Showing posts with label Tips and Tricks. Show all posts
Showing posts with label Tips and Tricks. Show all posts

Tuesday, October 18, 2011

Format The Same Document in Two Different Ways (2000/2002/2003/2007)


Different formats in single document.

If you’re working on a long document and want parts of the document to have Landscape page orientation, you can do so by following the steps outlined below:
  1. Separate the sections that you want to apply different page orientations to by a Next Page Section Break. You can apply a Next Page Section Break by choosing Insert | Break from the menu bar and selecting the Next Page option button under the Section Break Types panel of the Break dialog box. (In 2007, select the Page Layout tab on the ribbon and choose Breaks.)
  2. Select the text/pages you want in Landscape orientation and choose File | Page Setup from the menu bar. (In 2007, click on the arrow in the lower-right corner of the Page Setup area of the Page Layout ribbon to open the Page Setup dialog box.)
  3. Choose the Landscape orientation and then, in the Apply To dropdown box, choose Selected Text.
This will create a document partially formatted using Portrait orientation and partially using Landscape orientation.

Tuesday, October 18, 2011 by Gomzi · 0

Eliminate Error Values in Your Pivottable (2000/2002/2003/2007)


Resolve Errors.
If your PivotTable’s source data contains errors, you’ll notice those errors pop up in your PivotTable too. Here’s how you can replace error values with blank cells in your PivotTable:
  1. Click anywhere within your PivotTable to view the PivotTable toolbar (or choose View | Toolbars | PivotTable from the menu bar).
  2. Click the PivotTable button on the PivotTable toolbar and choose Table Options from the resulting menu. Excel displays the PivotTable Options dialog box. (In 2007, click on the PivotTable button on the PivotTable Tools ribbon, then choose Options.)
  3. Select the For Error Values, Show check box, and leave the corresponding text box blank.
  4. Click OK to return to your PivotTabl
   There’s a lot more regarding MS Office, for more information stay connected…

by Gomzi · 0

Wednesday, July 13, 2011

Copy a Router’s System Image

Backup Your Router.

In some cases, you may want to copy the system image from one device to another, to duplicate settings; or you may want to back it up.

Although the steps for different routers may vary, generally you’ll first want to know the name and size of the system image file. You can do so with the following command:

show flash

The system image is the file with a .bin extension. You should copy down the name of the file so you can enter it if your router prompts you for it.

You can then copy the file with the following command:

copy flash tftp

You’ll then be prompted for the IP address of the TFTP server you’re copying from, the name of the file you’re copying, and the name of the file you’re copying to. Use the names you found from “show flash”; however, you can leave out the “.bin” part.

If you’re trying to replace the system image of another device, use “show flash” to get the name of that device’s system image, and use that name when prompted for the destination file. You’ll then be prompted to confirm that you want to overwrite the system image.

For more information, consult the following instructions for Cisco 2500 Series Routers:

www.cisco.com/en/US/products/hw/routers/ps233
/products_tech_note09186a00800a6744.shtml#copying

Wednesday, July 13, 2011 by Gautam Sehgal · 1

The Easy Way to Get Information on Security Signatures

Get More information on your security Alerts.

When your Cisco appliance issues a security signature or alert, you may wonder how to get more information, or whether the message you’re seeing could be a “false positive.”

To get more information on such messages, simply go to the following website:

http://tools.cisco.com/security/center/search.x

If you type in the name or message that appears, be sure to change the dropdown next to Keywords to “exact phrase.” That narrows the results considerably, usually right down to the one exact security record you need.

Once you pull up the information on your message, look for the section on “Benign Triggers” to help assess whether you’re dealing with a false positive or a real security breach.

Note that this tool from Cisco also lets you search for security messages from Apache, HP, Microsoft, and Red Hat.

by Gautam Sehgal · 1

Wednesday, June 22, 2011

Make Security an Integral Part of Your Organization’s Business Goals

How Secure is your business.

Many business principals find the whole issue of organizational security rather esoteric and are generally reluctant to allocate resources to it unless they can see a return on their investment. At the same time, technical staff charged with managing organizational security often finds itself fighting an uphill battle because, without the appropriate resources, they can’t do their jobs. As a result, both parties fall into a reactive rather than a proactive role, responding to incidents only when they affect critical operations.
In communicating your needs to upper management, it can be helpful to discuss security in terms of three distinct stages, as described here:
  • Passive. At this stage, the security team and the business principals cooperatively develop the policies and guidelines needed to protect the organization’s information.
  • Active. At this stage, the security team implements the technologies needed to support the Security Life Cycle: Detect, Assess, Respond, and protect. This stage typically requires the most resources.
  • Integrative. At this stage, security is an integral part of business decisions. To support the organization’s business goals, existing policies are revised and new security technologies are selected.

Wednesday, June 22, 2011 by Gautam Sehgal · 0

Save an Office File to a PDF with a Simple Add-in Tool (Office 2007)

Create PDF file without using any software.

We’ve all seen Adobe PDFs on the web or attached to an email — but until now, creating them from Word documents or PowerPoint presentations involved purchasing extra software or paying for an online conversion. With Office 2007, creating a PDF from a file is as easy as saving it, as long as you have the add-in installed.
To get the add-in, visit the Microsoft Download Center at www.microsoft.com/downloads. Then, simply enter “PDF” without the quotes into the Search box and click Go.

You can choose from a PDF-only tool or one that saves XPS files as well. These tools support the 2007 Office versions of Access, Excel, PowerPoint, and Word.

by Gautam Sehgal · 0

Tuesday, June 7, 2011

Instantly Deactivate All Hyperlinks or Fields in a Document (Word 2000/2002/2003/2004/2007)

Clear All your hyperlinks texts in just a frame.

Sometimes, you may want to deactivate hyperlinks so they act like regular document text. In fact, you may have wanted to do the same with field codes, too. Instead of digging around in dialog boxes and shortcut menus to solve the problem, Word offers two shortcut keys you can use to accomplish either task.
First, place the insertion point anywhere within the hyperlinked text or field you want to deactivate. (If you’re deactivating a hyperlink, be careful not to launch it.) Or, if you want to simultaneously strip all the hyperlinks and field codes in your document, begin by pressing [Ctrl]A to select the entire document ([command]A in Word 2001).

Next, press [Ctrl][Shift][F9] or [Ctrl]6 ([command][shift][F9] or [command]6 in Word 2001). Word removes any selected hyperlinks and fields—without disturbing their original display text.
Keep in mind that if your hyperlink’s display text is different from its URL, the URL stored behind the scenes is stripped along with the hyperlink—only the display text remains.

Tuesday, June 7, 2011 by Gautam Sehgal · 1

Easily Apply Slide Transitions to Multiple Slides (Powerpoint 2000/2002/2003/2004/2007)

Make your work Easy.

You can use the Slide Miniatures pane to select any number of slides and apply transition effects to them. If you’re grouping certain related slides together, it’s helpful if they share the same type of transition. This gives your audience another cue as to information groupings. Sometimes, however, it might not be apparent which slides go together until you’ve finished creating your show. For this reason, it’s best to make adding transitions one of your final steps. To add a transition to multiple slides, arrange your slides in the order you wish to present. Use the [Ctrl] key to select multiple slides that don’t follow one another, or hold down the [Shift] key to select a range of slides. Choose Slide Show | Slide Transition to open the Slide Transition task pane (Slide Transition window in PowerPoint 2000). In PowerPoint 2007, go to the Animations tab and adjust the settings in the Transition To This Slide group. The transition effects you choose will be applied to the selected slides.

by Gautam Sehgal · 1

Reset The Domain Group Policies to Default


Go to defaults and start again.

Imagine this scenario: You’ve inherited a network with a multitude of changes to the default domain group policies. You don’t know what your predecessor enabled or disabled in these GPOs. All you want to do is get your domain back to the default domain and default domain controllers policies included with Windows Server 2003–and fast. You can then begin the process of creating or modifying group policies to suit your needs.

Here’s the solution: You can use the DCGPOFix command to reset both the default domain policy and the default domain controllers policy to their default settings. The basic syntax for this command is dcgpofix. When you enter this command, you’ll see a warning message reminding you that you’ll lose all settings in these two GPOs. To continue, enter Y.

by Gautam Sehgal · 1

Troubleshoot File Replication

Save yourself from Phishing.

Spoofing is a term used to describe methods of faking various parts of the browser user interface. This may include the address or location bar, the status bar, the padlock, or other user interface elements. Phishing attacks often utilize some form of spoofing to help convince the user to provide personal information. If a user’s browser is vulnerable to spoofing, they are more likely to fall victim to a phishing attack. You can search the US-CERT and CERT/CC web sites for malicious scripting and content vulnerabilities at the following URL: http://search.us-cert.gov (use the search term browser+spoof). The US-CERT document “Technical Trends in Phishing Attacks” (available at http://www.us-cert.gov/reading_room/phishing_trends0511.pdf) has more information about spoofing and phishing techniques.

by Gautam Sehgal · 0

Thursday, May 19, 2011

Rename The Administrator Account using Group Policy

Steps to change rename "Administrator"

As you know, it’s a best security practice to rename the built-in administrator and guest accounts. Rather than renaming these accounts in the Computer Management console, the preferred method is to use the Microsoft Windows Server 2003 Group Policy, as described in these steps:
  1. Open the Group Policy Object (GPO) Editor.
  2. Navigate to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options.
  3. In the right pane, double–click on Accounts: Rename Administrator Account.
  4. Select the Define This Policy Setting check box and enter the new name for the account
  5. Click OK to save your changes.
  6. Repeat this procedure with the Accounts: Rename Guest Account item.

Thursday, May 19, 2011 by Gautam Sehgal · 0

Protect Windows Systems Against SYN Flood Attacks


No more SYN Flood Attacks.

A SYN flood is a type of Denial of Service (DoS) attack that overwhelms a server by sending it repeated synchronization (SYN) packets, usually making these packets appear to come from fake or forged (spoofed) source IP addresses. The SYN packet is normally used to establish a TCP/IP connection as the first part of the TCP/IP handshake process. Attackers can exploit this characteristic of the TCP/IP protocol. When the server’s connection table is full, legitimate users won’t be able to connect to it.
A common defense against SYN floods is to decrease the timeout so that connection responses time out more quickly. You can configure Windows 2000/XP computers to do this by creating a new registry setting, as follows:
  1. Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSet
    ServicesTcpipParameters.
  2. Create a REG_DWORD value called SynAttackProtect.
  3. Set the value data field to 2 for best protection against SYN flood attacks.

by Gautam Sehgal · 0

Tuesday, May 10, 2011

How To Debug Network Performance Problems

Analise your network smoothly.

If your network is slow or experiencing other problems, one tool to help figure out what’s wrong is a network sniffer (also called packet analyzer).
Some free multi-platform network sniffers include Ettercap, ngrep, tcpdump, and Wireshark.
To get started with network sniffers, Wireshark is a good place to start, as it has fairly extensive documentation and support, and features both GUI and command-line style interfaces.
If you want to use Wireshark, don’t go to www.wireshark.com. The address is www.wireshark.org.
In addition, you’ll want to check out the following informational sites:
Wireshark user guide: www.wireshark.org/docs/wsug_html/
Wireshark training: www.wiresharktraining.com/

Tuesday, May 10, 2011 by Gautam Sehgal · 0

How To Remove Personal Information From Your Documents (2002/2003/2007)

Know your Matadata in your documents.

To make your documents easier to store, route, and locate, Word automatically saves hidden information (a.k.a. metadata) within your document. Metadata includes information such as authors’ and editors’ names, routing slips, and email headers. You can configure Word to remove this metadata during the save process if you’d rather restrict access to this information. To share your documents without sharing this personal information, follow these steps in 2002/2003:
  1. Select Tools | Options from the menu bar to open the Options dialog box.
  2. Click on the Security tab.
  3. In the Privacy Options panel, select the Remove Personal Information From This File On Save check box, and then click OK.
In 2007, click the Office button and choose Prepare | Inspect Document. (You may be prompted to save changes first.) Click Inspect, then click Remove all next to the types of hidden content you want to remove.
Each time you save a document, this setting removes its file properties (i.e., the contents of the Author, Manager, Company, and Last Saved By fields located in the Properties dialog box). In addition, names associated with tracked changes, comments, and versions are changed to Author, and routing slips and email headers, if any, are removed. This setting remains in effect for all documents unless you disable it.

by Gautam Sehgal · 2

Resolve a Conflict Between Security Protocols with This Simple Crypto Map Setting

When forwarding traffic to users on different security protocols, you may sometimes find that setting up one security protocol conflicts with another. For example, if your configuration for remote VPN users isn’t done properly, that may interfere with an existing IPsec authentication.
If that happens, check your sequence numbers for crypto map entries.
A crypto map set allows you to forward traffic to users with different security protocols. To do this, you create crypto map entries for each protocol, using the same crypto map name. The sequence numbers (seq-num) differentiate the entries.
The key thing to remember is that entries with lower sequence numbers are processed first. Sometimes just changing the order of the sequence numbers may solve your networking problem. For example, if setting up VPN causes your other authentication system not to work, try giving the VPN a higher sequence number in the crypto map.
For more information on customizing crypto maps, see the crypto ca authenticate command page in the Cisco Security Appliance Command Reference at www1.cisco.com/en/US/docs/security
/asa/asa80/command/reference/c5.html.

by Gautam Sehgal · 0

Sunday, May 1, 2011

Effect of Cables On Your Network’s Performance

Are you using right cables in your network structures??

You may think it’s strange but using the wrong type of cable is a common problem with networks. However, there are many installed networks running on low-grade, or even wrong, cable. Many networks were installed in offices where some sort of cabling already existed and, to cut corners, someone decided to use the existing cable, no matter what was recommended. The network may run on this cable, but not at its optimum level of performance and usually with intermittent errors.

Here’s the best advice: Don’t cut corners on your network cabling. Use high-quality cable that meets or exceeds the specifications for your network topology. Make sure you use data-grade cable, not inexpensive phone cable. You’ll see a big performance difference between the two.

Sunday, May 1, 2011 by Gautam Sehgal · 0

Stop Spim and Spit, as Well as Spam (All)

No more SPIM, SPIT or SPAM.

SPIM are unwanted instant messages (IMs) that are full of annoying ads and unrequested information. Most users with instant messages enabled receive about five SPIM messages a day, and the number is increasing rapidly. SPIM may now contain or lead users to viruses, worms, and other malware.
Personal users can restrict the instant messages they receive to a specific buddy list and keep SPIM under control. Corporate users who rely on IM can’t risk blocking messages from the new VP or a new client who is not yet on a buddy list. A search of the internet shows some anti-SPIM techonology is available, but no solution exists at this point.
SPIT is SPAM sent over internet telephony. Because the phone is connected to the internet, spammers could target the VOIP with unwanted messages. SPIT is not yet a major problem. Before embracing and becoming dependent on any new technology, you must consider all potential threats to productivity, include SPIM, SPIT, and SPAM.

by Gautam Sehgal · 1

Authenticate Digital Signatures with PGP

Is your Data digitally signed.

Electronic documents and email messages are becoming a commonplace way to conduct business transactions, but it’s important to be able to verify that the author of a document or message is really the person he or she claims to be.
You can use digital signatures to verify identity. This is easy to do with programs such as Pretty Good Privacy (PGP). PGP is based on a public/private key pair; you sign the document by encrypting it with your private key, to which only you have access. The recipient uses your public key to decrypt it. Note that this doesn’t provide data confidentiality because the public key is available to everyone. It does, however, ensure that it was really you who signed it, because no one but you has the private key that’s paired with that public key.
PGP is available in both freeware and commercial versions. You can get the commercial version at www.pgp.com or download the free version for Windows XP at www.pgpi.org/products/pgp
/versions/freeware/winxp/8.0/
.
There are also versions for earlier Windows operating systems, UNIX, Mac, and even MS-DOS, OS/2, and Palm OS.

by Gautam Sehgal · 2

Create More Secure Passwords

Make up your mind and create secure passwords.

Strong passwords are the first line of defense against hack attacks, but how can you get users to create passwords that are complex and don’t contain any dictionary words, without making the passwords so hard to remember that they end up writing them down?
A random combination of letters and numbers (such as rjfoo3B7p2) is ideal, but hard to remember. A handy trick is to have users create password phrases or sentences that include numbers and then reduce them to abbreviations. In other words, I love my two cats, Susie and Fluffy, becomes Ilm2cS&F, which looks like a random group of characters but is much easier to remember.

by Gautam Sehgal · 0

Back Up Your Login Password to Avoid Losing It Altogether

No more loosing your passwords…..
the key is in your hands.

Microsoft Windows XP’s Forgotten Password Wizard allows you to create a password reset disk that you can use to recover your user account and personalized computer settings in the event you forget your login password.
The procedure to do so differs depending on whether your computer is on a domain or in a workgroup, and whether it’s an administrator or limited account. For specific details on each procedure, search for the phrase password reset disk in the Help and Support Center. If you choose to create a password reset disk, make sure you keep it secure, as anyone with access to the disk can change the associated account’s password.

by Gautam Sehgal · 0

All Rights Reserved Tech-next| | Blogger Template by Bloggermint
© TECH NEXT INDIA 2011. Powered by Blogger.