Connecting an iPhone or iPod Touch to uabwifi-nac
We can retrieve your mailbox data if you make a request from the AskIT Help Desk within 21 days of the deletion. You can keep your e-mail address as long as you have it forwarded to an outside e-mail service like Gmail, Hotmail, or Yahoo. You can recreate your mailbox once you are an active student or employee at the university. If you have additional questions, please call 996-5555 or go to www.uab.edu/askit, where you can chat with an online agent
What is Outlook Web App Light?
Outlook Web App (OWA) Light is designed to aid those with low vision & to support web browsers that are not compatible with the Premium version. There are fewer features in OWA Light. These web browsers are listed by Microsoft as compatible with Outlook Web App Premium:
Windows XP & Later
- Internet Explorer 7 & later
- Firefox 3.0.1 & later
- Chrome 18.104.22.168 & later
Mac OS X 10.5 & Later
- Safari 3.1 & later
- Firefox 3.0.1 & later
- Firefox 3.0.1 & later
This is what OWA Light looks like:
The easiest way to sign in to OWA Light is to check the box to “use the light version of Outlook Web App” when signing in to https://mail.ad.uab.edu
If you find yourself using Outlook Web App Light, but wish to use Outlook Web Access Premium, there are 3 things to check:
- Are you using a compatible browser (as listed above)?
- Make sure the check box beside “Use the light version of Outlook Web App” is not checked when signing in.
- Uncheck “Use the blind and low vision experience by performing the following steps:
- While looking at your mailbox in OWA, click the “Options” button at the top.
- Click Accessibility on the left side
- Uncheck “Use the blind and low vision experience
- Click Save (just above the check mark)
- Click “Sign out” in the top right corner
- Sign back in to https://mail.ad.uab.edu
My Exchange mailbox has been deleted - Can I get it back?
We can retrieve your mailbox data if you make a request from the AskIT Help Desk within 21 days of the deletion. You can keep your e-mail address as long as you have it forwarded to an outside e-mail service like Gmail, Hotmail, or Yahoo. You can recreate your mailbox once you are an active student or employee at the university. If you have additional questions, please call 996-5555 or go to www.uab.edu/askit, where you can chat with an online agent.
Clients & Protocols
Outlook (MAPI, HTTPS), Outlook for MAC (EWS, POP3, IMAP), Mac Mail (EWS, IMAP, POP3), Outlook Web App (HTTPS), Windows Mail (POP3, IMAP), Mozilla Thunderbird (POP3, IMAP)
Hypertext Transfer Protocol (HTTP) is the protocol used to display Web pages but it can also be used to read e-mail with Outlook Web App (OWA). The advantage to OWA is that you can read, send, etc. e-mail from any computer with an Internet connection and a modern Web browser capable of supporting a secure connection (SSL). The Web address for OWA is https://mail.ad.uab.edu.
Post Office Protocol (POP3) can be used by almost any client including Windows Mail and Mozilla Thunderbird. The difference between IMAP and POP3 is that POP typically pulls your e-mail messages off the server and stores them locally on your hard drive. This is fine unless a problem arises with your hard-drive, which may cause you to lose all messages stored on your machine. Your POP3 client will need to be capable of providing secure authentication.
Messaging Application Programming Interface (MAPI) is used by the full version Outlook client in conjunction with an Exchange mail server. MAPI is very much like IMAP but provides extended features within Outlook. This is only available in Outlook on a machine running Windows. You choose this protocol by selecting Microsoft Exchange Server within the Outlook e-mail account configuration.
The Exchange Web Services (EWS) protocol serves as the critical link in enabling secure synchronization between Microsoft Exchange Server 2010 systems and Snow Leopard-powered Macs.
Internet Message Access Protocol (IMAP) is the most common way to configure the Outlook for MAC mail clients. The benefit of using this protocol is that your e-mail messages remain on the server. When configured this way, you do not lose any e-mail messages should a problem arise with your personal computer and have the option of using Outlook Web Access when you so desire. Your IMAP client will need to be capable of providing secure authentication
What types of files are blocked by the UAB email system?
Below is a list of blocked file extensions. Please note that any compressed file (such as .zip or .rar) containing files with blocked extensions will be blocked. If you need to send a file with one of these extensions, please use the UAB Drop Box.
Why does the login page want to know if I'm on a public or private computer?
The network wants to know if someone could access your email account (and any personal information located there) and the security measures it needs to take to protect it. In OWA 2010, your information will be stored in a cookie, not in the browser. This means that your login information will be cleared when you log out of OWA - there is no "Remember my password" option.
Secondly, your session will expire (and you will have to login again) if the account is inactive for a period of time. If you are on a public or shared computer, timeout occurs after fifteen minutes of inactivity. You will have more time on your private computer. When timeout does occur, the page will remain the same until you try to perform another action. At this point, you will be prompted to log on again.
These measures help to protect your privacy, but they are not a replacement for the personal security measures you should already be taking:
- Never walk away from a public computer without logging off completely.
- Always log off of OWA and close the browser before you move on to a website that might not be secure. In OWA 2010, the Log Off button is located in Navigation pane, on the right-hand side. You will be prompted to close the browser window.
- Never disclose your password to anyone. With your BlazerID and password, they will have access more than just your email.
- The Internet Privacy setting ( Tools>Internet Options>Privacy ) should be at Medium or higher.
Even if you are on your personal computer, think of everyone who could have access to it (colleagues and roommates included).
Can we track down who sent an offensive email message?
In most cases we are able to determine at least the point of origin. If you receive an inappropriate email, please do not delete the email and contact AskIT (www.uab.edu/askit) within 3 days of receipt. There are ways for a sophisticated hacker to disguise the original location of email messages; in those cases, we can at least contact the Internet service provider involved and request that they prevent a recurrence or be blocked from sending messages onto campus.
This section will show you how to defrag your hard drive in order to correct problems with files and folders.
*While Windows Vista is shown in the following video, the steps can be used for both Windows XP or Windows Vista platforms.