Search This Blog

12 November 2009

Email Failure Notice

One of user in my workplace forward me email problem. This is the content of mail message:


-----Original Message-----
From: MAILER-DAEMON@server6.rad.net.id [mailto:MAILER-DAEMON@server6.rad.net.id]
Sent: Wednesday, November 11, 2009 8:26 AM
To: user@mycompany.co.id
Subject: failure notice

Hi. This is the qmail-send program at server6.rad.net.id.
I'm afraid I wasn't able to deliver your message to the following addresses. This is a permanent error; I've given up. Sorry it didn't work out.

:
user is over quota

--- Below this line is a copy of the message.

Return-Path:
Received: (qmail 5842 invoked by uid 89); 11 Nov 2009 01:25:52 -0000
Received: from unknown (HELO Firewall6.rad.net.id) (202.154.1.188)
by 0 with SMTP; 11 Nov 2009 01:25:52 -0000
Received: from mycompany.co.id (localhost [127.0.0.1])
by Firewall6.rad.net.id (Spam & Virus Firewall) with ESMTP id 7BCF2105198D2
for ; Wed, 11 Nov 2009 08:25:35 +0700 (WIT)
Received: from mydomain.com([xxx.xxx.xxx.xxx]) by Firewall6.rad.net.id with ESMTP id CFpZpHXywGwhCffP for ; Wed, 11 Nov 2009 08:25:35 +0700 (WIT)
Received: from userclient ([192.168.0.23])
by mycompany.co.id (mycompany.co.id)
(MDaemon PRO v9.0.6)
with ESMTP id md50001805217.msg
for ; Wed, 11 Nov 2009 08:29:25 +0700
From: "User"
To: "'Patrizia Pisciotta'"
Cc: "'ptsasbdg'" ,
,
"'SAS/Import General'"
,
"'Sara Palladino'" ,
"'Eric Herzum'"
Subject: RE: Information of Shipment dryer machine and accessories
Date: Wed, 11 Nov 2009 08:29:23 +0700
Message-ID: 0df5e7d8069842bc89d4f8f486fa7835@mydomain.com
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_000E_01CA62A9.134F9C60"
X-Priority: 1 (Highest)
X-MSMail-Priority: High
X-Mailer: Microsoft Outlook, Build 10.0.2627
Importance: High
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.4325
In-Reply-To: <3a0f6c8316e28647a31b3177ae0b17e40199b0414584@mailsrv.vidaleinternationa>
X-Spam-Processed: mydomain.com, Wed, 11 Nov 2009 08:29:25 +0700
(not processed: message from valid local sender)
X-MDRemoteIP: 192.168.0.23
X-Return-Path: user@mycompany.co.id
X-Envelope-From: user@mycompany.co.id
X-MDaemon-Deliver-To: ptsasbdg@rad.net.id

This is a multi-part message in MIME format.

------=_NextPart_000_000E_01CA62A9.134F9C60
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable



I could not solve this problem because this problem is in external side. This is because the space of recipient already reach maximum quota of user space. User must download all email in his server mailbox to empty the mail box.

10 November 2009

Validation Control

ASP.NET have 5 types of validation feature, they are Required-FieldValidator, RangeValidator, RegularExpressionValidator CompareValidator and CustomValidator which have different function each other. The five validation control can be found in validation group control in the toolbox menu of Visual Web Developer 2008 Express Edition.

The fisrt step should be done by web developer before using all validation control is to change CausesValidation property value to be true in all text box in the web form.

1. RequiredFieldValidator

Use the RequiredFieldValidator control to make an input control a mandatory field. The input control fails validation if the value it contains does not change from its initial value when validation is performed. This prevents the user from leaving the associated input control unchanged. By default, the initial value is an empty string (""), which indicates that a value must be entered in the input control for it to pass validation

2. RangeValidator

The RangeValidator control allows you to check whether a user's entry is between a specified upper and a specified lower boundary. You can check ranges within pairs of numbers, alphabetic characters, and dates. Boundaries are expressed as constants. Use the ControlToValidate property to specify the input control to validate. The MinimumValue and MaximumValue properties specify the minimum and maximum values of the valid range, respectively. The Type property is used to specify the data type of the values to compare. The values to compare are converted to this data type before any comparison is performed

3. RegularExpressionValidator

The RegularExpressionValidator control is used to determine whether the value of an input control matches a pattern defined by a regular expression. This type of validation allows you to check for predictable sequences of characters, such as those in social security numbers, e-mail addresses, telephone numbers, postal codes, and so on.

4. CompareValidator

The CompareValidator control allows you to compare the value entered by the user into an input control, such as a TextBox control, with the value entered into another input control, or with a constant value. You can also use the CompareValidator control to determine whether the value entered into an input control can be converted to the data type specified by the Type property

5. CustomValidator

The CustomValidator control allows you to create a validation control with customized validation logic. For example, you can create a validation control that checks whether the value entered into a text box is an even number.

05 November 2009

Wireless Installation Considerations

The wireless switch lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business. The key to maximizing wireless range is to follow these basic guidelines:

  1. Keep the number of walls and ceilings between the switch and other network devices to a minimum - each wall or ceiling can reduce your adapter’s range from 3-90 feet (1-30 meters.) Position your devices so that the number of walls or ceilings is minimized.

  2. Be aware of the direct line between network devices. A wall that is 1.5 feet thick (.5 meters), at a 45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet (14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead of at an angle) for better reception.

  3. Building Materials make a difference. A solid metal door or aluminum studs may have a negative effect on range. Try to position access points, wireless switchs, and computers so that the signal passes through drywall or open doorways. Materials and objects such as glass, steel, metal, walls with insulation, water (fish tanks), mirrors, file cabinets, brick, and concrete will degrade your wireless signal.

  4. Keep your product away (at least 3-6 feet or 1-2 meters) from electrical devices or appliances that generate RF noise.

  5. If you are using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and home security systems), your wireless connection may degrade dramatically or drop completely. Make sure your 2.4GHz phone base is as far away from your wireless devices as possible. The base transmits a signal even if the phone in not in use.

04 November 2009

Security GateWay trial period

Today I received an email from SecurityGateway for Exchange / SMTP [noreply@mycompany.co.id] about reminding me that the trial period SecurityGateway software for Exchange / SMTP 10 days would be ended.

Email is as follows:

This message is a friendly reminder that only 10 days remain on your free trial of SecurityGateway for Exchange/SMTP.

We certainly hope SecurityGateway for Exchange/SMTP has met your expectations during your free evaluation period. If for any reason you find that this product does not meet your expectations, please feel free to share the details of your experiences with us
Please click here for contact information.

If you require technical assistance, please click here.

Click here to register your copy of SecurityGateway for Exchange/SMTP online.

Thanks for using SecurityGateway for Exchange/SMTP.

Regards,

SecurityGateway for Exchange/SMTP Sales and Support Team

**This message has been automatically generated by SecurityGateway for Exchange/SMTP**

After trying SecurityGateway software for Exchange / SMTP I get a good impression for this software in terms of blocking spam email from the internet. Email with spam score between 5 and 7 will be quarantined so that it still could be taken by the email recipient. Log lists prominently displayed with different color variations for each action to email. There are also charts that show the amount of incoming spam messages and the amount of spam email for each user the most accepted.

Here is the screen shoot of email log of SecurityGateway software for Exchange / SMTP. In column Result we can see if the mail is delivered then the font color is green but if rejected the font color is red.

Here is the top ten email recipient graphic bar provided by SecurityGateway software for Exchange / SMTP:

02 November 2009

Backup Windows System

If you installed Windows operating system on your computer, it is better to have backup up your operating system to recover your windows system.

To create an Automated System Recovery set using Backup
  1. Open Backup (ntbackup.exe). The Backup Utility Wizard starts by default, unless it is disabled.
  2. Click the Advanced Mode button in the Backup Utility Wizard.
  3. On the Tools menu, click ASR Wizard.
  4. Follow the instructions that appear on your screen.

    Important
    • You will need a blank 1.44 megabyte (MB) floppy disk to save your system settings and media to contain the backup files.
    Notes
    • To start Backup, click Start, point to All Programs, point to Accessories, point to System Tools, and then click Backup.
    • Only those system files necessary for starting up your system will be backed up by this procedure. To backup your data, see

To recover from a system failure using Automated System Recovery
  1. Make sure you have the following items before you begin the recovery procedure:
    • Your previously created Automated System Recovery (ASR) floppy disk.
    • Your previously created backup media.
    • The original operating system installation CD.
  2. Insert the original operating system installation CD into your CD drive.
  3. Restart your computer. If prompted to press a key in order to start the computer from CD, press the appropriate key.
  4. Press F2 when prompted during the text-only mode section of Setup. You will be prompted to insert the ASR floppy disk you have previously created.
  5. Follow the directions on the screen