Review the following:
Delete the OL tif cache contents
https://social.technet.microsoft.com/Forums/windowsserver/en-US/a99d4f1e-26da-4b34-96b1-856990daa743/outlook-2010-not-displaying-images
Note, the above worked on Outlook 2003 which was showing not the red x but a black x placeholder.
http://www.slipstick.com/problems/red-xs-in-email/
http://www.addictivetips.com/windows-tips/outlook-2010-download-images-automatically/
Below page mentions Microsoft's change in html rendering between 2007 and 2010.
http://windowssecrets.com/forums/showthread.php/143697-Outlook-2010-doesn-t-show-pictures-in-HTML-email
Monday, December 7, 2015
Thursday, December 3, 2015
Acronis coupon
The following site had a good discount on TrueImage, and it included Universal Restore
http://www.softocoupon.com/coupons/acronis-promo-codes.php
http://www.softocoupon.com/coupons/acronis-promo-codes.php
Wednesday, December 2, 2015
SSL, certificates, sessions Info
See
https://www.digicert.com/ssl-cryptography.htm

http://security.stackexchange.com/questions/20803/how-does-ssl-tls-work
which refer to
http://security.stackexchange.com/questions/6290/how-is-it-possible-that-people-observing-an-https-connection-being-established-w
http://security.stackexchange.com/questions/5/does-an-established-ssl-connection-mean-a-line-is-really-secure
https://www.digicert.com/ssl-cryptography.htm

http://security.stackexchange.com/questions/20803/how-does-ssl-tls-work
which refer to
http://security.stackexchange.com/questions/6290/how-is-it-possible-that-people-observing-an-https-connection-being-established-w
http://security.stackexchange.com/questions/5/does-an-established-ssl-connection-mean-a-line-is-really-secure
The other answers are good, but here's a physical analogy that may be easier to grasp:
Imagine a lock-box, the kind with a metal flap that you put a padlock on to secure. Imagine that the loop where you put the padlock is large enough to fit two padlocks. To securely exchange send something to another party without sharing padlock keys, you would
- put the "Thing" in the box, and lock it with your padlock.
- send the locked box to the other party.
- they put their padlock on the loop also (so that there are two locks on it), and return the double-locked box to you
- You remove your padlock, and return the now singly-locked box to them
- they remove their own lock and open the box.
With encryption the locks and keys are math, but the general concept is vaguely like this.
Sunday, November 15, 2015
Google for ipad - full results
For some reason (possibly related to monetizing mobile browsing) Google has designated iPads to be 'mobile' devices and shows the skinny results page meant for phones. (A recent change in late summer/fall 2015)
Many people, self included, find this annoying.
Instead of starting at google.com
Try the following:
http://www.google.com/webhp?nota=1
Many people, self included, find this annoying.
Instead of starting at google.com
Try the following:
http://www.google.com/webhp?nota=1
Saturday, October 31, 2015
Win7 Repair tips
chkdsk
May have to boot the OS cd and choose repair, then boot to cmd prompt
bootrec /fixmbr
bootrec /fixboot
bootrec /rebuildbcd
May have to boot the OS cd and choose repair, then boot to cmd prompt
bootrec /fixmbr
bootrec /fixboot
bootrec /rebuildbcd
Thursday, October 22, 2015
Wireless products
For a great router that can work as an Wireless Access Point (WAP), and at AC1900 speed....consider
the D-Link DIR-880L.
For a Range Expander, we've used Amped's REA20. Note it requires a medium to good strength signal to boost.
the D-Link DIR-880L.
For a Range Expander, we've used Amped's REA20. Note it requires a medium to good strength signal to boost.
Subscribe to:
Posts (Atom)