b')
vdir     Verbosely list directory contents (`ls -l -b')
vi       Text Editor

watch    Execute/display a program periodically
wc       Print byte, word, and line counts
whereis  Report all known instances of a command
which    Locate a program file in the user's path.
while    Execute commands
who      Print all usernames currently logged in
whoami   Print the current user id and name (`id -un')
Wget     Retrieve web pages or files via HTTP, HTTPS or FTP

xargs    Execute utility, passing constructed argument list(s)
yes      Print a string until interrupted

.        Run a command script in the current shell
###      Comment / Remark