Google Search

Monday, November 28, 2011

Thursday, October 20, 2011

MY FACEBOOK PAGE


Wednesday, October 12, 2011

EXCEL TIPS

http://excel.tips.net/


HELLO FRIENDS
HERE I PROVIDE YOU THE VERY HELPFULL WEBSITE LINKS THAT HELPS IN UNDERSTANDING IN EXCEL. YOU CAN BE A MASTER BY HAVING TIPS HERE.
THANKS & REGARDS
EXCEL TIPS TEAM
BY
NAFEES AHMAD

Friday, September 30, 2011

WHAT IS PHISHING

What is Phishing?
Hi!

Today let's talk about one of the great dangers of the Internet: Phishing.

Phishing is when an ill-intentioned people masquerading as someone to get important information such as a number of a credit card, a password or even a way to invade yourcomputer.

How does it work? The criminal sends a message pretending to be your friend, your bank or another institution known. This message can reach her ​​by e-mail, an instant messaging program or, even for a social networking profile. The strategy is almostalways the same: use curiosity as bait to steal your information.

Want an example? Who of you has received a message like "the pictures you asked me," "your Social Security number has been canceled," "his name was proposedSPC"? So this is phishing. Clicking on links contained in these emails, you most likelywill be installing on your computer program made by a criminal with the purpose of stealing your personal data!

The solution is wary of emails containing files that you did not ask, even if they weresent by friends. Remember, the criminal may have invaded your friend's computer and may be impersonating him.

So be smart and not fall for it.

Wednesday, June 29, 2011

Five tips for removing viruses and spyware

1: Isolate the drive
Many rootkit and Trojan threats are masters of disguise that hide from the operating system as soon as or before Windows starts. I find that even the best antivirus and antispyware tools -- including AVG Anti-Virus Professional, Malwarebytes Anti-Malware, and SuperAntiSpyware -- sometimes struggle to remove such entrenched infections.
You need systems dedicated to removal. Pull the hard disk from the offending system, slave it to the dedicated test machine, and run multiple virus and spyware scans against the entire slaved drive.
2: Remove temporary files
While the drive is still slaved, browse to all users' temporary files. These are typically found within the C:\Documents and Settings\Username\Local Settings\Temp directory within Windows XP or the C:\Users\Username\App Data\Local\Temp folder within Windows Vista.
Delete everything within the temporary folders. Many threats hide there seeking to regenerate upon system startup. With the drive still slaved, it's much easier to eliminate these offending files.
3: Return the drive and repeat those scans
Once you run a complete antivirus scan and execute two full antispyware scans using two current, recently updated and different anti-spyware applications (removing all found infections), return the hard disk to the system. Then, run the same scans again.
Despite the scans and previous sanitization, you may be surprised at the number of remaining active infections the anti-malware applications subsequently find and remove. Only by performing these additional native scans can you be sure you've done what you can to locate and remove known threats.
4: Test the system
When you finish the previous three steps, it's tempting to think a system is good to go. Don't make that mistake. Boot it up, open the Web browser, and immediately delete all offline files and cookies. Next, go to the Internet Explorer Connection settings (Tools | Internet Options and select the Connections tab within Internet Explorer) to confirm that a malicious program didn't change a system's default proxy or LAN connection settings. Correct any issues you find and ensure settings match those required on your network or the client's network.
Then, visit 12 to 15 random sites. Look for any anomalies, including the obvious popup windows, redirected Web searches, hijacked home pages, and similar frustrations. Don't consider the machine cleaned until you can open Google, Yahoo, and other search engines and complete searches on a string of a half-dozen terms. Be sure to test the system's ability to reach popular anti-malware Web sites, such as AVG, Symantec, and Malwarebytes.
5: Dig deeper on remaining infections
If any infection remnants persist, such as redirected searches or blocked access to specific Web sites, try determining the filename for the active process causing the trouble. Trend Micro's HijackThis, Microsoft's Process Explorer, and Windows' native Microsoft System Configuration Utility (Start | Run and type msconfig) are excellent utilities for helping locate offending processes. If necessary, search the registry for an offending executable and remove all incidents. Then, reboot the system and try again.
If a system still proves corrupt or unusable, it's time to begin thinking about a reinstall. If an infection persists after all these steps, you're likely in a losing battle.
Other strategies

Thursday, June 16, 2011

MOVE YOUR MOUSE POINTER WITHOUT MOUSE




Moving the pointer without a mouse..!

Ever thought that you could move your mouse pointer without your mouse..? No, not really, isn't it..? But, it's possible..!

Here is how:

1.Press Left Alt + Left Shift + Num Lock Button and click OK in the dialogue box that appears.

2.In your Taskbar, a mouse-like icon will appear. Double click it and under "Mouse" tab, make sure that the "Use Mouse Keys" is checked.

3.Also ensure that the Num Lock is ON (ie. the light must glow).

2.Now with the help of Numeric Keypad e.g ( Press and Hold the following Keys )

7 8 9

4 6

1 2 3

For normal click, press 5

Interesting, isn't it? You can also change settings under the "Mouse" tab in "Accessibility Options", by clicking on Settings

LOCK YOUR COMPUTER BY PRESSING 2 KEYSTROKS




IF YOU WANT TO GO ANYWHERE WHILE WORKING ON COMPUTER & YOU DONT WANT TO SHUT DOWN YOUR COMPUTER FOR ANY REASON THEN YOU CAN LOCK YOUR COMPUTER SO NO ONE CAN OPERATE YOUR COMPUTER IN YOUR ABSANCE.

IF YOU HAVE CRATED YOUR USER NAME & PASSWORD FOR WINDOWS THEN YOU CAN LOCK YOUR COMPUTER BY PRESSING ONLY TWO KEYSTROKES. YOU DON'T NEED TO LOG OFF IT..

PRESS WINDOW KEY + L




YOUR COMPUTER WILL BE LOCKED. THEN YOU CAN GO ANY WHERE FOR YOUR WORK.

LESSER KNOWN WORD SHORCUTS - VERY IMPORTANT




The shortcuts
Keystroke Function
Ctrl + Shift + D ------: Double underline the selected text
Ctrl + ] ------: Increase the size of selected text by 1 point
Ctrl + [ ------: Decrease the size of selected text by 1 point
Ctrl + Shift + A ------: Make selected text all caps
Ctrl + = ------: Toggle subscripting for selected text
Ctrl + + ------: Toggle superscripting for selected text
Ctrl + Shift + Q ------: Apply Symbol font to selected text
Ctrl + Shift + N ------: Apply Normal style to current paragraph
Ctrl + Alt + 1 ------: Apply Heading 1 style to current paragraph
Ctrl + Alt + 2 ------: Apply Heading 2 style to current paragraph
Ctrl + Alt + 3 ------: Apply Heading 3 style to current paragraph
Ctrl + Shift + L ------: Apply List Bullet style
Ctrl + 0 (zero) ------: Apply or remove space above current paragraph

How To Reset The Ink Level




We always see that if ink cartridge of the printer is new it shows correct ink level. But once it is refilled printer shows ink level error even if it is refilled full. To fix this problem follow these steps:

1) Disconnect the printer's power outlet
2) Press and hold the power button while connecting the power outlet back.
3) While still holding down the power button, press the reset button twice.(red circle with a triangle)

4) Release the power button
The printer takes about 10 seconds to show the number 0.

(at this step, i press and hold the reset button twice, each time i press and hold is about 5 seconds. then i'm able to continue to the next step)

5) Press + to change the value from 0 to 1.

6) When this value is 1, press colour button; this will light up two leds.
One is for plain paper and the other for photo paper. At this point feed the printer with paper.

7) Press the power button twice and the printer will print a some stuff (if this page doesn't print by itself, press the "color" button once and the test page will print). Don't worry much about the printed material. I got some stripped lines and some numbers. I believe that my colour cartridge is clogged which is why I got the green strips.
When you print this sheet the value in the display returns to zero.

(at this step, i have to wait for about two minutes or more then the printer automatically start print the document mentioned.)

8 ) Open the printer cover cover (not the scanner cover) and remove the cartridges. With the printer still open, disconnect the power outlet.

9) Close the lid and turn on the printer.

10) Refill cartridges and place them back in their nice little abode in the printer.

11) close the printer cover. Wait for 2 mins. (for my printer, i didnt wait for two minutes, the light immediately disappeared) The amber light beside the black ink and color ink will have disappeared.
Also if you take printouts now you will no longer get the ink low warning.If you check the ink status
it will show that the cartridge is full !!! THe ink level has been reset successfully."

IT PERFECT AND SUCCESSFULY SOLUTION

WITH BEST REGARDS
NAFEES AHMAD

HOW TO PROTECT OUR ORKUT PROFILE FROM HACKERS




Hacking technique 1..
Hackers send us a fake orkut duplicate site. the victim thinks he got logged out, and then tries to log back in. but instead the hacker steps in and steal your password.

How to protect yourself from this- whenever you see an orkut login page, check the addressbar, and make sure it says, Orkut.com, or google.com or orkut.co.in or orkut.com.br. if you have any doubts, simple close the window.

Hacking technique 2.
Hacker send a virus (/malware /trojan) to your computer, that records everything you type, most cyber cafes, and public computers are already affected with such viruses, these viruses do not delete anything from your computer, they just sit there, and steal your passwords.

How to protect yourself from this most of the times such viruses enter from your internet browser' now, internet explorer is pretty safe on an updated, and orignal, windows system, but if someone uses pirated version of windows, you will probably get these viruses faster if you use Internet explorer on such pirated windows so, the safe thing to do is, stop using internet explorer, download, Firefox, or Google chrome they are safe, secure, absolutely free, and very very fast, i personally prefer google chrome, it changed the way i use the internet, this is just much much faster now.

These are the two main techniques hackers used on someone's orkut account, and hence i provided simple techniques i used to protect myself, two more things that experts recommend, is:
1. Keep an effective and updated antivirus,
2. Use firewall to protect your computer from threats.

It don't take 100% guarantee to make u safe from hackers but very very effective.

KEYBOARD SPECIAL CHARACTERS


Special Characters - Alt Keyboard Sequences
To obtain an ALT Character:

1. Make certain that the Num Lock key has been pressed to activate the numeric key section of the keyboard.
2. Depress the Alt key.
3. While the Alt key is depressed, type the proper sequence of numbers (on the numeric keypad) of the ALT code from the table above.
4. Release the Alt key, and the character will appear.
5. On a laptop computer, there usually is no numeric keypad. So, instead, depress the Fn (function) key, then the Alt key, then the numerical code sequence. The numbers are on the fronts of certain keyboard keys: M=0, J=1, K=2, L=3, U=4, I=5, O=6, 7=7, 8=8, and 9=9.

*There are some gaps in the numerical sequence of ALT Character codes because either those items do not exist, or else they are duplicates of characters listed elsewhere.

RUN command shortcuts




I know there are a lot of people who love using the run prompt
or the command prompt rather than using the mmc control ...
So here are some quick tips that you can use ... Enjoy ...

Accessibility Controls: access.cpl

Add Hardware Wizard: hdwwiz.cpl

Add/Remove Programs: appwiz.cpl

Administrative Tools: control admintools

Automatic Updates: wuaucpl.cpl

Bluetooth Transfer Wizard : fsquirt

Calculator: calc

Certificate Manager : certmgr.msc

Character Map: charmap

Check Disk Utility : chkdsk

Clipboard Viewer: clipbrd

Command Prompt: cmd

Component Services: dcomcnfg

Computer Management: compmgmt.msc

Date and Time Properties: timedate.cpl

Device Manager: devmgmt.msc

Disk Cleanup Utility: cleanmgr

Disk Defragment: dfrg.msc

Disk Management: diskmgmt.msc

Disk Partition Manager: diskpart

Display Properties: desk.cpl

Display Properties (w/Appearance Tab Preselected): control color

Dr. Watson System Troubleshooting Utility: drwtsn32

Driver Verifier Utility: verifier

Event Viewer: eventvwr.msc

File Signature Verification Tool: sigverif

Folders Properties: control folders

Fonts Folder: fonts

Internet Properties: inetcpl.cpl

Keyboard Properties: control keyboard

ODBC Data Source Administrator: odbccp32.cpl

On Screen Keyboard: osk

Opens AC3 Filter (If Installed): ac3filter.cpl

Password Properties: password.cpl

Regional Settings: intl.cpl

Registry Editor: regedit

Registry Editor: regedit32

Remote Desktop: mstsc

Removable Storage: ntmsmgr.msc

Removable

Storage Operator Requests: ntmsoprq.msc

Resultant Set of Policy (XP Prof): rsop.msc

Scanners and Cameras: sticpl.cpl

Scheduled Tasks: control schedtasks

Security Center: wscui.cpl

Services: services.msc

Shared Folders: fsmgmt.msc

Shuts Down Windows: shutdown

Sounds and Audio: mmsys.cpl

System Properties: sysdm.cpl

Task Manager: taskmgr

EXCEL TIPS-DFRNC BTWN CURRENCY & ACCOUNTING FORMAT




Excel features several shortcuts that allow you to quickly apply formatting to selected cells. For instance, on the Formatting toolbar or the Home tab of the ribbon there are tools that allow you to apply character attributes, such as bold, italics, and underline. There is also a tool that has a dollar sign on it. (Well, it does in the US versions—not sure about what the tool looks like in other countries' versions of Excel.)

If you hover the mouse pointer over this tool in versions of Excel up through Excel 2003, the ToolTip that appears says Currency Style.

The fact of the matter is, this tool doesn't really apply the Currency style. What really happens is that the tool applies the Accounting style with the currency symbol selected. You can verify this by selecting a cell, clicking on the Currency Style tool, and then choosing Cells from the Format menu. In the resulting Format Cells dialog box, the Number tab indicates that the selected cell is formatted using the Accounting style.

It is interesting to note that in Excel 2007 Microsoft seems to have changed this misnomer. If you hover the mouse pointer over the dollar-sign tool, the ToolTip indicates that it is the Accounting style that the tool applies.

While the distinction between the Currency style and the Accounting style may not seem like a big deal, it can make a big difference in how information is displayed in the affected cells. The Currency and Accounting styles align numbers and currency symbols differently, and some of the available underline styles work differently in cells formatted with the two styles.

To figure out which format works best for you, make sure you test them both out. And if you really want to use the Currency style, then don't use the Currency Style tool on the toolbar.

CHANGING THE FONT & SIZE OF TOOL TIPS & COMMENTS



When you insert a comment into a worksheet cell, Excel places the user's name on the first line of the comment balloon in bold type. The insertion point is then at the beginning of the next line, ready for your to type. What you type is inserted, by default, in 8-point Tahoma.
If you want a larger font used for your comment, you can change the character formatting of anything within the comment itself. Just select the text, then use the controls on the Formatting toolbar or by choosing Comment from the Format menu.
Excel does not provide a way for you to change the default font specifications for comment balloons, across the board. You can change them individually (as already mentioned), but not universally within Excel. You can make a change in Windows that will affect the comment font, however. Follow these general instructions:
Right-click anywhere on the desktop. Windows displays a Context menu.
Choose Properties. Windows displays the Display Properties dialog box.
Make sure the Appearance tab is selected. Click the Advanced button. Windows displays the Advanced Appearance dialog box. Using the Item drop-down list, choose ToolTip. Using the other controls in the dialog box, change the font specifications as desired. Click OK, as necessary, to close all the open dialog boxes.
In case you didn't figure it out from these steps, the font used in the comment balloons of Excel is determined by the ToolTip font used by Windows. Changing the ToolTip font changes the comment balloons, but it also changes things in other applications besides Excel, as well.
If you prefer to not change the ToolTip font, you can create an Excel macro that will step through all the comments in a worksheet to make changes.
Sub FixComments()
Dim cmt As Comment

For Each cmt In ActiveSheet.Comments
With cmt.Shape.TextFrame.Characters.Font
.Name = "Arial"
.Size = 12
End With
Next cmt
End Sub
This macro changes the font to 12-point Arial for all comments.

MORE THAN 2 SIMULTANEOUS DOWNLOADS ON IEXPLORER



This is to increase the the number of max downloads to 10.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Internet Settings
3. On the Edit menu, click Add Value , and then add the following registry values:
"MaxConnectionsPer1_0Server"=Dword:0000000a
"MaxConnectionsPerServer"=Dword:0000000a
4. Quit Registry Editor.