Windows XP Run Command List

Total Page:16

File Type:pdf, Size:1020Kb

Windows XP Run Command List Windows XP Run Command List 1. Accessibility Controls - access.cpl 2. Accessibility Wizard - accwiz 3. Add Hardware - Wizardhdwwiz.cpl 4. Add/Remove Programs - appwiz.cpl 5. Administrative Tools control - admintools 6. Adobe Acrobat (if installed) - acrobat 7. Adobe Designer (if installed)- acrodist 8. Adobe Distiller (if installed)- acrodist 9. Adobe ImageReady (if installed)- imageready 10. Adobe Photoshop (if installed)- photoshop 11. Automatic Updates - wuaucpl.cpl 12. Bluetooth Transfer Wizard – fsquirt 13. Calculator - calc 14. Certificate Manager - certmgr.msc 15. Character Map - charmap 16. Check Disk Utility - chkdsk 17. Clipboard Viewer - clipbrd 18. Command Prompt - cmd 19. Component Services - dcomcnfg 20. Computer Management - compmgmt.msc 21. Control Panel - control 22. Date and Time Properties - timedate.cpl 23. DDE Shares - ddeshare 24. Device Manager - devmgmt.msc 25. Direct X Control Panel (If Installed)- directx.cpl 26. Direct X Troubleshooter- dxdiag 27. Disk Cleanup Utility- cleanmgr 28. Disk Defragment- dfrg.msc 29. Disk Management- diskmgmt.msc 30. Disk Partition Manager- diskpart 31. Display Properties (w/Appearance Tab Preselected)- control color 32. Display Properties- control desktop 33. Display Properties- desk.cpl 34. Dr. Watson System Troubleshooting Utility- drwtsn32 35. Driver Verifier Utility- verifier 36. Event Viewer- eventvwr.msc 37. File Signature Verification Tool- sigverif 38. Files and Settings Transfer Tool- migwiz 39. Findfast- findfast.cpl 40. Firefox (if installed)- firefox 41. Folders Properties- control folders 42. Fonts- control fonts 43. Fonts Folder- fonts 44. Free Cell Card Game- freecell 45. Game Controllers- joy.cpl 46. Group Policy Editor (XP Prof)- gpedit.msc 47. Hearts Card Game- mshearts 48. Help and Support- helpctr 49. HyperTerminal- hypertrm 50. Iexpress Wizard- iexpress 51. Indexing Service- ciadv.msc 52. Internet Connection Wizard- icwconn1 53. Internet Explorer- iexplore 54. Internet Properties- inetcpl.cpl 55. Internet Setup Wizard- inetwiz 56. IP Configuration (Delete DNS Cache Contents)- ipconfig /flushdns 57. IP Configuration (Display Connection Configuration) - ipconfi/all 58. IP Configuration (Display DHCP Class ID)- ipconfig/showclassid 59. IP Configuration (Display DNS Cache Contents)- ipconfig /displaydns 60. IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid 61. IP Configuration (Release All Connections)- ipconfig /release 62. IP Configuration (Renew All Connections)- ipconfig /renew 63. IP Configuration(RefreshesDHCP&Re-RegistersDNS)-ipconfig/registerdns 64. Java Control Panel (If Installed)- javaws 65. Java Control Panel (If Installed)- jpicpl32.cpl 66. Keyboard Properties - control keyboard 67. Local Security Settings - secpol.msc 68. Local Users and Groups - lusrmgr.msc 69. Logs You Out Of Windows - logoff….. 70. Malicious Software Removal Tool - mrt 71. Microsoft Access (if installed) - access.cpl 72. Microsoft Chat - winchat 73. Microsoft Excel (if installed) - excel 74. Microsoft Frontpage (if installed)- frontpg 75. Microsoft Movie Maker - moviemk 76. Microsoft Paint - mspaint 77. Microsoft Powerpoint (if installed)- powerpnt 78. Microsoft Syncronization Tool - mobsync 79. Microsoft Word (if installed)- winword 80. Minesweeper Game - winmine 81. Mouse Properties - control mouse 82. Mouse Properties - main.cpl 83. Nero (if installed)- nero 84. Netmeeting - conf 85. Network Connections - control netconnections 86. Network Connections - ncpa.cpl 87. Network Setup Wizard - netsetup.cpl 88. Notepad - notepad 89. Nview Desktop Manager (If Installed)- nvtuicpl.cpl 90. Object Packager - packager 91. ODBC Data Source Administrator- odbccp32.cpl 92. On Screen Keyboard - osk 93. Opens AC3 Filter (If Installed) - ac3filter.cpl 94. Outlook Express - msimn 95. Paint – pbrush 96. Password Properties - password.cpl 97. Performance Monitor - perfmon.msc 98. Phone and Modem Options - telephon.cpl 99. Phone Dialer - dialer 100. Pinball Game - pinball 101. Power Configuration - powercfg.cpl 102. Printers and Faxes - control printers 103. Printers Folder – printers 104. Private Character Editor - eudcedit 105. Quicktime (If Installed)- QuickTime.cpl 106. Real Player (if installed)- realplay 107. Regional Settings - intl.cpl 108. Registry Editor - regedit 109. Registry Editor - regedit32 110. Remote Access Phonebook - rasphone 111. Remote Desktop - mstsc 112. Removable Storage - ntmsmgr.msc 113. Removable Storage Operator Requests - ntmsoprq.msc 114. Resultant Set of Policy (XP Prof) - rsop.msc 115. Scanners and Cameras - sticpl.cpl 116. Scheduled Tasks - control schedtasks 117. Security Center - wscui.cpl 118. Services - services.msc 119. Shared Folders - fsmgmt.msc 120. Shuts Down Windows - shutdown 121. Sounds and Audio - mmsys.cpl 122. Spider Solitare Card Game - spider 123. SQL Client Configuration - cliconfg 124. System Configuration Editor - sysedit 125. System Configuration Utility - msconfig 126. System File Checker Utility (Purge File Cache)- sfc /purgecache 127. System File Checker Utility (Return to Default Setting)- sfc /revert 128. System File Checker Utility (Scan Immediately)- sfc /scannow 129. System File Checker Utility (Scan On Every Boot) - sfc /scanboot 130. System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce 131. System File Checker Utility (Set Cache Size to size x)-sfc/cachesize=x 132. System Information - msinfo32. 133. System Properties - sysdm.cpl 134. Task Manager – taskmgr 135. Task Manager – taskmgr 136. TCP Tester - tcptest 137. Telnet Client - telnet 138. Tweak UI (if installed) - tweakui 139. User Account Management- nusrmgr.cpl 140. Utility Manager - utilman 141. Windows Address Book - wab 142. Windows Address Book Import Utility - wabmig 143. Windows Backup Utility (if installed)- ntbackup 144. Windows Explorer - explorer 145. Windows Firewall- firewall.cpl 146. Windows Magnifier- magnify 147. Windows Management Infrastructure - wmimgmt.msc 148. Windows Media Player - wmplayer 149. Windows Messenger - msmsgs 150. Windows Picture Import Wizard (need camera connected)- wiaacmgr 151. Windows System Security Tool – syskey 152. Windows Update Launches - wupdmgr 153. Windows Version (to show which version of windows)- winver 154. Windows XP Tour Wizard - tourstart 155. Wordpad - write More windows XP/Vista/Seven tips .
Recommended publications
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • Strategies of Computer Worms
    304543_ch09.qxd 1/7/05 9:05 AM Page 313 CHAPTER 9 Strategies of Computer Worms “Worm: n., A self-replicating program able to propagate itself across network, typically having a detrimental effect.” —Concise Oxford English Dictionary, Revised Tenth Edition 313 304543_ch09.qxd 1/7/05 9:05 AM Page 314 Chapter 9—Strategies of Computer Worms 9.1 Introduction This chapter discusses the generic (or at least “typical”) structure of advanced computer worms and the common strategies that computer worms use to invade new target systems. Computer worms primarily replicate on networks, but they represent a subclass of computer viruses. Interestingly enough, even in security research communities, many people imply that computer worms are dramatically different from computer viruses. In fact, even within CARO (Computer Antivirus Researchers Organization), researchers do not share a common view about what exactly can be classified as a “worm.” We wish to share a common view, but well, at least a few of us agree that all computer worms are ultimately viruses1. Let me explain. The network-oriented infection strategy is indeed a primary difference between viruses and computer worms. Moreover, worms usually do not need to infect files but propagate as standalone programs. Additionally, several worms can take con- trol of remote systems without any help from the users, usually exploiting a vul- nerability or set of vulnerabilities. These usual characteristics of computer worms, however, do not always hold. Table 9.1 shows several well-known threats. Table
    [Show full text]
  • Planning for Internet Explorer and the IEAK
    02_Inst.fm Page 15 Monday, October 16, 2000 9:40 AM TWO 2Chapter 2 Planning for Internet Explorer and the IEAK LChapter Syllabus In this chapter, we will look at material covered in the Planning section of Microsoft’s Implementing MCSE 2.1 Addressing Technical Needs, Rules, and Policies and Supporting Microsoft Internet Explorer 5 by using the Internet Explorer Administration Kit exam MCSE 2.2 Planning for Custom (70-080). After reading this chapter, you should be Installations and Settings able to: MCSE 2.3 Providing Multiple • Identify and evaluate the technical needs of business Language Support units, such as Internet Service Providers (ISPs), con- tent providers, and corporate administrators. MCSE 2.4 Providing Multiple Platform Support • Design solutions based on organizational rules and policies for ISPs, content providers, and corporate MCSE 2.5 Developing Security Strategies administrators. • Evaluate which components to include in a custom- MCSE 2.6 Configuring for Offline ized Internet Explorer installation package for a given Viewing deployment scenario. MCSE 2.7 Replacing Other Browsers • Develop appropriate security strategies for using Internet Explorer at various sites, including public MCSE 2.8 Developing CMAK kiosks, general business sites, single-task-based sites, Strategies and intranet-only sites. 15 02_Inst.fm Page 16 Monday, October 16, 2000 9:40 AM 16 Chapter 2 • Planning for Internet Explorer and the IEAK • Configure offline viewing for various types of users, including gen- eral business users, single-task users, and mobile users. • Develop strategies for replacing other Internet browsers, such as Netscape Navigator and previous versions of Internet Explorer. • Decide which custom settings to configure for Microsoft Outlook Express for a given scenario.
    [Show full text]
  • IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions
    IBM Security Solutions May 2011 IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions Contents About the report 2 About the Report The IBM X-Force® Threat Insight Quarterly is designed to highlight some of the most significant threats and challenges 3 Evolution: From Nuisance to Weapon facing security professionals today. This report is a product of IBM Managed Security Services and the IBM X-Force 8 Prolific and Impacting Issues of Q1 2011 research and development team. Each issue focuses on specific challenges and provides a recap of the most significant recent 16 References online threats. IBM Managed Security Services are designed to help an organization improve its information security, by outsourcing security operations or supplementing your existing security teams. The IBM protection on-demand platform helps deliver Managed Security Services and the expertise, knowledge and infrastructure an organization needs to secure its information assets from Internet attacks. The X-Force team provides the foundation for a preemptive approach to Internet security. The X-Force team is one of the best-known commercial security research groups in the world. This group of security experts researches and evaluates vulnerabilities and security issues, develops assessment and countermeasure technology for IBM security products, and educates the public about emerging Internet threats. We welcome your feedback. Questions or comments regarding the content of this report should be addressed to [email protected]. 3 X-Force Threat Insight Quarterly IBM Security Solutions Evolution: From Nuisance to Weapon One of the more notable examples here is Brain3, a boot sector infector which originated in Pakistan and released in 1986, was Creeper, Wabbit, Animal, Elk Cloner, Brain, Vienna, Lehigh, one of the first examples of malware that infected PC’s running Stoned, Jerusalem.
    [Show full text]
  • Eudora® Email 7.1 User Guide for Windows
    Eudora® Email 7.1 User Guide for Windows This manual was written for use with the Eudora® for Windows software version 7.1. This manual and the Eudora software described in it are copyrighted, with all rights reserved. This manual and the Eudora software may not be copied, except as otherwise provided in your software license or as expressly permitted in writing by QUALCOMM Incorporated. Export of this technology may be controlled by the United States Government. Diversion contrary to U.S. law prohibited. Copyright © 2006 by QUALCOMM Incorporated. All rights reserved. QUALCOMM, Eudora, Eudora Pro, Eudora Light, and QChat are registered trademarks of QUALCOMM Incorporated. PureVoice, SmartRate, MoodWatch, WorldMail, Eudora Internet Mail Server, and the Eudora logo are trademarks of QUALCOMM Incorporated. Microsoft, Outlook, Outlook Express, and Windows are either registered trademarks or trademarks of Microsoft Incorporated in the United States and/or other countries. Adobe, Acrobat, and Acrobat Exchange are registered trademarks of Adobe Systems Incorporated. Apple and the Apple logo are registered trademarks, and QuickTime is a trademark of Apple Computer, Inc. Netscape, Netscape Messenger, and Netscape Messenger are registered trademarks of the Netscape Communications Corporation in the United States and other countries. Netscape's logos and Netscape product and service names are also trademarks of Netscape Communications Corporation, which may be registered in other countries. All other trademarks and service marks are the property of their respective owners. Use of the Eudora software and other software and fonts accompanying your license (the "Software") and its documentation are governed by the terms set forth in your license.
    [Show full text]
  • HP Universal Fax Driver for Windows User Guide Copyright and License Trademark Credits
    HP Universal Fax Driver for Windows User Guide Copyright and License Trademark Credits © Copyright 2019 HP Development Company, Adobe®, Adobe Photoshop®, Acrobat®, and L.P. PostScript® are trademarks of Adobe Systems Incorporated. Reproduction, adaptation, or translation without prior written permission is prohibited, except as Apple and the Apple logo are trademarks of allowed under the copyright laws. Apple Inc., registered in the U.S. and other countries. The information contained herein is subject to change without notice. macOS is a trademark of Apple Inc., registered in the U.S. and other countries. The only warranties for HP products and services are set forth in the express warranty AirPrint is a trademark of Apple Inc., registered in statements accompanying such products and the U.S. and other countries. services. Nothing herein should be construed as constituting an additional warranty. HP shall not Google™ is a trademark of Google Inc. be liable for technical or editorial errors or omissions contained herein. Microsoft®, Windows®, Windows® XP, and Windows Vista® are U.S. registered trademarks Edition 2, 9/2019 of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Table of contents 1 About this guide ........................................................................................................................................................................................ 1 Introduction ..............................................................................................................................................................................
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Mastering Windows XP Registry
    Mastering Windows XP Registry Peter Hipson Associate Publisher: Joel Fugazzotto Acquisitions and Developmental Editor: Ellen L. Dendy Editor: Anamary Ehlen Production Editor: Elizabeth Campbell Technical Editor: Donald Fuller Electronic Publishing Specialist: Maureen Forys, Happenstance Type-O-Rama Proofreaders: Nanette Duffy, Emily Hsuan, Laurie O'Connell, Yariv Rabinovitch, Nancy Riddiough Book Designer: Maureen Forys, Happenstance Type-O-Rama Indexer: Ted Laux Cover Designer: Design Site Cover Illustrator: Sergie Loobkoff Copyright © 2002 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. The author(s) created reusable code in this publication expressly for reuse by readers. Sybex grants readers limited permission to reuse the code found in this publication or its accompanying CD-ROM so long as the author is attributed in any application containing the reusable code and the code itself is never distributed, posted online by electronic transmission, sold, or commercially exploited as a stand-alone product. Aside from this specific exception concerning reusable code, no part of this publication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photocopy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher. First edition copyright © 2000 SYBEX Inc. Library of Congress Card Number: 2002100057 ISBN: 0-7821-2987-0 SYBEX and the SYBEX logo are either registered trademarks or trademarks of SYBEX Inc. in the United States and/or other countries. Mastering is a trademark of SYBEX Inc. Screen reproductions produced with FullShot 99. FullShot 99 © 1991-1999 Inbit Incorporated. All rights reserved.FullShot is a trademark of Inbit Incorporated.
    [Show full text]
  • Free Editable Address Book Template
    Free Editable Address Book Template diffusedTip-up Lindsey temptingly. disputing Completive candidly. and Buster morphological is saccharic Brad and oscillating castrate hisdazedly tompion as manlywhined Freddy equilibrate dirk collectively lawlessly. and Rsvps through the address book template free editable contact database for your territory and the seller directly into the network administrator Then you might stay connected with the whole people in tired life Address Book Templates Free contact list template. For free book manuscript will not appear in address book template gives you edit one page analytics cookies are easy steps. This applies to SSO users, you can download them and use just a few business forms or the entire collection. The best part is, such as not supporting audio or video, you can easily upload and add your own staff photos. This free book icon, edit these templates are of content your books interiors to start a quick access the society make sure they won. Use all in editable, social shares by closing this site contains the market leader in? This in between you have the almighty favor you also have their related information on your contact us get started writing a crm might become a book template free editable address. This will quiet your flick to new heights. You have found after the free editable address book template can then select a legal forms or logos are spread all of the outside of all yourself can edit them for. Then i was also send out template free templates and addresses, and paste the. Keep an overview of your biggest goals throughout the entire year.
    [Show full text]
  • MICROSOFT CORPORATION, a Washington Corporation
    IN THE IOWA DISTRICT COURT FOR POLK COUNTY : JOE COMES, RILEY PAINT, INC., an : No. CL82311 Iowa corporation, SKEFFINGTON’S : FORMAL WEAR OF IOWA, INC., an : Iowa corporation, and PATRICIA ANNE : LARSEN, : Plaintiffs, vs. MICROSOFT CORPORATION, a Washington Corporation, Defendant. SUPPLEMENTAL EXPERT REPORT OF ANDREW SCHULMAN December 19, 2006 Schulman – Supplemental Report 2 Andrew Schulman – Supplemental Report 1. The source code for Windows XP and Microsoft Office provide additional bases for opinion #21 in my June 2, 2006 technical expert report (“Microsoft Office uses (and copies) undocumented DirectUI APIs”). a. That DirectUI is a Windows API is shown by the presence of formal internal documentation in the form of web pages, marked “Internal Only”, written by Jeff Stall in March 2000, and describing the APIs for DirectUser Gadgets in the \windows\advcore tree of the XP source code. See e.g.: MSM_IA_298 windows\advcore\duser\docs\api\creategadget.htm MSM_IA_298 windows\advcore\duser\docs\api\core.htm MSM_IA_298 windows\advcore\duser\docs\api\addgadgetmessagehandler.htm b. That Microsoft regards DirectUI as part of Windows, rather than as functionality entirely within Office, is shown by the presence of the DirectUI HTML documentation in the \windows\advcore tree of the XP source code, noted above. c. That Microsoft regards DirectUI as part of Windows is also shown by the presence of DirectUI source code in the \windows\advcore tree of the XP source code. See e.g.: MSM_IA_298 windows\advcore\duser\engine\services\resourcemanager.cpp MSM_IA_298 windows\advcore\duser\engine\services\resourcemanager.h MSM_IA_298 windows\advcore\duser\engine\services\context.h MSM_IA_298 windows\advcore\duser\directui\engine\util\published.h MSM_IA_298 windows\advcore\duser\directui\test\app\logonui\priv.h MSM_IA_298 windows\advcore\duser\engine\objectapi\objectapi.h MSM_IA_298 windows\advcore\duser\engine\services\public.h MSM_IA_298 windows\advcore\duser\engine\services\services.h MSM_IA_298 windows\advcore\duser\engine\winapi\winapi.h d.
    [Show full text]
  • Corporate and Personal Directory
    Corporate and Personal Directory • Corporate Directory Setup, on page 1 • Personal Directory Setup, on page 1 • User Personal Directory Entries Setup, on page 2 Corporate Directory Setup The Corporate Directory allows a user to look up phone numbers for coworkers. To support this feature, you must configure corporate directories. Cisco Unified Communications Manager uses a Lightweight Directory Access Protocol (LDAP) directory to store authentication and authorization information about users of Cisco Unified Communications Manager applications that interface with Cisco Unified Communications Manager. Authentication establishes user rights to access the system. Authorization identifies the telephony resources that a user is permitted to use, such as a specific phone extension. Cisco IP Phones use dynamic allocation for SecureApp on both client and servers. This ensures your phone can read certificates larger than 4KB, and reduces the frequency of Host Not Found error messages when a user accesses their directory. For more information, see the documentation for your particular Cisco Unified Communications Manager release. After you complete the LDAP directory configuration, users can use the Corporate Directory service on their phone to look up users in the corporate directory. Related Topics Cisco Unified Communications Manager Documentation Personal Directory Setup The Personal Directory allows a user to store a set of personal numbers. Personal Directory consists of the following features: • Personal Address Book (PAB) • Speed Dials • Address Book Synchronization Tool (TABSynch) Corporate and Personal Directory 1 Corporate and Personal Directory User Personal Directory Entries Setup Users can use these methods to access Personal Directory features: • From a web browser—Users can access the PAB and Speed Dials features from the Cisco Unified Communications Self Care Portal.
    [Show full text]
  • Getting the Most out of E-Mail with Outlook Express
    21 Oldaker St, Devonport Tel. 6424 9413 A Taste of E-commerce Getting the most out of e-mail with Outlook Express Presented by John Guenther PREFACE.....................................................................................................................1 COURSE OBJECTIVES ...................................................................................................2 MODULE 1 – SETTING UP OUTLOOK EXPRESS..............................................3 WHAT DOES OUTLOOK EXPRESS DO?..........................................................................4 A NOTE ABOUT OUTLOOK EXPRESS AT ONLINE ACCESS CENTRES .............................4 STARTING OUTLOOK EXPRESS ....................................................................................5 SETTING UP HOTMAIL TO BE USED IN OUTLOOK EXPRESS ..........................................6 EXERCISE 1 - USING OUTLOOK EXPRESS VIEWS.........................................................9 UNDERSTANDING FEATURES OF THE OUTLOOK EXPRESS WINDOW ...........................11 EXERCISE 2 - CHANGING HOW OUTLOOK EXPRESS BEHAVES ...................................14 FOR HOMEWORK – SETTING OPTIONS ........................................................................15 MODULE 2 – SENDING AND RECEIVING MESSAGES..................................16 EXERCISE 3 - CREATE A NEW MESSAGE ....................................................................17 EXERCISE 4 - SENDING MESSAGES TO SEVERAL RECIPIENTS .....................................19 RECEIVING MESSAGES ...............................................................................................21
    [Show full text]