This Guide is going to be about how to attach files create a signature send to multiple recipients with using ‘Cc’ and ‘Bcc’ change the priority add contacts to address book block a contact. use safely 25th October, 2012Nisha Malik Zaman1
Step 1:How to attach files Step2: How to create a signature 1.Attach files with the attachment button 1. Go to Options 2.Go to Settings 3. Add signature and save it. 25th October, 2012Nisha Malik Zaman2
Step4: How to open an attachment 25th October, 2012Nisha Malik Zaman3 1.Right Click on the attachment and Save Target As, but don’t open suspicious s and attachments as they might contain files that may cause harm to your computer.
Step 5: How send to multiple recipients with using ‘Cc’ and ‘Bcc’ 1.You can use ‘Cc ‘(carbon copy) to send to multiple recipients, you can also use the ‘To’ column to send it to multiple recipients. 2.‘Cc’ is used to send to people just for information purposes 3.‘To’ is used to send to people who it is really aimed at. 4.‘Bcc’(blind carbon copy) is used to send to multiple recipients but hiding the people you are sending to 5.To open Bcc ’, open ‘Cc’ and below there, at the bottom is ‘Bcc’ column. 25th October, 2012Nisha Malik Zaman4
Step 6: How to change the priority of the 25th October, 2012Nisha Malik Zaman5 Open a new and there are two buttons High Priority Low Priority
Step 4: How to add contacts to the Address Book. 25th October, 2012Nisha Malik Zaman6 1.Click Add Contact 2. A box will appear in which you have to write of the person you want to add and click on ‘Invite’.
Step 6: How to block and unblock a contact 25th October, 2012Nisha Malik Zaman7 1.Right Click on that person’s Name/ in the Contact List you would like to block 2.Click on the Block icon. 3.You can unblock it as well when you click on that contact again.
Step7: How to use safely 25th October, 2012Nisha Malik Zaman8 One of the most common tools we are using on a daily basis is . Due to this fact, is also a major security problem. Outlook has an option to block attachments that are potentially dangerous. 1.Use an antivirus that also has the ability to scan incoming/outgoing . AVG and Norton is an example of such product. 2.It is very important to keep your antivirus updated on a daily basis. 3.Do not open attachments from people that you do not know or seem suspicious.
Step8: What is Phishing and Spam? 25th October, 2012Nisha Malik Zaman9 Phishing: Phishing is to get information such as usernames, passwords and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Phishing s may contain links to websites that are infected with malware. What is spam? Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.
Step9: What is Scam and Virus? 25th October, 2012Nisha Malik Zaman10 Computer Virus: A computer virus that can be spread from one computer to another. The term "virus" is also commonly used to refer to other types of malware such as spyware. A virus is a program that runs against your wishes. A spyware spies on your computer of what you are doing and information that you have without letting you know but if you have a spyware you might experience that your internet is slower than usual.