ML20140F594

From kanterella
Jump to navigation Jump to search
Inside Information.Spring 1997
ML20140F594
Person / Time
Issue date: 06/13/1997
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0191, NUREG-BR-191, NUDOCS 9706130155
Download: ML20140F594 (8)


Text

1 l kh[hb _,_-__ __

%4ini= INFORMATIONmason


YouR l)NK TO lNFORMADON ExcEufNCE W["

Sntnc1997 OrncE OF INF0ltMATION RESOURCES MANAGEMENT NUREG/St-0191 U.S. NuctEm RicutAton Comme PLEASE MR. POSTMAN RETURN TO .

Managing Your E-Mail '

SENDER??

When it was introduced at the NRC in 1991, e-mail was greeted with skepticism and treated with benign neglect. Now, e-mail is recognized as one of the most E-Mail Attachments That Deliver successful computer applications introduced here in the last few years. Need You've been working with the inter-proof? When e-mail is down, our Customer Support Center phone lines light up. agency group for months on this re-Try living without e-mail for a week. port, and now your E.P. A. counter-Although the Word Perfect Office e-mail system has its share of quirks, it is part has completed his part of the generally' a reliable and flexible product with an array of features that make it con- aft. Although the hard copy is com-venient to different kinds of users. Some users are minimalists: they like to clear E " ' ""

out their e-mail boxes by the end of the day; or

. d l"d! I u week. Others use e-mail as a fihne ss stem, mam- r the e-mail, click on the attachment, T~ /

taining literally hundreds of e-mails in their In and see and Out Boxes.

'^$# W & $#xse*f e N$llte*c#$#* $(

While IRh1 prefers that you do not store -

Sometimes e-mail attachments arrive

,y 4 hundreds of e-mails indefinitely (it eats up 1 ,t intact; other times, you get a collee-lots of server storage space), we know that tion of strange characters and a myste-many of you will continue to squirrel away rious message about " encoding." is messages long bevond their reasonable there some way you can transmit and useful lifetime. This article provides a receive files using e-mail without be-few pointers for bringing order to the e-mail coming a cryptographer?

files of even compulsive hoarders like you (and me).

g g g ,

Conhnved on page 2 cated, and reflects the complexities faced by both NRC's system and the e-mail system at the other end of the TOO MUCH? IOO LRTLE? IOO LATE? iine. If'you want the details, read on;if you just want to know how to Tell Us if this Newsletter Meets Your Needs transmit attachments, skip to the "How to do it" box on page 8.

Unlike memos from the Commission, w hich tend to catch your attention. hnide Infonnation is not " required reading! If IRN1's newsletter is not both interesting Continued on page 7 and relevant to your work, you just won't read it.

I We try to tell you what you might need or want to know about computers l PLEASE MR. POSTMAN =

and information technolog*y, to help 3 our work at the NRC. We do this in several EE!.

ways, including: I TOO MUCH? IOO llTTLE?

TOO LATE?

Q M

  • Showing how organizations both in the NRC and elsew here use computers and #=P information technology successfully to get their job done better. I RETURN TO SENDER?? Q
  • Tutorials and tips on how to use features of common softw are and hardware in 2 ATTACK Of THE KILLER use at the NRC e.g., e-mail, Netscape. Windows. BLOylATORS Discussing changes to NRC's computing environment. 3 RUKEMAKINGl EASIER
  • Telling you whom to contact within NRC for help in soking your computer SAID THAN DONE needs.

3 I STARTED A .lOKE Presenting technology updates on advances in infonnation technology.

5 REGION lli ON THE WEB 9706130155 970613 PDR NUREO BR-0191 R PDR Continued on page 8 l

[/

. Inside Information Spring 1997

ATTACK OF THE KILLER BLOVIATORS " *""" fr m P09e I ,

by MichaelMcNeil, RES can create a rule that any incoming 1 i

e-mail from a stated source, or on a One of the most useful features in )

illoviator: n. One wlm indulges in stated subject, goes directly to trash. Word Perfect OfHee's e-mail system bloriation. is the ability to create " folders," to T,ou can create a LOT of these rules.

group related messages under sepa- 1 Illov,ation:

i n. Meaning / css chatter; They do work. I used to get endless e- rate topics, e.g., projects, contracts,

, annedar maAing the speakeruppear to mails about the progress of a tunnel people. If you store more than a few he Anonledgeah/c or important. that the Department Of Energy was dozen messages, folders will help you

,"E * ""'"" """ "" Y organize your e-mails, All of us receive unwelcome e-mail . i fers of ass stance irom a psychic l sometimes a lot of it. Remember, an}'- F, rom the menu of,your In Box, select reader. One filter sends to trash any l body. w ho knows your e-mail address File, Folders. (You can do this from message whose subject is " Tunnel can send you e-mail. either mailbox: folders will be created Boring," another any message w hose There are two general types of subject is " Psychic Readings " and for both boxes simultaneously.) Click bloviators: governmental bloviators, my life is simpler. on the Create button, and you will be who want y ou to think they are impor- asked to specify a name for the folder, tant and/or knowledgeable, and pri. 4F PICC"" V"Y for example, " Urgent Stuff." Click vate sector bloviators, who want the * * # '" I "' "'.e "" o fD  !@b discunion OK, and the folder Urgent Stuff has gr ups, buHenn boards, and chat been created. Nowelick on your name same things plus they want some of vour monev. These people have dis-

~

covered the Internet, and they aren't T *' I

  • *Cf" both vny narrowb focuwd on sub-

" (* -

to highlight your main folder and you can then create additional folders. If going to forget about it soon. Al-

  1. "*"'"" #""'"" I you want subfolders within folders, though IRM has some filterine de- .ge a1 t f stuff I can do with- simply click on the folder you wish to vices, it is too much to expect IR'M to

"* "E" " """ l" 8 VC subdivide (to highlight its name) and nyone your pasonal e-mail addre" then create the subfolders.

set up a filter that would extinguish all unless you have an established work-messages with s.ignal/ noise ratios be- Let's say you want to divide Urgent ing reiationship. Remember, the low some lesel. Stuff into two subfolders ("Due Yes-junk-mail and direct-phone-sales You can, however, set up filters of creeps are lurking out there! terday" and "Due Last Week"). From your own. Just click on " TOOLS," your mailbox menu, click on File,

" RULES", then " CREATE," and you Continued on page 7 Folder, then click to highlight Urgent Stuff. Click on Create, name the 3 - my folder Due Yesterday, and click on Mm . yM h. .s 3 ,

j i e ,! OK. Click again on Create, and name n the other folder. Click OK, then OK

,  ; again, and your folders have been cre-ated for both mailboxes. You can see the folders on the leftmost section of WO your mailboxes.

] If you can't read the titles of your fold-y3 '

1 ers, go to your in Box and point the

N_

j mouse at the bar between the folder j names and the messages. When the mouse pointer changes to a double line.

4%

click on the left button and drag the

~ p N divider bar until you have divided up q

+

your screen real estate to your satitfac-tion. Of course, the more room you 7mm 4 , make for folder names, the less room N "

r p you have for message information.

To store a message in a folder, go to M d52 @ the in or Out box and click on the Dr. Michael McNeil defending his PC from junk e-mail. Continued on page 4 2

Insids Information j Spring 1997 I

RULEMAKING: EASIER SAID IHAN DONE To view these documentsin word Perfect,you will have to reconfig-Now, w ith the help of Web technology ure your Netscape program icon Intranet allows on-line review to the specifications used by RES.

and an "intranet," technical staf f and Two routine activities at the NRC can managers can review, comment on, Click on the "Need help click bere" link on the RES rulemakmg bring even veteran civil servants to and check the status of complete pages. We suggest that if you are tears of frustration: the concurrence rulemaking packages, all on-line. ,

not in RES, but wish to view these process and rulemaking. documents in Word Perfect, you To go directly to RES's rulemaking l Getting everyone to concur on a final pages, enter http://res1.nre. gov / should create a separate Netscape text. whether on a short memo or a ~cag/ rule.html in Netscape. From icon for rulemaking reviews.

new rule, takes much longer than ev- there, you can review rulemakings eryone wants it to take. We've all that: have been sent by RES foroffice Relevant background documents faced the frustration of having a man- concurrence; rulemakings being re- can be brought together, which ager, er someone from another divi- viewed by the Executive Director for helps reviewers put the subject sion, send a carefully negotiated Operations; or rulemakings that hase matter in its full context.

r; been sent to the Com-7.... . - ~. .._ ,

mission. By clicking on Managg can quqy asmtain the I @ l 2ll3 l ' I EI H I 5 II1'"- any of the listed docu-status of any pendmg rule and as-

  • N '

a wwkloads more easily.

E d.h C. M T l o .a rr:;n ments, the browser will RES Rulemakings Under Concurrence Review l launch Wordperfect and .

Niany people can review the same the document will open. document simultaneously.

at the Office Level Although the user can- .

,_ ,.i.,. . , n,,, u,,,,,,,,,, .. , i,. v ,o, ci.n,,,,, am.. . All -vi wers have an electronie not change the original, c py mat can be modified on their the open file can be read Word processors.

NM MWal DO UvT ofC()p!ed.

%=i"a"N%';7.t"M=~*'- """*"" "*" Need more information on the Rule-gg , , How does this help.9 making Intranet? Contact George Uy M .

The latest draft can Niarino of RES/DRA at 415-6657, or lw ys be found on-line. e-mail him at GPN1.

2 0 W 5. W m "a r& M ";*a # /.*m "* # M 7 L )

J g"g,gl:y"~

" final" draft back to the originating staff member for an " overhaul."

Rulemaking draws upon the techm. cal I STARTED A JOKE i

.J expertise of multiple offices. The fin- Don't Be Fooled By Computer Hoaxes 'M L ished rules also reflect comments Mr.977 from licensees, attorneys, consult-ants, and the general public. The end by Louis M. Numkin, Computer Security, IRM An article in the Niay '95 edition

  • h [ ['

1 product of rulemaking-the final rule of Inside Information 4 itself - requires a long list of (you Numerous computer hoaxes have told of a virus hoax i

guessed it) concurrences. been unleashed over the past several which began spreading in late 1994 The pivotal role of the Office of ye rs. Claiming falsely that they warn The so-called " Good Times" virus l Nuclear Regulatory Research (RES) f potential harm, the hoaxes instead would arrive in your e-mail and de-I in rulemaking 'cives that office an spread panic that ultimately wastes stroy your hard drive. Although no time and deprives people of the use of such virus exists, a flurry of e-mails incentive to improve the process.

their computers. still spreads through Cyberspace ev-1 One report, circulated at the time "Y I * *"",tb wM war nings of f

77:e "intranet" is simply the net- Good Times.

of Operation Desert Storm, stated that work connectingNRCstaff(butno brand-new computer printers pur- Hoax: An act meant to trick one else) to data stored on en m' chased by Iraq contained computer or dece/re, ternal computer or server. H.e v run We know that Iraq did not enter it by using Netscape to ac- Computer hoaxes rely on the help of connect many of these new printers.

cess NRC s Internal Home Page well-meaning co-workers, friends, and thus the printers were unavailable (http:Hwww. internal.nn. gov).

to support the Iraq.i war effort. Cont.nued on page 6 3

Inside Infonnati:n Spring 1997 Postman from page 3 /g you might type it in as CAARCHIVE\. Anything you have sent to othersis in I e s When you click on OK, it will ask you message; then drag the' your Out Box, and these messages l mouse to the left, to the if you want to create that directory;

' will also archive, but to the Archive-unswer Yes. Remaining in the Prefer- Out Box. At your Out Box, click on name of the desired folder. Wrong ences screen, double-click on the icon folder? Just reverse the process and File, Open Archive. The Archive-called Cleanup. Out Llox appears. Again,ifyou want return the message to its origmal loca-tion. To open a folder, move to the left J. Chtlvsc automaJg. or manng] to resend an old message, you must section of your mailbox and click on arc /nring first move it back to the current Out the c61 der's name; close the folder by Box by clicking on Actions, Archive.

Auto-archiving works automatically Afterwards, toggle back to your cur-clicking on your main folder-as you exit from your e-mail systeni rent Out Box by clicking on File, If you make a mistake at any point, every day. In the Cleanup dialog box, Open Archive.

you can go back (menu File, Folders) choose the selection that says Auto-and Delete any folder except your Archive Af.ter and use the up-arrow to Search Tools main folder. The system will ask you Fick the numberofdays. Ify ou want to ifyou want to deletejust the messages, Three Word Perfect Office search keep one month's worth of messages or the foldcrs as well. in your current In Box and to store tools are very helpful to manage and organize your messages:

older meskliges in the Archive In Box, Archiving set it for 30 days. Click on OK and exit Sm From eithermailbox menu, select from Preferences. When you exit your View, Sort. You can sort your messages When you see the number of your

e. mail, anything older than 30 days by date, subject, sender ("from") or messages creeping up 10 200, it's time will move into the archive directory. item type (e.g., mail, note, appoint-toarchive! Crowded mailboxes are as ment). If you are starting off with a difficult to manage as ~,, Manual archiving allows you to large number of messages and want to over-stuffed filing 3g select which e-mails are to be create folders, this tool provides a good cabinets. Storing too many e-mails f*

j gA *N archived and when. first cut through the chaos.

eats up space on the % y W S/

y r g + y$ E From the Cleanup dia-log box, double-click finiIf you,re seeking an elusive ,

server's hard drives, a y pf 2 on Manual Delete message and can remember a distm' e

];1 [

and ultimately slows and Archive. Click tive name or word m the subject c:

down vour access to all [:> e 4 OK and exit body of the message, this tool willlo-of you'r e-mails. p* M .n +) onfrom Preferences. cate it. (Unless, of. course, you,ve M When you want to deleted it. However, if it was only

/$f/

Archiving is a good ~

/ Archive an e-mail, sim. recently deleted, you can use this tool solution for mes-sages that you need to d'/ DD keep long term but that you will not q

d ply highlight it; then from the mailbox menu choose Ac.

tions, then Archive.

to rummage around in your trash can as well.) Go to the mailbox where you routinely need to access. By are trying to find a particular message.

Select Edit, Find, then fill in whatever archiving them to the hard drive in 3. Retriering archived e-mailf you remember about the message that your computer, you free up needed space on the file server. You can It's easy to look up messages in the you seek. Find starts searching begin-Archive-in Box. At y our in Box, sim. ning at the message where the cursor choose to have the system automati-ply click on File Open Archive. The is located.

cally archive e-mails after a specified title bar of your in Box changes t number of days, or you may prefer to Filter: This tool is a more refined ver-Archive-in Box. Otherwise, they look archive e-mails selectively. Either s on of the previous two. From your the same. The archived messages will way, it s easy to switch into your ar- mailbox menu, select View, Filter.

chives tolook up older messages, and still be in the same Folders. If you Here your search can specify sender, need to Reply or Forward a message they'll still be in the folders you put " " '" ##

them in. from the Archive-In Box, >ou can '

unarchive it and put it back in your text, or various other parameters. If L Settine un an archire directory current in Box by clicking on the you routinely use a certain set of pa-rameters to search through your mes-

~

From the menu in your Main s,creen or menus Actions Archive. Then toggle sages, you can even save the set of In Box, select File, Preferences; then back to your current In Box by click-

~

ing on File Open Archive. At the end double-click on Location of Files. Set  ;

of the day, as you exit your e-mail, the the Archive Directory to a directory on your C: drive. If there's nothing there. item will be mosed back into the Archive-In Box.

4 A

1 a

i Spring 1997 Inside Information 1

1 l g of the problem solenoid valves. Also Web; and to useful resources like a linked to the page are the NRC inspec- ZIP Code finder, an online telephone tion reports that form the basis of the in- directory, and a "per diem" listing for l

! ON THE WEB ferma,iee netice. geve,emeet t,avei. Other ,egionai l 1

Web users have suggested useful sites j Two Region 111 staffers have been Home is Where the Intranet is they have found, and these have been i 4

working for more than a year now to I

[ Note: For a definition of Intranet, see added to the Region 111 home page.

! turn the Internet and the NRC's Web I site into a useful tool for the region and the article on rulemaking on page 3J Other Pages at Region Ill's I

! the agency. The result has been a home Another Region 111 employee, Jan Web Site j page focused on the specific needs of Strasma in the Office of Public Affairs, I Region Ill's staff and licensees. has created the Region III home page, Jan and Ed collaborated on a Web a series of links to Web sites of page pulling together the documents

{ Note: All World Wide i particular interest to re- associated witha hydrogen gas burn m

) Web pages cited in this ar- , pg g g pg; i ticle can be accessed by gional st f1 members.

j g p ,99

{ any NRC PC equipped / The Region 111 home Ed, who was the lead engineer as.

! with Netscape. Only -

page is a usefuljumping- signed to Point Beach, used a digital

{ one of the pages,Infor- -

p off place for making the camera and a video camera to record I mation Notice (IN) 95-93, Web work for the regional images of the cask components and of is also accessible to the gen- staff. With pointers to other gas bubbles rising in the cask.

eral public. For URLs (Uni- key locations on NRC's inter-j form Resource Locators) to the nal and external Web sites, as well pd has continued toexplore the use of f pages, see the end of this article.] unages to help explam techmcal is-as to non-NRC Web sites, regiona si ff. m mbers (and any ne m. the sues. He maintains a Region Ill One "hyperlinked Clf"Is Technical Issues Web page with both Worth a Thousand words f RC)( an quicMy check today s sta- still and movie images ofissues such ms report on nuclear plants, review as tornado damage at the Quad Cities l As Ed Schweibinz, a Region til in- events reported to the NRC Opera-station, battery problems at Point j spector, prepared an Information No- tions Center, scan through the latest Beach, and a transformer problem j tice about the La Salle County station, NRC news releases, and read the latest that caused a loss of offsite power at j he wonderedif placing the notice on a issues of industry newsletters.

Byron station. Region 111 now has a j Web page, linked to related docu- digital camera to make it easier to The home page has links to the Web ments and images, could bring an sites of all the Region 111 utilities and produce and share electronic images added dimension for both staff and other nuclear-related sites; to Web of technical problems.

se rch engines; to news sites on the Continued on page 6

! en th so da e a ures t at j led to the failure of main steam isola- ,,,,

j tion valves to close at that plant, m- 2' d W

1 cluded one figure and references to d

} several inspection reports. ;P?

l IN95-53 is now on the NRC's Web site.

j The full text of the official notice and added images include a drawing from d[

7 '*

+ '

! Commonwealth Edison, operator of QW7 ,

the La Salle plant, and photographs p%

4 m% 1

% .j l

e The term "hyperlinked," used above, refers to the Web's capa- .r(

W '_ ~? ii l bility of allowing you tojump to 3

j a related document or graphic image by clicking with a mouse.

[# ' '

.~~ m The acronym "GIF" (Graphic ~

Interchange Format) refers to a T '

-: : a j file format typically used on the N K. 7 - ma .;

i Web to reproduce a drawing or un image. Jan Strasma (L) and Ed Schweibinz review photos of a spent fuel cask that con be l found on Region Ill's web site.

l 5.

i i

l Inside Inkrm: tion Spring 1997 i Sforted a Joke *pm name picked at random to imply au- distributed by a company as a promo-  !

from page 3 .g thority and authenticity. In particular, tion. The screen saver had a trick in and family members to the FCC (which has been often cited it: on any Friday 13th, the ghosts fly-  ;

spread the panic. Ev- f as the " authority" for the warning) is ing around on the screen would fly l eryone wants to warn everyone else about a pos N L W simply not in the business of monitor-ing viruses for the general public.

off and circle the screen. Some con-cerned users thought this change was sible new nefarious virus, and this the work of a virus and sent out an Several recent hoaxes stated that a process ends up wasting time and ty- alert. The result was an unintentional computer would become infected ing up computer resources defending hoax mmage about a harmless piece simply by opening an infected e-mail.

"I * " *"I

against a nonexistent threat. Yet computer security experts tell us .

Some of the telltale signs ofcomputer that viruses can (so far) only be trans- In early December,1996, we saw  !

hoaxes include invoking bogus au- mitted in executable (i.e., program) alerts about the Deeyenda Virus.

thorities and taking advantage of files, not data files such as e-mails, Claim,mg that it was " virtually unde-the lack of sophistication of most documents and spreadsheets.* tectable," the reports eited "Research- ,

users. Here's how computer hoaxes ers at Princeton University," for cred- )

are spread. ibility. The alert warned that just by  !

  • One exception to that rule con- opening or reading a Dee>enda-in-Nowadays, hoaxes often arrive in an cerns Microsoft (MS) Word. If fected e-mail, sou would harm yout

~ i e-mail from a friend, or via a mass. you use MS Word as a word pr - machine. There is no such virus.

mailed e-mail forwarded from some_ cessor, there is a whole new one, who got it from someone, who genre of what are called Macro A recent hoax is "Penpal Greetings."

got it from someone "who know s.- Viruses that can hitchhike into When a company got tired of chain The note will warn of a virus or a your system attached to MS. letters being passed through its net-threat, and sometimes cites some Word documents, work, someone put out an alert that if prestigious authority, such as the Fed. any ne received e-mail with subjects eral Communications Commission, like the phrase Penpal Greetings, it Current examples of hoaxes will automaticall' forward itself to or a professor from a big university, as and honyP w* ruses eseryone whose e-mail address is in the source of the warning. With com-puter hoaxes, the " source" simply Before Halloween 1996, free screen _ y ur mailbox and destroy all the data may not exist, or may have been a saver software called ghost.exe was n your hard drive." Suffice it to say that there is no Penpal Greetmgs virus.

How to respond to virus Region 111 from page 3 ,

the Web to support its mission. To dis- warnings

, , . cuss how to develop a Web site on the Sounds intriguing, - , intranet or external NRC Web Page to If you ever get messages like these but Could We Do help your program as wellas the costs from friends, family members, or it for Our Programl of Web site development. contact Walt an Internet Service Provider (e.g.,

Oliu (e-mail WEO or phone 415 Erol's, AOL, Compuserve), please Jan designed the current Region 111 forward a copy of the notice to home page on his home computer, a 7166). For technical support on spe_

cific software or hardware issues as. LMN@NRC. GOV so that we can Macmtosh, and most of the updating verify its authenticity. Enough real vi-sociated with a Web page, contact and revision are done on his office ruses are out there that will cause us computer using a % indows-based John Badrian (e-mail JHB or phone 415-5748). To obtain Web access for problems, so let's not be " April Fools" program called HTML Assistant. The by falling for virus hoaxes.

t Walt Oliu.

IRM Technology Assessment Staff was instrumental in fostering the use page t/RLS:

of the Web, both external and internal, .

NCE'"" III Home Page:

in Region III. They helped Ed and Jan For up-to-date news on virus obtain access to the NRC Web servers http:/h.rm25/ Rill hoaxes,go to the following URL and set up the original pages. Feel free Technical issues in Region Ill: on NRC's intranet:

to contact Jan (e-mail RJS2) for sug- http://irm25/ Rill /ers gestions and advice on how Region 111 http://www.m.ternal.nre. gov /

Spent Fuel Cask Gas Burn Page: irm/ info.htm created its web site. http://irm25/ Rill /rjs2/ cask Because the Web is a relatively new Information Notice 95-53:

Then click on Information toolin government, the NRC is stillin http://www.nre. gov / Rill /crs/ b"*Y' the process of de fining how best to use IN95-53/in95053.html 6

1 Spring 1997 Insids Informati:n Sender from page 1 'Ti .

text (called the header), which N11h1E-encoded messages. Agency.

in turn is followed by a stream of en- wide implementation of the gateway Text format and coded text. Please contact the Cus- is scheduled for the third quarter of FY encoding: the long story tomer Support Center (415-1234) for 1997. Once the gateway is available For e-mail and many other computer assistance in decoding these files. agencywide, h11h1E-encoded attach-purposes, there are only two types of NRC's internet e-mail gateway is ments will automatically be decoded files: " text"(also known as DOS text now being upgraded to decode Continued on page 8 or ASCll) and binary format. A text file is one that contains no special for-matting characters. Unless you ex- Blovictors from page 2 plicitly save your Word Perfect files as DOS text files they are considered bi-nary files, since they are formatted with special codes that can only be un-derstood by the program that created For example, if you want to discard automatically all e-mails sent by someone them or by a viewer program. N1ost named Darth Vader, with a subject line of"Jedi family reunion," here's how you other kinds of files, including spread- would do it.

sheets, databases, program files, and graphics, are binary. 1. From the in Box, click on Tools, Rules, Create.

2. Give the rule a name, like "The Force" E-mail attachments in text format can be sent and received by most e-mail 3. Fill in the appropriate in formation ("new item,""from,"" subject")in the sec-systems, including NRC's. Such at. tions entitled "When event is" and "If the contents are."

tachments should present no problem in transmission. The problem comes 4. At the bottom of the dialog box, where it says "Then actions are," click on m with the binary attachment, and it s " Add." You will see a menu of actions.

not always under NRC's control. 5. Click on " delete / decline," then click on ok in the box that appears.

There are many encoding algorithms 6. At the top right of the Create Rule dialog box, click on Save. Then click on in use today (including UU, BinHex, Close in the Rules box.

Base-64, and h!!h1E), and not all e-mail systems can uecode them all. The new rule will automatically trash any new e-mails meeting the description When an NRC user sends a binary at- in the rule, until you disable the rule. To enable or disable any rule: From the tachment via Internet e-mail, NRC s In Box menu. click on Tools, Rules; highlight the rule you wish to enable or disable; and chck on the enable or disable button to the right.

Internet gateway automatically en-codes it using the UU-encoding A common use of a rule is to notify senders ofincoming mail that you are away scheme. Thus, any receiving e-mail from the office for an extended period (e.g., vacation). Such a rule could inform system that recognizes UU-encoded yot r correspondents when you will return, or give the name of a contact in your files can decode your attachment. branch w ho can help them until you return.

Receiving e-mail with attachments from outside the agency, via the CAUTIONS:

Internet, is a more complex issue. a. If your rule includes a " reply" action, the " Reply box" will appear. hiake sure NRC's internet gateway can decode that you mark it for " Reply to sender," and NOT " Reply to all." If you " Reply attachments encoded with UU to all," then your reply message w.ll be sent to everyone w ho received that e-or BinHex. Such attachments will mail -- which, for network announcements, means all NRC employees! The appear in your in Box with the attach- entire agency doesn't need to bow your vacation schedule.

ment as an icon at the bottom of tk mmage b. Ifyour rule applies to allincoming mail. rather than mail from a specific sender, you must do the following: Click on the "From" box, and enter the two sym-hiessages encoded with newer tech- bois !@. This code exempts incoming Internet mail from the Reply rule. The niques such as N1151E cannot be de- e-mail system cannot always respond correctly to allInternet addresses. If this coded by NRC's e-mail system. is not done, your reply might genyate an Internet error message, which would Those attachments are left in the en- be sent back to you, resulting in multiple error messages.

coded form and are included in the body of the e-mail message. They For help with e-mail rules, call the Customer Support Center at 415-1234.

i appear below the body of the message, following a dashed line and some i 7

Inside Information Spring 1997 \

Sender from page 7 Too Much Too little Too lote?

Please take a minute to answer the fol- l from page i lowing questions about IRM's news-and accessible to you when you open your e-mail messages.

In this issue and the prevm.us one letter. You can provide feedback by (which featured use of the World Wide tearing off (or photocopsir Ns sheet and mailing it to me.'

Web),IRM used a new approach. We ow to do it: attachment about this survey will also b >

tried to make Inside InJbrmation live- you via e-mail, with instruu, m on lier, yet also more focused on the needs If you .sent an e-mail attachment Imw to respond usi~ng e-mail. Thanks of computer users (that's you) and less and your recipient received al- for your help.

focused on IRM. We got some positive phabet roup, inform him or her feedback from some of you; now we that your e-mail system converts llarrey Spiro need to hear from the rest of you. Editor, Inside Information attachments to UU-encoded for-mat. It's up to the recipient to speak to has or her on-site com- Please Circle Your. Answers to Questio puter gurus about decoding a gg,, (,,p ,,,g,g

,,,g go y, Sp y,u ,, yS from that format.

If you receive an e-mail attach- USEFULNESS OF Tile NEWSLETTER:

ment that looks like a solid 1. Do y u generally read the IRM newsletter (Inside Information)?

stream ofletters and numbers,it - yes - no is probably MIME-encoded. 2. Has it helped you in your work at NRC't Call the Customer Support Cen- yes _. no ter (415-1234) for assistance in conversion. If you receive a lot 3. Have you ever saved the newsletter or ch.pped an article for future use?

of MIME-encoded e-mail at- - never - sometimes tachments, you are invited to PUBLISil/NG OPTIONS participate in the MIME gate-

4. The newsletter is published quarterly. Printing the newsletter costs NRC less way pilot project. To receive in-than 51.00/ copy. Should IRM (circle all that apply):

f ormation about the pilot, con-

a. maintain current print version, keep quanerly publication schedule tact the Network Control Center
b. drop the publication entirely?

via e-mail (NCC).

c drop the printed version, but replace it with a Web version only?

d. keep publishing the printed version, and also post excerpts from the Other Ihings to keep in mind

"'*'" "'RM'*h**'P"8'?

e. keep printed version as is Make sure that you know what the
f. publish less frequently?

original file format is. If the document

g. publish more frequently?

was created in Word Perfect for Win-dows or Microsoft Word and you try h. don't know/ care to read it in Woni Perf. ct 5.1.even the

. STYLE:

best e-mail system around can't help 5. The style of the articles is generally (circle all that apply):

you. Call the Customer Support Cen- a. too dry e. too technical ter to resolve that dilemma. b. boring f. too elementary Finally, if your recipient's local com- c. too chatty g. generally okay puter folks can't solve the problem, d. too flippant h. don't know/ care you might want to try sending the disk i. other by U.S. Mail. It may be faster in the long run. OTilER COSIAIENTS (please tell us how we can make the newsletter more

,,,j,g go ,,,y;

6. I'd be sure to read the newsletter ifit contained .

g.yl)3b 7. What I like most/least about the newsletter is .

T6 ggNDER 1 P5551'Q5'1 1 12n19R US NOC-0IrP rUPLICATICNS HAlNrH TPS-PDC-NUQEG 2 W F N -(. r 7 WtSWTNUON DC 20555 $