Posts

Showing posts from July, 2020

Useful Shortcut Keys for MS Excel

Below is a list of some of the useful shortcut keys for MS Excel for increased productivity by saving time. MS Excel is such a great application and lot of us who is more involved in financial and project management job tends to use MS Excel a lot. So, this list of shortcut keys for MS Excel will be very useful for any type of Excel users. HELP: F1 Key   :-  Need Help in Excel, press F1 Key E DITING: F2 Key   :- Press F2 to edit the current cell Ctrl + B   :- To toggle bold text Ctrl + C   :- To  copy the selected items Ctrl + X   :- To cut the selected item Ctrl + V   :-  To paste the items from clipboard Ctrl + U   :- To toggle underlined Text Ctrl + Y   :- Redo the last undone action Ctrl + Z   :-  Undoes the last action F12 Key   :- To open file "Save As" dialog Ctrl + A   :- To select entire worksheet F7 Key   :- Press F7 Key to start spell check Ctrl + F   :- To display Find dialog box Ctrl + H   :- To display the Replace dialog box

How to Protect Yourself Against Ransomware Attack?

As more and more organizations are increasing their dependency on information technology, any disruption to these services can have negative impact on the organization’s functioning. Recent incidents of Ransomware is one of such that can cause severe disruption and financial loss to any organization. Hence, it is very important for any organization to keep their information technology (IT) infrastructure safe and hack-free as much as possible. What is Ransomware, anyway? Ransomware is a malicious program which encrypts user’s data on their computer and ask money in return to decrypt it. Encryption is a legitimate program in computer which is used for safeguarding data in the event that computer is lost. Nobody can open and look at the data without the encryption key. Hence, safeguarding the data from being compromised. The Ransomware utilizes that feature of the operating system to encrypt the compromised system by tricking a user to click on a malicious link sent either through em

59 CMD Commands Every Windows User Must Know

One of  the most efficient and faster way of doing things in Windows XP is to use DOS Commands. Here is a list of most useful DOS Commands used in Windows XP operating System. To open command prompt, type  cmd  in  Run  in  Start Menu  and  hit enter . If you want help for any command mentioned below, type  command name  followed by  /  and  ?  like this one assoc /? will display help information for assoc. If  ?  alone is typed followed by enter at command prompt, it will display list of all commands. 1. assoc – Displays which programs will open the file with .xyz extension It can be used either to displays or modifies file extension associations. If you just type assoc then it will display the list of all files extension and associated a program which is used to open that file. For example, assoc .doc will show you the name of program which the file is associated with. 2. attrib – Displays and changes file attributes (i.e. make hidden file visible) It displays,

Customize the Command Prompt in Windows

This explanation of customization of Command Prompt will apply for Windows Operating Systems 1.  Open Command Prompt ( Start ->Run->cmd  or cmd.exe) 2.  Left Click the upper left corner of the Command Prompt Window, and then Click Properties or use shortcut  Alt+Spacebar+P  to open properties directly (screenshot is shown) 3.  Click the Options Tab; you can change Cursor Size, Command History Buffer Size and no. of buffers, Display options like Window or Full Screen, and Edit options 4.  You can also change Font, Layout and Color by changing parameters in their respective Tabs 5.  In the Apply Properties dialog box, there are two options –  Apply properties to current Window Only  and  Save properties for future Windows.  Select whichever option is suitable for you.

Top 8 Reasons You Should Start Using Linux

Linux distributions have come to a stage now where you should not look for reasons to use it. But if you are not convinced yet, look into the reasons below which might make sense. Reason to use Linux 1.  It’s a powerful operating system. It still takes less resources and very stable system. 2.  The best part is that it’s free. All the goodness of Linux is available free of cost. 3.  It offers some of the most matured and reputed development tools for development. 4.  You can run your mail, web, print, database, FTP, NFS services with Linux easily as Linux is very stable. Some of best servers are Apache for web, MySql for database, PHP for server side scripting etc.. 5.  Portability - Linux can run on various architectures. 6.  Source Code for Linux is freely available. If you don’t like something about Linux, you can make modifications by yourself. 7.  Linux does very well with multitasking – it handles many applications at once without any problem. 8.  The most im

HTML Tutorial for Beginners

This html tutorial is best suited for beginners. This tutorials covers the basic concepts starting from creating a new html file in notepad and naming it with .html extension so that it can be opened with web browsers. What is HTML? HTML stands for   HyperText Markup Language . Basically, it is an authoring language which is used to create documents on the World Wide Web. It describes how a set of text, images, sounds and links should be displayed in a browser. HTML is a Platform Independent Language. Platform Independent means you can write HTML code on any computer running MS Windows, Linux or UNIX. The only thing you should remember is that you should save your file as text file (ASCII). Basic Structure of an HTML Page: <html> <head> <title>You can write the title of your web page here</title> </head> <body> <p> This is test paragraph.</p> </body> </html> Explanation of each tag used above   1.

How to Setup a Lab for Ethical Hacking

This tutorials explains how to setup a personal lab for ethical hacking from scratch.  Certified ethical hacking (CEH) is the most demanded intermediate level cybersecurity course which is well respected and demanded in the industry. If you choose the path to attain the CEH certification, you would need some hands on practice.  You would need following to setup a lab: A notebook VMWARE Workstation or VirtualBox Kali Linux Metasploitable2  A Windows Server 8 / 12 without updates Windows 8 or 10  Metasploitable2 and Windows OS will be installed in the virtual environment. The setup of network card inside the virtual machine should be done with great care. It you are beginner, make sure that you configure the network cards as host-only so that it does not affect the network you are connected with. Never configure the VM network card as bridge when experimenting with CEH Lab as some of the steps might be considered illegal.

CSS Tutorial for Beginners

This CSS tutorials is best suited for beginners who do not have any prior knowledge about CSS. In this tutorials, We will be learning what is CSS and different terminology associated with it along with examples to make it easier to understand for those who are new to CSS. The CSS stands for Cascading Style Sheets. This is a technology recommended by World Wide Consortium (W3C) in 1996. Basically, CSS is a way of formatting web pages layout, text, margins, lines, heights, widths, images a nd many more. You can position anything exactly where you want on the web page. Single external CSS file can control the layout of all the pages of your website. That means that your life will be easier with the use of CSS. HTML is used to structure the content where CSS is used to format the already structured html content. CSS allows you to separate presentation from content when building a website. You can put your CSS Style rules in entirely separate file and HTML web page in another file. You o

Who Invented The First Computer Mouse

If you are a computer user, you must be familiar with a Mouse, but wonder who did invent this little very useful pointing device? Well, Douglas Carl Engelbart was the inventor of a computer mouse. He also contributed to the early incarnation of email, internet and word processing programs. The mouse at that time was a wooden shell covering two metal wheels that worked on X-Y position indicator logic for a computer display system. He developed the mouse in 1960s while at his Augmentation Research Center Lab in SRI International and the mouse was patented in 1970 by SRI and later licensed to Apple. Apple released the first commercial product based on his invention with the Lisa Computer in 1983.  He was born on January 30, 1925 in Portland and studied electrical engineering at Oregon State University. He first worked with army as radar technician during Word War II and later joined Nasa's predecessor, NACA, as an electrical engineer. He soon left this job to pursue

SFC and DISM Commands to Repair Windows System Files

The   sfc   is an utility in Windows and stands for   System File Checker . The sfc utility is primarily used when you suspect that some of system files in your Windows machine are corrupted. If   sfc   command with   /scannow  switch is run, it looks for altered or damaged protected system files and replaces the incorrect files by retrieving the correct version of that file from %systemroot%\system32\dllcache folder. Hence, it is very useful tool to repair Windows system files. It was first introduced in Windows 98 and still available with Windows XP/ Vista/ 7 / 8 / 8.1 / 10. This command is run from the command prompt. It has many switches available but the one which is most common is   /scannow . This switch basically scans all the Windows Protected System Files and replaces the incorrect protected system files with correct copy of the file from dllcache folder or from Windows CD. Some of the common switches are as follows along with the command syntax - sfc [/scannow] [/

Utilities for Linux Scripts

Literally, there are hundred of utilities in Linux which you can use to solve problem in Linux. This is the list of selected utilities which are frequently used in scripts in Linux operating system. 1.   at   : This reads command from a file and executes the command at the specified time. 2.   awk   : This is a text processing language used in Linux to perform some sophisticated text processing. 3.   chvt   : This allows a single user to login to Linux system a number of times. 4.   cksum   : This calculates CRC and prints it along with total number of bytes. 5.   clear   : This clears the terminal screen. 6.   cmp   : This performs the binary comparison of two files. 7.   compress and uncompress   : It does compression and un-compression of file using Lempel-Ziv coding. 8.   cut   : This is used to extract characters. 9.   diff   : This reads through two text files and shows differences between them. 10.