Frequently Asked Questions (FAQ)

Email subject must be simple and precise.

Email contain must be simplified and professionally written. Use proper language and correct font size. Focus on the relevant matters only.

It is not encourage to attach large size attachment to your email. Document Library is provided to cater large size attachment.

It is also advisable not to attach large images or pictures. Images and pictures are required not more than 200KB per email send.

Any forwarded emails, required to be scrutinized for unnecessary contain.

For broadcasting emails, reply is not required. Footnote "Do not reply to this email" stated at the bottom of your email.

If respond or reply is required, please click on Delivery Options > Advance > Replies to this memo should be address to: (Staff Name/Group of the receiver/s).

PLEASE avoid sending repeated emails too frequent.

In the message list, select a message sent by the sender to block. To block multiple senders at once, select one message sent by each sender.

Click More > Deliver sender's mail to Junk. A confirmation window displays.

If a message was sent from an Internet-style address, do one of these actions:

Click "Deliver to Junk any mail from this sender (This email address is being protected from spambots. You need JavaScript enabled to view it.)," where This email address is being protected from spambots. You need JavaScript enabled to view it. is the sender of the message, to block mail from that specific sender.
Click "Deliver to Junk any mail from any address that ends with (@example.com)," where @example.com is the message's originating domain, to block all mail from this domain, regardless of sender.

Click OK. The selected message is added to the Junk folder, and all future incoming messages from this sender are added to the Junk folder. If you selected multiple messages, a confirmation window displays for each message.

Open the Junk folder.

Click Manage List at the top of the message list.

Click a sender, and then click Remove.

Repeat step 3 for each sender to remove, and then click OK.

Is your computer running very slowly? A common symptom of a virus is much slower than normal computer performance. However, there can be other reasons for slow performance, including a hard disk that needs defragmenting, a computer that needs more memory (RAM), or the existence of spyware or adware. For more information about spyware, see How to tell if your computer is infected with spyware.

Are you getting unexpected messages, or are programs starting automatically? Some viruses can cause damage to Windows or some of your programs. The results of this damage might include messages appearing unexpectedly, programs starting or closing automatically, or Windows shutting down suddenly.

Is your modem or hard disk working overtime? An e‑mail virus works by sending many copies of itself by e‑mail. One indicator of this is that the activity light on your broadband or external modem is constantly lit; another is the sound of your computer's hard disk continually working. These are not always symptoms of a computer virus, but when combined with other problems, can indicate a virus infection.

To check for viruses, scan your computer with an antivirus program. New viruses appear every day, so keeping your antivirus program updated is important. For more information about computer security, go to the Security at Home page on the Microsoft website. To learn how to remove malicious software (malware) from your computer, go to the Microsoft Safety Scanner webpage.

Sometimes a virus must be removed manually. This can become a technical process that you should only undertake if you have experience with the Windows registry and know how to view and delete system and program files in Windows.

First, identify the virus by name by running your antivirus program. If you don't have an antivirus program or if your program doesn't detect the virus, you might still be able to identify it by looking for clues about how it behaves. Write down the words in any messages it displays or, if you received the virus in email, write down the subject line or name of the file attached to the message. Then search an antivirus vendor's website for references to what you wrote down to try to find the name of the virus and instructions for how to remove it.

Install an antivirus program. Installing an antivirus program and keeping it up-to-date can help defend your computer against viruses. Antivirus programs scan for viruses trying to get into your email, operating system, or files. New viruses can appear daily, so check the antivirus manufacturer's website frequently for updates. Some antivirus programs are sold with annual subscriptions that can be renewed as needed, but many are also available for free. Microsoft offers Microsoft Security Essentials, a free antivirus program you can download from the Microsoft Security Essentials website. You can also visit the Windows Security software providers webpage to find a third-party antivirus program.

Don't open email messages from unfamiliar senders, or email attachments that you don't recognize. Many viruses are attached to email messages and will spread as soon as you open the email attachment. It's best not to open any attachment unless it is something you are expecting. Microsoft Outlook and Windows Mail help block potentially dangerous attachments.

Use a pop-up blocker with your browser. Pop-up windows are small browser windows that appear on top of the website you're viewing. Although most are created by advertisers, they can also contain malicious or unsafe code. A pop-up blocker can prevent some or all of these windows from appearing.

The Pop-up Blocker feature in Internet Explorer is turned on by default. To learn more about changing its settings or turning it on and off, see Internet Explorer Pop-up Blocker: frequently asked questions.

Keep Windows updated. Periodically, Microsoft releases special security updates that can help protect your computer. These updates can help prevent viruses and other computer attacks by closing possible security holes. Make sure that Windows receives these updates by turning on Windows automatic updating. To learn how, see Turn automatic updating on or off.

Use a firewall. Windows Firewall or any other firewall program can help alert you to suspicious activity if a virus or worm attempts to connect to your computer. It can also block viruses, worms, and hackers from attempting to download potentially harmful programs to your computer. To learn more about Windows Firewall, see Understanding Windows Firewall settings.

Use your browser's privacy settings. Being aware of how websites might use your private information is important to help prevent targeted advertising, fraud, and identity theft. If you're using Internet Explorer, you can adjust your Privacy settings or restore the default settings whenever you want. For details, see Change Internet Explorer Privacy settings.

Turn on User Account Control (UAC). When changes are going to be made to your computer that require administrator-level permission, UAC notifies you and gives you the opportunity to approve the change. UAC can help keep viruses from making unwanted changes. To learn more about enabling UAC and adjusting the settings, see Turn User Account Control on or off.

Clear your Internet cache and your browsing history. Most browsers store information about the websites you visit, and information that websites might ask you to provide (such as your name and address). While it can be helpful to have these details stored on your computer, there are times when you might want to delete some or all of them, for example when you're using a public computer and don't want to leave personal information behind.

(iRIS7 Manual) Add Book/Chapter

Data Kepakaran (English Version)

Expert User Manual

Financial and Accounting System (MyFAS)





HOW To WiFi Registration

HOW-TO, Tutorial & User Manual

HOW-TO: Register Academia.edu account

HOW-TO: Register Google Scholar Account

HOW-TO: Register ResearchGate account

How To Compact Your Mail?

HOW-TO : Install Mariadb CONNECT engine with Oracle 12c ODBC in Ubuntu 14.04 64-bit

How to Create & Enable Out Of Office Notification ( IBM Notes 9.0.1 Social Edition )

HOW-TO : Import Calendar from e-Mesyuarat to Lotus Notes

How to Import Sametime Emoticons

How to Sync IBM Notes email to another email

How to edit User Profiles (iRIS7)

How to fix the Lotus Notes unread documents feature

How to print all recipients in lotus?

IBM Lotus Sametime Connect: User Guide

How to Install Smartcard Reader Drivers

Intelligent Mining & Decision Support System (InMinds)


Kaedah Troubleshooting Rangkaian

Lotus Sametime Instant Messaging 8.0.2 Entry version

Manual EC Form Pengguna

Manual EHCM-Data Kepakaran

Manual ESS

Manual Pengguna Sistem Baucar 1 Malaysia

Manual Pengguna Eclaim Mobil Notification

Manual Pengguna ePrestasi

HOW-TO : Reset Password in HCM

Manual eMesyuarat

Manual ePrestasi Akademik

Moderating Research Report Submission

OFFICE 365 Frequently Asked Questions (FAQ)

Online Journal System

OpenCart Manual for Publisher Administrator


Single - ID ( Set Semula Kata Laluan Portal Baharu UNIMAS )

Research Report Submission

Reset Password For Students

Reset Password in iNotes

Retrieve Password UNIMAS Alumni

Retrieve Password UNIMAS PreU Students

Student Account Activation

Taklimat GST dan Manual Pengguna Modul Purchasing IFAS

Tersilap hantar emel ke UNIMAS-All?

Tips Asas Menghantar Emel ke group UNIMAS-All

Travelling Claim Quick Guide

Tutorial : Linux 101

HOW-TO: Manually archive email in Lotus Notes (standard version)


UNIMAS Alumni Account Creation

HOW-TO : Post New Activity in UNIMAS Centralised Activity Posting


HOW-TO : UNIMAS IBM Notes Traveler Installation Tutorial (Android)

HOW-TO : UNIMAS IBM Notes Traveler Installation Tutorial (iPhone/iPad)

UNIMAS IBM Notes Traveler Installation Tutorial (iPhone)

UNIMAS-All Best Practices v1.1

Update UNIMAS Email Signature

User Manual : ILSEM Task Calculator

User Manual : ILSEM Visitor Tracking

(iRIS7 Manual) Add Journal Article

(iRIS7 Manual) Add Thesis Detail in Research

(iRIS7 Manual) Application Approval

(iRIS7 Manual) Application Endorsement

(iRIS7 Manual) Application Review

(iRIS7 Manual) Apply for Research extension

(iRIS7 Manual) Assigning Project ID to the approved grant application

(iRIS7 Manual) Change Product Type in Intellectual Property

(iRIS7 Manual) Common User Interface

(iRIS7 Manual) Item list re-ordering

(iRIS7 Manual) Managing Email Template

(iRIS7 Manual) Managing Grant Application Reviewer Panels

(iRIS7 Manual) Managing Lookup

(iRIS7 Manual) Managing User Access Control and Groups

(iRIS7 Manual) Record Research Expenses

(iRIS7 Manual) Update Task Progress Status

(iRIS7 Manual) Add Research

eBooking Manual

eTrain for PPS

(iRIS7 Manual) Add Research Assistant

Manual :How to create Encypted Email Using Lotus Notes

Manual Pengguna eClips