Solved

Received .mlf file in email.  Help opening!!!

Posted on 2004-04-29
4
1,021 Views
Last Modified: 2011-10-03
We received a file with extension .MLF and we aren't sure what it opens with.  Ran numerous searches on google and didn't find anything consistent.  I've read about it being used with pictures and possibly being used with LINUX.  Any ideas on how to open this file?  It's been scanned for viruses, so it's not malicious.  
0
Comment
Question by:bunipres
  • 3
4 Comments
 
LVL 16

Expert Comment

by:JamesDS
ID: 10949008
bunipres
Try this:

http://filext.com/detaillist.php?extdetail=MLF
http://discussion.autodesk.com/thread.jspa?threadID=303346

I searched google for the string "MLF file"

Cheers

JamesDS
0
 
LVL 16

Accepted Solution

by:
JamesDS earned 125 total points
ID: 10949016
bunipres
It may also be possible to open the file in notepad and look in the first few bytes for a header with a product name in it.

Cheers

JamesDS
0
 

Author Comment

by:bunipres
ID: 10950726
Opened in notepad, and I found it was a Groupmax Mail File.  Requires some strange Japanese software to open.  Thanks JamesDS.
0
 
LVL 16

Expert Comment

by:JamesDS
ID: 10950924
JamesDS
Great!

Glad to help

Cheers

JamesDS
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question