Julia: My computer crashed when I opened an E-mail attachment yesterday.
朱莉娅:昨天我打开一个电子邮件附件的时候,电脑死机了。
A two document solutions have received (file is a mail attachment), very detailed.
两个文件方案已收到(文件是邮件附件),十分详尽。
Although if I'd worked out a way of doing that via an E-mail attachment, I certainly would have done it.
尽管我是想通过电子邮件的附件来完成这个任务,但是我敢肯定我能够做到。
The technology can be extended in image filtering for the network, such ase-mail attachment filtering the image.
该技术可扩展用于网络图像过滤,如邮件附件图像的过滤等。
To prevent users from running email attachments, you can create a path rule for your mail program's attachment folder that prevents users from running email attachments.
要防止用户运行电子邮件附件,可为邮件程序的附件文件夹创建一个防止用户运行电子邮件附件的路径规则。
After a file has been checked for the first time, any copy of it is identified quickly as identical, even if it is located in another folder, in an archive or in a mail attachment.
当档案第一次被检查过后,任何此档案的复本同样迅速地被鉴定,即使假如它位于其他的路径、在资料夹之中或在邮件的附件里。
When you send an e-mail you can also send a file as an attachment and that file can be a graphic, a program, a sound or whatever.
当发送电子邮件时,你还可以把一份文件作为附件发送,该文件可以是图片、程序、或声音文件等。
DAOS is a method of saving disk space when multiple mail users are sent the same attachment.
DAOS是向多个邮件用户发送相同的附件时节约磁盘空间的一种方法。
NOTE: the actual file size of the mail database that USES attachment consolidation need not necessarily reflect its logical size.
注意:使用附件整合的邮件服务器的实际文件大小不一定反映它的逻辑大小。
Attachment consolidation is not limited to mail; it occurs as soon as an attachment is saved in any document of any database on the server where the feature is enabled.
附件整合并不仅限于邮件;当服务器上启用了该特性时,只要将一个附件保存在该服务器上任何数据库中的任何文档中,都会发生附件整合。
When you use attachment consolidation for mail files, also use it for any MAIL.BOX files on the server.
当对邮件文件使用附件整合时,同时也会对服务器上的任何MAIL . BOX文件使用附件整合。
When MAIL.BOX is done routing the mail, it deletes its copy of the attachment, effectively transferring the reference to the mail recipients.
当MAIL . BOX完成邮件发送后,它删除附件的副本,有效地将引用传递给邮件收件人。
The virus is released when an attachment to a fake e-mail message is opened.
当假的电子邮件附件被打开时,病毒就会被释放出来。
Mail compose page - attachment portion.
撰写邮件页——附件部分。
It is also important to note that attachment consolidation is not limited to mail databases; it works on any Lotus Notes database on a DAOS-enabled server.
还有一点很重要,要注意附件整合不仅限于邮件数据库;它可以作用于任何支持DAOS服务器的LotusNotes数据库。
When you receive a mail message you get an additional attachment, Oledata.mso.
当您收到邮件消息得到附加附件,Oledata . m so。
After receiving the request, the service provider can simply E-mail the service description as an attachment or provide it to the service requestor on a transferable media, such as a diskette.
服务提供者接收到请求后,可以把服务描述作为一个附件用电子邮件发送或者在可传递介质(例如磁盘)上提供给服务请求者。
They make every e-mail appear as if it has an attachment.
它使每一封电子邮件看起来都像带有附件。
Now you can achieve this easy attachment bulk download with Yahoo Mail.
现在,用雅虎邮箱你能够轻易地下载大量附件。
For example, in my E-mail client, if an E-mail downloaded from a Pop3 server contains an attachment, I check the attachment's mime-type.
例如,在我的电子邮件客户机上,如果从Pop3服务器上下载的一个电子邮件包含附件,就检查附件的mime - type。
An advantage of a patch file is that it can be submitted as an attachment to an E-mail message or bug report.
补丁文件的一个优势在于它能够作为电子邮件消息的附件或者bug报告进行提交。
One issue, though, is how to structure the E-mail: Do you send the XML transaction in the body of the mail or in an attachment?
但有一个问题,即e - mail采用什么样的结构:在邮件体还是附件中发送XML交易?
You can launch the attachment Viewer by opening a mail message with an attachment.
通过打开带有附件的邮件,可以启动附件查看器(attachment Viewer)。
Julia: So if I open an E-mail with such an attachment, my computer would get infected at once?
朱莉娅:那如果我打开带这种附件的电子邮件,我的电脑就会立刻受到感染,是吗?
If you consider yourself qualified for the job, please mail us two photos in attachment to your application form.
如果你觉得你能胜任这份工作,请随申请表格附上两张照片寄给我们。
Pease send your CV bye-mail without attachment.
请勿以附件形式发送你的简历。
After taking over one computer, intruders insert into ane-mail conversation a message containing a digital attachment carrying malware that is highly likely to be opened by the second victim.
通过控制一台机器,入侵者在一封邮件中植入包含恶意软件的附件引诱第二名受害者打开。
After taking over one computer, intruders insert into ane-mail conversation a message containing a digital attachment carrying malware that is highly likely to be opened by the second victim.
通过控制一台机器,入侵者在一封邮件中植入包含恶意软件的附件引诱第二名受害者打开。
应用推荐