Tuesday, March 22, 2011

Office 2007 open excel file .xls and .xlsx take too long time

When I double click on an Excel 2003 (.xls) or 2007 (.xlsx) file in Microsoft Excel 2007 takes long time (about 30 seconds) to open the file, but I can avoid this delay by minimizing or maximizing Excel and it immediately opens the file.

This problem sometimes caused by Antivirus program when it try to scan your Excel file, but in this problem it has another problem in open the excel file. Please follow the bellow step to solve the problem.
1. Click on Start and click on Control Panel.
2. Double click on Folder Options then select File Types tab.
3. Select XLS or XlSX file type extension and click on Advanced button.
4. Highlight Open under actions and click Edit.
Then a dialog box appears after that you need to make two adjustments:
Under Application to perform action:
- At the end of the line after /e append a space character followed by “%1″(including the quotes)
- Uncheck “Use DDE”
5. Done

Source : www.vutha.net

Friday, March 11, 2011

Describe about TCP/IP Layers and Protocols

The TCP/IP model defines four categories of functions that must occur for communications to be successful. Most protocol models describe a vendor-specific protocol stack. However, because the TCP/IP model is an open standard, one company does not control the definition of the model.

TCP/IP Layer :
Application :
Represents data to the user and controls dialog. Example : DNS, Telnet, SMTP, POP3, IMAP, DHCP, HTTP, FTP, SNMP
Transport :
Supports communication between diverse devices across diverse networks. Example : TCP, UDP
Internet :
Determines the best path through the network. Example : IP, ARP, ICMP
Network access :
Controls the hardware devices and media that make up the network. Example : Ethernet, Frame Relay

In coming days, we will review these protocols in more detail. For now, a brief description of the main TCP/IP protocols follows:
■ Domain Name System (DNS): Provides the IP address of a website or domain name so a
host can connect to it.
■ Telnet: Allows administrators to log in to a host from a remote location.
■ Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3), and Internet
Message Access Protocol (IMAP): Used to send email messages between clients and servers.
■ Dynamic Host Configuration Protocol (DHCP): Assigns IP addressing to requesting
clients.
■ Hypertext Transfer Protocol (HTTP): Used to transfer information between web clients and
web servers.
■ File Transfer Protocol (FTP): Allows the download and upload of files between an FTP
client and FTP server.
■ Simple Network Management Protocol (SNMP): Used by network management systems to
monitor devices attached to the network.
■ Transmission Control Protocol (TCP): Allows virtual connections between hosts on the
network to provide reliable delivery of data.
■ User Datagram Protocol (UDP): Allows faster, unreliable delivery of data that is either
lightweight or time-sensitive.
■ Internet Protocol (IP): Provides a unique global address to computers for communicating
over the network.
■ Address Resolution Protocol (ARP): Finds a host’s hardware address when only the IP
address is known.
■ Internet Control Message Protocol (ICMP): Used to send error and control messages
including reachability to another host and availability of services.
■ Ethernet: The most popular LAN standard for framing and preparing data for transmission
onto the media.
■ Frame Relay: Also a framing standard; one of the most cost-effective WAN technologies
used to connect LANs.
Readmore...

Sunday, March 6, 2011

How to beat the Keyloggers to keep safe from password hacking?

My computer is already protected with antivirus program. I know I am probably safe, but just worry about the keyloggers and because of this, I have a list in a text file of about ten passwords for programs, email, networking and websites.
Whenever I have to enter a password mainly for online banking, I open the text file in Notepad and copy and paste to the relevant password. Am I being too clever for my own good or is this a good idea?

Answer : It’s not a bad idea, but it won’t protect you from everything. Some keyloggers directly snoop on the letters pressed on the keyboard, and your method will protect you from those; in much the same way, a password manage, such as the one built into the Firefox and Internet Explorer web browsers, will do the same thing.
However, more sophisticated malicious software will take note of any text that’s placed in forms whether that’s by typing or by copying and pasting or if it’s automatically put there by a password manager.
We’ve also heard of malicious software that takes a screen grab every time a mouse button is pressed, making onscreen keyboards no more secure.... Read more..

Tuesday, March 1, 2011

How to recover the PDF password security?

If you are looking for a free PDF Password Remover or Recovery tool then you have come to the right place. PDF is a popular and widely used format to publish ebooks and prepare professional documents.

How To Remove PDF Password?

In PDF documents, password restriction can be applied in two ways. One is by restricting a few functions like printing, copying or modifying the PDF document. The other way is to password protect it in a manner that might prevent you from accessing or opening the PDF file.

Freeware PDF Unlocker is a free PDF Password remover tool that can help you in the above situations.To remove the first type of restrictions, simply drag your PDF document onto a shortcut on your desktop or alternatively onto the PDF Unlocker icon on your desktop. Instantly, it should remove the password and allow printing or copying & pasting the contents from the PDF document.

Please click the following links to download the Free PDF password removal tool :
http://www.4shared.com/file/110957982/540a8267/FreewarePDFUnlocker.html