Solved

Notes Attachment Files

Posted on 2000-03-26
2
199 Views
Last Modified: 2013-12-18
can a user see the attachment files such as Tif,gif,jpeg,word,excel without necessarily having the software installed on the PC they access their e-mail from.This is with respect to accessing the e-mail from the browser(web user).If so, how to view the files?
0
Comment
Question by:ina57
2 Comments
 
LVL 17

Expert Comment

by:calacuccia
ID: 2662251
Hi Ina57,

The files of type .tif .gif and .jped can be viewed by almost every PC with standard software on it.
For Word and Excel, you'll need the programs themselve, or a Word and Excel viewer (can be downloaded from MicroSoft site), ore another spreadsheet/text editor compatible to import Excel/Word files.


Calacuccia
0
 
LVL 3

Accepted Solution

by:
sreenathk earned 5 total points
ID: 2773852
There is no way without proper s/w to view the attachments. ou need to have the appropriate s/w to view or read the attachments.
That is the point where whole industry is making money. Otherwise there will be single form of file which can be viewed by anybody, there will not be any different  types of files



0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For users on the Lotus Notes 8 Standard client, this article provides information on checking the Java Heap size and adjusting it to half of your system RAM in attempt to get the Lotus Notes 8.x Standard client to run faster.  I've had to exercise t…
Notes Document Link used by IBM Notes is a link file which aids in the sharing of links to documents in email and webpages. The posts describe the importance and steps to create a Lotus Notes NDL file in brief.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question