Posted on 2001-07-08
Last Modified: 2013-12-18
How to add a disclaimer at the end of every outgoing mail ? I tried the mtaforms.nsf, but it didn't work.
Thank you
Question by:fangfei

Expert Comment

ID: 6264978

Author Comment

ID: 6267343
Sorry to let you know that this is version 4.6a not 5

Accepted Solution

a_murray earned 10 total points
ID: 6268772
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.


Expert Comment

ID: 6724365
fangfei---->  You've asked 27 questions here, but only finalized 10 of them.  This, as you'll agree, isn't fair to the experts who have stepped in to help you.  PLEASE RETURN AND UPDATE/FINALIZE all of them.  If more is needed, provide feedback in that regard.  If you've been helped, please accept the Expert's information as the Accepted Answer to then grade and close it.

If you need help to split points among multiple contributors, post comment here with details and I'll return as quickly as I can to help you accomplish that.

I am updating all your open questions with this information to make it easy for you to navigate through them and finalize them.

Thank you,

Community Support Moderator @ Experts Exchange

Expert Comment

ID: 6872724

ADMINISTRATION WILL BE CONTACTING YOU SHORTLY.  Moderators Computer101 or Netminder will return to finalize these if still open in seven days.  Please post closing recommendations before that time.

Question(s) below appears to have been abandoned. Your options are:
1. Accept a Comment As Answer (use the button next to the Expert's name).
2. Close the question if the information was not useful to you. You must tell the participants why you wish to do this, and allow for Expert response.
3. Ask Community Support to help split points between participating experts, or just comment here with details and we'll respond with the process.
4. Delete the question. Again, please comment to advise the other participants why you wish to do this.

For special handling needs, please post a zero point question in the link below and include the question QID/link(s) that it regards.
Please click the Help Desk link on the left for Member Guidelines, Member Agreement and the Question/Answer process.

Please click you Member Profile to view your question history and keep them all current with updates as the collaboration effort continues, to track all your open and locked questions at this site.  If you are an EE Pro user, use the Power Search option to find them.

To view your open questions, please click the following link(s) and keep them all current with updates.

This question is locked with a proposed answer, if it served you, please accept it to grade and close it.  If not, reject it and comment as to why.

------------>  EXPERTS:  Please leave any comments regarding your closing recommendations if this item remains inactive another seven (7) days.  Also, if you are interested in the cleanup effort, please click this link

7 days, if still open, Moderators will return to close it either by awarding expert(s), moving to our PAQ or deleting it.  Expert input most appreciated to determine the fair outcome.
Thank you everyone.
Moderator @ Experts Exchange

P.S.  For any year 2000 questions, special attention is needed to ensure the first correct response is awarded, since they are not in the comment date order, but rather in Member ID order.

Expert Comment

ID: 6958027
Force-accepted by
CS Moderator

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

For users on the Lotus Notes 8 Standard client, this article provides information on checking the Java Heap size and adjusting it to half of your system RAM in attempt to get the Lotus Notes 8.x Standard client to run faster.  I've had to exercise t…
I thought it will be a good idea to make a post as it will help in case someone else faces these issues. I trust this gives an idea how each entry in Notes.ini can mean a lot for the Domino Server to be functioning properly. This article discusses t…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now