Outlook Express Error Codes – SMTP Errors

0×800CCC60 – SMTP_RESPONSE_ERROR Invalid response.
0×800CCC61 – SMTP_UNKNOWN_RESPONSE_CODE Unknown error code.
0×800CCC62 – SMTP_500_SYNTAX_ERROR Syntax error returned.
0×800CCC63 – SMTP_501_PARAM_SYNTAX Parameter syntax incorrect.
0×800CCC64 – SMTP_502_COMMAND_NOTIMPL Command not implemented.
0×800CCC65 – SMTP_503_COMMAND_SEQ Improper command sequence.
0×800CCC66 – SMTP_504_COMMAND_PARAM_NOTIMPL Command not implemented.
0×800CCC67 – SMTP_421_NOT_AVAILABLE Command not available.
0×800CCC68 – SMTP_450_MAILBOX_BUSY Mailbox is locked and busy.
0×800CCC69 – SMTP_550_MAILBOX_NOT_FOUND Mailbox not found.
0×800CCC6A – SMTP_451_ERROR_PROCESSING Error processing request.
0×800CCC6B – SMTP_551_USER_NOT_LOCAL User mailbox is known, but mailbox not on this server.
0×800CCC6C – SMTP_452_NO_SYS

Advertisements

How to Fix a Corrupt Boot.ini File

As Windows begins to load, the Ntldr program refers to the Boot.ini file to determine where the operating system files are and what options to enable as the operating system continues to load. So if there’s a problem with the Boot.ini file, your PC will not boot up correctly.

If you suspect that your Boot.ini file has been corrupted, you can use the special Recovery Console version of the Bootcfg tool to fix it. To do this, you must first boot the system with the Windows XP CD and access the Recovery Console.

To use the Bootcfg tool, from the Recovery Console command prompt, type

Bootcfg /rebuild

There are several other parameter switches you can use with Bootcfg. These are listed here

  • /Add–Scans the disk for all Windows installations and allows you to add any new ones to the Boot.ini file.
  • /Scan–Scans the disk for all Windows installations.
  • /List–Lists each entry in the Boot.ini file.
  • /Default–Sets the default operating system as the main boot entry.
  • /Rebuild–Completely re-creates the Boot.ini file. The user must confirm each step.
  • /Redirect–Allows the boot operation to be redirected to a specific port when using the Headless Administration feature. The Redirect parameter takes two parameters of its own, [Port Baudrate ] | [UseBiosSettings].
  • /Disableredirect–Disables the redirection

How to stop Outlook Express from blocking attachments

Normally this is caused by Antivirus programs or Windows update changing the way Outlook Express Handles attachments. Fortunately, you can reverse the process and get your email attachments normally again. Start Outlook Express and follow these steps:

 

  1. Click Tools from the menus
  2. Click Options
  3. Click the Security Tab
  4. Uncheck the “do not allow attachments to be saved or opened that could potentially be a virus” box
  5. Click Apply
  6. Click OK

How to troubleshoot TCP/IP connectivity with Windows XP/Vista

This is a comprehensive guide for using the tools that are built into Windows when you are trying to determine the cause of TCP/IP networking problems. This article lists recommendations for using these tools to diagnose network problems. Although this list is not complete, the list does provide examples that show how you can use these tools to track down problems on the network.

 

 

 

TCP/IP troubleshooting tools

The following list shows some of the TCP/IP diagnostic tools that are included with Windows XP:

 

 

Basic tools

• Network Diagnostics in Help and Support

Contains detailed information about the network configuration and the results of automated tests.

• Network Connections folder

Contains information and configuration for all network connections on the computer. To locate the Network Connections folder, click Start, click Control Panel, and then click Network and Internet Connections.

• IPConfig command

Displays current TCP/IP network configuration values, updates, or releases, Dynamic Host Configuration Protocol (DHCP) allocated leases, and display, register, or flush Domain Name System (DNS) names.

Ping command

Sends ICMP Echo Request messages to verify that TCP/IP is configured correctly and that a TCP/IP host is available.

 

Advanced tools

• Hostname command

Displays the name of the host computer.

• Nbtstat command

Displays the status of current NetBIOS over TCP/IP connections, updates the NetBIOS name cache, and displays the registered names and scope ID.

• PathPing command

Displays a path of a TCP/IP host and packet losses at each router along the way.

• Route command

Displays the IP routing table and adds or deletes IP routes.

• Tracert command

Displays the path of a TCP/IP host.

To view the correct command syntax to use with each of these tools, type -? at a command prompt after the name of the tool.

 

 

Windows XP Professional tools

Windows XP Professional contains the following additional tools: • Event viewer

Records system errors and events.

• Computer Management

Changes network interface drivers and other components.

 

 

Troubleshooting

The procedure that you use to troubleshoot TCP/IP issues depends on the type of network connection that you are using and the connectivity problem that you are experiencing.

 

 

Automated troubleshooting

For most issues that involve Internet connectivity, start by using the Network Diagnostics tool to identify the source of the issue. To use Network Diagnostics, follow these steps: 1. Click Start, and then click Help and Support.

2. Click the link to Use Tools to view your computer information and diagnose problems, and then click Network Diagnostics in the list on the left.

3. When you click Scan your system, Network Diagnostics gathers configuration information and performs automated troubleshooting of the network connection.

4. When the process is completed, look for any items that are marked “FAILED” in red, expand those categories, and then view the additional details about what the testing showed.

You can either use that information to resolve the issue or you can provide the information to a network support professional for help. If you compare the tests that failed with the documentation in the Manual Troubleshooting section later in this article, you may be able to determine the source of the issue. To interpret the results for TCP/IP, expand the Network Adapters section of the results, and then expand the network adapter that failed the testing.

 

You can also start the Network Diagnostics interface directly by using the following command:

netsh diag gui

Manual troubleshooting

To manually troubleshoot your TCP/IP connectivity, use the following methods in the order that they appear:

 

 

Method 1: Use the IPConfig tool to verify the configuration

 

 

To use the IPConfig tool to verify the TCP/IP configuration on the computer that is experiencing the problem, click Start, click Run, and then type cmd. You can now use the ipconfig command to determine the host computer configuration information, including the IP address, the subnet mask, and the default gateway.

 

The /all parameter for IPConfig generates a detailed configuration report for all interfaces, including any remote access adapters. You can redirect IPConfig output to a file to paste the output into other documents. To do this, type:

ipconfig > \folder_name\file_name

The output receives the specified file name and is stored in the specified folder.

 

You can review the IPConfig output to identify issues that exist in the computer network configuration. For example, if a computer is manually configured with an IP address that duplicates an existing IP address that is already detected, the subnet mask appears as 0.0.0.0.

 

If your local IP address is returned as 169.254.y.z with a subnet mask of 255.255.0.0, the IP address was assigned by the Automatic Private IP Addressing (APIPA) feature of Windows XP Professional. This assignment means that TCP/IP is configured for automatic configuration, that no DHCP server was found, and that no alternative configuration is specified. This configuration has no default gateway for the interface.

 

If your local IP address is returned as 0.0.0.0, the DHCP Media Sensing feature override turned on because the network adapter detected its lack of connection to a network, or TCP/IP detected an IP address that duplicates a manually configured IP address.

 

 

If you do not identify any issues in the TCP/IP configuration, go to Method 2.

 

 

Method 2: Use the Ping tool to test your connectivity

 

 

If you do not identify any issues in the TCP/IP configuration, determine whether the computer can connect to other host computers on the TCP/IP network. To do this, use the Ping tool.

 

The Ping tool helps you verify IP-level connectivity. The ping command sends an ICMP Echo Request message to a destination host. Use Ping whenever you want to verify that a host computer can send IP packets to a destination host. You can also use Ping to isolate network hardware problems and incompatible configurations.

 

Note If you ran the ipconfig /all command, and the IP configuration appeared, you do not have to ping the loopback address and your own IP address. IPConfig has already performed these tasks to display the configuration. When you troubleshoot, verify that a route exists between the local computer and a network host. To do this, use the following command:

ping IP address

NoteIP address is the IP address of the network host that you want to connect to.

 

To use the ping command, follow these steps: 1. Ping the loopback address to verify that TCP/IP is installed and correctly configured on the local computer. To do this, type the following command:

ping 127.0.0.1

If the loopback test fails, the IP stack is not responding. This problem may occur if any one or more of the following conditions is true: • The TCP drivers are corrupted.

• The network adapter is not working.

• Another service is interfering with IP.

 

2. Ping the IP address of the local computer to verify that the computer was correctly added to the network. If the routing table is correct, this procedure just forwards the packet to the loopback address of 127.0.0.1. To do this, type the following command:

ping IP address of local host

If the loopback test succeeds but you cannot ping the local IP address, there may be an issue with the routing table or with the network adapter driver.

3. Ping the IP address of the default gateway to verify that the default gateway is working and that you can communicate with a local host on the local network. To do this, type the following command:

ping IP address of default gateway

If the ping fails, you may have an issue with the network adapter, the router or gateway device, the cabling, or other connectivity hardware.

4. Ping the IP address of a remote host to verify that you can communicate through a router. To do this, type the following command:

ping IP address of remote host

If the ping fails, the remote host may not be responding, or there may be a problem with the network hardware between computers. To rule out an unresponsive remote host, use Ping again to a different remote host.

5. Ping the host name of a remote host to verify that you can resolve a remote host name. To do this, type the following command:

ping Host name of remote host

Ping uses name resolution to resolve a computer name into an IP address. Therefore, if you successfully ping an IP address but you cannot ping a computer name, there is a problem with host name resolution, not with network connectivity. Verify that DNS server addresses are configured for the computer, either manually in the properties of TCP/IP, or by automatic assignment. If DNS server addresses are listed when you type the ipconfig /all command, try to ping the server addresses to make sure that they are accessible.

If you cannot use Ping successfully at any point, verify the following configurations: • Make sure that the local computer’s IP address is valid and that it is correct on the General tab of the Internet Protocol (TCP/IP) Properties dialog box or when it is used with the Ipconfig tool.

• Make sure that a default gateway is configured and that the link between the host and the default gateway is working. For troubleshooting purposes, make sure that only one default gateway is configured. Although you can configure more than one default gateway, gateways after the first gateway are used only if the IP stack determines that the original gateway is not working. The purpose of troubleshooting is to determine the status of the first configured gateway. Therefore, you can delete all the other gateways to simplify your task.

• Make sure that Internet Protocol security (IPSec) is not turned on. Depending on the IPSec policy, Ping packets may be blocked or may require security. For more information about IPSec, go to Method 7: Verify Internet Protocol security (IPSec).

Important If the remote computer that you are pinging is across a high-delay link such as a satellite link, response may take longer. You can use the -w (wait) parameter to specify a longer timeout period than the default timeout of four seconds.

 

 

Method 3: Use the PathPing tool to verify a route

 

 

The PathPing tool detects packet loss over multiple-hop paths. Run a PathPing analysis to a remote host to verify that the routers on the way to the destination are operating correctly. To do this, type the following command:

pathping IP address of remote host

Method 4: Use the Arp tool to clear the ARP cache

 

 

If you can ping both the loopback address (127.0.0.1) and your IP address but you cannot ping any other IP addresses, use the Arp tool to clear out the Address Resolution Protocol (ARP) cache. To view the cache entries, type any one of the following commands:

arp -a

 

arp -g

To delete the entries, type the following command:

arp -d IP address

Hacking Internet Explorer’s Kiosk Mode

Internet Explorer offers a Full Screen mode, invoked by pressing F11. In this mode it has no title bar or border and it fills the whole screen. This is sometimes called kiosk mode, suggesting you could use it to turn your PC into a self-service Internet kiosk for use by the public. However, it gives the user too much power. The navigation toolbar remains at the top, and any user can right-click it to restore the Address bar. Worse, pressing F11 again restores the normal view.

You can get a lot closer to a practical Internet kiosk by launching IE in its true Kiosk mode. To do so, simply enter iexplore -k in the Start menu’s Run dialog, appending the URL of the Web site you want it to open. You could also create a shortcut containing this command line. The resulting window will totally fill the screen with the selected page—no frame, no title bar, no menu, and no toolbar. If the page in question is a local HTML page with only local links, users can’t click to navigate elsewhere.

Savvy users could still get around this limitation by controlling IE through the keyboard. By typing Ctrl-O or Ctrl-L they could invoke the Open dialog, which would allow them to open any Web site (effectively restoring the Address bar’s functionality). Ctrl-N would open a new window that’s not in Kiosk mode, and Shift-clicking a link would open that link in a non-Kiosk window. Finally, Alt-F4 or Ctrl-W would close the Kiosk-mode window.

You can lock down these subversive key combinations using restrictions in the Registry. Launch RegEdit from the Start menu’s Run dialog; navigate to HKEY_LOCAL_MACHINE\SOFTWARE\
Policies\Microsoft Internet Explorer\Restrictions; and find or create each of the following DWORD values, setting its data to 1 to enable the restriction:

·  NoBrowserClose (disables closing the browser window)

·  NoBrowserContextMenu (disables right-click context menu)

·  NoFileOpen (disables use of Ctrl-O or Ctrl-L to launch an arbitrary URL)

·  NoOpenInNewWnd (disables opening a link in a new window via Ctrl-N or Shift-click)

A user who attempts one of these restricted actions will get a warning stating “This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator.” You may need to restart the computer to make it recognize changes in these values. Of course users can still enter Ctrl-Alt-Del to bring up Task Manager and end the process.

Outlook Express Troubleshooting

Outlook Express (OE), which is bundled with the Windows operating system, is probably the email client most commonly used by the average home PC user. Here are some tips on how OE works and how to use it better.

 


How Outlook Express stores mail

A peculiarity of OE that many are not aware of is the proprietary way that email is stored. OE is organized with folders such as “Inbox”, “Outbox”, “Sent”, and “Deleted”. Rather than store individual messages as separate files, OE stores the contents of each of these folders in one proprietary binary file with the extension DBX. Thus there is a file Inbox.dbx, a file Outbox.dbx, a file Sent.dbx, and so forth. These files cannot be read by simply clicking on them. All of these files are kept in a hidden folder called “Outlook Express” that is buried deep down in the Documents and Settings folder with a very long and arcane path. Each user account has its own folder. Also, if you use more than one identity, each identity will have its own folder. Identities are assigned a long hexadecimal name called a GUID or Globally Unique Identifier. Here is an example of a path to an email store folder:

C:\Documents and Settings\UserName\Local Settings\Application Data\Identities\{ACEF249B-0C16-491C-B19E-347F8295C81C}\Microsoft\Outlook Express

A more convenient place for Outlook Express mail

It is possible to move the store folder to a much simpler path. This makes copying or backing up the email files much easier. The easiest way to find where your Outlook Express mail is currently stored is to open Outlook Express, go to the Tools-Options menu and click the “Maintenance” tab. There will be a button “Store Folder”. If you click that, a dialog box “Store Location” will open. It will list where your mail is currently being kept. Use the “Change” button to move the store folder for mail to a more accessible location. Choose a new location by typing in the box or use the Browse function.

 

How to add special characters to email

Did you ever want to put a special character like the cent sign (¢) or the British pound sign (£) into an email? Or use the correct symbols for Spanish or other languages? Regular users of word processing programs like Microsoft Word probably already know how to do this but many average PC users are not aware that two easy methods of inserting special characters are readily available. The first and more comprehensive way is to use the Windows accessory called Windows Character Map. On most XP machines this can be found either in All Programs-Accessories-System Tools or in All Programs-Accessories.

Another method makes use of the Numeric Keypad. That is the section on the right of many keyboards that is ignored by a lot of PC users. It actually has some useful functions and here is one of them. First, make sure the “Num Lock’ light is on. This function is toggled by the “Num Lock” key. With Num Lock on, you can enter special characters into Word documents, Outlook Express messages, and other documents by holding down the Alt key and entering a number code for a variety of special characters, and then releasing the Alt key. For example, to enter the cent sign (¢) hold down the Alt key, enter the numbers 0162 into the Numeric Keyboard, and then release the Alt key.

Combining and archiving emails in Outlook Express

If you ever want to archive a collection of emails, you can make use of a feature in OE for combining a bunch of emails into one file. The feature was originally intended for combining emails or newsgroup messages that were sent in encoded pieces (necessary for big files back in the days of narrow bandwidth) but it works for regular emails as long as they don’t contain graphics.

Select the emails to be combined by using either the Shift or Ctrl keys and open the OE menu “Message”. Choose “Combine and Decode” from the menu. A dialog box called “Order for decoding” will appear, listing all the messages. Don’t let the term “decoding” put you off. If you have some reason for doing so, you can change the order in which the different messages are combined but normally they will be in whatever order you use in your mailbox. Mine are chronological and I just leave them that way. When you are ready to combine the messages, click the button “OK”. The combined file will then be displayed in an OE window. Go to the “File” menu, click “Save as” and put the file wherever on your computer you want to keep it with an appropriate file name. The default format is the OE email format with extension “eml” but you can also choose a text format if your emails are pure text. The advantage of the eml format is that it preserves any hyperlinks in the original messages. Note that all the original messages are not affected and will still be in their original form and location.

I also use this method for transferring a bunch of messages from one computer to another. It is often easier than messing with the binary DBX files where OE messages are stored.

More on archiving or transferring email

The method given above works nicely as long as no message contains a picture. Hypertext links are OK but mail with embedded pictures doesn’t work. Either the combination process stops with the first email or the combined file ends up displaying the underlying HTML code instead.

However, there is another way to combine emails that I sometimes use to transfer mail from one computer to another or to archive a bunch of email in one file. This one works fine with graphics. Select the emails you are interested in and then click the “Forward” button. All the messages will be attached in a single new message. You do not have to actually forward the new message with all the attachments but can save it anywhere on your computer that you like. I do not know what limit OE itself might place on the number of attachments but I have attached as many as 30 emails to a single message. If you do wish to forward a combined message, keep in mind that not all ISPs may allow multiple attachments. Also, ISPs usually limit the size of an email, with 10 MB being a common number.

When OE pictures don’t send properly

I have had it happen to me that I send out email with a picture in it only to find that the picture didn’t accompany the email. This happens if a particular setting in OE gets accidentally changed. Instead of a picture being embedded in OE, only a reference to the picture is placed in the message. The message looks fine when viewed locally becuse the reference loads the graphics file. On somebody else’s computer, there is no file to load so they get a red X. The setting is reached by going to the OE menu Tools-Options and clicking the “Send” tab. In the dialog box that opens, click the button “HTML Settings” that is in the section “Mail Sending Format”. The dialog shown below will open. Make sure a check is by ” Send pictures with messages”. Then Click “OK” and “OK’ again.