How to know if someone has responded to your message?

How do you know when someone has replied to your message?

Do you have an email if you have been set up for this with the old forum?


Tags: Dell Products

Similar Questions

  • How to know if someone has tried to determine or to derive my password?

    I came across a link under Favorites called how to bypass the administrator password.  I am the administrator and I has not implemented the link.  I would like to know if anyone has tried to compromise my means of access.  There are 3 users, and I'm the only one with a password.   Thank you.

    Hi johnnysboy,

    There is no way of knowing if someone is connected to your user account.

  • How to know if someone has set up my computer to store information online without knowing me

    online storage

    Hello

    Thank you for contacting Microsoft Community.

    You can use a reliable antivirus and internet security program that scans for threats of malicious software on your PC. If found, they will be deleted. In addition, if nothing is found, you may check the firewall settings if any suspicious application is access to the internet and download files.

    You can also open the resource monitor by pressing start, type "Resource monitor", right click and click 'run as administrator '. In windows, on the network tab, you can find the list of applications using the internet connection. You can zero in any unwanted or suspicious of there programs and eliminate them.

  • How to know if someone copied a file on a USB?

    If you have a person who you think access to your USB key, how do you know if they copied a file from your USB key on his computer?

    Hello

    Unfortunately, there is no way we would know that someone has copied contacts from the flash drive on your computer.

  • need help on history, recycle bin and cookies: how will I know what someone has done on my laptop?

    I would like to learn more about history on my computer vista laptop microsoft and more on maybe the trash and or cookies. For example, someone else used my laptop last night and delete everything that he was looking at or for then how can I know what it was?

    Assuming that it has not been removed, you can view the history of visited web sites by clicking on the Favorites button, click the history tab.

    The only things in the trash are files or folders that have been removed from the system (no evidence they have been read or something like that).

    Cookies will not tell you anything either because they are terms in the code and you can not tell what web site they belong - no good for tracking not web history (and they apply only to the history of the web).

    You can view the Start / recent items to display some of the files which were recently seen (assuming that the list has not been removed).  That may help some.  You can also go to C:\Users\\Recent for a longer list of recently accessed files (as long as you know the user name).

    There is actually very little that you can do with hindsight to see what anyone seen or done on your computer.

    If you want to implement such a procedure, use the Parental http://windows.microsoft.com/en-US/windows-vista/Set-up-Parental-Controls control and activity reports control Parentalhttp://windows.microsoft.com/en-us/windows-vista/Set-up-Parental-Controls-activity-reports.  Do this for each account you want to track.  Then you can check what you wish now that you could check.

    I hope this helps.

    Good luck!

    Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • I think that someone other than me has synchronized my computer. How to tell if someone has access to my activity?

    I think my computer is "hidden." There are Web sites that I have not visited at all, including the Mozilla developers, who appear as previously visited. In addition, whenever I load a page, it seems to load twice, as if another copy is running in the background. Help, please.

    The Firefox sync system don't live synchronization of all of the Web site that you visit on another device. That means, the problem with your sites Web appearing to load twice is more than likely not caused by the synchronization system.

    For added security, please change the password for your Firefox sync account to make sure that nobody can access it.

    It seems to me that you have an infection on your computer. You can try these free programs to search for malicious software that work with your existing anti-virus software:

    Microsoft Security Essentials is a good permanent antivirus for Windows 7/Vista/XP, if you do not already have one. Windows 8 already has integrated antivirus.

    Please let me know if the scans detect something.

  • How to know if sequencefile has loaded or not?

    Customization of the user interface.

    I "recharge sequencefile on start. And do not use SequenceFileView. Some sequencefile spends a lot of time for loading. And sometimes the sequencefile reference must be empty. Because the sequencefile has been remove, or did not open any file last time, etc.

    I need feedback from the TS engine. How to get it?

    It's a little more complicated than I thought that if you run a reminder of connection during startup (which is the default. i.e. LoginOnStart property is true). In this case, you need to wait after execution of callback connection ends and the Application Manager ends to deal with it. To do this, you can manage the AfterUIMessageEvent as follows:

    Private bool firstExecutionEnded = false;
    ' Private Sub axApplicationMgr_AfterUIMessageEvent (object sender, NationalInstruments.TestStand.Interop.UI.Ax._ApplicationMgrEvents_AfterUIMessageEventEvent e)
    {
    If (! firstExecutionEnded & e.uiMsg.Event == UIMessageCodes.UIMsg_EndExecution)
    {
    firstExecutionEnded = true;
    What you want with this.axApplicationMgr.SequenceFiles;
    }
    }

    Hope this helps,

    -Doug

  • How to check if someone has unwittingly remotely attached to my computer via a VNC or VPN network?

    Remember - this is a public forum so never post private information such as numbers of mail or telephone!

    Ideas:

    • You have problems with programs
    • Error messages
    • Recent changes to your computer
    • What you have already tried to solve the problem

    Hello baberuth,.

    ·         Your computer is on a domain?

    ·         Do you see any suspicious activity indicating that your computer has been used remotely?

    Your computer are not accessible remotely if it is on a domain.

    If you have your computer password protected your computer is not accessible remotely.

    I suggest that you create a password for your account, it will prompt you for the password if it is accessed remotely.

    Also, open programs and features and remove the VNC program. Read this article that talks about remove programs:

    http://Windows.Microsoft.com/en-us/Windows-Vista/uninstall-or-change-a-program

    Thank you
    Irfan H, Engineer Support Microsoft Answers. Visit our Microsoft answers feedback Forum and let us know what you think

  • How to know what data has been inserted in ERPI for target.

    Hello
    I'm loading data from Oracle EBS to Hyperion Planning using EPRI (11.1.2.1.501), ODI.
    ERPI is successfully configured and it does planning data, but I want to see data before insertion in conditions weather target ERPI or ODI (Planning) application creates a logfile for data?

    concerning

    See my blog.

    http://devidasdumbre.blogspot.com/2012/09/how-to-verify-data-loaded-by-ERP.html

  • someone has FedEx hostage your apple product?

    So I order online a mini iPad & keyboard cover for the birthday of my daughter who is a week away.  No problem, order went through fine, will arrive on time.  So, I am tracking the FedEx package and the keyboard cover comes first. Now I am tracking the iPad and it gives me a date earlier scheduled delivery, Great! even better, now I know that it will be for sure at the time.  So I watch followed FedEx the day they said it would be delivered 10:26, it is to the East and I'm on the West Coast, I think how it get delivered today if it is so far away. I look at and then I see it says "Refused by the addressee" uh this isn't me? I'm not in this State, but he said that I refused it? I check my front door to see if there is a tag or something, anything!  So I called FedEx who after that goes around and on how I could not have refused it because I live in a State completely different than where they say he was 'denied' they put a tracer on it, call me and say that security is due to "security issues" holding office FedEx said they think it is a "counterfeit product" so she asks which is in the box.  I said a mini Apple iPad.  They hold well and she told me to call FedEx and ask for security.  I called and the guy had no idea what I was referring to, he looks to the top of my follow-up and could offer no explanation what was going on and now it is for FedEx desktop to the East where the package is being held to call me tomorrow because they are now closed! at this rate now I will not get it in time for my daughter's birthday.  Has SOMETHING like this happened to someone? It's crazy!

    No, nothing like that happened to me, and no one here can help you, it's between you and Fedex

  • How Thunderbird keep track of where it stores your messages?

    I am writing a program to isolate some of the messages to a message queue. Of course I can hardcode the path where messages are kept for the moment, but when the user changes this, my program will be lost.
    I looked in the registry and profile.ini file with no luck. Someone knows the answer? Thank you.

    The path to the messages in Thunderbird is random just for the reason why your having trouble. To make the programming of nontrivial.

    As you would have observed the profiles.ini contains a path the the root of the profile.

    In the mail profile is stores in profiles\imapmail for profiles\mail for pop or IMAP

    Subfolders exist for the server of that mail is, often with a tail number to separate multiple accounts on the same server, or multiple attempts to implement the same account.

    These files can contain new subfolder. According to structure internal folders in Thunderbird.

    If the user has specified a custom for an account folder location, this information is stored in the file prefs.js and all other preferences. The account that the setting is referenced numerically. If you establish preferences, which is the account number, before the reading of the preference for the location.

  • How can you tell if someone else is having your email charged to their account in respect of the audit of the other e-mail options?

    for example, if someone knows my password and they choose to download my mail on their behalf.  is there a notification sent to me that tells me that?  And if I change my password, they can always get access or you have to enter the password associated with this account each time you check them?  clear as mud?

    Hello

    This forum is for comments on the Forums for answers then you really should ask
    in the Forums for answers corresponding to your version of Windows.

    Answers - Forums
    http://answers.Microsoft.com/en-us/Windows

    -------------------------------------------------------------------------------------------------

    Normally you would not get a notice if someone has access to your email.

    If you change the password must to lock anyone out of your e-mail, unless
    you have defined it for download on your computer automatically by using an e-mail program.
    If you need to go online or have any e-mail program set to request your password
    the email must be secure. Don't forget to put online do not save your login or
    remove the cookies. Also, your login information can be saved if you set IE AutoComplete
    and tell him to remember your name and your password.

    ----------------------------------------------------------------------------------------------------------------------

    If you suspect that your account has been hacked or spoofed they should contribute.

    Proceed to a very thorough check for malware and then change your password by e-mail.

    It is possible for a person to send the email that 'seems' to be of your
    account but that is not really - called "Spoofing." That means its 'Possible' emails
    were not really you, although they may have your contact list. Have someone
    who receives the e-mails to check the header to see where he is actually sent by and
    NOT only the answer to the address.

    How to read the message headers
    http://www.high-speed-Internet-Access-Guide.com/articles/email-headers.html

    E-mail spoofing
    http://en.Wikipedia.org/wiki/E-mail_spoofing

    E-mail spoofing and Phishing
    http://www.mailsbroadcast.com/email.broadcast.FAQ/46.email.spoofing.htm

    Understanding E-mail Spoofing
    http://www.windowsecurity.com/articles/email-spoofing.html

    Fraudulent emails (false)
    http://pages.eBay.com/education/spooftutorial/

    Google search - email Spoofing
    http://www.Google.com/search?hl=en&EI=FB1nS9DiNo7CsQPNhKGdAw&SA=X&Oi=spell&resnum=0&CT=result&CD=1&ved=0CAgQBSgA&q=email+spoofing&spell=1

    =============================================

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    New Vista and Windows 7 version
    http://OneCare.live.com/site/en-us/Center/whatsnew.htm

    Original version
    http://OneCare.live.com/site/en-us/default.htm

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Run DiskCleanup - start - all programs - Accessories - System Tools - Disk Cleanup

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    I hope this helps.

  • An error occurred sending mail: TheError: mail server has sent a wrong message: 4.7.0 [C7] too much spam...

    From yesterday I can receive but not send emails. I get the above error, whatever (I have 5) I use an email account. Had no problems until yesterday. I see that I started getting junk mail on the same account including addresses ending with ".edu".

    Somehow your IP probably are on the blacklist.
    If a lot of spam came from your IP, you or a person who had this IP address before you could be diverted.

    Search for viruses using several different programs.

    Can someone use your spam email account. Change password.

    Or someone has used just your e-mail address during the usurpation of their spam.
    Talk to your email provider to make them help you to lift this ban

  • Someone has created a website for my business before I joined 5 weeks ago. We do not have a lot of information about how they did it! I know it's good Muse - any ideas on how to get into the back-office to do this editing?

    Someone has created a website for my business before I joined 5 weeks ago. We do not have a lot of information about how they did it! I know it's good Muse - any ideas on how to get into the back-office to do this editing?

    You would need to Muse and the original file of Muse. There is no 'back-office' on Muse like WordPress or Joomla sites! If that's what you're looking for.

  • How can know you if someone has consulted and used the default Administrator account in Vista?

    I was not aware that the default Administrator account is so easily accessible if there is no password on it. In my view, a standard user has accessed this and it seems that the computer is having a lot of problems now. Is there a way to tell? Needless to say I care that much personal info could acceded as well as commercial information.  Security, 3 administartors (users) appears in some of the boxes, and I only know 2 of them, myself and the default admin?  I'm a recruit of the computer and the other person is somewhat a geek so I could really use some help. I am the system administrator, but don't really know what to look for. I would really appreciate if some wiz could help me.

    Thank you

    Hello

    You can't find if someone has consulted and used the default Administrator account in Vista. You will need to set up a password so that no one will be able to access the admin account.

Maybe you are looking for