is a free blogging website to share all sort of technical issue, article, How-to, latest news, etc.


Recover Lotus Notes Archive to standard mail file

Recover Lotus Notes archive to standard mail file All the Lotus Notes archive mail file look similar with the standard mail file because they are using the same mail template. You might need to use the archive mail file to replace the existing mail file in server for certain cases. However you will notice that […]


Useful command for Lotus Domino/Notes server maintenance

Below are some of the useful commands for IBM Lotus Domino/Notes server maintenance. Use in Domino Console


How to repair Lotus Domino/Notes NSF file

IBM Lotus Domino/Notes use NSF (Notes Storage Facility) file to storage the data together with the design. All the mail file in Lotus Domino/Notes is in *.nsf format. There are cases that these individual NSF file might get corrupted. Below are some of the example of corrupted nsf file message

Error compacting Mail *.nsf: Database is corrupt — Cannot allocate space

Cannot open NSF files

RRV bucket is corrupt


IBM Lotus Domino in Windows 2008 Server

There is no more Domino Console due to the architecture changed in Windows 2008. The java server controller must be started so that you can view/manage thru the java console.

The start-up Lotus Domino service parameters for Lotus Domino in Windows 2008 Server registry must be correct in order to start the java server controller.


 Registry key:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Lotus Domino Server\ImagePath


Disable Lotus Domino/Notes HTTP TRACE / TRACK Methods

Synopsis : Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.