Solved

Saving images with text in Netscape

Posted on 1997-12-14
5
222 Views
Last Modified: 2010-04-12
Netscape communicator does not save images together with text when using Save as (page). How can I make it save altogether. ?
0
Comment
Question by:Boby
  • 3
  • 2
5 Comments
 

Accepted Solution

by:
einarbe earned 50 total points
ID: 1017234
1. Go to "File-save as" and save the document to disk.
2. Point at every individual graphic element in the document, right-click and "Save image as" (A little depending on your version number).
3. Save the image in the same directory as the previous document.
4. Now you can load the document from disk through "File-Open page (Or file)"
5. If the images are not visible, you have to edit the html code of the document, removing the original paths to the images. Open the file f.inst. in notepad, look for "IMG.SRC...". When you find the name of the image, remove the original path, leaving the image name, with an "/" before it.
0
 

Author Comment

by:Boby
ID: 1017235
I cannot grade until I test.I'll be glad to do it once
tested
0
 

Author Comment

by:Boby
ID: 1017236
Look, your suggestion is ,although possible, a little bit complicated. Imagine if I have to change the source code of
every page I download for every page on the document.
Isn't there a more "automatic" way ?
boby
0
 

Expert Comment

by:einarbe
ID: 1017237
Hello, I thought you might find this method a little cumbersome, but I did not know exactly what you where after, a one time or a routine operation.
There are lots of programs that can do the job for you, but then you must be prepared to pay some $$.
At http://cws.internet.com/32agents.html you can read about such programs, "internet agents" many of which you can try for free. Good luck!
0
 

Author Comment

by:Boby
ID: 1017238
THANK YOU EINARBE
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Motherboard powers up but does not post or boot 11 84
Automotive battery with UPS 4 37
Drivers  Repository for Win 7 13 58
Management Engine Interface 4 35
This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question