Solved

Moving Address Book

Posted on 2004-04-08
4
277 Views
Last Modified: 2013-12-18
This seems like a simple question...I have a new PC and want to move my old address book to the new install of Lotus. I tried simply renaming the names.nsf file and dumping my old one in, but it wouldn't let me login afterwards.

What is the correct procedure for doing this?
0
Comment
Question by:csho
4 Comments
 
LVL 46

Expert Comment

by:Sjef Bosman
Comment Utility
It's not only the names.nsf you have to copy. Did you also copy your old ID-file, say csho.id? That file contains the keys to open Notes, and to open the ID-file you need your old password.
0
 
LVL 24

Accepted Solution

by:
HemanthaKumar earned 250 total points
Comment Utility
If you are interested in just the contacts, then copy the old names.nsf and put it inside the new lotus data dir.

Then open the old addr book and copy all the contacts and paste it into the new one. Always keep a backup of the new names.nsf

~Hemanth
0
 
LVL 31

Expert Comment

by:qwaletee
Comment Utility
Were you able to login on the new PC before moving the old address book?  When you moved to the new PC, did you get a new ID file (changed name, or changed division, or changed company)?  Your old address book might have been locked down to the ID you used to use, in which case, if you have that old ID, you can unlock it.

Another possibility is connectivity issues.  Teh address book also contains information about how to access servers (network addresses).  If the way to rach the mail server form the new machine is different than the old (changed server, changed network address of server, different firewalls), then there might have been connection and location documents in the new PC's address book that specified how to connect, and those would have differed from old PC address book.  In that case, it may be easier to copy in the contacts and groups (which you can copy do en masse).
0
 

Author Comment

by:csho
Comment Utility
Duh...never even thought about copy and paste.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Article by: Rob
Notes 8.5 Archiving Steps and Tips This article covers setting up a Notes archive, and helps understand some of the menu choices making setting up and maintaining a Notes archive file easier.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now