Export/Import

Total Page:16

File Type:pdf, Size:1020Kb

Export/Import ClickMail ® andy@ oneclick.com Central oneclick.com oneclick.com oneclick.com Directory The Master Address Book for Mac OS Administrator Guide for version 1.1.1 Guide Edition 1.1g by Paul A. Collins ©1998–2000 Gracion Software 1257 Tolman Creek Road Ashland, OR 97520-3652 phone: +1 (541) 488-3488 fax: +1 (541) 488-3492 email: [email protected] online support: http://www.gracion.com/server/support/ email support: [email protected] Thank you for choosing ClickMail! ClickMail Central Directory is the perfect complement to AppleShare IP mail services or any other POP or IMAP mail server. ClickMail provides the missing link: a master address book of your users’ email addresses. Your users on Macintosh, Windows, or Unix (and optionally the public), can look up email or postal addresses, phone and fax numbers, any kind of information you want to keep about people, devices, and services. Thanks to the Internet standard LDAP protocol, users can find addresses from ClickMail right from their email programs. LDAP-aware clients include Netscape Communicator, Outlook Express, Eudora Pro, Mulberry, QuickMail Pro, Sherlock 2, and Mac OS 9’s Network Browser. ClickMail comes in two versions: Basic, with up to 100 entries; and XL, with unlimited entries and remote web administration. ClickMail may be evaluated for 30 days from installation. After the evaluation period, you may purchase ClickMail or export your data and delete the software. Trademarks ClickMail® is a registered trademark of Gracion Software. Apple, the Apple logo, AppleShare, Macintosh, the Mac OS logo, and Power Macintosh are trademarks of Apple Computer, Inc., registered in the U.S.A. and other countries. All other brands or product names shown are trademarks or registered trademarks of their respective holders. 2 Contents How ClickMail works ....................................................................... 5 System requirements ...................................................................... 6 Getting started...................................................................................... 7 Installing ClickMail .......................................................................... 7 Files installed in the ClickMail folder ............................................... 7 Other ClickMail files ........................................................................ 8 Test drive ClickMail ......................................................................... 9 Opening the example directory ....................................................... 9 Looking at the entries ................................................................... 10 Looking up with a client program ...................................................11 Setting up a directory ........................................................................ 16 Your data....................................................................................... 16 Making a new directory ................................................................. 16 Special entries .............................................................................. 19 Importing entries ........................................................................... 20 Typing new entries into ClickMail .................................................. 22 Working with entries .......................................................................... 24 Browsing entries ........................................................................... 24 Finding entries .............................................................................. 24 Editing an entry ............................................................................. 25 Adding an entry ............................................................................. 26 Deleting an entry ........................................................................... 26 Distinguished name in the entry window ...................................... 27 Understanding ClickMail and directories ........................................ 28 Launching ClickMail ...................................................................... 28 Mirroring AppleShare .................................................................... 28 What is an entry? .......................................................................... 30 Distinguished Names—the unique identifiers for entries .............. 30 Basic email lookup directory ......................................................... 32 Tree directory ................................................................................ 33 Formal X.500-style directory ......................................................... 34 Other kinds of entries .................................................................... 35 User strategy: an example ............................................................ 35 LDAP Write ................................................................................... 36 Client programs.................................................................................. 37 Generic directions ......................................................................... 37 Eudora Pro 4 ................................................................................. 37 Mulberry ........................................................................................ 39 Netscape Communicator 4.5 ........................................................ 41 Outlook Express ........................................................................... 43 QuickMail Pro................................................................................ 46 Sherlock 2 and Network Browser ................................................. 48 Export/Import...................................................................................... 49 Tab-delimited format ..................................................................... 49 3 Contents LDIF .............................................................................................. 50 vCard ............................................................................................ 50 Import/Data Utility ......................................................................... 50 Importing with Drag-and-drop or AppleScript ................................ 52 Modifying your directory data offline ............................................. 53 Permissions and security ................................................................. 56 Database permissions .................................................................. 56 Attribute permissions .................................................................... 56 Attributes window .......................................................................... 57 Permissions window ..................................................................... 57 Remote Web Administration ............................................................. 61 Installing Web Administration ........................................................ 61 Personal Web Sharing and permissions ....................................... 62 Using Web Administration ............................................................. 65 Edit Mode ...................................................................................... 69 Find Mode ..................................................................................... 71 Browse Mode ................................................................................ 73 Permissions .................................................................................. 74 Customization ............................................................................... 76 Reference ............................................................................................ 77 Menus ........................................................................................... 77 Windows ....................................................................................... 80 Troubleshooting ................................................................................. 88 Error messages in client programs ............................................... 88 Other problems in client programs ................................................ 89 Error messages in ClickMail ......................................................... 91 Web Administration error messages ............................................. 92 Other Web Administration problems ............................................. 92 Other issues .................................................................................. 93 Links and thanks ................................................................................ 95 Web sites ...................................................................................... 95 Colophon ...................................................................................... 95 Acknowledgments! ........................................................................ 96 Glossary .............................................................................................. 97 4 How ClickMail works How ClickMail works The basic purpose of ClickMail Central Directory is to provide a master address book that a group of people can use to look up email addresses. When a user wants to send someone email, he/she opens an email program, types in part of a name, and clicks Find. The email program asks ClickMail for the email addresses of everyone who’s name contains “Fred” (what the user typed). ClickMail sends back
Recommended publications
  • Business SITUS Address Taxes Owed # 11828201655 PROPERTY HOLDING SERV TRUST 828 WABASH AV CHARLOTTE NC 28208 24.37 1 ROCK INVESTMENTS LLC
    Business SITUS Address Taxes Owed # 11828201655 PROPERTY HOLDING SERV TRUST 828 WABASH AV CHARLOTTE NC 28208 24.37 1 ROCK INVESTMENTS LLC . 1101 BANNISTER PL CHARLOTTE NC 28213 510.98 1 STOP MAIL SHOP 8206 PROVIDENCE RD CHARLOTTE NC 28277 86.92 1021 ALLEN LLC . 1021 ALLEN ST CHARLOTTE NC 28205 419.39 1060 CREATIVE INC 801 CLANTON RD CHARLOTTE NC 28217 347.12 112 AUTO ELECTRIC 210 DELBURG ST DAVIDSON NC 28036 45.32 1209 FONTANA AVE LLC . FONTANA AV CHARLOTTE 22.01 1213 W MOREHEAD STREET GP LLC . 1207 W MOREHEAD ST CHARLOTTE NC 28208 2896.87 1213 W MOREHEAD STREET GP LLC . 1201 W MOREHEAD ST CHARLOTTE NC 28208 6942.12 1233 MOREHEAD LLC . 630 402 CALVERT ST CHARLOTTE NC 28208 1753.48 1431 E INDEPENDENCE BLVD LLC . 1431 E INDEPENDENCE BV CHARLOTTE NC 28205 1352.65 160 DEVELOPMENT GROUP LLC . HUNTING BIRDS LN MECKLENBURG 444.12 160 DEVELOPMENT GROUP LLC . STEELE CREEK RD MECKLENBURG 2229.49 1787 JAMESTON DR LLC . 1787 JAMESTON DR CHARLOTTE NC 28209 3494.88 1801 COMMONWEALTH LLC . 1801 COMMONWEALTH AV CHARLOTTE NC 28205 9819.32 1961 RUNNYMEDE LLC . 5419 BEAM LAKE DR UNINCORPORATED 958.87 1ST METROPOLITAN MORTGAGE SUITE 333 3420 TORINGDON WY CHARLOTTE NC 28277 15.31 2 THE MAX SALON 10223 E UNIVERSITY CITY BV CHARLOTTE NC 28262 269.96 201 SOUTH TRYON OWNER LLC 201 S TRYON ST CHARLOTTE NC 28202 396.11 201 SOUTH TRYON OWNER LLC 237 S TRYON ST CHARLOTTE NC 28202 49.80 2010 TRYON REAL ESTATE LLC . 2010 S TRYON ST CHARLOTTE NC 28203 3491.48 208 WONDERWOOD TREE PRESERVATION HO .
    [Show full text]
  • Znetlive SSL Compatible Applications, Platforms & Operating
    ZNetLive SSL Compatible Applications, Platforms & Operating Systems Certificate Authority Root Apple MAC OS 9.0+ (circa 2002), includes 10.5.X and 10.6.X Future proof at 2048 bit, embedded in all Microsoft Windows XP, Vista, 7 and 8 (all devices and browsers and capable of upgrading versions inc 32/64 bit) weak encryption to a strong one is the most reliable Certificate Authority Root-GlobalSign. It is very important to ensure a flawless interaction of your online solutions with Default API Support within Hosting Control customers making connection with your web Panels server, reading emails, trusting your e- Ubersmith documents or running your code. Every WHMCS standard machine that uses trust of Public Key Infrastructure (PKI), e.g. S/MIME, SSL/TLS, Document Signing and Code Signing, has GlobalSign’s Root Certification present in it. Email Clients (S/MIME) ZNetLive’s SSL Certificates authenticated by GlobalSign have 2048 bit strength throughout Mulberry Mail complete Digital Certificate portfolio and Microsoft Outlook 99+ comply with recommendations of National Microsoft Entourage (OS/X) Institute of Standards and Technology (NIST) Qualcomm Eudora 6.2+ according to which all cryptographic keys Mozilla Thunderbird 1.0+ should be 2048 bit strength from 2011 onwards. Mail.app Anything weaker than 2048 bit encryption is Lotus Notes (6+) considered insecure. Because of this, the Netscape Communicator 4.51+ Certification Authorities and Browsers insists The Bat that all the EV SSL Certificates should be 2048 Apple Mail bit encryption.
    [Show full text]
  • The Unicode Cookbook for Linguists: Managing Writing Systems Using Orthography Profiles
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2017 The Unicode Cookbook for Linguists: Managing writing systems using orthography profiles Moran, Steven ; Cysouw, Michael DOI: https://doi.org/10.5281/zenodo.290662 Posted at the Zurich Open Repository and Archive, University of Zurich ZORA URL: https://doi.org/10.5167/uzh-135400 Monograph The following work is licensed under a Creative Commons: Attribution 4.0 International (CC BY 4.0) License. Originally published at: Moran, Steven; Cysouw, Michael (2017). The Unicode Cookbook for Linguists: Managing writing systems using orthography profiles. CERN Data Centre: Zenodo. DOI: https://doi.org/10.5281/zenodo.290662 The Unicode Cookbook for Linguists Managing writing systems using orthography profiles Steven Moran & Michael Cysouw Change dedication in localmetadata.tex Preface This text is meant as a practical guide for linguists, and programmers, whowork with data in multilingual computational environments. We introduce the basic concepts needed to understand how writing systems and character encodings function, and how they work together. The intersection of the Unicode Standard and the International Phonetic Al- phabet is often not met without frustration by users. Nevertheless, thetwo standards have provided language researchers with a consistent computational architecture needed to process, publish and analyze data from many different languages. We bring to light common, but not always transparent, pitfalls that researchers face when working with Unicode and IPA. Our research uses quantitative methods to compare languages and uncover and clarify their phylogenetic relations. However, the majority of lexical data available from the world’s languages is in author- or document-specific orthogra- phies.
    [Show full text]
  • Getting Started with Eudora 5.1 for Windows 95/98/ME/NT/2000 Author Teresa Sakata
    WIN9X003 July 2003 Getting Started with Eudora 5.1 For Windows 95/98/ME/NT/2000 Author Teresa Sakata Introduction ..............................................................................................................................................................1 POP and IMAP Servers ............................................................................................................................................2 Requirements ............................................................................................................................................................2 Changes From Version 4.3.x ....................................................................................................................................3 Issues ........................................................................................................................................................................3 Where do I get Eudora? ............................................................................................................................................4 Getting Started..........................................................................................................................................................4 Installation ................................................................................................................................................................4 Configuring Eudora ..................................................................................................................................................5
    [Show full text]
  • Infovox Ivox – User Manual
    Infovox iVox – User Manual version 4 Published the 22nd of April 2014 Copyright © 2006-2014 Acapela Group. All rights reserved http://www.acapela-group.com Table of Contents INTRODUCTION .......................................................................................................... 1. WHAT IS INFOVOX IVOX? .................................................................................................. 1. HOW TO USE INFOVOX IVOX ............................................................................................. 1. TRIAL LICENSE AND PURCHASE INFORMATION ........................................................................ 2. SYSTEM REQUIREMENTS ................................................................................................... 2. LIMITATIONS OF INFOVOX IVOX .......................................................................................... 2. INSTALLATION/UNINSTALLATION ................................................................................ 3. HOW TO INSTALL INFOVOX IVOX ......................................................................................... 3. HOW TO UNINSTALL INFOVOX IVOX .................................................................................... 3. INFOVOX IVOX VOICE MANAGER ................................................................................. 4. THE VOICE MANAGER WINDOW ......................................................................................... 4. INSTALLING VOICES ........................................................................................................
    [Show full text]
  • Downloadable Email Program for My Pc 32 Best Free Email Clients
    downloadable email program for my pc 32 Best Free Email Clients. Here are 32 best free email client software . These let you manage and access all of your email accounts in one single place easily. All these email client software are completely free and can be downloaded to Windows PC. These free software offer various features, like: can be used with IMAP, SMTP, POP3 and Gmail, keeps your emails safe and secure, lets you open various emails simultaneously, provide protection from spam, lets you view your emails offline, manage and access all of your email accounts in one single place, supports PH, LDAP, IMAP4, POP3 and SMPT mail protocols etc. So, go through this list of free email client software and see which ones you like the most. Thunderbird. Thunderbird is a free and handy email client software for your computer. It can be used with IMAP, SMTP, POP3 and Gmail. It will also work with email accounts provided by MS Exchange Server. The user interface of Thunderbird is tabbed. It lets you open various emails simultaneously. Thunderbird keeps your emails safe and secure. It also has special filters for filtering the mail. Windows Live Mail. Windows Live Mail is a free email client for your computer. It works with various email accounts. It lets you access Yahoo, Gmail, Hotmail and emails from different servers which supports POP3 and SMTP. Its security features are excellent it will also provide protection from spam. You can also view your emails offline in this freeware. Zimbra Desktop. Zimbra Desktop is a free email client.
    [Show full text]
  • Fontfont Opentype® User Guide
    version 02 | September 2007 fontfont opentype® user guide sections a | Introduction to OpenType® b | Layout Features c | Language Support section a INTRODUCTION TO OPENTYPE® what is OpenType is a font file format developed jointly by Adobe and Microsoft. opentype? The two main benefits of the OpenType format are its cross-platform compatibility – you can work with the same font file on Mac, Windows or other computers – and its ability to support widely expanded charac- ter sets and layout features which provide rich linguistic support and advanced typographic control. OpenType fonts can be installed and used alongside PostScript Type 1 and TrueType fonts. Since these fonts rely on OpenType-specific tables, non-savvy applications on computers running operating systems prior to OS X and Windows 2000 will not be able to use them without intermedia- tion by system services like atm. There are now many FontFont typefaces available in OpenType format with many more to follow step by step. They are OpenType fonts with PostScript outlines, i. e. CFF (Compact Font Format) fonts. Each Open- Type FontFont is accompanied by a font-specific Info Guide listing all the layout features supported by this font. The font and Info Guide will be delivered as a .zip file which can be decompressed on any computer by OS built-in support or a recent version of StuffIt Expander or WinZip. This document covers the basics of the OpenType format. In Section two you will find a glossary of all OpenType layout features that may be sup- ported by FontFonts. Section C explains the language support and lists all code pages that may be available.
    [Show full text]
  • Reference Guide
    Reference Guide Mulberry Internet Email and Calendar Client Version 4.0 Cyrus Daboo mailto:[email protected] Pittsburgh PA http://www.mulberrymail.com USA 2Information in this document is subject to change without notice. You are free to use this document in any way you wish provided full attribution of the original author is given. Document Revision 405.000 © 2006 Cyrus Daboo. All Rights Reserved. Pittsburgh PA USA Mulberry is a registered trademark. All other companies and product names are trademarks or registered trademarks of their respective holders. Contents 1. INTRODUCTION................................................................................. 15 2. GETTING STARTED............................................................................ 16 2.1 SYSTEM REQUIREMENTS .......................................................................................................... 16 2.2 INSTALLING MULBERRY........................................................................................................... 17 2.3 GETTING HELP......................................................................................................................... 18 2.4 STARTING MULBERRY .............................................................................................................. 18 2.5 DRAG AND DROP ...................................................................................................................... 20 2.6 CONTEXTUAL MENUS.............................................................................................................
    [Show full text]
  • Comodo SSL Certificates
    Comodo SSL Certificates Powerful, cost-effective security for e-commerce websites Why Comodo SSL? Comodo SSL certificates are the quickest way for 99.3% of the Internet population and maximizing online businesses to protect customer transactions the reach of your business. • Issued online in minutes – with SSL security. Featuring fast online issuance, automated validation means the strongest possible levels of encryption, Build Customer Trust and Increase no paperwork, no faxes, no Website Sales delay dedicated customer support and a huge $250K warranty, Comodo SSL lets you create a highly • Highest levels of SSL security In today’s highly competitive secure e-business environment within minutes. – 2048 bit digital signatures e-commerce world, building a and up to 256 bit encryption sense of trust and security in the as standard Highest Available Encryption Strength minds of your website visitors • 99.3% browser recognition 2048 bit signatures and up to 256 encryption is key to converting them to maximizes your potential means Comodo SSL certificates offer the highest customers. Comodo’s high impact site seal does just customer base possible levels of security for your customers. that by instantly reassuring your visitors that your • Highly visible site seal builds The key length complies with the National site is protected with SSL security from one of the trust and aids customer Institute of Standards and Technology (NIST) most recognized brands in Internet security. Each conversion recommendations. seal also features unique ‘point-to-verify’ technology • Peace of mind with our 30 which shows real-time verification of your website’s day refund policies Speed of Issuance & Validation Levels security whenever a visitor hovers their mouse • Licensed for unlimited cursor over the seal.
    [Show full text]
  • Desktop Messaging User Guide for Novell Groupwise
    Nortel CallPilot Desktop Messaging User Guide for Novell GroupWise NN44200-105 . Document status: Standard Document version: 01.04 Document date: 11 August 2009 Copyright © 2005-2009, Nortel Networks All Rights Reserved. Sourced in Canada. Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. The process of transmitting data and call messaging between CallPilot and its servers, switches or system is proprietary to Nortel Networks. Any other use of the data and the transmission process is a violation of the user license unless specifically authorized in writing by Nortel Networks prior to such use. Violations of the license by alternative usage of any portion of this process or the related hardware constitutes grounds for an immediate termination of the license and Nortel Networks reserves the right to seek all allowable remedies for such breach. Nortel Networks and third-party trademarks appear on the following pages: *Nortel, the Nortel logo, the Globemark, and Unified Networks, BNR, CallPilot, DMS, DMS-100, DMS-250, DMS-MTX, DMS-SCP, DPN, Dualmode, Helmsman, IVR, MAP, Meridian, Meridian 1, Meridian Link, Meridian Mail, Norstar, SL-1, SL-100, Succession, Supernode, Symposium, Telesis, and Unity are trademarks of Nortel Networks. 3COM is a trademark of 3Com Corporation. ACCENT is a trademark of Accent Software International Ltd. ADOBE is a trademark of Adobe Systems Incorporated. AMDEK is a trademark of Amdek Corporation. AT&T is a trademark of American Telephone and Telegraph Corporation. ATLAS is a trademark of Quantum Corporation. ATRIA is a trademark of Pure Atria Corporation.
    [Show full text]
  • RFC 9030: an Architecture for Ipv6 Over the Time-Slotted Channel
    Stream: Internet Engineering Task Force (IETF) RFC: 9030 Category: Informational Published: May 2021 ISSN: 2070-1721 Author: P. Thubert, Ed. Cisco Systems RFC 9030 An Architecture for IPv6 over the Time-Slotted Channel Hopping Mode of IEEE 802.15.4 (6TiSCH) Abstract This document describes a network architecture that provides low-latency, low-jitter, and high- reliability packet delivery. It combines a high-speed powered backbone and subnetworks using IEEE 802.15.4 time-slotted channel hopping (TSCH) to meet the requirements of low-power wireless deterministic applications. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are candidates for any level of Internet Standard; see Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc9030. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
    [Show full text]
  • Technical Report Belbo Oblique
    Technical Report [629 Glyphs] Belbo Belbo Two Oblique Belbo Hair Oblique Belbo Thin Oblique Belbo ExtraLight Oblique Belbo Light Oblique Belbo SemiLight Oblique Belbo Oblique Belbo Book Oblique Belbo Medium Oblique Belbo SemiBold Oblique Belbo Bold Oblique Belbo ExtraBold Oblique Belbo Black Oblique Belbo - Designed by Ralph du Carrois © bBox Type GmbH [PDF generated 2019-02-11] OT-Features, Scripts & Languages Supported Script(s): Latin 51 languages and many more: All Case-Sensitive Contextual Denominator Discretionary Alternates Forms Alternates Ligatures Afrikaans, Albanian, Basque, Bosnian, Breton, Corsican, Croatian, Czech, Danish, Dutch, English, Estonian, Faroese, Finnish, French, Gaelic, Galician, German, Hungarian, Icelandic, Indonesian, Irish, Italian, Kurdish, Fractions Localized Numerator Ordinals Proportional Latvian, Leonese, Lithuanian, Luxembourgish, Malay, Malaysian, Manx, Forms Figures Norwegian, Occitan, Polish, Portuguese, Rhaeto-Romanic, Romanian, Scottish Gaelic, Serbian Latin, Slovak, Slovakian, Slovene, Slovenian, Sorbian (Lower), Sorbian (Upper), Spanish, Swahili, Swedish, Turkish, Turkmen, Scientific Standard Stylistic Stylistic Stylistic Inferiors Ligatures Alternates Set 1 Set 2 Walloon Stylistic Subscript Superscript Tabular Sets Figures Belbo - Designed by Ralph du Carrois © bBox Type GmbH [PDF generated 2019-02-11] Code Pages (this overview can happen to be incomplete) ## Mac OS ## ## MS Windows ## ## ISO 8859 ## Mac OS Roman MS Windows 1250 Central European ISO 8859-1 Latin 1 (Western) Mac OS Central European
    [Show full text]