Solved

Setting up iNotes

Posted on 2003-11-05
8
512 Views
Last Modified: 2013-12-18
Can someone please help me.  I am having trouble setting up iNotes.  I have Lotus Domino 6.0.3 and have set up the HTTP server. I can access the server and view .nsf's but I am having trouble finding the iNotes login screen for end users.  How can i find this or do I have to make one.

Please help.
0
Comment
Question by:mor4eus
  • 3
  • 2
  • 2
  • +1
8 Comments
 
LVL 19

Expert Comment

by:madheeswar
ID: 9692081
What is the http path of iNotes ur using.
0
 
LVL 1

Author Comment

by:mor4eus
ID: 9692423
its not available on the web as yet.  It is a default install.  I can get it to work, but it doesn't like like the version 5 one.  It looks like not all is there.
Is there something else i need.
0
 
LVL 19

Expert Comment

by:madheeswar
ID: 9692432
u can use web mail redirect and can be dowladed from sandbox
0
 
LVL 19

Accepted Solution

by:
madheeswar earned 250 total points
ID: 9692450
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 9694158
Set your acl of the database like this

Anonymouse  - No Access
 Disable read/write public documents privelege

Now try opening the database

~Hemanth
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 9694276
It is Anonymous not Anonymouse !
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 9694618
Hi HemanthaKumar,
> It is Anonymous not Anonymouse !

You have something against cute little Anony mice?

Best regards,
qwaletee
0
 
LVL 1

Author Comment

by:mor4eus
ID: 9735663
Thanks for that everyone, that link helped heaps.
One last thing, does anyone know, the v6 inotes doesn't look as good as the v5 one.  Is there something I can change without changing the template back to the v5 one.

Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
This article covers general Notes 8.5 troubleshooting information including recreating the Notes\Data folder.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now