Frequently Asked Questions (FAQ)
Email subject must be simple and precise.
Email contain must be simplified and professionally written. Use proper language and correct font size. Focus on the relevant matters only.
It is not encourage to attach large size attachment to your email. Document Library is provided to cater large size attachment.
It is also advisable not to attach large images or pictures. Images and pictures are required not more than 200KB per email send.
Any forwarded emails, required to be scrutinized for unnecessary contain.
For broadcasting emails, reply is not required. Footnote "Do not reply to this email" stated at the bottom of your email.
If respond or reply is required, please click on Delivery Options > Advance > Replies to this memo should be address to: (Staff Name/Group of the receiver/s).
PLEASE avoid sending repeated emails too frequent.
In the message list, select a message sent by the sender to block. To block multiple senders at once, select one message sent by each sender.
Click More > Deliver sender's mail to Junk. A confirmation window displays.
If a message was sent from an Internet-style address, do one of these actions:
Click OK. The selected message is added to the Junk folder, and all future incoming messages from this sender are added to the Junk folder. If you selected multiple messages, a confirmation window displays for each message.
Open the Junk folder.
Click Manage List at the top of the message list.
Click a sender, and then click Remove.
Repeat step 3 for each sender to remove, and then click OK.
Is your computer running very slowly? A common symptom of a virus is much slower than normal computer performance. However, there can be other reasons for slow performance, including a hard disk that needs defragmenting, a computer that needs more memory (RAM), or the existence of spyware or adware. For more information about spyware, see How to tell if your computer is infected with spyware.
Are you getting unexpected messages, or are programs starting automatically? Some viruses can cause damage to Windows or some of your programs. The results of this damage might include messages appearing unexpectedly, programs starting or closing automatically, or Windows shutting down suddenly.
Is your modem or hard disk working overtime? An e‑mail virus works by sending many copies of itself by e‑mail. One indicator of this is that the activity light on your broadband or external modem is constantly lit; another is the sound of your computer's hard disk continually working. These are not always symptoms of a computer virus, but when combined with other problems, can indicate a virus infection.
To check for viruses, scan your computer with an antivirus program. New viruses appear every day, so keeping your antivirus program updated is important. For more information about computer security, go to the Security at Home page on the Microsoft website. To learn how to remove malicious software (malware) from your computer, go to the Microsoft Safety Scanner webpage.
Sometimes a virus must be removed manually. This can become a technical process that you should only undertake if you have experience with the Windows registry and know how to view and delete system and program files in Windows.
First, identify the virus by name by running your antivirus program. If you don't have an antivirus program or if your program doesn't detect the virus, you might still be able to identify it by looking for clues about how it behaves. Write down the words in any messages it displays or, if you received the virus in email, write down the subject line or name of the file attached to the message. Then search an antivirus vendor's website for references to what you wrote down to try to find the name of the virus and instructions for how to remove it.
Install an antivirus program. Installing an antivirus program and keeping it up-to-date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your email, operating system, or files. New viruses can appear daily, so check the antivirus manufacturer's website frequently for updates. Some antivirus programs are sold with annual subscriptions that can be renewed as needed, but many are also available for free. Microsoft offers Microsoft Security Essentials, a free antivirus program you can download from the Microsoft Security Essentials website. You can also visit the Windows Security software providers webpage to find a third-party antivirus program.
Don't open email messages from unfamiliar senders, or email attachments that you don't recognize. Many viruses are attached to email messages and will spread as soon as you open the email attachment. It's best not to open any attachment unless it is something you are expecting. Microsoft Outlook and Windows Mail help block potentially dangerous attachments.
Use a pop-up blocker with your browser. Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.
The Pop-up Blocker feature in Internet Explorer is turned on by default. To learn more about changing its settings or turning it on and off, see Internet Explorer Pop-up Blocker: frequently asked questions.
Keep Windows updated. Periodically, Microsoft releases special security updates that can help protect your computer. These updates can help prevent viruses and other computer attacks by closing possible security holes. Make sure that Windows receives these updates by turning on Windows automatic updating. To learn how, see Turn automatic updating on or off.
Use a firewall. Windows Firewall or any other firewall program can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer. To learn more about Windows Firewall, see Understanding Windows Firewall settings.
Use your browser's privacy settings. Being aware of how websites might use your private information is important to help prevent targeted advertising, fraud, and identity theft. If you're using Internet Explorer, you can adjust your Privacy settings or restore the default settings whenever you want. For details, see Change Internet Explorer Privacy settings.
Turn on User Account Control (UAC). When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes. To learn more about enabling UAC and adjusting the settings, see Turn User Account Control on or off.
Clear your Internet cache and your browsing history. Most browsers store information about the websites you visit, and information that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your computer, there are times when you might want to delete some or all of them, for example when you're using a public computer and don't want to leave personal information behind.