Solved

octet-stream attachment

Posted on 1998-09-12
6
1,035 Views
Last Modified: 2013-12-25
I'm a webtvplus user and have recived an e-mail with a octet-stream attachment.Because of the limited capabilities of my browser I'm unable read it.Is there a web tool or service that I could forward this e-mail to and have it converted a format my browser can read?(gif-jpg-html)
Thanks, Joe  
0
Comment
Question by:jgk3
6 Comments
 
LVL 1

Expert Comment

by:dagon
ID: 1865688
application/octet-stream - Unclassified binary data (often used for compressed file or executable)

It is unlikley to be an image or proberbly anything that a webtv can use. Email the sender and find out what it is they sent, if it is an image ask them to convert it to a jpg or a gif and send again.
0
 

Expert Comment

by:ru
ID: 1865689
Simply find a program that can read this format and manipulate the format into the
certain format that you want it to be.
0
 
LVL 1

Expert Comment

by:dagon
ID: 1865690
Not much of an option for a webtv user now is it ?
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 

Author Comment

by:jgk3
ID: 1865691
I'm using a web tv box,so even if I could find a program that can read this attachment I can't use it.Webtv is only a browser.No hard drive,no memory,no down loads.Thanks for trying,I believe I'm just S.O.L.                                                  jgk          
0
 
LVL 10

Accepted Solution

by:
MasseyM earned 100 total points
ID: 1865692
forward it to me and I will convert it for you.... If I can get it into a gif/jpg/html format I will.. If not, I will let you know..

send to:  masseym@javanet.com
Please also include your email.

Thanks,

matt
0
 

Expert Comment

by:david2022
ID: 1865693
Just exactly what is the name of the file and the 3 letter extension. There are literally thousands of sources on the net that has that information.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An enjoyable and seamless user experience can go a long way on an eCommerce site. While a cohesive layout and engaging copy play roles in creating a positive user experience, some sites neglect aspects that seem marginal but in actuality prove very …
Developer portfolios can be a bit of an enigma—how do you present yourself to employers without burying them in lines of code?  A modern portfolio is more than just work samples, it’s also a statement of how you work.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now