Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Attachments Removed from Email: How to get around this?

Posted on 2009-05-16
10
Medium Priority
?
455 Views
Last Modified: 2013-12-17
I sent a photograph (jpeg format) to a colleague  as a file attachment. While he received the email he was told that the attachment had been removed for safety. Is there a way around this so that the photograph can be received?
0
Comment
Question by:Michael Murphy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 4
10 Comments
 
LVL 98

Expert Comment

by:John Hurst
ID: 24404258
A way that usually works is to zip the file up into somefile.zip and send that to your user. XP will natively unzip a properly zipped up file and the receiving system should not remove a ZIP file. ... Thinkpads_User
0
 

Author Comment

by:Michael Murphy
ID: 24404451
How do I zip up the file?
0
 
LVL 98

Accepted Solution

by:
John Hurst earned 500 total points
ID: 24404462
I use WinZip to zip files. Very professional program and available on an evaluation basis. If you like it, it is very inexpensive.  You can also zip things up natively in XP or Vista (Send to Compressed folder in Windows Explorer). I just prefer WinZip. ... Thinkpads_User
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 

Author Comment

by:Michael Murphy
ID: 24404502
will try this. give me a day or two before I post result
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 24404515
Sure. Just remember that WinZip is the best way to go. I have used this to send files all over the place. And XP or Vista can happily unzip them if the recipient doesn't have WinZip.
... Thinkpads_User
0
 
LVL 26

Expert Comment

by:jar3817
ID: 24414987
How about you upload the photo to a photo sharing site and email this person the url?
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 24417070
Hello EamonX1 - Any progress or feedback?   Thanks. ... Thinkpads_User
0
 

Author Comment

by:Michael Murphy
ID: 24430554
Sorry for not replying. I used Winzip and sucessfully zipped up the files (photographs). I then sent them by email (as attachments). I wont know whether they got through until next Monday as the recipient (I have just learned) has gone on Holidays (we're in Ireland). Will contact you immediately as soon as I have the feedback. Much appreciated your help.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 24564873
Hello EamonX1 - Did this issue get resolved?  Thanks. ... Thinkpads_User
0
 

Author Comment

by:Michael Murphy
ID: 24565788
Yes. It worked. I am awarding the points now. Thanks. Sorry for delay
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question