How to block someone who is in my safe senders list

How to block someone who is in my safe senders list

In your email to remove access to its reliable lists and if you want to block, add to the block list.

Tags: Windows

Similar Questions

  • How to block someone without the person who knows?

    How to block someone without the person who knows?

    Windows Mail? Publishers will send the message to the deleted items, or you can use a message rule delete it from server and never see. None of these methods will be known by the sender.

    These are for Outlook Express but are the same for WinMail.

    How to configure message OE rules
    http://www.timeatlas.com/MOS/email/Outlook_Express/Creating_Rules_in_Outlook_Express/

    Tips Message rule
    http://www.insideoe.com/tips/rules.htm

    Message rules does not?
    http://www.insideoe.com/FAQs/why.htm#rules

  • How to block someone permanently?

    From somedays, I am facing a strange problem, it's that I can't be able to block someone! How to block someone permanently to my Skype account?

    Hi, Jferdous18, and welcome to the Skype community,

    Please see the FAQ for detailed instructions on how to block a contact:

    Kind regards

    Elaine

    __________________________________________________________________________________________________
    Your question has been answered? Please click on the link to accept as a Solutionfor everyone can quickly find what works! As a post or want to say, 'Thank You ' -? Click on the button of congratulations!
    Reliable information: Brian Krebs: 3 basic rules for online safety

  • How to block someone in Windows Live Mail?

    How to block someone on my email account?

    Original title: question Live Mail

    Edited the title: how to block someone on my email account?

    Click on the arrow down on the Junk button, and Add the sender to the blocked senders list.
     
  • In iOS 9 how you unfollow someone who share their location with you?

    Since we no longer have the app for friends to find how disable you someone following you? I have people who come in my friends list to find inside the Mac OS 10.11.6 notifications bar that I don't want to see. How can I get rid of these people? I tried to remove his business card, but it does not work.

    I thought about it, to find friends application is on the phone just hidden in a folder. You go and remove the people you don't want to see.

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

  • If I block someone on iphone 6s, can they still leave a voicemail? If so, how will I know? Y at - it an icon?  Would I be able to listen to it?

    If I block someone on iphone 6s, can they still leave a voicemail? If so, how will I know? Y at - it an icon?  Would I be able to listen to it?

    When callers are blocked, they are sent directly to your voicemail. They can leave a message. You can still hear none of these messages by going to voicemail in the phone app and then type in blocked messages. They are separated from the other voice mail message so that don't accidentally read you them if you don't want to.

  • Does anyone know how to find the ip address of someone who is to be a nuiscance?

    Does anyone know how to find the ip address of a person who uses different names to communicate with you. A member of the family has problems with someone who does this.  Thank you in advance, I know one of the guys will help me.

    Hi, Ros,

    Use the e-mail headers

    http://www.johnru.com/Active-WHOIS/trace-email.html

  • phone call from someone who says they work for Microsoft with a saying of phone number blocked that Microsoft was going to block my computer within 24 hours because of our virus transmission, is it true?

    Received a phone call from someone who has not been named (call from a blocked telephone number) saying that Microsoft would block my computer within 24 hours due to virus, we have been forward to microsoft.  He said we had a laptop and gave us a serial number.  We do not have a laptop.  Was it a scam call or this person really used by microsoft?  He wanted me to enter an address to give him access to my computer.  I refused.  Any information you can provide would be appreciated.

    Hello

    Yes, it's a SCAM!

    Avoid scams to phone for tech support
    http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    In the United States, you can contact the local police to the FBI, Attorney general, and
    consumer watch groups. Arm yourself with knowledge.

    The Internet Crime Complaint Center (IC3) is a partnership between the
    Federal Bureau of Investigation (FBI) and the National White Collar Crime Center
    (NW3C), funded in part by the Bureau of Justice Assistance (BJA).
    http://www.ic3.gov/complaint/default.aspx

    No, Microsoft wouldn't you not solicited. Nor would they know if any errors
    It exists on your computer. So those are the frauds or scams to get your money or
    worse to steal your identity.

    Avoid scams that use the Microsoft name fraudulently: Microsoft has no
    for you unsolicited telephone calls help fix your computer
    http://www.Microsoft.com/protect/fraud/phishing/msName.aspx

    Scams and hoaxes
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#tab3

    Microsoft Support Center consumer
    https://consumersecuritysupport.Microsoft.com/default.aspx?altbrand=true&SD=GN&ln=en-us&St=1&wfxredirect=1&gssnb=1

    Microsoft technical support
    http://support.Microsoft.com/contactus/?ws=support#TAB0

    Microsoft - contact technical support
    http://Windows.Microsoft.com/en-us/Windows/help/contact-support

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

  • My activation key for windows 7 (bought from my college) does not work. How can I contact someone who can help?

    My activation key for windows 7 (bought from my college) does not work.  How can I contact someone who can help?

    -Mike

    Hello djplexus

    First, you will need to understand how to set up the dual boot. This will allow you to be able to choose between XP and 7 at startup.
    With regard to the creation of an image of Windows XP Backup there is no Windows XP software that will do it for you. You will need to look to third-party vendors for support with this issue. Thank you.
  • How to block call someones on z3 compact

    How to block call someones on z3 compact

    You can't actually block. There is an option to send calls directly to voicemail, but to block you cannot without a 3rd party app.

  • How can I convert a PowerPoint file to share with someone who doesn't have PowerPoint?

    How can I convert a PowerPoint file to share with someone who doesn't have PowerPoint?

    Maybe you could save the PowerPoint file in .pdf format?

    Microsoft Office 2007 Save as PDF
    http://Office.Microsoft.com/en-us/PowerPoint-Help/Save-as-PDF-HA010064992.aspx#Bm14 Or maybe your recipient might try the PowerPoint Viewer:

    Microsoft Office PowerPoint Viewer 2007
    http://www.Microsoft.com/download/en/details.aspx?displaylang=en&ID=6

  • I have adapters and a power converter, but has been told by someone who travels internationally that the block performs the conversion of power for me.  I want to assure that I do not blow on my phone.  Use the power converter to charge my iphone and appl

    I have adapters and converter of power for international travel.  I was told by someone who often visits that the converter is not necessary for apple products.  I don't want to ruin my phone or watch - can I use my power converter?

    If you use the Apple adapter supplied, you will simply need an adapter to use in other countries. The adapter can be used with voltages between 100-240 v AC 50-60 Hz

  • I want to know how to correct an error of SW version ID. Or someone who knows the remote computers access to me and help me. I can use limited however. I bought hp without recovery disks.

    Ideas:

    • You have problems with programs
    • Error messages
    • Recent changes to your computer
    • What you have already tried to solve the problem

    Remember - this is a public forum so never post private information such as numbers of mail or telephone!

    Please give a better description of the problem. This includes citing the exact text of the error message (without paraphrase) and tell us when get you and what you are doing. A brief history of the machine and the problem will also help to give us a clear idea of your situation.

    You will not get a person of this venue to connect to your computer remotely, nor should allow you someone you do not know to do this. You can call Microsoft support and pay for it, but you would be better off to take the machine to a local computer Tech, a qualified person who is the computer will have a much better chance to diagnose and fix things than someone who works remotely. If you follow this path, do not use a type of BigComputerStore/GeekSquad of the place.

    Also, please explain what you are trying to do with the HP recovery discs. MS - MVP - Elephant Boy computers - don't panic!

  • How to block emails gmail on a MAC

    I need to block someone emails on my MAC to my gmail account. I can't understand how to block incoming emails for me. Help, please. Emails from the heir are rude and contain language inappropriate for me.

    Assuming that you use Apple's Mail client, you should be able to configure a rule for what to do when you receive an email from this person.

    Mail-> Preferences-> rules-> add rule

    If your mail server provider offers server side of filtering, which could even prevent you to see them.

    NOTE: If there are threats or content legally actionable, you should check with the authorities.

Maybe you are looking for