ML20140F594
| ML20140F594 | |
| Person / Time | |
|---|---|
| Issue date: | 06/13/1997 |
| From: | NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM) |
| To: | |
| References | |
| NUREG-BR-0191, NUREG-BR-191, NUDOCS 9706130155 | |
| Download: ML20140F594 (8) | |
Text
1 l
kh[hb _,_-__
%4ini= mason INFORMATION W["
YouR l)NK TO lNFORMADON ExcEufNCE Sntnc1997 OrncE OF INF0ltMATION RESOURCES MANAGEMENT NUREG/St-0191 U.S. NuctEm RicutAton Comme PLEASE MR. POSTMAN RETURN TO Managing Your E-Mail SENDER??
When it was introduced at the NRC in 1991, e-mail was greeted with skepticism E-Mail Attachments That Deliver and treated with benign neglect. Now, e-mail is recognized as one of the most successful computer applications introduced here in the last few years. Need You've been working with the inter-proof? When e-mail is down, our Customer Support Center phone lines light up.
agency group for months on this re-Try living without e-mail for a week.
port, and now your E.P. A. counter-Although the Word Perfect Office e-mail system has its share of quirks, it is part has completed his part of the generally a reliable and flexible product with an array of features that make it con-aft. Although the hard copy is com-venient to different kinds of users. Some users are minimalists: they like to clear E
. d l"d!
I u
out their e-mail boxes by the end of the day; or week. Others use e-mail as a fihne ss stem, mam-r the e-mail, click on the attachment, taining literally hundreds of e-mails in their In T~ /
and see and Out Boxes.
'^$# W & $#xse*f e N$llte*c#$#* $(
While IRh1 prefers that you do not store 4
Sometimes e-mail attachments arrive hundreds of e-mails indefinitely (it eats up
,y 1
,t intact; other times, you get a collee-lots of server storage space), we know that tion of strange characters and a myste-many of you will continue to squirrel away rious message about " encoding." is messages long bevond their reasonable there some way you can transmit and useful lifetime. This article provides a receive files using e-mail without be-few pointers for bringing order to the e-mail coming a cryptographer?
files of even compulsive hoarders like you g
g g
(and me).
Conhnved on page 2 cated, and reflects the complexities faced by both NRC's system and the e-mail system at the other end of the TOO MUCH? IOO LRTLE? IOO LATE?
iine. If'you want the details, read on;if you just want to know how to Tell Us if this Newsletter Meets Your Needs transmit attachments, skip to the Unlike memos from the Commission, w hich tend to catch your attention. hnide "How to do it" box on page 8.
Infonnation is not " required reading! If IRN1's newsletter is not both interesting Continued on page 7 and relevant to your work, you just won't read it.
I We try to tell you what you might need or want to know about computers l PLEASE MR. POSTMAN
=
and information technolog*y, to help 3 our work at the NRC. We do this in several EE!.
ways, including:
I TOO MUCH? IOO llTTLE?
Q TOO LATE?
M
- Showing how organizations both in the NRC and elsew here use computers and
- =P information technology successfully to get their job done better.
I RETURN TO SENDER??
Q
- Tutorials and tips on how to use features of common softw are and hardware in 2 ATTACK Of THE KILLER use at the NRC e.g., e-mail, Netscape. Windows.
BLOylATORS Discussing changes to NRC's computing environment.
3 RUKEMAKINGl EASIER
- Telling you whom to contact within NRC for help in soking your computer SAID THAN DONE needs.
3 I STARTED A.lOKE Presenting technology updates on advances in infonnation technology.
5 REGION lli ON THE WEB 9706130155 970613 Continued on page 8 l
[/
Inside Information Spring 1997 ATTACK OF THE KILLER BLOVIATORS
" *""" fr m P09e I by MichaelMcNeil, RES can create a rule that any incoming i
e-mail from a stated source, or on a One of the most useful features in
)
illoviator: n.
One wlm indulges in stated subject, goes directly to trash.
Word Perfect OfHee's e-mail system bloriation.
is the ability to create " folders," to T,ou can create a LOT of these rules.
group related messages under sepa-Illov,ation: n. Meaning / css chatter; They do work. I used to get endless e-rate topics, e.g., projects, contracts, i
annedar maAing the speakeruppear to mails about the progress of a tunnel people. If you store more than a few he Anonledgeah/c or important.
that the Department Of Energy was dozen messages, folders will help you
,"E *
""'"" """ "" Y organize your e-mails, All of us receive unwelcome e-mail.
fers of ass stance irom a psychic sometimes a lot of it. Remember, an}'-
reader. One filter sends to trash any F, rom the menu of,your In Box, select body. w ho knows your e-mail address message whose subject is " Tunnel File, Folders. (You can do this from can send you e-mail.
Boring," another any message w hose either mailbox: folders will be created There are two general types of subject is " Psychic Readings " and for both boxes simultaneously.) Click bloviators: governmental bloviators, my life is simpler.
on the Create button, and you will be who want y ou to think they are impor-asked to specify a name for the folder, tant and/or knowledgeable, and pri.
4F PICC"" "" D !@b discunion for example, " Urgent Stuff." Click V"Y vate sector bloviators, who want the
- * # '" I "' "'.e o f OK, and the folder Urgent Stuff has gr ups, buHenn boards, and chat been created. Nowelick on your name same things plus they want some of T *' I
(*
vour monev. These people have dis-
- *Cf" to highlight your main folder and you both vny narrowb focuwd on sub-can then create additional folders. If
~
covered the Internet, and they aren't I
going to forget about it soon. Al-you want subfolders within folders, though IRM has some filterine de-
.ge a1 t f stuff I can do with-simply click on the folder you wish to "E"
" """ l" 8 VC subdivide (to highlight its name) and vices, it is too much to expect IR'M to nyone your pasonal e-mail addre" then create the subfolders.
set up a filter that would extinguish all unless you have an established work-messages with s.ignal/ noise ratios be-ing reiationship. Remember, the Let's say you want to divide Urgent low some lesel.
junk-mail and direct-phone-sales Stuff into two subfolders ("Due Yes-You can, however, set up filters of creeps are lurking out there!
terday" and "Due Last Week"). From your own. Just click on " TOOLS,"
your mailbox menu, click on File,
" RULES", then " CREATE," and you Continued on page 7 Folder, then click to highlight Urgent Stuff. Click on Create, name the folder Due Yesterday, and click on Mm.
yM h.. 3 3
s my j
i e,!
OK. Click again on Create, and name the other folder. Click OK, then OK n
again, and your folders have been cre-ated for both mailboxes. You can see the folders on the leftmost section of W O your mailboxes.
]
If you can't read the titles of your fold-y3 1
ers, go to your in Box and point the N_
j mouse at the bar between the folder j
names and the messages. When the mouse pointer changes to a double line.
4%
click on the left button and drag the p
N
~
divider bar until you have divided up your screen real estate to your satitfac-
+
q tion. Of course, the more room you make for folder names, the less room 7mm 4
N r
p you have for message information.
M d5 @
To store a message in a folder, go to 2
the in or Out box and click on the Dr. Michael McNeil defending his PC from junk e-mail.
Continued on page 4 2
Spring 1997 Insids Information j
RULEMAKING: EASIER SAID IHAN DONE To view these documentsin word Perfect,you will have to reconfig-Intranet allows on-line review Now, w ith the help of Web technology ure your Netscape program icon and an "intranet," technical staf f and to the specifications used by RES.
Two routine activities at the NRC can managers can review, comment on, Click on the "Need help click bere" link on the RES rulemakmg bring even veteran civil servants to and check the status of complete pages. We suggest that if you are tears of frustration: the concurrence rulemaking packages, all on-line.
not in RES, but wish to view these process and rulemaking.
To go directly to RES's rulemaking documents in Word Perfect, you l
Getting everyone to concur on a final pages, enter http://res1.nre. gov /
should create a separate Netscape text. whether on a short memo or a
~cag/ rule.html in Netscape. From icon for rulemaking reviews.
new rule, takes much longer than ev-there, you can review rulemakings eryone wants it to take. We've all that: have been sent by RES foroffice Relevant background documents faced the frustration of having a man-concurrence; rulemakings being re-can be brought together, which ager, er someone from another divi-viewed by the Executive Director for helps reviewers put the subject sion, send a carefully negotiated Operations; or rulemakings that hase matter in its full context.
r; been sent to the Com-I @ l 2ll3 l ' I EI H I 5 II1'"-
mission. By clicking on Managg can quqy asmtain the 7....
. - ~.
status of any pendmg rule and as-any of the listed docu-a wwkloads more easily.
E d.h C. M T l o.a rr:;n
- N ments, the browser will l launch Wordperfect and Niany people can review the same RES Rulemakings Under Concurrence Review the document will open.
document simultaneously.
at the Office Level Although the user can-All -vi wers have an electronie
,_,.i.,.., n,,, u,,,,,,,,,,.., i,. v
,o, ci.n,,,,,
am..
not change the original, c py mat can be modified on their the open file can be read Word processors.
ofC()p!ed.
NM MWal DO UvT
%=i"a"N%';7.t"M=~*'- """*"" "*"
Need more information on the Rule-gg,
, How does this help.
making Intranet? Contact George 9
Uy M The latest draft can Niarino of RES/DRA at 415-6657, or J
lw ys be found on-line.
e-mail him at GPN1.
2 0 W 5. W m "a r& M ";*a # /.*m "* # M 7 L )
g"g,gl:y"~
" final" draft back to the originating staff member for an " overhaul."
I STARTED A JOKE i
.J Rulemaking draws upon the techm. cal expertise of multiple offices. The fin-Don't Be Fooled By Computer Hoaxes
'M L ished rules also reflect comments Mr.977
- h [ ['
from licensees, attorneys, consult-by Louis M. Numkin, An article in the ants, and the general public. The end Computer Security, IRM Niay '95 edition 1
product of rulemaking-the final rule of Inside Information 4
itself - requires a long list of (you Numerous computer hoaxes have told of a virus hoax guessed it) concurrences.
been unleashed over the past several which began spreading in late 1994 i
The pivotal role of the Office of ye rs. Claiming falsely that they warn The so-called " Good Times" virus Nuclear Regulatory Research (RES) f potential harm, the hoaxes instead would arrive in your e-mail and de-l I
in rulemaking 'cives that office an spread panic that ultimately wastes stroy your hard drive. Although no incentive to improve the process.
time and deprives people of the use of such virus exists, a flurry of e-mails their computers.
still spreads through Cyberspace ev-
"Y I * *"",tb wM war nings of 1
One report, circulated at the time Good Times.
77:e "intranet" is simply the net-of Operation Desert Storm, stated that f
work connectingNRCstaff(butno brand-new computer printers pur-Hoax: An act meant to trick one else) to data stored on en m' chased by Iraq contained computer or dece/re, ternal computer or server. H.e v run We know that Iraq did not enter it by using Netscape to ac-connect many of these new printers.
Computer hoaxes rely on the help of cess NRC s Internal Home Page and thus the printers were unavailable well-meaning co-workers, friends, (http:Hwww. internal.nn. gov).
to support the Iraq.i war effort.
Cont.nued on page 6 3
Inside Infonnati:n Spring 1997 Postman from page 3
/g you might type it in as CAARCHIVE\\.
Anything you have sent to othersis in I
When you click on OK, it will ask you your Out Box, and these messages l
e s
message; then drag the' if you want to create that directory; will also archive, but to the Archive-mouse to the left, to the unswer Yes. Remaining in the Prefer-Out Box. At your Out Box, click on name of the desired folder. Wrong ences screen, double-click on the icon File, Open Archive. The Archive-folder? Just reverse the process and called Cleanup.
Out Llox appears. Again,ifyou want return the message to its origmal loca-tion. To open a folder, move to the left J. Chtlvsc automaJg. or manng]
to resend an old message, you must section of your mailbox and click on arc /nring first move it back to the current Out the c61 der's name; close the folder by Box by clicking on Actions, Archive.
clicking on your main folder-Auto-archiving works automatically Afterwards, toggle back to your cur-as you exit from your e-mail systeni rent Out Box by clicking on File, If you make a mistake at any point, every day. In the Cleanup dialog box, Open Archive.
you can go back (menu File, Folders) choose the selection that says Auto-and Delete any folder except your Archive Af.ter and use the up-arrow to Search Tools main folder. The system will ask you Fick the numberofdays. Ify ou want to Three Word Perfect Office search ifyou want to deletejust the messages, keep one month's worth of messages tools are very helpful to manage and or the foldcrs as well.
in your current In Box and to store older meskliges in the Archive In Box, organize your messages:
Archiving set it for 30 days. Click on OK and exit Sm From eithermailbox menu, select from Preferences. When you exit your View, Sort. You can sort your messages When you see the number of your
- e. mail, anything older than 30 days by date, subject, sender ("from") or messages creeping up 10 200, it's time toarchive! Crowded mailboxes are as will move into the archive directory.
item type (e.g., mail, note, appoint-difficult to manage as Manual archiving allows you to ment). If you are starting off with a select which e-mails are to be large number of messages and want to over-stuffed filing
~,,
3g create folders, this tool provides a good cabinets. Storing archived and when.
j gA first cut through the chaos.
too many e-mails f*
S/
g + y$ E
- N From the Cleanup dia-r W
y log box, double-click finiIf you,re seeking an elusive eats up space on the % y server's hard drives, a
y pf 2 on Manual Delete message and can remember a distm' e
];1 [
[:> e OK and exit body of the message, this tool willlo-and Archive. Click tive name or word m the subject c:
and ultimately slows down vour access to all 4
of you'r e-mails.
p*
M
.n +) onfrom Preferences.
cate it. (Unless, of. course, you,ve M
When you want to deleted it. However, if it was only Archiving is a good
$f/
~
/
d Archive an e-mail, sim.
recently deleted, you can use this tool
/
d'/ D solution for mes-D q
ply highlight it; then from to rummage around in your trash can sages that you need to the mailbox menu choose Ac.
as well.) Go to the mailbox where you keep long term but that you will not tions, then Archive.
are trying to find a particular message.
routinely need to access.
By archiving them to the hard drive in
- 3. Retriering archived e-mailf Select Edit, Find, then fill in whatever you remember about the message that your computer, you free up needed It's easy to look up messages in the you seek. Find starts searching begin-space on the file server. You can choose to have the system automati-Archive-in Box. At y our in Box, sim.
ning at the message where the cursor cally archive e-mails after a specified ply click on File Open Archive. The is located.
number of days, or you may prefer to title bar of your in Box changes t Filter: This tool is a more refined ver-archive e-mails selectively. Either Archive-in Box. Otherwise, they look the same. The archived messages will s on of the previous two. From your way, it s easy to switch into your ar-still be in the same Folders. If you mailbox menu, select View, Filter.
chives tolook up older messages, and they'll still be in the folders you put need to Reply or Forward a message Here your search can specify sender, them in.
from the Archive-In Box, >ou can unarchive it and put it back in your text, or various other parameters. If L Settine un an archire directory current in Box by clicking on the you routinely use a certain set of pa-From the menu in your Main s,creen or menus Actions Archive. Then toggle rameters to search through your mes-
~
sages, you can even save the set of In Box, select File, Preferences; then back to your current In Box by click-
~
double-click on Location of Files. Set ing on File Open Archive. At the end the Archive Directory to a directory on of the day, as you exit your e-mail, the item will be mosed back into the your C: drive. If there's nothing there.
Archive-In Box.
4 A
1 a
i Spring 1997 Inside Information 1
1 l
g of the problem solenoid valves. Also Web; and to useful resources like a linked to the page are the NRC inspec-ZIP Code finder, an online telephone ON THE WEB tion reports that form the basis of the in-directory, and a "per diem" listing for ferma,iee netice.
geve,emeet t,avei. Other,egionai 1
Web users have suggested useful sites j
Two Region 111 staffers have been Home is Where the Intranet is they have found, and these have been working for more than a year now to 4
turn the Internet and the NRC's Web
[ Note: For a definition of Intranet, see added to the Region 111 home page.
I site into a useful tool for the region and the article on rulemaking on page 3J Other Pages at Region Ill's the agency. The result has been a home Another Region 111 employee, Jan Web Site j
page focused on the specific needs of Strasma in the Office of Public Affairs, Jan and Ed collaborated on a Web Region Ill's staff and licensees.
has created the Region III home page,
{ Note: All World Wide a series of links to Web sites of page pulling together the documents
)
Web pages cited in this ar-particular interest to re-associated witha hydrogen gas burn m pg g
g pg; gional st f1 members.
i ticle can be accessed by j
g p
,99
{
any NRC PC equipped
/
The Region 111 home Ed, who was the lead engineer as.
with Netscape. Only page is a usefuljumping-signed to Point Beach, used a digital
{
one of the pages,Infor-p off place for making the camera and a video camera to record I
mation Notice (IN) 95-93, Web work for the regional images of the cask components and of is also accessible to the gen-staff. With pointers to other gas bubbles rising in the cask.
eral public. For URLs (Uni-key locations on NRC's inter-j form Resource Locators) to the nal and external Web sites, as well pd has continued toexplore the use of unages to help explam techmcal is-f pages, see the end of this article.]
as to non-NRC Web sites, regiona sues. He maintains a Region Ill si ff. m mbers (and any ne m. the One "hyperlinked Clf"Is Technical Issues Web page with both Worth a Thousand words f RC)( an quicMy check today s sta-still and movie images ofissues such ms report on nuclear plants, review as tornado damage at the Quad Cities l
As Ed Schweibinz, a Region til in-events reported to the NRC Opera-station, battery problems at Point j
spector, prepared an Information No-tions Center, scan through the latest Beach, and a transformer problem j
tice about the La Salle County station, NRC news releases, and read the latest that caused a loss of offsite power at j
he wonderedif placing the notice on a issues of industry newsletters.
Byron station. Region 111 now has a j
Web page, linked to related docu-The home page has links to the Web digital camera to make it easier to ments and images, could bring an sites of all the Region 111 utilities and produce and share electronic images added dimension for both staff and other nuclear-related sites; to Web of technical problems.
se rch engines; to news sites on the Continued on page 6 en th so da e a ures t at j
led to the failure of main steam isola-j tion valves to close at that plant, m-2' d
1 cluded one figure and references to W
d
}
several inspection reports.
- P?
l d[
IN95-53 is now on the NRC's Web site.
The full text of the official notice and
+
j added images include a drawing from
- 7 '*
Commonwealth Edison, operator of QW7 the La Salle plant, and photographs p%
.j 4
m%
1 l
The term "hyperlinked," used W
~?
i above, refers to the Web's capa-
.r(
e i
l bility of allowing you tojump to
[# ' '
3 a related document or graphic j
image by clicking with a mouse.
. ~ ~
m The acronym "GIF" (Graphic
~
Interchange Format) refers to a T
a j
file format typically used on the N
K.
7
- ma i
Web to reproduce a drawing or un image.
Jan Strasma (L) and Ed Schweibinz review photos of a spent fuel cask that con be l
found on Region Ill's web site.
l 5.
i i
Inside Inkrm: tion Spring 1997 i Sforted a Joke
- pm name picked at random to imply au-distributed by a company as a promo-from page 3
.g thority and authenticity. In particular, tion. The screen saver had a trick in the FCC (which has been often cited it: on any Friday 13th, the ghosts fly-and family members to spread the panic. Ev-f as the " authority" for the warning) is ing around on the screen would fly l
eryone wants to warn N
simply not in the business of monitor-off and circle the screen. Some con-everyone else about a pos L W ing viruses for the general public.
cerned users thought this change was the work of a virus and sent out an sible new nefarious virus, and this Several recent hoaxes stated that a alert. The result was an unintentional process ends up wasting time and ty-computer would become infected hoax mmage about a harmless piece ing up computer resources defending simply by opening an infected e-mail.
"I * " *"I
against a nonexistent threat.
Yet computer security experts tell us Some of the telltale signs ofcomputer that viruses can (so far) only be trans-In early December,1996, we saw hoaxes include invoking bogus au-mitted in executable (i.e., program) alerts about the Deeyenda Virus.
files, not data files such as e-mails, Claim,mg that it was " virtually unde-thorities and taking advantage of the lack of sophistication of most documents and spreadsheets.*
tectable," the reports eited "Research-users. Here's how computer hoaxes ers at Princeton University," for cred-
)
ibility. The alert warned that just by are spread.
- One exception to that rule con-opening or reading a Dee>enda-in-Nowadays, hoaxes often arrive in an cerns Microsoft (MS) Word. If fected e-mail, sou would harm yout e-mail from a friend, or via a mass.
you use MS Word as a word pr -
machine. There is no such virus.
~
mailed e-mail forwarded from some_
cessor, there is a whole new one, who got it from someone, who genre of what are called Macro A recent hoax is "Penpal Greetings."
got it from someone "who know s.-
Viruses that can hitchhike into When a company got tired of chain The note will warn of a virus or a your system attached to MS.
letters being passed through its net-threat, and sometimes cites some Word documents, work, someone put out an alert that if prestigious authority, such as the Fed.
any ne received e-mail with subjects like the phrase Penpal Greetings, it eral Communications Commission, Current examples of hoaxes will automaticall' forward itself to or a professor from a big university, as and hony w* ruses eseryone whose e-mail address is in P
the source of the warning. With com-puter hoaxes, the " source" simply Before Halloween 1996, free screen _
y ur mailbox and destroy all the data may not exist, or may have been a saver software called ghost.exe was n your hard drive." Suffice it to say that there is no Penpal Greetmgs virus.
How to respond to virus Region 111 from page 3 the Web to support its mission. To dis-warnings cuss how to develop a Web site on the Sounds intriguing, -
intranet or external NRC Web Page to If you ever get messages like these but Could We Do help your program as wellas the costs from friends, family members, or it for Our Programl of Web site development. contact Walt an Internet Service Provider (e.g.,
Jan designed the current Region 111 Oliu (e-mail WEO or phone 415 Erol's, AOL, Compuserve), please home page on his home computer, a 7166). For technical support on spe_
forward a copy of the notice to cific software or hardware issues as.
LMN@NRC. GOV so that we can Macmtosh, and most of the updating and revision are done on his office sociated with a Web page, contact verify its authenticity. Enough real vi-computer using a % indows-based John Badrian (e-mail JHB or phone ruses are out there that will cause us 415-5748). To obtain Web access for problems, so let's not be " April Fools" program called HTML Assistant. The t Walt Oliu.
by falling for virus hoaxes.
IRM Technology Assessment Staff was instrumental in fostering the use page t/RLS:
of the Web, both external and internal, in Region III. They helped Ed and Jan NCE'"" III Home Page:
For up-to-date news on virus obtain access to the NRC Web servers http:/h.rm25/ Rill hoaxes,go to the following URL and set up the original pages. Feel free Technical issues in Region Ill:
on NRC's intranet:
to contact Jan (e-mail RJS2) for sug-http://irm25/ Rill /ers http://www.m.ternal.nre. gov /
gestions and advice on how Region 111 Spent Fuel Cask Gas Burn Page:
irm/ info.htm created its web site.
http://irm25/ Rill /rjs2/ cask Then click on Information Because the Web is a relatively new Information Notice 95-53:
b"*Y' toolin government, the NRC is stillin http://www.nre. gov / Rill /crs/
the process of de fining how best to use IN95-53/in95053.html 6
1 Spring 1997 Insids Informati:n Sender from page 1
'Ti text (called the header), which N11h1E-encoded messages. Agency.
in turn is followed by a stream of en-wide implementation of the gateway Text format and coded text. Please contact the Cus-is scheduled for the third quarter of FY encoding: the long story tomer Support Center (415-1234) for 1997. Once the gateway is available For e-mail and many other computer assistance in decoding these files.
agencywide, h11h1E-encoded attach-purposes, there are only two types of NRC's internet e-mail gateway is ments will automatically be decoded files: " text"(also known as DOS text now being upgraded to decode Continued on page 8 or ASCll) and binary format. A text file is one that contains no special for-matting characters. Unless you ex-Blovictors from page 2 plicitly save your Word Perfect files as DOS text files they are considered bi-nary files, since they are formatted with special codes that can only be un-derstood by the program that created For example, if you want to discard automatically all e-mails sent by someone them or by a viewer program. N1ost named Darth Vader, with a subject line of"Jedi family reunion," here's how you other kinds of files, including spread-would do it.
sheets, databases, program files, and graphics, are binary.
- 1. From the in Box, click on Tools, Rules, Create.
E-mail attachments in text format can
- 2. Give the rule a name, like "The Force" be sent and received by most e-mail
- 3. Fill in the appropriate in formation ("new item,""from,"" subject")in the sec-systems, including NRC's. Such at.
tions entitled "When event is" and "If the contents are."
tachments should present no problem in transmission. The problem comes
- 4. At the bottom of the dialog box, where it says "Then actions are," click on
" Add." You will see a menu of actions.
m with the binary attachment, and it s not always under NRC's control.
- 5. Click on " delete / decline," then click on ok in the box that appears.
There are many encoding algorithms
- 6. At the top right of the Create Rule dialog box, click on Save. Then click on in use today (including UU, BinHex, Close in the Rules box.
Base-64, and h!!h1E), and not all e-mail systems can uecode them all.
The new rule will automatically trash any new e-mails meeting the description When an NRC user sends a binary at-in the rule, until you disable the rule. To enable or disable any rule: From the tachment via Internet e-mail, NRC s In Box menu. click on Tools, Rules; highlight the rule you wish to enable or Internet gateway automatically en-disable; and chck on the enable or disable button to the right.
codes it using the UU-encoding A common use of a rule is to notify senders ofincoming mail that you are away scheme. Thus, any receiving e-mail from the office for an extended period (e.g., vacation). Such a rule could inform system that recognizes UU-encoded yot r correspondents when you will return, or give the name of a contact in your files can decode your attachment.
branch w ho can help them until you return.
Receiving e-mail with attachments CAUTIONS:
from outside the agency, via the Internet, is a more complex issue.
- a. If your rule includes a " reply" action, the " Reply box" will appear. hiake sure NRC's internet gateway can decode that you mark it for " Reply to sender," and NOT " Reply to all." If you " Reply attachments encoded with UU to all," then your reply message w.ll be sent to everyone w ho received that e-or BinHex. Such attachments will mail -- which, for network announcements, means all NRC employees! The appear in your in Box with the attach-entire agency doesn't need to bow your vacation schedule.
ment as an icon at the bottom of tk mmage
- b. Ifyour rule applies to allincoming mail. rather than mail from a specific sender, you must do the following: Click on the "From" box, and enter the two sym-hiessages encoded with newer tech-bois !@. This code exempts incoming Internet mail from the Reply rule. The niques such as N1151E cannot be de-e-mail system cannot always respond correctly to allInternet addresses. If this coded by NRC's e-mail system.
is not done, your reply might genyate an Internet error message, which would Those attachments are left in the en-be sent back to you, resulting in multiple error messages.
coded form and are included in the body of the e-mail message. They For help with e-mail rules, call the Customer Support Center at 415-1234.
appear below the body of the message, i
following a dashed line and some i
7
Inside Information Spring 1997
\\
Sender from page 7 Too Much Too little Too lote?
Please take a minute to answer the fol-l from page i lowing questions about IRM's news-and accessible to you when you open letter. You can provide feedback by your e-mail messages.
In this issue and the prevm.us one (which featured use of the World Wide tearing off (or photocopsir Ns Web),IRM used a new approach. We sheet and mailing it to me.'
ow to do it: attachment tried to make Inside InJbrmation live-about this survey will also b lier, yet also more focused on the needs you via e-mail, with instruu, m on If you.sent an e-mail attachment of computer users (that's you) and less Imw to respond usi~ng e-mail. Thanks and your recipient received al-focused on IRM. We got some positive for your help.
phabet roup, inform him or her feedback from some of you; now we llarrey Spiro that your e-mail system converts need to hear from the rest of you.
Editor, Inside Information attachments to UU-encoded for-mat. It's up to the recipient to speak to has or her on-site com-Please Circle Your. Answers to Questio gg,, (,,p,,,g,,,,g go y, Sp,u,, yS g
y puter gurus about decoding a
from that format.
USEFULNESS OF Tile NEWSLETTER:
If you receive an e-mail attach-ment that looks like a solid
- 1. Do y u generally read the IRM newsletter (Inside Information)?
stream ofletters and numbers,it
- yes
- no is probably MIME-encoded.
- 2. Has it helped you in your work at NRC't Call the Customer Support Cen-yes
_. no ter (415-1234) for assistance in conversion. If you receive a lot
- 3. Have you ever saved the newsletter or ch.pped an article for future use?
of MIME-encoded e-mail at-
- never
- sometimes tachments, you are invited to PUBLISil/NG OPTIONS participate in the MIME gate-
- 4. The newsletter is published quarterly. Printing the newsletter costs NRC less way pilot project. To receive in-than 51.00/ copy. Should IRM (circle all that apply):
f ormation about the pilot, con-tact the Network Control Center
- a. maintain current print version, keep quanerly publication schedule via e-mail (NCC).
- b. drop the publication entirely?
c drop the printed version, but replace it with a Web version only?
- d. keep publishing the printed version, and also post excerpts from the Other Ihings to keep in mind
"'RM'*h**'P"8'?
- e. keep printed version as is Make sure that you know what the
- f. publish less frequently?
original file format is. If the document was created in Word Perfect for Win-
- g. publish more frequently?
- h. don't know/ care dows or Microsoft Word and you try to read it in Woni Perf. ct 5.1.even the STYLE:
best e-mail system around can't help
- 5. The style of the articles is generally (circle all that apply):
you. Call the Customer Support Cen-
- a. too dry
- e. too technical ter to resolve that dilemma.
- b. boring
- f. too elementary Finally, if your recipient's local com-
- c. too chatty
- g. generally okay puter folks can't solve the problem,
- d. too flippant
- h. don't know/ care you might want to try sending the disk
- i. other by U.S. Mail. It may be faster in the long run.
OTilER COSIAIENTS (please tell us how we can make the newsletter more
,,,j,g go,,,y;
- 6. I'd be sure to read the newsletter ifit contained.
g.yl)3b
- 7. What I like most/least about the newsletter is.
T6 ggNDER 1 P5551'Q5'1 1 12n19R US NOC-0IrP rUPLICATICNS HAlNrH TPS-PDC-NUQEG 2 W F N -(. r 7 WtSWTNUON DC 20555