Tuesday, October 18, 2011
Different formats in single document.
- Separate the sections that you want to apply different page orientations to by a Next Page Section Break. You can apply a Next Page Section Break by choosing Insert | Break from the menu bar and selecting the Next Page option button under the Section Break Types panel of the Break dialog box. (In 2007, select the Page Layout tab on the ribbon and choose Breaks.)
- Select the text/pages you want in Landscape orientation and choose File | Page Setup from the menu bar. (In 2007, click on the arrow in the lower-right corner of the Page Setup area of the Page Layout ribbon to open the Page Setup dialog box.)
- Choose the Landscape orientation and then, in the Apply To dropdown box, choose Selected Text.
Tuesday, October 18, 2011 by Gomzi · 0
- Click anywhere within your PivotTable to view the PivotTable toolbar (or choose View | Toolbars | PivotTable from the menu bar).
- Click the PivotTable button on the PivotTable toolbar and choose Table Options from the resulting menu. Excel displays the PivotTable Options dialog box. (In 2007, click on the PivotTable button on the PivotTable Tools ribbon, then choose Options.)
- Select the For Error Values, Show check box, and leave the corresponding text box blank.
- Click OK to return to your PivotTabl
by Gomzi · 0
Wednesday, July 13, 2011
Backup Your Router.
In some cases, you may want to copy the system image from one device to another, to duplicate settings; or you may want to back it up.
Although the steps for different routers may vary, generally you’ll first want to know the name and size of the system image file. You can do so with the following command:
show flash
The system image is the file with a .bin extension. You should copy down the name of the file so you can enter it if your router prompts you for it.
You can then copy the file with the following command:
copy flash tftp
You’ll then be prompted for the IP address of the TFTP server you’re copying from, the name of the file you’re copying, and the name of the file you’re copying to. Use the names you found from “show flash”; however, you can leave out the “.bin” part.
If you’re trying to replace the system image of another device, use “show flash” to get the name of that device’s system image, and use that name when prompted for the destination file. You’ll then be prompted to confirm that you want to overwrite the system image.
For more information, consult the following instructions for Cisco 2500 Series Routers:
www.cisco.com/en/US/products/hw/routers/ps233
/products_tech_note09186a00800a6744.shtml#copying
Wednesday, July 13, 2011 by Gautam Sehgal · 1
Get More information on your security Alerts.
When your Cisco appliance issues a security signature or alert, you may wonder how to get more information, or whether the message you’re seeing could be a “false positive.”
To get more information on such messages, simply go to the following website:
http://tools.cisco.com/security/center/search.x
If you type in the name or message that appears, be sure to change the dropdown next to Keywords to “exact phrase.” That narrows the results considerably, usually right down to the one exact security record you need.
Once you pull up the information on your message, look for the section on “Benign Triggers” to help assess whether you’re dealing with a false positive or a real security breach.
Note that this tool from Cisco also lets you search for security messages from Apache, HP, Microsoft, and Red Hat.
by Gautam Sehgal · 1
Wednesday, June 22, 2011
How Secure is your business.
- Passive. At this stage, the security team and the business principals cooperatively develop the policies and guidelines needed to protect the organization’s information.
- Active. At this stage, the security team implements the technologies needed to support the Security Life Cycle: Detect, Assess, Respond, and protect. This stage typically requires the most resources.
- Integrative. At this stage, security is an integral part of business decisions. To support the organization’s business goals, existing policies are revised and new security technologies are selected.
Wednesday, June 22, 2011 by Gautam Sehgal · 0
Create PDF file without using any software.
We’ve all seen Adobe PDFs on the web or attached to an email — but until now, creating them from Word documents or PowerPoint presentations involved purchasing extra software or paying for an online conversion. With Office 2007, creating a PDF from a file is as easy as saving it, as long as you have the add-in installed.
To get the add-in, visit the Microsoft Download Center at www.microsoft.com/downloads. Then, simply enter “PDF” without the quotes into the Search box and click Go.
You can choose from a PDF-only tool or one that saves XPS files as well. These tools support the 2007 Office versions of Access, Excel, PowerPoint, and Word.
by Gautam Sehgal · 0
Tuesday, June 7, 2011
Clear All your hyperlinks texts in just a frame.
First, place the insertion point anywhere within the hyperlinked text or field you want to deactivate. (If you’re deactivating a hyperlink, be careful not to launch it.) Or, if you want to simultaneously strip all the hyperlinks and field codes in your document, begin by pressing [Ctrl]A to select the entire document ([command]A in Word 2001).
Next, press [Ctrl][Shift][F9] or [Ctrl]6 ([command][shift][F9] or [command]6 in Word 2001). Word removes any selected hyperlinks and fields—without disturbing their original display text.
Keep in mind that if your hyperlink’s display text is different from its URL, the URL stored behind the scenes is stripped along with the hyperlink—only the display text remains.
Tuesday, June 7, 2011 by Gautam Sehgal · 1
Make your work Easy.
You can use the Slide Miniatures pane to select any number of slides and apply transition effects to them. If you’re grouping certain related slides together, it’s helpful if they share the same type of transition. This gives your audience another cue as to information groupings. Sometimes, however, it might not be apparent which slides go together until you’ve finished creating your show. For this reason, it’s best to make adding transitions one of your final steps. To add a transition to multiple slides, arrange your slides in the order you wish to present. Use the [Ctrl] key to select multiple slides that don’t follow one another, or hold down the [Shift] key to select a range of slides. Choose Slide Show | Slide Transition to open the Slide Transition task pane (Slide Transition window in PowerPoint 2000). In PowerPoint 2007, go to the Animations tab and adjust the settings in the Transition To This Slide group. The transition effects you choose will be applied to the selected slides. by Gautam Sehgal · 1
Go to defaults and start again.
Here’s the solution: You can use the DCGPOFix command to reset both the default domain policy and the default domain controllers policy to their default settings. The basic syntax for this command is dcgpofix. When you enter this command, you’ll see a warning message reminding you that you’ll lose all settings in these two GPOs. To continue, enter Y.
by Gautam Sehgal · 1
Save yourself from Phishing.
Spoofing is a term used to describe methods of faking various parts of the browser user interface. This may include the address or location bar, the status bar, the padlock, or other user interface elements. Phishing attacks often utilize some form of spoofing to help convince the user to provide personal information. If a user’s browser is vulnerable to spoofing, they are more likely to fall victim to a phishing attack. You can search the US-CERT and CERT/CC web sites for malicious scripting and content vulnerabilities at the following URL: http://search.us-cert.gov (use the search term browser+spoof). The US-CERT document “Technical Trends in Phishing Attacks” (available at http://www.us-cert.gov/reading_room/phishing_trends0511.pdf) has more information about spoofing and phishing techniques.by Gautam Sehgal · 0
Thursday, May 19, 2011
- Open the Group Policy Object (GPO) Editor.
- Navigate to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options.
- In the right pane, double–click on Accounts: Rename Administrator Account.
- Select the Define This Policy Setting check box and enter the new name for the account
- Click OK to save your changes.
- Repeat this procedure with the Accounts: Rename Guest Account item.
Thursday, May 19, 2011 by Gautam Sehgal · 0
No more SYN Flood Attacks.
- Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSet
ServicesTcpipParameters. - Create a REG_DWORD value called SynAttackProtect.
- Set the value data field to 2 for best protection against SYN flood attacks.
by Gautam Sehgal · 0
Tuesday, May 10, 2011
Analise your network smoothly.
To get started with network sniffers, Wireshark is a good place to start, as it has fairly extensive documentation and support, and features both GUI and command-line style interfaces.
If you want to use Wireshark, don’t go to www.wireshark.com. The address is www.wireshark.org.
In addition, you’ll want to check out the following informational sites:
Wireshark user guide: www.wireshark.org/docs/wsug_html/
Wireshark training: www.wiresharktraining.com/
Tuesday, May 10, 2011 by Gautam Sehgal · 0
Know your Matadata in your documents.
To make your documents easier to store, route, and locate, Word automatically saves hidden information (a.k.a. metadata) within your document. Metadata includes information such as authors’ and editors’ names, routing slips, and email headers. You can configure Word to remove this metadata during the save process if you’d rather restrict access to this information. To share your documents without sharing this personal information, follow these steps in 2002/2003: - Select Tools | Options from the menu bar to open the Options dialog box.
- Click on the Security tab.
- In the Privacy Options panel, select the Remove Personal Information From This File On Save check box, and then click OK.
Each time you save a document, this setting removes its file properties (i.e., the contents of the Author, Manager, Company, and Last Saved By fields located in the Properties dialog box). In addition, names associated with tracked changes, comments, and versions are changed to Author, and routing slips and email headers, if any, are removed. This setting remains in effect for all documents unless you disable it.
by Gautam Sehgal · 2
A crypto map set allows you to forward traffic to users with different security protocols. To do this, you create crypto map entries for each protocol, using the same crypto map name. The sequence numbers (seq-num) differentiate the entries.
The key thing to remember is that entries with lower sequence numbers are processed first. Sometimes just changing the order of the sequence numbers may solve your networking problem. For example, if setting up VPN causes your other authentication system not to work, try giving the VPN a higher sequence number in the crypto map.
For more information on customizing crypto maps, see the crypto ca authenticate command page in the Cisco Security Appliance Command Reference at www1.cisco.com/en/US/docs/security
/asa/asa80/command/reference/c5.html.
by Gautam Sehgal · 0
Sunday, May 1, 2011
Are you using right cables in your network structures??
You may think it’s strange but using the wrong type of cable is a common problem with networks. However, there are many installed networks running on low-grade, or even wrong, cable. Many networks were installed in offices where some sort of cabling already existed and, to cut corners, someone decided to use the existing cable, no matter what was recommended. The network may run on this cable, but not at its optimum level of performance and usually with intermittent errors. Here’s the best advice: Don’t cut corners on your network cabling. Use high-quality cable that meets or exceeds the specifications for your network topology. Make sure you use data-grade cable, not inexpensive phone cable. You’ll see a big performance difference between the two.
Sunday, May 1, 2011 by Gautam Sehgal · 0
No more SPIM, SPIT or SPAM.
SPIT is SPAM sent over internet telephony. Because the phone is connected to the internet, spammers could target the VOIP with unwanted messages. SPIT is not yet a major problem. Before embracing and becoming dependent on any new technology, you must consider all potential threats to productivity, include SPIM, SPIT, and SPAM.
by Gautam Sehgal · 1
Is your Data digitally signed.
PGP is available in both freeware and commercial versions. You can get the commercial version at www.pgp.com or download the free version for Windows XP at www.pgpi.org/products/pgp
/versions/freeware/winxp/8.0/.
There are also versions for earlier Windows operating systems, UNIX, Mac, and even MS-DOS, OS/2, and Palm OS.
by Gautam Sehgal · 2
Make up your mind and create secure passwords.
Strong passwords are the first line of defense against hack attacks, but how can you get users to create passwords that are complex and don’t contain any dictionary words, without making the passwords so hard to remember that they end up writing them down?by Gautam Sehgal · 0
No more loosing your passwords…..
the key is in your hands.
Microsoft Windows XP’s Forgotten Password Wizard allows you to create a password reset disk that you can use to recover your user account and personalized computer settings in the event you forget your login password.by Gautam Sehgal · 0