Types of SSL certificates

SSL Certificates are available in a number of different configurations, with differing features depending on the needs of the purchaser deploying the certificate.

Validation types

Domain-validated certificates: SSL Certificates for domains ensure that the domain has been authenticated by a recognized certificate provider. Visitors to the site can click on the seal to verify that the certificate is still valid, giving site visitors extra peace of mind.
Organization-validated certificates: When corporate identity validation is important, an SSL Certificate for the organization assures customers that the website is trustworthy and secure.
Extended Validation (EV) certificates: With Extended Validation, as well as displaying the certificate seal, the address bar is displayed in green, providing customers with an extra level of confidence. The green address bar is a strong visual indication that the site has an Extended Validation Certificate. The Security Status bar displays the organization name and the name of the Certificate Authority (CA).
Wildcard option

Wildcard certificates: A wildcard SSL Certificate helps enable SSL encryption on multiple sub-domains using a single certificate as long as the domains are controlled by the same organization and share the same second-level domain name. For example, a Wildcard certificate issued to Company ABC using the Common Name (“*.CompanyABC.com”) may be used to secure subdomains like login.companyabc.com, payment.companyabc.com and support.companyabc.com.
Code Signing

Code Signing certificates: When customers want to download applications online, install plug-ins and add-ins, and interact with sophisticated Web-based applications, a code signing certificate is a digital signature that identifies the company responsible for the code and confirms that the code has not been modified since the signature was applied.
Site Seals

Site Seals are static or dynamic images that can be placed on SSL secured websites that allows visitors to tell at a glance that they can trust who they are dealing with, that the online site is validated and that they can transact safely and securely. Each of the three brands of SSL Certificates offer different site seals:
VeriSign Secured Seal is available with all VeriSign-branded SSL certificates for installation on pages secured with a VeriSign SSL Certificate. Customers not only see the trust mark, they can click the seal and verify the site in real time. More than any other trust mark, 79% of U.S. online shoppers are familiar with the VeriSign Secured Seal. More information.
GeoTrust True Site Seal is available with every GeoTrust SSL Certificate and shows web site visitors that their information is protected. The GeoTrust True Site Seal can be added to home pages, buy pages, log-ins or any other page on your authenticated site where visitors need to verify a web site. Depending on the certificate, True Site Seals are either dynamic or static and may contain further information about the identity of the certificate owner. More information.
thawte Trusted Site Seal is a dynamic image appearing on websites secured with thawte SSL certificates allowing visitors to tell at a glance that they can trust the site, that the online site is validated and that they can transact safely and securely. More information.

Manage auto-mail lists

Q. Using Microsoft Outlook I send email to everyone in my “Office” with a list. I start typing the name of the list and Outlook automatically fills it in. However I cannot edit the “Office” list after we upgraded my Outlook to add or remove addresses. I also cannot find the original list in my Contacts.

A. One of the things that email clients like Microsoft Outlook, Entourage and Apple’s Mail do is cache your email addresses. They store your addresses this way s that you can quickly address a message. The cache stores addresses of people and list that you send to and address from messages you have received. You can add addresses to your Address Book or Contacts by right-clicking on the addresses. However you cannot easily edit the cached addresses.

After you upgraded your Outlook your application migrated the cache file (called “Outlook.NK2” on Windows) so that your ability to quickly access addresses is maintained. The only way to regain the ability to edit the list is to recreate it. In Microsoft Outlook, click on Contacts and choose “New Distribution List” from the File menu. Give it a name like “Office 2” and add the addresses you need in the list. Your Contacts will maintain your list for future additions and deletions.

You can select and auto completed email and press the Down Arrow and Delete where it appears. The more extreme method is to delete the Outlook.NK2 file but you will lose all the cached addresses. With Apple’s Mail you can edit “Previous Recipients” under the Window menu.

Sending outside email inside Rogers

Q. When we have guests on our network they have trouble of sending mail. We are with Rogers and the messages go out but they don’t get delivered. What could be wrong?

A. A few years ago Rogers and Yahoo joined forces so they could manage mail services together using Yahoo’s mail servers. While this benefits the services involved in managing e-mail and spam filtering, it resulted in some new rules and restrictions.

Early in the days of the Internet users were much more friendly and could be trusted on wide scale basis. Since most users on Internet could be trusted security on the systems was much looser and most mail servers could accept and relay e-mail to other users. As the Internet grew more and more nefarious types started to take advantage of this trust. Spammers soon found out this loose policy could be taken advantage of. A server that would accept mail from any e-mail address became known as an open relay.

It is estimated that 90% of all e-mail traffic is actually Spam. These days most mail servers block e-mail from domain names that are not registered among their users. So when a strange e-mail lands on the mail server it is often checked against lists of known spammers or simply refused out right. The latter is becoming the more often chosen protocol and users are now finding that their e-mail is not reaching the intended recipient. Some mail administrators maintain white lists of valid e-mail addresses but this is proved to be a huge task to manage.

If you’re trying to send e-mail via a Rogers/Yahoo you must be using a Rogers e-mail account otherwise you have to add the outgoing e-mail address to your accepted users list. Go to http://mail.yahoo.com and login with your Rogers e-mail account and password. Once you’re logged in click on the ‘Mail’ link in the top right corner. Next click on the “Options” link. You should see a place where you can add an e-mail account. Enter your guest’s or other non-Rogers e-mail address and press the “Add” button, you can skip the next screen and at the bottom you’ll find a validation code. At the same time Rogers/Jack who will send an e-mail to that address. However you can copy the code and simply paste it into the dialog screen and press validate.

When complete you will see the outgoing e-mail address listed and you will be able to send outgoing e-mail from within the Rogers network. It is annoying extra set of steps but you can’t blame Rogers for wanting to protect its clients from the barrage of unwanted mail.

More added June 16, 2009


Dear Customer,

This is an important reminder about upcoming security enhancements that will require you to make some adjustments to your e-mail settings in your Rogers Yahoo! Mail (Webmail) options.

According to our records you use an alternate e-mail address in the “From” line of your messages. As a result of upcoming security enhancements starting on April 3rd, you will need to make a change to your e-mail settings so you can continue to send messages from this alternate e-mail address.

If you have already updated your e-mail settings in your Rogers Yahoo! Mail (Webmail) options, there’s no need to take further action.

If you have not completed the steps below, it is very important that you update your e-mail settings prior to April 3rd so you can continue to send messages from your alternate e-mail address.

This change should take under 5 minutes to complete. You simply need to:
to your Rogers Yahoo! Mail (Webmail) account
Add the e-mail address(es) that you typically use in the “From” field of your e-mail messages to your “Mail Profile”
To get detailed, step-by-step instructions on how to make this quick change, visit:

We are pleased to continually deliver a safe and reliable Internet experience to you.

Rogers Hi-Speed Internet Technical Support


Mail text becomes attachment

Q. We continue to get complaints from PC users that we send email to using Apple’s Mail application. They get the message as an attachment and don’t see that the attached files. Often they end up running the wrong file in our ad because they miss the instructions in our e-mail. How can we avoid this?

A. E-mail messages are encoded so they can survive transport over the Internet. The messages are also segmented automatically, so that the servers and mail clients that handle them can determine what makes up the message. Generally email consists of “plain text” and/or “html text” as well as attached files. As a rule file attachments should also always have a “file extension” in the filename.

Some email clients such as Outlook and Outlook Express have trouble deciphering the elements of a mail message – especially if they originate from Apple’s Mail. So some receivers may get a partial message or a blank message with the content for the message as attachments. The safest way to send email is in “plain text” with files properly encoded and attached.

In Apple Mail choose “Attachments” from the “Edit” menu, before you create a message and make sure the following are checked:
“Always Send Windows-Friendly Attachments”
“Always Insert Attachments at the End of the Message.”
Otherwise the parts of the message may get misinterpreted but receiver’s email client application.

Also get in the habit of pressing the “Attachment” icon. If you Drag and Drop the attachment goes in the mail message – inline – with the text. If you use the set up mentioned above – attachments should drop to the end of the email and appear as attached by receiver.

When sending files to a publication you should always use a “zip” archive. Like a Stuffit “.sit” archive, it should contain the required ad elements. You can create a ZIP in the Finder by selecting files or folders and choosing Compress “Folder-name” from the contextual menu (Right-click or Control-Click on the item). The Finder will create an “Archive.zip” file – which you can rename.

Smart Mail Folders and Rules in Mail

Q. I’m trying to set a Rule in Mail to organize my messages. I made a Smart Folder to sort my messages but when I deleted them from my Inbox they were deleted from the Smart Folder as well. Can you tell me what’s wrong?

A. To begin with a Smart Folder in Mail is actually a special way of viewing all of your messages. Like a rule or a filter you can specify the criteria that picks the the messages out. For instance a Smart Folder will gather all the messages to and from an email address or domain that you specify.
Many users organize the email they want to save in folders – a Smart Folder will gather all the messages from all of the folders in your Mail application. You can even choose to include you Sent messages. It does this without moving the messages. So if you delete a message and then empty Mail’s trash you will delete the message.
If you want to keep a message in an organized way then you should create a folder or Mailbox as they are called in Apple’s Mail. Behind the scenes Mail stores your messages in a file called an “mbox”. This is an open source format that many applications use such as Mozilla’s Thunderbird. In fact you can import messages into Microsoft’s Entourage by dragging an mbox file onto “My Messages”.
Storing your messages in mboxes also makes them easier to back up. You can find your mboxes in the Mail folder that is inside your own Library folder – you will see a folder called “IMAP-your-email-address” if you use an IMAP account and/or you will see a folder called “POP-your-email-address” if you use POP3.
Inside these folders you will see an mbox file for each “folder” you have in Mail. You will see an “Inbox.imapmbox”, “Deleted Messages.imapmbox”, “Sent Messages.imapmbox” and so on. If you want to keep messages from “Client A” in your Mail application and you make a rule to move the messages you have received into a folder, Mail will make a file called “Client A.mbox”.
To make a new Mailbox in Mail:
Choose “New Mailbox” from the Mail menu.
Select “On my Mac” as the location.
Name it “Client A”. (or whatever name you like)
Press OK.

Then select a message from Client A.
Go to Preferences under the Mail menu.
Choose Rules.
Choose Add Rule (or edit)
set it to:
If [Any] of the following conditions are met.
[From] [Contains] “@clientadomain…”
Perform the following actions:
[Move Message] to mailbox: [Client A]
Press OK.

Then when you “Apply Rules” it will move the messages to the “Client A” mailbox/mbox and any new email you receive will go to that folder automatically.

Font is a four letter word

Nothing can bring Quark Xpress to it’s knees quite like a corrupt font. In fact, the whole operating system can suffer. With the introduction of Mac OSX, and it’s ability to use multiple font formats the future looked bright. Missing fonts can still be a headache but at least now when a customer sends a PC TrueType font you can use it. A corrupt fonts can wreak havoc over your Macintosh, which entitles us to say that, “Font is a four-letter word.”

MacOS X seemingly has added another level of complexity to the management of fonts. Fonts can be stored in several locations and are activated in a particular order creating confusion for the average user. Certain fonts are required by the operation system, as well as Apple own applications, so removing them or deactivating them can lead to trouble.

Recently, I was called in to investigate a case where Mail would work intermittently. The user would open the application but the Message Viewer window would not open. Initially, it looked like corrupt Mail preferences. We moved the preferences to the desktop, launched the Mail application but the program still didn’t work.
If you’re having a problem with an application, one of the first things you can do is recreate the application’s preference file. Another trick is to create a second user account, then log in with that second account and test the applications. Nine times out of ten, the application is fine – the problem is the user’s preferences file(s).

You’ll find your application’s preferences in the Preferences folder under your own home folder. (Eg /Users/[yourlogin]/Library/Prefernces). Look for a file ending with “.plist”, with a similar name as your application. In the case of Mail – you would look for “com.apple.mail.plist”. Note: If you delete this file you would be prompted to recreate your mail account login. The other common problem with Apple’s own applications occurs if you move them from the Applications folder. Restore the program to its original location and it may behave.

Returning to the Mail problem, I discovered many other Apple programs were misbehaving. Safari, System Preferences, Mail and even Font Book wouldn’t open properly. In most cases we had to “force quit” the applications. This user was using Font Book to manage her fonts.

Apple has included Font Book as a method for dealing with fonts. It has been improved for the latest system, MacOS 10.4 as Font Book 2. While it enables users to create font sets and has a utility for resolving font conflicts, it is still not as flexible as Third Party applications such as Extensis Suitcase, Font Reserve (and FontAgent Pro) for managing fonts, because they don’t interfere with the operating system – when adding fonts. There are also shareware tools such as FontFinagler for fixing font issues. Most users may deal with a few fonts in their daily workflow, but if you’re a publishing professional, then you know you need a robust font management tool – that can deal with hundreds of fonts and font versions.

In MacOS X, there are several locations for fonts to be installed. The first location belongs to the System “/System/Library/Fonts”. These fonts are best left alone, they’re always active and some are absolutely required by the system.

The second location are the Library fonts “/Library/Fonts”. The third location is the User fonts, “/Users/[yourlogin]/Library/Fonts”. Each user has his own fonts under his home folder. The fourth location is the Classic fonts, “/System Folder/Fonts”. These fonts are available to MacOS X applications even if Classic is not running.

The last two locations are Network fonts and Application fonts. Network fonts are located on a MacOS X Server. Application fonts are stored the Library under Application Support.

If you have duplicate fonts installed, you should be aware of how you Mac deals with them. If the system finds duplicate fonts, then it follows a specific order to activate them. First, it will look in the Application’s own font folder. Second, it will look in the User’s font folder. Third, it will look in the local Library font folder, then Network, System, and Classic font folders.

To resolve the mystery of the applications that wouldn’t open we had to delete Font Book’s preferences. The two main culprits are “com.apple.FontBook.plist” and “com.apple.ATS.plist”. Deleting these to files and rebooting the Mac, restored the functionality to the Mail (and other) applications. Then we were left with the task of figuring out which font was corrupt.

Occasionally a font may appear garbled. If that’s the case then there may be a problem with your font caches. Here you’ll need to remove the following files from “/System/Library/Caches” com.apple.ATS.System.fcache, com.apple.ATSServer.FODB_System, and fontTablesAnnex. You’ll need to be an administrator to do this. Remove the “com.apple.ATS” from the “/Library/Caches” folder, and also remove the “com.apple.ATS.plist” from your own Preferences. Once you’ve done this, restart your Mac.