This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Photoshop Cs2

Is Photoshop CS2 worth the upgrade? You bet it is! Here are just 10 things you can do with this fantastic new version of Photoshop that were impossible (or difficult) to do with previous versions:

Manipulate objects in the Adobe Bridge

This new generation of file browser enables you to look at photographs and artwork in detail before you open the file, process multiple Camera Raw images, flip through pages in PDF documents, size, rate and organize your work in a convenient and highly user-friendly way. Goes way beyond the capabilities of the File Browser introduced in Photoshop 7.

Get rid of imperfections with the Spot Healing Bush

The Spot Healing brush enables you to get rid of slight imperfections - like dust or scratches at the click of a mouse. Unlike the Healing Brush or Patch tools, you don't have to find a source point first.

Remove "red-eye" in an instant. With older versions of Photoshop, removing red-eye and pet-eye was possible, but it wasn't easy. Now, one click of the Red Eye removal tool can remove pet-eye and red-eye from your photographs, in less time than it takes your subject to say "cheese!".

Perform non-destructive scaling with Smart Objects. You know how it is: You try to make an imported object larger, and it goes all blurry and pixelated. With Smart Objects, that's a thing of the past, because you can scale, warp and rotate vector graphics in a non-destructive way.

Do neat things in perspective with the new Vanishing Point feature. With Vanishing point you can cut and paste in perspective. Now you're able to turn a photograph of a wall into a "virtual art gallery" with all the pictures correctly skewed, or move a window from one side of a building to another and, because the perspective is correct, have it look like it's always been there. You can also draw lines that taper off into the distance - wide nearest the camera, narrow further away - just like in "real life".

Get more accurate printing. With Photoshop CS2, the people at Adobe have improved the printing workflow. Now it's even easier to configure your inkjet printer to get more accurate color printing.

Customize menus and workspaces. Photoshop CS2 lets you highlight commonly used menu items, and set up custom menus and workspaces. Now all the power of Photoshop is (literally) at your command, and can be tailored to your requirements.

See what each font looks like before you use it. Finally! Photoshop gets a WYSIWYG font drop-down menu. Now you don't have to keep text highlighted while you cycle through all the fonts until you get to the right one!

Manipulate images with Image Warp. Image Warp allows you to bend, peel, and stretch images the same way as type. Now you can put an image on a mug or soda can with ease.

See what video graphics will look like, while you're doing them. If you're a video professional , you'll know how frustrating it can be: You make a graphic that looks fantastic on a flat computer monitor, but when you import the .psd file into your Avid timeline, and look at it on the TV screen, it's not quite what you had in mind. You then have to go back into Photoshop and make your artwork look "wrong", so it will look right on a video monitor. With Photoshop CS2 you can preview your images on a video monitor directly from the software, and see exactly how they're going to look in your video, even if your editing software is on a different computer. Neat eh?

Outlook Tips: One of the coolest and most useful Outlook tip

Did Forget to mention subject while writing an official email?
Sometimes YES, and that too when we send some important mails.
It happens accidentally. Don't worry...
Just follow the below steps & see the result.
1. Open your outlook and press Alt+F11 (this opens the Visual Basic editor)
2. On the Left Pane you'll see "Microsoft Outlook Objects", expand this. Now one can see the "ThisOutLookSession".
3. Click on "ThisOutLookSession" then copy and Paste the code below in the right pane. (Code Pane)
*****************************************************************************************************************
Private Sub Application_ItemSend(ByVal Item As Object, Cancel As Boolean)
If Len(Item.Subject) = 0 Then
Prompt$ = "Subject is Empty. Are you sure you want to send the Mail?"
If MsgBox(Prompt$, vbYesNo + vbQuestion + vbMsgBoxSetForeground, "Check for Subject") = vbNo Then
Cancel = True
End If
End If
End Sub
*****************************************************************************************************************
You are Done..
Next time You will not send a mail without a Subject in it..
Whenever you start outlook it will prompt you for enabling Macros where you select Yes.

Posted by jai at 1:15 AM 1 comments

Outlook Tips: Remove all items from Calendar

Follow the steps given below to remove all items from calendar..
Note: This method removes all items without asking for a confirmation. So use with caution.
1. Go to Calendar view using Shortcut Ctrl+2.
2. Go to View -> Arrange By -> Current View -> By Category.
3. Click on any one of the small calendar icons on the left-most row.
4. Select all items using Shortcut Ctrl+A.
5. Press 'Delete' or right-click and select delete in it.
You may go back to the usual Calendar 'View' mode by going to View -> Arrange By -> Current View -> Day/Week/Month.
You may go back to 'Mail' mode by clicking on the 'Mail' and then 'Folder List' buttons or using Shortcuts Ctrl+1 and then Ctrl+6.

Outlook Tips: Recovering Shift+Deleted mails

Follow the steps given below to Retrieve the mails deleted using Shift+Delete option..
MS Outlook 2000 and 2003 soft deletes the mails.
That is all copies of deleted mails including Shift+deleted are stored in PST file and can be recovered manually using the Recover Deleted Items option from the Tools menu

To Enable these Options:
By default this option is disabled in MS Outlook.
Use the following steps to enable this option..
1.Close Outlook
2.Open Windows registry editor (Run -> regedit)
3.Browse to My Computer\HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\Client\Options registry key
4.On the Edit menu, point to New, and then click DWORD Value.
Type the name DumpsterAlwaysOn (Note: Case sensitive Do not type any spaces in the name).
5.Set the DWORD value to 1 to turn the Recover Deleted Items menu choice on for all folders or enter 0 to turn it off.
6.Restart Outlook.

Note:This procedure can recover mails which were deleted by pressing shift+del in the past 4 days only.
All the Windows registry changes if incorrectly done may damage your system.

Outlook Tips: Recalling Mails Sent

Follow the given steps below to Recall the sent mails..
1.Go to the Sent Items folder.
2.Open the message to be recalled.
3.Actions -> 'Recall This Message'.
4.To recall the message -> 'Delete unread copies of this message'
5.To replace the message -> 'Delete unread copies and replace with a new message'
6.To be notified about the success of the recall or replacement, select 'Tell me if recall succeeds or fails for each recipient' check box.

If there are multiple recipients, you can request notification of whether the recall succeeded or failed for each one (so that you can take necessary steps).

Note: Even after successfull recalling of the message, the recipient still knows that you sent a message and then recalled it. Further more this will work only for mails sent within the a company or a Domain, others will get a plain text mail stating that you attempted to recall.

MMC Console Window Keyboard Shortcuts

MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)

Mail formats- Plain text, Rich text and HTML

Plain Text– Rich Text – HTML?

Why is it that in some messages that you reply to, you can change the font and make standard formatting changes just like a word processor but others you can not? The format of the message determines the flexibility you have when replying to or creating a new email message. There are three standard formats for an email message. They are described below.

* Plain Text - A plain text message is an email message that does not include colors, fonts or formatting. It is the most basic type of email that is easily readable by all e-mail clients today. It does not support pictures displayed directly in the message body (although you can include them as attachments).

* Rich Text - Outlook Rich Text Format (RTF) is a Microsoft format that only some e-mail programs understand, mainly the Microsoft Office Outlook clients. You can use RTF when sending messages within a company that uses Microsoft Exchange Server ( i.e. OSU). RTF supports text formatting, including bullets, alignment, and links.

* HTML Format – HTML supports text formatting, numbering, bullets, alignment, horizontal lines, pictures (including backgrounds), HTML styles, stationery, signatures, and linking to Web pages. This type of format provides the greatest range of formatting possibilities.


When using Outlook, how do I make changes or choose a Format?

How to change the format of your message depends on if you have Word as your email editor. To determine if Word is your editor, do the following:
In Outlook Click Tools – Options
Click on the Mail Format tab
If the "Use Microsoft Word to edit email messages" is checked then Word is your editor. Please use the instructions below for MS Word as your editor.
Otherwise please use the instructions below for Word is not your editor.

MS Word as your editor
When composing a message with Word as your email editor you have the option of creating a message in Plain Text, Rich Text or HTML Format. In the email, you can choose your format via the format toolbar drop down menu.

MS Word is not your editor

If Word is not your email editor, select the Format menu in the email and click the format you would like to use - Plain Text, Rich Text , or HTML.

When replying to an email message, you can also change the message format. With the message open, select the Format menu; click the format you would like to use (Plain Text, HTML, or Rich Text).
When should you use one type of format over another?

Rich Text can be used in place of Plain text when you are in an environment that uses one of the Microsoft Outlook email clients. CN recommends using Rich Text formatted messages to give you additional formation features. Email clients that can't support rich text formatted messages will simply drop the formatting and show them in plain text.

HTML formatting should only be used when there is a need to insert graphics or specifically format a message to look a certain way. While Outlook can display HTML messages please keep in mind that not all e-mail programs can.

If you have questions about the different formats or would like advice on which format is best to use please contact your CN support team.
Take the complete training here http://tss.oregonstate.edu/cn/soft_tips/docs/outlook/?page=mail-format&type=normal

Posted by jai at 6:30 AM 1 comments

Friday, December 21, 2007
Some Usefull RSS:

Add these RSS feeds to your Web pages and keep them updated.
101 Cookbooks
http://www.101cookbooks.com/index.rdf
About Today
http://z.about.com/6/nl/rss/todaysl.xml
BusinessWeek Online
http://www.businessweek.com/rss/bwdaily.rss
CNN.com Recently Published/Updated -
http://rss.cnn.com/rss/cnn_latest.rss
Cricinfo cricket news
http://www.cricinfo.com/rss/index.rdf
CyberMedia India Online Limited - IT News
http://www.ciol.com/RSS/CIOL-ITNews.xml
Dictionary.com Word of the Day
http://dictionary.reference.com/wordoftheday/wotd.rss
Discovery News Top Stories : Discovery Channel http://dsc.discovery.com/news/topstories.xml
Engadget
http://www.engadget.com/rss.xml
ESPN.com
http://sports.espn.go.com/espn/rss/news
Expressindia
http://www.expressindia.com/syndications/ei.xml
Fodor's Travel Wire
http://www.fodors.com/blog/index.rdf
Fool.com: The Motley Fool
http://www.fool.com/About/headlines/rss_headlines.asp
Forbes.com: Most popular stories
http://www.forbes.com/feeds/popstories.xml
Funny Quote of the Day
http://www.brainyquote.com/link/quotefu.rss
Hilarious Jokes on Funtoosh.com
http://www.funtoosh.com/rss/latest_jokes.php
International Herald Tribune
http://www.iht.com/rss/frontpage.xml
Medindia Health News
http://www.medindia.net/rss2.0/rss.xml
News items on ZDNet
http://news.zdnet.com/2509-1_22-0-5.xml
News-Indiatimes Cricket
http://cricket.indiatimes.com/rssfeeds/864838.cms
Official Gmail Blog
http://gmailblog.blogspot.com/atom.xml
Official Google Blog
http://googleblog.blogspot.com/atom.xml
orkut Blog
http://en.blog.orkut.com/atom.xml
Quote of the Day
http://www.brainyquote.com/link/quotebr.rss
Reuters: Oddly Enough
http://www.reuters.com/rssFeed/oddlyEnoughNews?irpc=69
The Economic Times- News- Economy- Finance http://economictimes.indiatimes.com/rssfeeds/1286551815.cms
The Financial Express -
http://www.expressindia.com/syndications/fe.xml
Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml
Yahoo! News: Entertainment News
http://rss.news.yahoo.com/rss/entertainment
AnandTech Article Channel
http://www.anandtech.com/rss/articlefeed.aspx
Add CNET
News.com http://news.com.com/2547-1_3-0-5.xml
Add Emergic
http://emergic.org/index.xml
Add Slashdot
http://slashdot.org/rss/slashdot.rss
Add SPACE.com
http://www.space.com/syn/space.xml
Add Wired Politics
http://www.wired.com/news/feeds/rss2/0,2610,4,00.xml
Add Wired Top Stories
http://www.wired.com/news/feeds/rss2/0,2610,,00.xml

List of Google Services!!!!!!!

Well These are the list of Services Provided by Google some are known but some are not , so here get them all!!!!
Google AdSense : https://www.google.com/adsense/
Google AdWords : https://adwords.google.com/select/
Google Analytics : http://google.com/analytics/
Google Answers : http://answers.google.com/
Google Base : http://base.google.com/
Google Blog Search : http://blogsearch.google.com/
Google Bookmarks : http://www.google.com/bookmarks/
Google Books Search : http://books.google.com/
Google Calendar : http://google.com/calendar/
Google Catalogs : http://catalogs.google.com/
Google Code : http://code.google.com/
Google Deskbar : http://deskbar.google.com/
Google Desktop : http://desktop.google.com/
Google Directory : http://www.google.com/dirhp
Google Earth : http://earth.google.com/
Google Finance : http://finance.google.com/
Google Groups: http://groups.google.com/
Google Images : http://images.google.com/
Google Labs : http://labs.google.com/
Google Local: http://local.google.com/
Google Maps : http://maps.google.com/
Google Mars : http://www.google.com/mars/
Google Mobile : http://mobile.google.com/
Google Moon : http://moon.google.com/
Google Movies : http://www.google.com/movies
Google Music: http://www.google.com/musicsearch
Google News : http://news.google.com/
Google Pack : http://pack.google.com/
Google Page Creator : http://pages.google.com/
Google Personalized Home… : http://www.google.com/ig
Google Personalized Search : http://labs.google.com/personalized
Google Reader : http://www.google.com/reader
Google Scholar : http://scholar.google.com/
Google Search History : http://www.google.com/searchhistory
Google SMS : http://www.google.com/sms/
Google Suggest : http://www.google.com/webhp?complete=1
Google Talk : http://talk.google.com/
Google Toolbar : http://toolbar.google.com/
Google Transit Trip Planner : http://www.google.com/transit
Google Translate : http://www.google.com/translate_t
Google Video : http://video.google.com/
Google Web Accelerator : http://webaccelerator.google.com/
Google Web API : http://www.google.com/apis/
Google Web Search : http://www.google.com

Keeping Your Networks Secure

Computer security is an ever present concern that evolves constantly. One reason why computers and the programs we use are so vulnerable is that they are incredibly complex. The more complex they become, the more likely they are to have security gaps.

On the other hand, the more they can store and do, the more we value them. With so much potential for doing things locked within every computer and program, it shouldn't be surprising that a clever computer hacker can manipulate or break codes to wreak havoc on the whole system. This is why we also need security systems. Unlike the programs that they protect, security systems are valuable because of how many things they make hard to do.

If your company uses a network of computers to store, transfer and process information, you can't afford to leave that system vulnerable to attacks. New viruses and worms come out every year and without the right protection, your computers could be among the millions that are knocked completely out of commission.

In addition to blocking harmful viruses, it is just as important to guard against invaders who want to access confidential information about your business and your clients. Hackers are among the most innovative group of computer geeks in the world. If there's a vulnerability anywhere in any of your systems, they can find it.

Ways to Keep Your Network Secure and Running

There are many ways to tighten security on computer networks. A few forms of protection include anti-virus software, firewalls, intrusion prevention systems (IPS), information encryption, and user authentication safe guards. Armed with these tools, your Dallas network security will be a discouraging target for predators.

One thing to keep in mind though when you start the task of securing your system is the need for network security in addition to individual computer security. You may have armed each computer with a couple different kinds of protection, but if even one computer becomes infected with a virus or a worm, the problem will quickly spread to all the computers within your network.

If you and your staff don't have the expertise to diagnose security weaknesses in your network and provide the necessary remedies, there are many professionals who can. If you want, they can also maintain the systems they service. Network security is vital to your businesses success. Be sure you don't go with amateurs.

What to Look for in a Network Security Specialty Firm

When it comes to network security, it's hard to argue with a strong record of success. Watch for a network security company that has a list of happy clients. The larger the client, the larger target they probably are for hackers, so big names are a good thing.

Security testing is another key factor. No network can be made 100% secure and still be usable. A good firm will employ computer specialists whose job it is to hack systems. Through these means, they'll find and weaknesses in a system and be able to work towards securing it.

Is Your Computer Safe Offline?

Probably one the biggest notions among computer users is that if they are not online, they are safe from identity theft. Their reasoning is that, if they are offline, they are not vulnerable to phishing, viruses, malware, hackers, etc. While, it is true that being offline would protect them from such things, to fall into the belief that they are safe is being somewhat blind to other possibilities for id theft.

Even people who are connected to the Internet fall into a false sense of security. How? Computer users think that once they install a firewall, get adware, malware, and virus protection. Throw into all that, phishing protection. They get lulled into that invulnerable feeling. They think they are safe.

But are they? Among the many ways to steal data from a computer is through the peripheral data ports. They can be hooked up to printers, external disk drives, etc. Still another way to steal data has been the use of cds or floppy disks. This is done by actually stealing the disks themselves or dumping data onto them. In most cases, this can be done without the computer's owner ever knowing.

Along the same ideas, hard drives can be stolen or broken into. This is alot easier than one might think. Here's how. Hard drives fail. There's nothing that can be done about that. We get them replaced, reload the software, and move on with our lives.

But what about that old hard drive? Even if it has crashed, data can still be harvested from it. In some cases, it is not easily done. There are softwares written to help map the crashed disk and retrieve information off of it. This software is used by legitimate, reputable companies as a means of data reclamation for their clients. It is also used by thieves to steal personal and company data.

Another way to break into a computer involves the thief using his or her own floppy disk or cd to boot your system. With this method, they can bypass your security features and gain direct access to your data.

Even more recently, with the advent of flash drives, it is easier to steal data and conceal it. These small devices are roughly the same size as a man's finger and are hard to detect when concealed. They can be stolen or lost very easily due to their small size.

When it comes to dealing with these issues, many businesses are removing the extra disk drives from computer work stations. They are also networking their printers, etc. to monitor information flow.

Hard drives can be rendered totally useless by drilling holes in the cases and drives. Still another way to do this is by burning the hard drive.

Certain types of flash drives are being built with security features in place to aid in preventing theft. By using a security system which encrypts the data, it adds a measure of protection not offered by Microsoft. This encryption feature is called Advanced Encryption Standard (AES) symmetric encryption. It is considered to be the best encryptions systems for flash drives. It should also be noted that it is not the only form of encryption available. Many versions of encryption are designed with the user in mind (I.E. ease of use).

The final problem deals with the users themselves. Often times, the user will be careless with with their user name and password information. They sometimes will paste it to their computer or somewhere close to it. In this case, it is always best to either commit this information to memory or store it in a very secure place.