Configuring Outlook 2010 to check AOL email
To configure Outlook 2010 to check an AOL email account, take the following
steps.
-
Open Outlook and click on Next at the startup window.
-
When prompted as to whether you would like to configure an E-mail account,
maintain the default option of "yes" and click on Next.
-
At the Add New Account window, choose "Manually configure server
settings or additional server types" and then click on Next.
-
At the Choose Service window, maintain the default option of
"Internet E-mail" and click on Next.
-
At the Internet E-mail Settings window, you will need to
provide the relevant information for your AOL email account. In the
username field, include "@aol.com" as part of the user name, e.g.,
jdoe@aol.com. You will also need to choose
whether you will access your AOL email account using the
Post Office
Protocol (POP) or the
Internet Message Access Protocol (IMAP). The default option is
POP3, version 3 of POP. With that option, the email in your inbox will
be downloaded to Outbox and deleted from the server after a specified
period of time; by default Outlook will leave it on the server for 14 days.
If you log into the AOL website to check your
email after you've downloaded it with Outlook and delete a message while
viewing your email in a browser, it won't be available to download with
Outlook, if you subsequently check your AOL email with Outlook, although
that may not matter to you. A disadvantage of using the POP protocol is
that it only downloads email from the inbox, not any other folders you
may have created to hold specific email messages. Also, by default email
is deleted from the email server after you download it to Outlook, so email
you've already downloaded won't be visible to you if you check your email
through a web browser at a later time—by default Outlook will leave
the email there for 14 days, though. You can change that setting, though, once
you've filled in account information by clicking on the More Settings
button, then clicking on the Advanced tab and choosing how long
a copy of messages should be left on the server.
If you select IMAP for the account type, you can view email in
other folders besides the inbox and Outlook's view of the email in your
account is synchronized with the email messages maintained on the AOL email
server, so you can check with a web browser or with Outlook and see the
same messages in your email folders. You could also set up Outlook on another
system and select IMAP there as well to see the same email messages on
a separate system where you are using Outlook.
The information you should put in the incoming mail server and
outgoing mail server fields is as follows:
Protocol | Server | Port Settings |
POP3 | Incoming mail server (POP3): pop.aol.com
Outgoing mail server (SMTP): smtp.aol.com |
POP3: 995-SSL SMTP: 465-SSL |
IMAP | Incoming mail server (IMAP): imap.aol.com
Outgoing mail server (SMTP): smtp.aol.com |
IMAP: 993-SSL SMTP: 465-SSL |
Put a check mark in the "Remember password"
check box, if you don't want to have to enter your password every time
you open Outlook to check your email.
[ More Info ]
[/network/email/AOL]
permanent link
Book Collector - Adding an author or publisher image
If you are using
Book Collector to track your book
collection and wish to add a photograph of an author to the information about
the author, you may be able to do so by taking the following steps:
-
Download the image of the author. If you wish, you can place the image in the
location where book cover images are stored, i.e. the
images
directory beneath the Book Collector directory where you store the book
database.
-
If you are editing an entry for a book by the author, you can right-click on the
icon of three horizontal bars to the left of the author's name while editing
the book entry and select "Edit this author entry." Or from the main Book
Collector window, you can select "Edit" then "Manage Pick Lists" to select
the author picklist where you can select the relevant author—you can
double-click on the author entry then to edit it.
-
In the Edit Author window, click on the Images tab.
-
For the "Template Image" field, browse to where you downloaded
the image of the author. Once you have selected the image, click on OK.
Leave the "Image (will be scaled to 16x16)" field blank.
You can then close the entry where you are editing the author's information.
When viewing the entry for a book by the author from the book list in
the home screen for Book Collector, you should then see a small thumbnail
picture of the author.
If you don't have an image, but want to add a picture to the author's
entry, check to see if there is a
Wikipedia entry for the author or if
the author has a website.
You can use similar steps to add an image for a publisher's entry in
the database.
[ More Info ]
[/software/database/collectorz]
permanent link
Verifying a website's security certificate with openssl
You can verify a website's security certificate from a command line
interface (CLI), such as a shell prompt, by using
OpenSSL, which is
available for Linux, macOS, Microsoft Windows and other operating systems
— for a Windows version, see the instructions at
How to install the most recent version of OpenSSL on Windows 10 in 64 Bit.
To check a certificate, you can issue the command openssl s_client
-connect example.com:443 -showcerts
, substituting the
fully
qualified domain name (FQDN) of the site you wish to check for
example.com
. The output for example.com is shown below.
$ openssl s_client -connect example.com:443 -showcerts CONNECTED(00000003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = US, ST = California, L = Los Angeles, O = Internet Corporation for Assigned Names and Numbers, OU = Technology, CN = www.example.org
verify return:1
---
Certificate chain
0 s:/C=US/ST=California/L=Los Angeles/O=Internet Corporation for Assigned Names and Numbers/OU=Technology/CN=www.example.org
i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
-----BEGIN CERTIFICATE-----
MIIHQDCCBiigAwIBAgIQD9B43Ujxor1NDyupa2A4/jANBgkqhkiG9w0BAQsFADBN
<text snipped>
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
Session-ID: 907C391C745555481A141A04D65B7CD175BD5E052FF39EFD17B30848D535F0D1
Session-ID-ctx:
Master-Key: 9DC337D789BB8DB7CCE82BBC3EAD28C4A9E98016C98D35AD9A6B737C0B76AE3118881303F7E7890BEE0567FFC402B5F9
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - b1 7d 3a 56 0e 17 8f 5a-37 b0 4b 03 dd de 8d 98 .}:V...Z7.K.....
0010 - 59 36 bb 73 43 e2 95 2a-9b 2e de ef 99 5e 92 d8 Y6.sC..*.....^..
0020 - 3a 16 b6 4d 78 2b c6 a4-58 a5 5b 2e c0 8a 1f a6 :..Mx+..X.[.....
0030 - e6 35 dd 8d 77 fb 4e 09-82 94 c0 8c 6e f8 56 41 .5..w.N.....n.VA
0040 - 9a bb 82 a6 b1 30 5d bc-38 24 00 9c a6 a3 10 c5 .....0].8$......
0050 - 6f cc e8 c8 25 62 6f e0-8f 7d 1a d9 18 6a db 32 o...%bo..}...j.2
0060 - 48 07 df b0 15 fc 98 a0-5d 27 93 df 20 4c 6c ae H.......]'.. Ll.
0070 - cf 95 23 49 d0 c0 57 10-c1 8b 12 fa b0 c4 33 41 ..#I..W.......3A
0080 - 2f 21 cf df dc 9a 1f 44-68 a3 76 81 0f b8 04 ab /!.....Dh.v.....
0090 - 59 e7 c4 29 79 28 f9 45-43 82 b9 a0 5a e5 6d 5a Y..)y(.EC...Z.mZ
Start Time: 1592522720
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
closed
$
If you wish to check on whether a particular
cipher is supported, you
can use the command openssl s_client -cipher
followed by the
particular cipher for which you wish to connect and then -connect
followed by the FQDN, a colon, and then the HTTPS port, port 443, as shown
below for example.com. If you see the response "handshake failure" as in the
example below, the cipher is not supported.
$ openssl s_client -cipher 'ECDHE-ECDSA-AES256-SHA' -connect example.com:443
CONNECTED(00000003)
140497569793952:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:s23_clnt.c:769:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 121 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
Start Time: 1592522976
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
$
If the cipher is supported, you will see "connected" instead, as shown
below.
$ openssl s_client -cipher 'ECDHE-RSA-AES128-GCM-SHA256' -connect example.com:443
CONNECTED(00000003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = US, ST = California, L = Los Angeles, O = Internet Corporation for Assigned Names and Numbers, OU = Technology, CN = www.example.org
verify return:1
---
Certificate chain
0 s:/C=US/ST=California/L=Los Angeles/O=Internet Corporation for Assigned Names and Numbers/OU=Technology/CN=www.example.org
i:/C=US/O=DigiCert Inc/CN=DigiCert SHA2 Secure Server CA
<text snipped>
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 27 d3 5d a3 cf ac 34 0b-92 af c6 00 17 0d 15 bc '.]...4.........
0010 - 6b be b4 92 dc 1a 01 97-98 9c f4 2b 68 f7 fd 69 k..........+h..i
0020 - 1c fd 25 16 21 ba aa f9-43 2b 1a 4b 54 d8 48 37 ..%.!...C+.KT.H7
0030 - 90 f7 2f 3f 76 d1 88 22-cf db 43 77 55 40 d2 41 ../?v.."..CwU@.A
0040 - c8 3a 8c f5 75 02 9b 88-92 92 38 f3 53 46 e7 48 .:..u.....8.SF.H
0050 - 9a bf 2d db 78 00 cd 12-2c 30 fc f8 81 20 e9 89 ..-.x...,0... ..
0060 - c0 8f 3c e3 e6 22 69 af-cb cd b0 ec dd 06 1b c9 ..<.."i.........
0070 - f3 82 cb ee 85 f1 c8 6a-27 29 5b 42 7e bb 87 60 .......j')[B~..`
0080 - c3 17 4a ff 54 41 b3 1a-8e 3b e3 30 b6 48 fa 9d ..J.TA...;.0.H..
0090 - b3 50 a5 2b 73 8d 59 16-4c fd b4 24 54 48 14 08 .P.+s.Y.L..$TH..
Start Time: 1592523392
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
closed
$
[/security/encryption/openssl]
permanent link
Resetting a HostGator cPanel Password
If you are hosting a website through
HostGator,
you can take the following steps to reset the
cPanel
password for the HostGator account associated with the website:
- Click on Manage, which is under Hosting Packages.
- Click on Settings.
- Click on Reset Password.
- You will see the username you should use under Username. You
will also see the
fully qualified domain name (FQDN), e.g.,
serverxxxx.hostgator.com, where "xxxx" is a four-digit number, of the
server you will connect to under Server. Or you can use the IP
address shown, instead. Click on Reset Password.
- When prompted for a new password, enter one that is a minimum of 8
characters in length with a mixture of uppercase and lowercase characters
(at least one of each) and which also contains at least one digit and one
special character, such as a dash, exclamation mark, dollar sign, etc. Click
on the Change Password button to reset the password.
[/network/web/services]
permanent link
Call from 616-465-0071 purporting to be from Amazon
My wife received a call today that was a recorded message purportedly about
a suspicous Amazon charge for an
iPhone.
She asked me to pick up the phone, but by the time I got to the phone the
call was disconnected. I used *69 to determine the calling number was
1-616-465-0071, though of course the number may have been spoofed. I
searched online and didn't find anyone else reporting a fraudulent call
from that number purporting to be from Amazon. I checked our Amazon
account just to be certain there was no recent charge for something
neither of us ordered, but I didn't see anything ordered after a recent purchase
of ink for my wife's printer. I tried calling the number using *69 just to see
whether I could get anyone at the other end or any identifying voice
message, but only got the message "I'm sorry we can not connect your
call at this time." Subsequent attempts I made to call the number resulted
in a busy signal. At this point, I'm presuming the call was an attempt
by a scammer to obtain information about our Amazon account or a credit
card number associated with the account.
[/security/scams]
permanent link