Jump to content


Community Leader
  • Content Count

  • Joined

  • Last visited

  • Days Won


YongSan last won the day on May 25 2017

YongSan had the most liked content!

Community Reputation

2 Neutral

About YongSan

  • Rank
    Cloud Master

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Keeping your Sent mail folder in sync is a straightforward concept, but unfortunately, in practice, many mail applications fail to configure it correctly. The way it should work is as follows: 1. You must be using IMAP for your mail on all of your devices. 2. You must designate a single folder on the server as your Sent folder 3. You must configure your mail applications to store your sent messages on the server rather than locally 4. You must ensure that all the devices you are using recognize the single Sent folder as their ‘official’ Sent folder When you add your mail account to your mail program, it should automatically configure your Sent folder in this manner. However, in some cases, such as old versions of Apple Mail, it will automatically use a folder called “Sent Messages” instead of “Sent.” In other cases, your mail program will default to storing your sent messages locally rather than on the server, meaning you won’t have access to them on any other device. To fix Sent folder syncing issues, check your account settings to ensure that the four items above are accurate. One of your devices must have at least one of those directions incorrectly configured – fix the configuration and your Sent mail will remain synced across all of your devices. You can find the Sent mail folder configuration using the following directions. iPhone & iPad 1. Launch the Settings app 2. Choose Mail Contacts and Calendars 3. Select the account with which you would like to adjust 4. Under IMAP tap on your Account 5. Choose Advanced at the bottom 6. Under Mailbox Behaviours, tap on Sent Mailbox sync-sent-items-ipad 7. Ensure that the folder called Sent is checked off under the On the Server section sync-sent-items-ipad-2 Apple Mail 1. Open Mail and choose the Mail menu in the upper left. Select Preferences. 2. Choose the “Accounts” Tab at the top, then select the account you wish to adjust in the list on the left 3. Select the Mailbox Behaviours tab on the right ”Store sent messages on the server” should be checked. If it is not, check it. 4. Close the Preferences window and choose to save your changes if prompted. 5. Apple Mail defaults to a sent mailbox/folder named “Sent Messages”. If the option to “Store sent messages on the server” is active it will create a folder called “Sent Messages” on the server and use that folder to save copies of sent messages. This conflicts with many other applications using the folder “Sent” instead. To change the default sent mailbox for Apple Mail first: a) select the Sent folder on the server (in the folders pane on the left) b) Then chose Mailbox from the menu c) Select Use this Mailbox for > d) and then choose Sent Outlook for Windows 1. Select the Tools menu, then choose Account Settings 2. Go to the Email Tab if it’s not already selected 3. Select the email account for which you wish to adjust the Sent folder, then choose the Change button 4. Choose the More Settings button at the bottom of the newly opened window 5. Click the Folders tab 6. Select Choose an existing folder to choose the Sent folder you want Outlook to use for Sent messages 7. Click OK to save Android 1. From the inbox, press your menu button. Click Settings, then Account Settings. 2. Click on Folders. 3. You can re-map the indicated folder by clicking on it. You will receive a list of the folders available. sync-sent-items-android-1 4. Select the Sent folder. Thank you :) View the full article
  2. Nobody wants to fall prey to a phishing scam. There’s a good reason that such scams will continue, though: They are successful enough for cybercriminals to make massive profits. Phishing scams have been around practically since the inception of the Internet, and they will not go away any time soon. Fortunately, there are ways to avoid becoming a victim yourself. Here are 10 basic guidelines in keeping yourself safe: 1. Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about them as early as possible, you will be at much lower risk of getting snared by one. For IT administrators, ongoing security awareness training and simulated phishing for all users are highly recommended in keeping security top of mind throughout the organization. 2. Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn’t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link. 3. Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. This is just one more layer of protection against phishing scams, and it is completely free. 4. Verify a Site’s Security – It’s natural to be a little wary about supplying sensitive financial information online. As long as you are on a secure website, however, you shouldn’t run into any trouble. Before submitting any information, make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well. If you get a message stating a certain website may contain malicious files, do not open the website. Never download files from suspicious emails or websites. Even search engines may show certain links which may lead users to a phishing webpage which offers low-cost products. If the user makes purchases at such a website, the credit card details will be accessed by cybercriminals. 5. Check Your Online Accounts Regularly – If you don’t visit an online account for a while, someone could be having a field day with it. Even if you don’t technically need to, check in with each of your online accounts on a regular basis. Get into the habit of changing your passwords regularly too. To prevent bank phishing and credit card phishing scams, you should personally check your statements regularly. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge. 6. Keep Your Browser Up to Date – Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit. If you typically ignore messages about updating your browsers, stop. The minute update is available, download and install it. 7. Be Wary of Pop-Ups – Pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Many popular browsers allow you to block pop-ups; you can allow them on a case-by-case basis. If one manages to slip through the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead, click the small “x” in the upper corner of the window. 8. Never Give Out Personal Information – As a general rule, you should never share personal or financially sensitive information over the Internet. This rule spans all the way back to the days of America Online when users had to be warned constantly due to the success of early phishing scams. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”. 9. Use Antivirus Software – There are plenty of reasons to use antivirus software. Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date. New definitions are added all the time because new scams are also being dreamed up all the time. Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. Firewall protection prevents access to malicious files by blocking the attacks. Antivirus software scans every file which comes through the Internet to your computer. It helps to prevent damage to your system. You don’t have to live in fear of phishing scams. By keeping the preceding tips in mind, you should be able to enjoy a worry-free online experience. Thank you :) View the full article
  3. “The connection to the server was interrupted” error is the most common error when you try to send emails. You can take the solutions below to do away with it. This error can be triggered when your computer is not connected to the Internet. Of course, apart from it, there are multiple other reasons. The followings are relevant causes and effective solutions to “The connection to the server was interrupted” error. Outlook Error: The connection to the server was interrupted 1. Check Your Computer Network Connectivity As a rule, this error tends to show up if your computer isn’t connected to the valid Internet. Thus you should check the network connectivity in the first place. Open your Internet Browser, and type any website URL in the address bar. Press “enter” key. If the website opens normally, this error is caused by other factors. But if not, proceed to deal with the network connectivity problems. Check Your Computer Network Connectivity 2. Turn off the Firewall and Re-add the Incoming and Outgoing Server Name Another common reason is that windows firewall doesn’t allow Outlook to access the Internet. So you should turn off the firewall. The method will expose Outlook to network attacks. But in order to exclude this reason, you ought to have a try. Close Outlook and go to “Control Panel”, in which click on “Network and Internet” option. Then in the subsequent screen, click “Network and Sharing Center”.Network and Sharing Center Next, in the bottom left corner, locate and click “Windows Firewall”. And in the following page, click on “turn Windows Firewall on or off” link. In the final interface, you can turn off the windows firewall. Turn off Windows Firewall Eventually, you should restart Outlook and re-add the incoming and outgoing server name in Outlook “Account Settings”. After completing the above steps, you should verify if the problem is solved or not. If the error persists, you should turn on the firewall immediately to protect Outlook from being attacked by viruses or spyware. 3. Re-define Send/Receive Groups If You Are Using an IMAP Email Account Besides, the faulty send/receive settings in an IMAP email account can trigger the issue as well. Perform the operations below. Go to “File” > “Options” > “Advanced” option. Then under “Advanced” tab, locate and click “send/receive” button.Send/Receive Button in Outlook Options In the popup dialog, click the “Edit” button. Next, in the subsequent dialog box, deselect the option “Get folder unread count for subscribed folders” and select “Use the custom behavior defined below”.Re-define Send/Receive Groups in IMAP Email Account In addition, at the bottom, you should choose the Inbox folder only. Finally, click a series of “OK” to save the changes. When finishing, try to send emails again. 4. Start Outlook in Safe Mode to Verify Add-ins Should Be to Blame Supposing that all the methods above can fix this error, there are great chances that one of the existing add-ins is the criminal. Thus you should probe into this reason. Close Outlook and head to Start Menu. In the search field, type “outlook.exe /safe” and press “Enter”, which will start Outlook in safe mode. Start Outlook in Safe Mode Then go to “File” > “Options” > “Add-ins” > “Go”. In the next popup dialog, remove one add-in at a time and restart Outlook normally to check if the add-in is to blame. Remove Outlook Add-ins 5. Scan and Fix Outlook Errors via Scanpst.exe If all of the above fails, it is possible that the error stems from a corrupted Outlook file. Then you can repair it via Scanpst.exe. Searching “Scanpst” in the Explorer can help you locate the tool with effortless ease. Then you can launch it and follow the instructions to finish repair the file. Scan and Fix Outlook Errors via Scanpst.exe 6. Opt for a Formidable External Repair Tool At times, corruption may be greatly beyond the capacity of Scanpst.exe. In this situation, you should pick out a potent external repair tool like DataNumen Outlook repair. This tool is well versed in Outlook recovery. Therefore, it can scan and fix Outlook errors with minimized corruption. View the full article
  4. Overview Content rot has a tendency to creep up on you as a website or application ages. The last thing your visitors want when they reach your site, after clicking a link to it, is to be face planted with a 404 error. To make matters worse, too many 404s will have an impact on your search engine site rankings. We can battle 404s with redirect rules written in our Nginx configurations. The rules can either suggest to the web browser, search engine and anything that the content has permanently moved, or we suggest the content has only moved temporarily. Either way, you have a chance to guide the user to the new location of your content in a transparent manner. Permanent Vs. Temporary Two types of redirects exist. As you probably figured out from the heading, we can do either a permanent redirect (301) or a temporary redirect (302), depending on what our needs are. A permanent redirect tells user agents, including search engines, to update their indexes to replace the link with the new location, whereas temporary redirects instruct user agents to continue using the old one, but follow the request to a new path. If you are unsure whether the redirect is going to be permanent or not, always start off with a temporary redirect. Undoing a permanent redirect may mean users will be unable to access your content or application for an extended period of time. For web client, that means after the caches are cleared. However, for a search engine, it could take several days or weeks to update. Redirecting Domains You may want to direct your users to a completely new domain, or maybe you want to enforce traffic to funnel through a single domain, such as to a ‘www’ address. server { listen 80; server_name www.example.com } server { listen 80; server_name example.com return 301 http://www.example.com } We can also use a so-called wildcard domain to redirect all requests, except those going to a specific domain. In the example below, all traffic redirected to www.example.com, excluding any request going to directly to www.example.com and any going to www.myblog.com. server { listen 80; server_name www.myblog.com } server { listen 80; server_name www.example.com } server { listen 80; server_name _; return 301 http://www.example.com } Redirect URI Matching Within the server block of our application server, location blocks are used to match against a request URI that needs to be redirected. server { listen 80; server_name example.com location = /post/learning-nginx-redirects { return 301 http://example.com/articles/nginx/how-to-do-redirects/ } } Matching URLs Sometimes you want to match against several URI’s based on a pattern using regex, other times you want to match against anything that starts with a particular string, and finally, you may want to match against an exact string. Exact URI When you want to match an exact URI, you would write the following rule. location = /post/learning-nginx-redirects { return 301 http://example.com/articles/nginx/how-to-do-redirects/ } Matching URI Path There are times you may want to redirect anything under a specific path. The only difference between path matching and exact URI matching is the absence of the equals sign. location /post { return 301 http://example.com/articles } Matching URI Patterns location ~ ^/post/(.*) { rewrite ^ http://newexample.com/articles/$1; } Creating a Temporary Redirect When using the return option, we use status code 302 to set the redirect as temporary. location /post { return 302 http://example.com/articles } Creating a Permanent Redirect When using the return option, we use status code 301 to set the redirect as permanent. location /post { return 301 http://example.com/articles } Thank you. View the full article
  5. Change the pc app cache location Normally the system finds the drive with most space on it an sets the local cache. To change it you have to change a configuration file. Do the following Close the program. In fileExplorer in the path bar type %localappdata% In there a hidden folder called RfUserData is located. In the folder there are a file called ClientPcConfiguration.cfg. In this file there are some JSON. On 3 different values the drive is set. There are many other values in the configuration, but don't change any of them. Here is a example of the cache located on D: Set this to the drive of your preference, her the cache is moved from "d" to "e" by changing the "d:" with "e:" Then copy the RushFiles folder from the old location to the new. Start the program again. View the full article
  6. 1. Login to Readyspace customer portal 2."Home" > "More services". 3. Click on Qmail tab 4. Click on Add New Mailbox 5. Select New Service User and click Next 6. Enter your Display Name, Email address & password Passwords must be at least 7 different characters include uppercase and lowercase letters, numbers, and special characters(# $ %) The password cannot contain any of your Account information like address, phone number, contact name & etc Or you can click on Generate new password, the system will randomly generate a set of password for you 7. Click on Next If the system prompt you that Service User already exists, please refer to Add email to existing service user instead 8. In the subsequent page, you can set your preferred setting (or leave as default) and click NEXT 9. Select Webmail access and click on Next 10. And click on FinishView the full article
  7. Please follow the below steps for enabling 3-panes and 3-columns layout in the Horde webmail: 1: Login to webmail >> Edit options >> select global options 2: Choose Display options 3: Then Tick show the horde menu on the let. View the full article
  8. Symptoms Unable to read mail in Horde with the following error: ================== IMAP error reported by the server ================== The following message appears in /var/log/maillog while accessing mailbox: ================== dovecot: service=imap, user=user@example.com, ip=[]. Fatal: master: service(imap): child 688159 returned error 83 (Out of memory (service imap { vsz_limit=256 MB }, you may need to increase it) - set CORE_OUTOFMEM=1 environment to get core dump) ================== The following error appears in /var/log/maillog during working in webmail interface: ================= Error: mmap(size=0) failed with file /var/qmail/mailnames/example.com/user/Maildir/dovecot.index.cache: Cannot allocate memory and the size of the file /var/qmail/mailnames/example.com/user/Maildir/dovecot.index.cache is more than the default "vsz_limit" value: # ls -alh /var/qmail/mailnames/example.com/user/Maildir/dovecot.index.cache -rw------- 1 popuser popuser 500M Feb 27 11:21 /var/qmail/mailnames/example.com/user/Maildir/dovecot.index.cache # doveconf | grep default_vsz_limit default_vsz_limit = 256 M ================== Cause The maximum limit for Dovecot process address space is reached. Resolution Connect to the server via SSH; Increase vsz_limit value in the dovecot configuration file by adding the following configuration: # touch /etc/dovecot/conf.d/99-vsz.conf # cat /etc/dovecot/conf.d/99-vsz.conf service imap { vsz_limit = 512MB } Restart dovecot service: ================== # service dovecot restart ================== View the full article
  9. If you’ve had trouble finding a sent email from your Mac on your iPhone or iPad, it may not be anything you’re doing wrong. It’s possible that your Mac is putting its sent mail into a local folder instead of up on the server, which is certainly not ideal. Please follow the steps for resolving the issue. When the Preferences window opens, click on the “Accounts” tab, and then select the problematic account from the sidebar. When you do that, you can choose the “Mailbox Behaviors” tab: Under “Mailbox Behaviors” is the drop-down for “Sent Mailbox.” If you click that, you’ll likely note that yours is set to store sent emails under the “On My Mac” section like mine is above; switch that to the “Sent” or “Sent Messages” folder under the server section at the top, and you should be good to go. Note, however, that if you do this, your existing sent mail from that account may appear under the “On My Mac” area in Mail’s sidebar instead of within the sent mailbox near the top: If that’s the case for you, you could consider moving the messages from “On My Mac” into the newly created sent folder for that account if you need your old stuff to sync, too. You’d do this by clicking on the sent folder underneath “On My Mac,” pressing Command-A to select everything within it, and then dragging those emails to the correct sent folder near the top of the sidebar, like so: Then everything should sync to the same folder on your iPhone or iPad! View the full article
  10. 1. Login to your customer portal Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Find the "More Services" Option at the bottom of the page 3. Click on "More Services" to access the CCPv1 interface. View the full article
  11. 1. Login to your customer portal Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Find the "More Services" Option at the bottom of the page 3. Click on "More Services" to access the CCPv1 interface. View the full article
  12. 1. Login to your customer portal Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Find the "More Services" Option at the bottom of the page 3. Click on "More Services" to access the CCPv1 interface. View the full article
  13. 1. Login to your customer portal Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Find the "More Services" Option at the bottom of the page 3. Click on "More Services" to access the CCPv1 interface. View the full article
  14. YongSan


    Microsoft Installer (MSI) The latest version of the installer file can be downloaded here. This installer has default RushFiles branding. If a branded version is needed please contact RushFiles for a dedicated download link. Zip distribution Get the latest version of the RushFilesVDI client from here. If a new client is available, you will receive information in advance. Login to the TS server as an administrator In a folder of your choice, but available for all users,unzip the VDI client.(we will call it the RFfolder) Create a subfolder in the RFfolder called “\FirstTime\Skinning\ ”If you have a custom branding. Place a copy of the skinning files in this folder If you have a skinned pc client installed they can be retrieved from there Go to %localappdata% --> RushFilesV2 --> FirstTime --> Skinning and the skinning files will be available there Run the file installer procedure Start a command line as administrator If necessary, navigate to the RFfolder ( cd "path_to_the_rffolder" ) Execute the installer with the following command : installer.exe /G .Thisexe is made to run in silent mode so you will not see anything on screen, but it should create a log file called "Installer logfile[current date].txt". INSPECT the log file to see if any of the installed components require restart / failed. If so, the machine needs to be restarted to allow shell extension DLLs to be replaced. If restart is not possible, one can try to find programs with open handles to the locked files inside of RFFolder and close them. If the computer has been restarted / programs blocking the DLLs closed, invoke the installer.exe /Gagain. In the RFfolder, there is a file called ProgramPcConfiguration.template.cfg This is a TEMPLATE for the configuration of the VDI client Rename it to ProgramPcConfiguration.cfg(the .cfg may not be visible, depending on you settings) This will make it “Your” copy of the file, and ensure that we do not overwrite any setting, you make to the configuration. Open then file in notepad.exe or similar program Change the settings accordingly to your installation needs. Close/save the configuration. The VDIClient is now ready, to be used. On the user’sdesktop place ashortcut that will start the RfClientPCV2.exe Change the icon on the shortcut to be the program icon from the “\FirstTime\skinning\”folder. When running a terminal server farm, using roaming profile from a UNC path it’s important that an user can’t have more than one concurrent session. Updating the client To update the VDI client Use the same procedure as installation, except the skinning. 1. All users must be logged off / exit the client, or the .dll's will be locked. 2. Download the newest version from the website (link in the installation guide) 3. Unzip the new client into the folder where the client is installed (for all clients) 4. No need to update skinn as that is already there. 5 Run the installer to update the driver Done. Additional information At the applications setting page you can set the time period for keeping local files. The cashing feature also allows RushFiles to be deployed in a VDI environment, when the cashing is set to 0 days, any cashed files will get deleted when the user logs of the VDI. The client is the same as the normal desktop client. It’s just the setting that’s makes the difference. Thank you :)View the full article
  15. YongSan

    Email Account Sync in Android

    To adjust the sync frequency settings for your personal email, view this info.  The available settings may vary depending upon the email account type. 1) From a Home screen, navigate: Apps icon  > Settings  > Accounts. 2) Tap Email. 3) Tap Account Settings. 4) Tap the appropriate email address (below "General settings").  5) Multiple accounts may appear. 6) From the Data Usage section, tap Sync frequency. Select one of the following: * Never * Every 5 minutes * Every 10 minutes * Every 15 minutes * Every 30 minutes * Every hour View the full article