How do I check and modify the outgoing port number

Charter has changed their settings and I need to set the outgoing port to 465. How do I do that?

'''[http://kb.mozillazine.org/Menu_differences_in_Windows,_Linux,_and_Mac Tools|Account Settings]'''
Scroll down the list of accounts. The last one is "Outgoing Server (SMTP)".
Select this, select your charter SMTP server, click on Edit.

Similar Messages

  • How can I check and change the size of photo or doc in iPhone or any other app

    How can I check and change the size of photo or doc in iPhone or any other app

    You would need software form a third party to have this option.  The free software that comes with the 8600 doesn't have an option for that. Vuescan is the only software I could find that says it works with your pritner and has a descreen option.  You have to purchase it, but it will give you more advanced options than the software that came with the printer.
    -------------How do I give Kudos? | How do I mark a post as Solved? --------------------------------------------------------

  • How can I check and change the system set events trace level?

    Dear all:
    How can I check the system set events trace level? I don't want the alert_log so big.
    Regards
    Terry

    Hi Terry;
    Please check :
    How to determine which system events are currently being set? [ID 845043.1]
    How To List All The Named Events Set For A Database [ID 436036.1]
    How to set EVENTS in the SPFILE [ID 160178.1]
    Also check:
    http://www.dba-oracle.com/t_grid_rac_events_in_Oracle.htm
    http://www.akadia.com/services/ora_events.html
    Hope it helps
    Regard
    Helios

  • Sampling Rate- How do I check and adjust the sampling rate on my Laptop?

    For the purposes of matching the sampling rates on my laptop to my usb microphone, (recording in garageband) how do I find out what the sampling rates are on my 2009 macbook?  Many thanks!

    GarageBand '11: Set the audio resolution: http://support.apple.com/kb/PH1873

  • Control-k key binding broken. How can I check and change my key bindings?

    I use the Terminal app a lot. Unfortunately I am not able to use the control-k shortcut to cut lines in the terminal anymore. How can I check (and change) the Terminal key bindings?
    Thank you!

    Basing on your input, you should get the following values:
    1) session keys
    SK_ENC: 6DCE2A99BACB5207A7A96A92F114D66C
    SK_MAC: 0D446132B168F75CD6F0A780693A4DD3
    SK_DEK: 19F7B0F94837F32874B29B5EFB7809F6
    2) host cryptogram
    1B781553209748EA
    3) Retail MAC
    01761103B810F00E
    Summing up, the External Authenticate command should have the following value:  84 82 01 00 10 1B781553209748EA 01761103B810F00E.
    Try to compare it with your results.
    Regards

  • How to Check and Uncheck the JCheckBox in the JTable?

    Dear Friends,
    I created a Table using JTable and it consists first column is JCheckBox (JCheckBox is included in JTable by using TableCellRenderer) and two more columns with Id and Name. How to enable the check and uncheck the JCheckBox in the Table and how to get the row id or values of the rows where the CheckBox is checked?
    Thanks in Advance.
    Sathish kumar D

    Read the API for JTable and follow the link to the tutorial on how to use tables, where you will find adequate guidance and examples.
    db
    edit And isn't this post on the same topic as your previous one? If so, please add a note that responses should be posted here and not on the other thread.
    [http://forums.sun.com/thread.jspa?threadID=5353422]
    Edited by: Darryl.Burke

  • HT1212 If I never synced to itunes and I restore the device. Will I lose unstored data? How can I check to see the last time my phone was backed up if I forgot the passcode to my phone?

    If I never synced to itunes and I restore the device. Will I lose unstored data? How can I check to see the last time my phone was backed up if I forgot the passcode to my phone?

    If you can't remember your passcode, you'll need to restore your phone.  If you never synched to iTunes, all data on your phone will be erased.  No way around this.

  • HT4061 my phone is unable to power on and i dont have the packaging how can i check what is the serial number of the phone

    my phone is unable to power on and i dont have the packaging how can i check what is the serial number of the phone

    Apple (and no one else) can not assist (with serial number or iCloud) in finding a lost or stolen iPad.
    Report to police along with serial number. Change all your passwords.
    These links may be helpful.
    How to Track and Report Stolen iPad
    http://www.ipadastic.com/tutorials/how-to-track-and-report-stolen-ipad
    Reporting a lost or stolen Apple product
    http://support.apple.com/kb/ht2526
    What to do if your iOS device is lost or stolen
    http://support.apple.com/kb/HT5668
    iCloud: Locate your device on a map
    http://support.apple.com/kb/PH2698
    iCloud: Lost Mode - Lock and Trace
    http://support.apple.com/kb/PH2700
    iCloud: Remotely Erase your device
    http://support.apple.com/kb/PH2701
    Report Stolen iPad Tips and iPad Theft Prevention
    http://www.stolen-property.com/report-stolen-ipad.php
    How to recover a lost or stolen iPad
    http://ipadhelp.com/ipad-help/how-to-recover-a-lost-or-stolen-ipad/
    How to Find a Stolen iPad
    http://www.ehow.com/how_7586429_stolen-ipad.html
    What NOT to do if your iPhone or iPad is lost or stolen
    http://www.tomahaiku.com/what-not-to-do-if-your-iphone-or-ipad-lost-or-stolen/
    Apple Product Lost or Stolen
    http://sites.google.com/site/appleclubfhs/support/advice-and-articles/lost-or-st olen
    Oops! iForgot My New iPad On the Plane; Now What?
    http://online.wsj.com/article/SB10001424052702303459004577362194012634000.html
    If you don't know your lost/stolen iPad's serial number, use the instructions below. The S/N is also on the iPad's box.
    How to Find Your iPad Serial Number
    http://www.ipadastic.com/tutorials/how-to-find-your-ipad-serial-number
    iOS: How to find the serial number, IMEI, MEID, CDN, and ICCID number
    http://support.apple.com/kb/HT4061
     Cheers, Tom

  • How do I check and clean of virus's

    How would I check and clean my Mac of virus's?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could conceivably get control of a code-signing certificate under false pretenses (though there's no evidence this has happened yet.) The certificate would eventually be revoked, but probably not before some damage was done.
    For more information about Gatekeeper, see this Apple Support article. 4. Considering all the above, the best defense against malware is your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability and poor performance.
    By modifying the system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

  • How do I find and open the CD folder on a 13" macbook pro??

    How do I find and open the Cd folder on a 13" macbook pro , so I can read the content on the cd with pages.

    If the CD is not showing on the desktop, go to Finder on the menu bar, Preferences, General and check the box for CDs, DVDs,and iPods.  Then double click the image of the CD on the desktop to open and display the contents of the CD.

  • How can I access and use the alphabetical keyboard of the phone ?

    How can I access and use the alphabetical keyboard of the phone ? I cannot find the answer in the manual of use.  Thanks for your help !

    Recently I was abroad and tried to contact my voicemail to check my messages. I was asked to enter a password and did not know how to use the letters below the figures on the keyboard.  I had to give up and wait until I was back in my country (no password is then needed).

  • I upgraded Photoshop CS2 back in 2006.  How can I buy and install the upgrade to a newer version of Photoshop?

    I currently have Photoshop CS2 and purchased and installed an upgrade for it back in 2006.  It has not been upgraded since and now today when I tried to access it I get a message saying I have to reactivate it but it won't allow me to do that. How can I upgrade my version of Photoshop?

    CS2 is totally outside the upgrade loop.  It doesn't qualify for anything.
    However, you can still install CS2.  You just have to download a special CS2 version, expressly meant for CS2 owners, which requires no activation and also the new key number for that special edition; your old serial number will not work, the new one only works for the new, modified CS2 version.
    Error: Activation Server Unavailable | CS2, Acrobat 7, Audition 3
    Adobe decommissioned the old CS2 activation servers, then generated this workaround for CS2 licensees.

  • Problem while extending and modifying the ISA B2B app on SAP J2EE 6.4

    We are facing some problem with extending and modifying the ISA B2B 4.0 application.
    First Let me clarify you the whole scenario.
    Previously we had ISA B2B 4.0 SP03 deployed on SAP J2EE 6.20 Engine.
    We had used eclipse 3.0 to extend and modify the application as NWDS does not support SAP J2EE 6.20.
    We had used ant buildtool to build the modified application which comes along with the ISA Software Archive.
    We had successfully done all the modifications and application was running fine...
    Now we have upgraded the overall J2EE infrastructure and using J2EE 6.4 Engine which supports NWDS.
    We have successfully deployed the ISA B2B  application which comes along with the Support Package.
    We are using Support Package ISAWAC40SP11P_7-20000529.SAR E-Selling 640. The application is working fine after all
    the configuration done in XCM and SAP CRM 4.0 system.
    Now for modification and extension i have created another b2b enterprise archive with name "b2b_client.ear" using ant buildtool.
    I've done the modification and extension .. added some Z classes and JSP pages. Now when i try to deploy the application using
    SDM 6.40, I got an error message stating
    <b>"com.sap.sdm.util.sduread.IllFormattedSduFileException: The archive must be deployed with a 6.20 SDM, which has a SDM-SDA compatible version 1 or greater."</b>
    I think this error is due to the incompatible sda_build.xml used in the build process but we have used the same xml file bundled with the above mentioned ".sar" file..
    Please help or suggest someone who can help me out from this...
    Thanks & Regards.
    Sandeep Solanki

    Hi Alkis.
    First, you need to specify the fully qualified class name of your based-RequestProcessor class in the config.xml file like
    <controller  contentType="text/html;charset=UTF-8"  locale="true"  nocache="true"
      processorClass="com.mycompany.struts.framework.MyRequestProcessor"/>
    If you review the source code of the ActionServlet and RequestProcessor classes, you can see that overwritten methods (by you) are executed every time the client makes a request to the struts based application.
    I hope you can run your approach. And it will be excellent you can shared how you will do it.
    Kindest regards.

  • How does Avilability check and TOR  takes place in SD

    How does Avilability check and TOR  takes place in SD? if you have any Tax configuration notes please send it to my mail ID?
    [email protected]
    Gopal

    ATP
    Types of Availability Check in Sales and Distribution
    Processing
    There are three types of availability check:
    _ Check on the basis of the ATP quantities
    _ Check against product allocation
    _ Check against planning
    The following SD-specific control features need to be maintained in Customizing:
    _ Checking group
    The checking group controls whether the system is to create individual or collective
    requirements in sales and shipping processing. In addition, a material block for the
    availability check with transfer of requirements can be set here. The checking group can
    also be used to deactivate the availability check. This option was created especially for
    the assembly order so that when the bill of material is exploded in the assembly order,
    the individual components, if necessary, can be classified as non-critical parts as far as
    procurement is concerned.
    The checking group specifies in combination with the checking rule the scope of the
    availability check. It is proposed in the material master record on the basis of the material
    type and the plant, and copied into the sales and distribution documents.
    _ Checking Rule
    You use the checking rule to control the scope of the availability check for each
    transaction in sales and distribution. You also specify whether the check should be
    carried out including or excluding replenishment lead time. The individual checking rules
    define by transaction, which stock and inward and outward movement of goods should
    be taken into account for the availability check.
    _ Schedule line category
    You can control with the schedule line category whether an availability check and
    transfer of requirements should be carried out in the sales documents. The possible
    settings for this at schedule line level are dependent on the settings in the requirements
    class which is determined from the requirements type of the material.
    _ Delivery item category
    The delivery item category can be used to control whether an availability check takes
    place in deliveries.
    Requirements type
    The various requirements are identified by their requirements type. The requirements
    type refers to the requirements class and its control features.
    _ Requirements Class
    The requirements class contains all control features for planning such as relevance for
    planning, requirements planning strategy and requirements consumption strategy. In
    addition, it is specified at a global level whether an availability check is to take place for
    the material in the sales and distribution documents on the basis of the ATP quantity
    (ATP = available to promise) and whether requirements are to be passed on. A finer
    degree of control can be obtained for sales documents using the schedule line category.
    Replenishment lead time is only included in the check performed on the basis of the
    ATP quantity.
    Prerequisites
    An availability check can only be carried out if the following prerequisites have been fulfilled:
    _ The control elements described above for the availability check must be maintained in
    Customizing for Sales and the relevant assignments made to the sales transactions
    _ The availability check must be switched on at requirements class level and - for the
    availability check in the sales documents - at schedule line category level
    A requirements type must exist by which the requirements class can be found
    _ A plant must be defined. It can either be proposed from the customer or material master
    record or can be entered manually in the document.
    _ A checking group must be defined in the material master record on the Sales/plant data
    screen in the Availability check field
    Configuring entries of the Availability Check
    IMG&#61664;SD&#61664;Basic fncs&#61664;Availability check and TOR&#61664;Availability check&#61664;Availability check with ATP logic or against planning&#61664;Define checking groups
    You can use SAP std checking groups of 01 for summarized reqts or 02 for daily reqts or u can create ur own.
    The columns total sales and total deliveries are selection options whereby u can configure a checking rule to sum up reqts to post to MRP either individually or by day or week.
    Column 5, Block qty; set this block if u want several users to be able to process the material simultaneously in different transactions without blocking each other. The No Check indicator is used when u want a material to not be relevant for an ATP check.
    Defining a material block for other users. The Block checkbox is an indicator that enables u to block the particular material from being checked for availability if it is already being checked at the same time by another user.
    Defining the default value for checking groups. However should no entry exist for the checking group in the material master record, one can set a default value per material type and plant.
    Controlling the availability check. In this section, u tell the system what stock on hand and what inward and outward movements of stock it must take into account when performing the availability check. These settings are based on the checking group that is assigned to the material master record and the checking rule that is predefined and assigned to the sd transaction. The carry out control for the availability check must be maintained for both the sales order and delivery.
    TOR
    IMG &#61664; SD &#61664; Basic fncs &#61664; Availability check and TOR &#61664; TOR
    A line item in the sales order creates a schedule line. The schedule lines in the sales order transfer the requirements through to MRP. You can select the docs on which you want the TOR to happen. For ex, not for quotations.
    The TOR aims to ensure the ordered materials are available for the requested delivery date. The TOR can be set for individual or for collective requirements (materials master&#61664;sales/plant view).
    The TOR is dependent on the following data:
    The reqts type, reqts class, checking group and schedule line category.
    The reqts type and class are determined in the strategy group (material master&#61664;MRP3)
    For TOR to be carried out, a few criteria need to be met:
    Plant assigned to line item level, schedule line category should be switched on at TOR, TOR must be switched on at the reqts class level, checking group must be defined and allocated to the material master record (sales/plant view in the availability check field)
    The reqts class is the controlling factor for the availability check and the TOR for all sd types.
    Configuring the TOR:
    1) Use std 041 reqts class or copy and rename it. Use the indicators to select if this reqts class must carry out an availability check and/or a TOR.
    2) Define the reqts types. A reqts type is allocated to a single reqts class and not vice versa. It is based on the item category and the MRP type of the material.
    3) Assign the rqts type to the relevant item category in the sales order and the MRP type found on the material master record.
    You can select an alternative search strategy where u assign the reqts type to item category and MRP type. Can select source as 0, 1 or 2. (1 = Item type and MRP type strategy).
    4) The TOR and Availability check can be selected/de-selected at the schedule line category level.
    5) Block qty confirmation in delivery blocks. This is used to block the reservation of the TOR from MRP.
    6) Maintain requirements for TOR. Requirements can be used to determine that the TOR to MRP is not carried out unless a number of conditions are met.
    Availability Overview = CO09 &#61664; order qty, sd doc no, item no, requirements class.
    Stock requirements list = MD04 &#61664; sd no or dly no, line item, schedule line placing the demand
    Stock overview = MMBE &#61664; total stock per company, then plant followed by storage location, and finally a breakdown per batch
    this is the customising as weel as the knowledge part.
    PLease award pints if helpful
    thanks

  • How do i open and modify my pdf converted to excell spreadsheet

    How do I open and modify my PDF converted to Excell spreadsheet?

    After the conversion from PDF to .xlsx, you should be able to open the file in Excel and edit it like any other Excel file.

Maybe you are looking for

  • How to remove the Dunning block in the Invoice

    Dear All, For a particular customer, we dont have any "Dunning block" in the customer master. But "Dunning block" enable at the invoice level. Because of this we are unable to post the document to accounting. While releasing the document to acounting

  • Problem while restricting onfoprovider with variable

    Hi All. I have a scenario where i have to restrict the infoprovider(Data package field )in the characteristic restrictions with an variable.But iam unable to restrict it and iam getting the following error. Unhandled exception has occured and also In

  • Where can I find this calendar widget?

    Hi everyone, I want to add a calendar widget. Google Calendar's default baby blue color doesn't really match my client's company site. I got this reference that I wanted to copy: Classes | High School Investing™ Let me know where can get that calenda

  • Master Pages and Buttons - Bug and Fix Request

    I think I'm the only person in the world who has encountered this bug, and I've filled out the bug report form on the Adobe site twice in a couple of years. Just wondering if anyone else has encountered it, and I'm curious to know if it still exists

  • Steps to install Oracle 10g on Red Hat Enterprise Linux 4 AS

    Hi Friends, I want to install oracle 10g on Red Hat Enterprise Lnux 4 AS. Can anyone give me steps how to install oracle 10g on it? My machine configuration Processor 2.66ghz Intel, Memory 1024 MB , HDD 160 GB, 845 mother board.