Solved

Deleting Attachments via Web

Posted on 2002-03-07
6
246 Views
Last Modified: 2013-12-18
When deleting an attachment via the web it seems to create a blank attachment name ATTxxxxx where x is a bunch of numbers.  the attachment contain a text file  "_click". How can i stop this from happening?

Thanks in advance.
0
Comment
Question by:fayeb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 6847163
How are you deleting the attachments ? Script or manually !

~Hemanth

0
 

Author Comment

by:fayeb
ID: 6847255
manually by placing document in edit mode and checking the box to select the attachment for deletion
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 6847312
BTW, what is the version of Domino ?
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:fayeb
ID: 6847315
5.09
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 6847362
I don't know exactly what the problem could be unless I can see it. Is it possible for you to send the db with minimal docs with attach to this id, hemanthakumark@bigfoot.com

0
 

Accepted Solution

by:
giusepe earned 200 total points
ID: 6859739
I recommend you to read these two articles in the Jakes's Codestore website that talk about the way to control how the attachments are removed ( part I and II ).

Article I
http://www.codestore.net/A55692/store.nsf/all/CA6E3FFCD0C3D3B08625696C00467DE9?OpenDocument

Article II
http://www.codestore.net/A55692/store.nsf/all/A1001D27C5C74B5C862569DC0049C4A9?OpenDocument

Hope this help you !!

giusepe
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
This article covers general Notes 8.5 troubleshooting information including recreating the Notes\Data folder.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question