Feedback Tab
Home Up General Tab Functionality Tab Appearance Tab Branding Tab Page/Directory Protection Tab Feedback Tab Directories Tab

 

The feedback tab allows you to control various aspects of how data from form processing within your presentation is returned to you.

SMTP Server to be used for feedback.

You need to specify something in this field only if one of your forms specifies the "SMTP?" or "SMTPC?" action. If the user initiates that action then your presentation will attempt to connect via a TCP/IP connection using the SMTP protocol to the e-mail server specified here in order to send the data back via SMTP e-mail.

Note this is the address of an SMTP SERVER, it is not an e-mail address.

The email address the data goes back to is specified as part of the Action in the HTML that defines the form. See "Processing Forms" for more details.

The SMTP server you specify here must be willing to accept connections that do not originate from its own domain. Many don't in order to prevent them being abused by spammers. You may need to experiment or check with your ISP to see if you can use the SMTP Server you use with your normal e-mail client, or hunt for an alternative on the Internet that you can be sure will be available for the life of your presentation.

SMTP/MAPI Feedback Style

Check this box if you would prefer the data to be embedded inline in the email message rather than being returned as an attached file. 

Feedback encryption

Check the box if you want data returned via SMTP or MAPI or saved to a file to be encrypted. You may want to do this if sensitive information such as credit card numbers is involved. The data is encrypted using the standard "Blowfish" encryption algorithm, and you can use a key up to 56 bytes (448bits) in length. Note that keys are case sensitive, and things like additional blanks on the end count as part of the key.

To decrypt data that has been returned to you, press the Decrypt button, select the file(s) containing the encrypted data and press OK. Note that you can select multiple files. The data will be decrypted and the file extension changed to .wcd

If you want to develop a more automated decryption mechanism for inclusion in some other process, the encryption is performed with Blowfish using the CFB chaining mode. You can learn more about the Blowfish algorithm from http://www.counterpane.com

Note that using such encryption may be illegal in your country, and if so you should not use it. This encryption implementation was developed totally outside of the USA. It is illegal to export this product from the USA, but it may be freely purchased in other parts of the world, and freely used in the USA. At the time of writing it is probably illegal to export presentations using encryption with more than a 40bit (5 byte or character) key from the USA.

Bear in mind that the key is carried with the presentations, (it has to be if you think about it) and although it is well hidden and each presentation is different it isn't impossible to break it although it would take a lot of effort.