<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7984975874999201037</id><updated>2024-10-06T00:21:41.021+05:30</updated><category term="Tips and Tricks"/><category term="Cisco"/><category term="Linux"/><category term="Photography"/><title type='text'>Tech-next</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Gomzi</name><uri>http://www.blogger.com/profile/14678929040537102883</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDg5tBvwORA4Ac8aZOvbTtaI8EI4uAAfbj6GJ45hSqFBRJy1So1LSIeIjWLSWt9TGjxXIrukj2XwzVk90cmeHOTrRuLmOApgC5hbWmkVCCz__Ixl_4kqhQ_hTMX46TOk4/s220/100_2580.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>68</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-2227796331511896306</id><published>2011-10-28T09:32:00.000+05:30</published><updated>2013-04-12T00:44:06.804+05:30</updated><title type='text'>Roadies 9 Raghu, Rajeev &amp; Rannvijay at chandigarh auditions</title><content type='html'>&lt;iframe src=&quot;http://www.youtube.com/embed/pjY0T24aF-M&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/2227796331511896306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/10/roadies-9-raghu-rajeev-rannvijay-at.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/2227796331511896306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/2227796331511896306'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/10/roadies-9-raghu-rajeev-rannvijay-at.html' title='Roadies 9 Raghu, Rajeev &amp; Rannvijay at chandigarh auditions'/><author><name>Gomzi</name><uri>http://www.blogger.com/profile/14678929040537102883</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDg5tBvwORA4Ac8aZOvbTtaI8EI4uAAfbj6GJ45hSqFBRJy1So1LSIeIjWLSWt9TGjxXIrukj2XwzVk90cmeHOTrRuLmOApgC5hbWmkVCCz__Ixl_4kqhQ_hTMX46TOk4/s220/100_2580.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/pjY0T24aF-M/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-3410991012262437208</id><published>2011-10-28T09:26:00.000+05:30</published><updated>2013-04-12T00:44:06.813+05:30</updated><title type='text'>Roadies 9 Suchit and Mohit performing on Sheran di kaum punjabi chandigarh Auditions</title><content type='html'>&lt;iframe src=&quot;http://www.youtube.com/embed/Rspdme2n1fw&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/3410991012262437208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/10/roadies-9-suchit-and-mohit-performing.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/3410991012262437208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/3410991012262437208'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/10/roadies-9-suchit-and-mohit-performing.html' title='Roadies 9 Suchit and Mohit performing on Sheran di kaum punjabi chandigarh Auditions'/><author><name>Gomzi</name><uri>http://www.blogger.com/profile/14678929040537102883</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDg5tBvwORA4Ac8aZOvbTtaI8EI4uAAfbj6GJ45hSqFBRJy1So1LSIeIjWLSWt9TGjxXIrukj2XwzVk90cmeHOTrRuLmOApgC5hbWmkVCCz__Ixl_4kqhQ_hTMX46TOk4/s220/100_2580.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/Rspdme2n1fw/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-7109280222920569779</id><published>2011-10-18T22:36:00.000+05:30</published><updated>2013-04-12T00:44:06.838+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Format The Same Document in Two Different Ways (2000/2002/2003/2007)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h2 class=&quot;post-excerpt-single&quot;&gt;
Different formats in single document.&lt;br /&gt;

&lt;/h2&gt;
&lt;div class=&quot;KonaBody&quot;&gt;
If you’re working on a long 
document and want parts of the document to have Landscape page 
orientation, you can do so by following the steps outlined below:&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Separate the sections that you want to apply different page 
orientations to by a Next Page Section Break. You can apply a Next Page 
Section Break by choosing Insert | Break from the menu bar and selecting
 the Next Page option button under the Section Break Types panel of the 
Break dialog box. (In 2007, select the Page Layout tab on the ribbon and
 choose Breaks.)&lt;/li&gt;
&lt;li&gt;Select the text/pages you want in Landscape orientation and choose 
File | Page Setup from the menu bar. (In 2007, click on the arrow in the
 lower-right corner of the Page Setup area of the Page Layout ribbon to 
open the Page Setup dialog box.)&lt;/li&gt;
&lt;li&gt;Choose the Landscape orientation and then, in the Apply To dropdown box, choose Selected Text.&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;

     
     
     

&lt;/div&gt;
This will create a document partially formatted using Portrait orientation and partially using Landscape orientation.&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/7109280222920569779/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/10/format-same-document-in-two-different.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7109280222920569779'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7109280222920569779'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/10/format-same-document-in-two-different.html' title='Format The Same Document in Two Different Ways (2000/2002/2003/2007)'/><author><name>Gomzi</name><uri>http://www.blogger.com/profile/14678929040537102883</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDg5tBvwORA4Ac8aZOvbTtaI8EI4uAAfbj6GJ45hSqFBRJy1So1LSIeIjWLSWt9TGjxXIrukj2XwzVk90cmeHOTrRuLmOApgC5hbWmkVCCz__Ixl_4kqhQ_hTMX46TOk4/s220/100_2580.JPG'/></author><thr:total>0</thr:total><georss:featurename>IGI Airport T3 Rd, New Delhi, Delhi, India</georss:featurename><georss:point>28.549544699103865 77.102737426757812</georss:point><georss:box>28.493758699103864 77.023773426757813 28.605330699103867 77.181701426757812</georss:box></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-7120295929410807068</id><published>2011-10-18T22:10:00.001+05:30</published><updated>2013-04-12T00:44:06.839+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Eliminate Error Values in Your Pivottable (2000/2002/2003/2007)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;single-excerpt&quot;&gt;
Resolve Errors.&lt;br /&gt;

&lt;/div&gt;
&lt;div class=&quot;KonaBody&quot;&gt;
&lt;div style=&quot;float: right; width: 300px;&quot;&gt;

     
     
     

&lt;/div&gt;
If your PivotTable’s source data contains errors, you’ll notice
 those errors pop up in your PivotTable too. Here’s how you can replace 
error values with blank cells in your PivotTable:&lt;br /&gt;

&lt;ol&gt;
&lt;li&gt;Click anywhere within your PivotTable to view the PivotTable toolbar (or choose View | Toolbars | PivotTable from the menu bar).&lt;/li&gt;
&lt;li&gt;Click the PivotTable button on the PivotTable toolbar and choose 
Table Options from the resulting menu. Excel displays the PivotTable 
Options dialog box. (In 2007, click on the PivotTable button on the 
PivotTable Tools ribbon, then choose Options.)&lt;/li&gt;
&lt;li&gt;Select the For Error Values, Show check box, and leave the corresponding text box blank.&lt;/li&gt;
&lt;li&gt;Click OK to return to your PivotTabl&lt;/li&gt;
&lt;/ol&gt;
&amp;nbsp;&amp;nbsp; There’s a lot more regarding MS Office, for more information stay connected…&lt;/div&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/7120295929410807068/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/10/eliminate-error-values-in-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7120295929410807068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7120295929410807068'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/10/eliminate-error-values-in-your.html' title='Eliminate Error Values in Your Pivottable (2000/2002/2003/2007)'/><author><name>Gomzi</name><uri>http://www.blogger.com/profile/14678929040537102883</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDg5tBvwORA4Ac8aZOvbTtaI8EI4uAAfbj6GJ45hSqFBRJy1So1LSIeIjWLSWt9TGjxXIrukj2XwzVk90cmeHOTrRuLmOApgC5hbWmkVCCz__Ixl_4kqhQ_hTMX46TOk4/s220/100_2580.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-4641754623902782086</id><published>2011-07-13T20:08:00.002+05:30</published><updated>2013-04-12T00:44:06.822+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Copy a Router’s System Image</title><content type='html'>Backup Your Router.&lt;br /&gt;
&lt;br /&gt;
In some cases, you may want to copy the system image from one device to another, to duplicate settings; or you may want to back it up.&lt;br /&gt;
&lt;br /&gt;
Although the steps for different routers may vary, generally you’ll first want to know the name and size of the system image file. You can do so with the following command:&lt;br /&gt;
&lt;br /&gt;
   show flash&lt;br /&gt;
&lt;br /&gt;
The system image is the file with a .bin extension. You should copy down the name of the file so you can enter it if your router prompts you for it.&lt;br /&gt;
&lt;br /&gt;
You can then copy the file with the following command:&lt;br /&gt;
&lt;br /&gt;
   copy flash tftp&lt;br /&gt;
&lt;br /&gt;
You’ll then be prompted for the IP address of the TFTP server you’re copying from, the name of the file you’re copying, and the name of the file you’re copying to. Use the names you found from “show flash”; however, you can leave out the “.bin” part.&lt;br /&gt;
&lt;br /&gt;
If you’re trying to replace the system image of another device, use “show flash” to get the name of that device’s system image, and use that name when prompted for the destination file. You’ll then be prompted to confirm that you want to overwrite the system image.&lt;br /&gt;
&lt;br /&gt;
For more information, consult the following instructions for Cisco 2500 Series Routers:&lt;br /&gt;
&lt;br /&gt;
www.cisco.com/en/US/products/hw/routers/ps233&lt;br /&gt;
/products_tech_note09186a00800a6744.shtml#copying</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/4641754623902782086/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/copy-routers-system-image.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4641754623902782086'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4641754623902782086'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/copy-routers-system-image.html' title='Copy a Router’s System Image'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-4071809775600856642</id><published>2011-07-13T19:52:00.002+05:30</published><updated>2013-04-12T00:44:06.816+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>The Easy Way to Get Information on Security Signatures</title><content type='html'>Get More information on your security Alerts.&lt;br /&gt;
&lt;br /&gt;
When your Cisco appliance issues a security signature or alert, you may wonder how to get more information, or whether the message you’re seeing could be a “false positive.”&lt;br /&gt;
&lt;br /&gt;
To get more information on such messages, simply go to the following website:&lt;br /&gt;
&lt;br /&gt;
   http://tools.cisco.com/security/center/search.x&lt;br /&gt;
&lt;br /&gt;
If you type in the name or message that appears, be sure to change the dropdown next to Keywords to “exact phrase.” That narrows the results considerably, usually right down to the one exact security record you need.&lt;br /&gt;
&lt;br /&gt;
Once you pull up the information on your message, look for the section on “Benign Triggers” to help assess whether you’re dealing with a false positive or a real security breach.&lt;br /&gt;
&lt;br /&gt;
Note that this tool from Cisco also lets you search for security messages from Apache, HP, Microsoft, and Red Hat.</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/4071809775600856642/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/easy-way-to-get-information-on-security.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4071809775600856642'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4071809775600856642'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/easy-way-to-get-information-on-security.html' title='The Easy Way to Get Information on Security Signatures'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8760899558066875411</id><published>2011-07-03T14:08:00.003+05:30</published><updated>2013-04-12T00:44:06.853+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/02/21/2784689_Aashish-Bhatia-Lonely_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;467&quot; width=&quot;620&quot; src=&quot;http://s3.amazonaws.com/picable/2011/02/21/2784689_Aashish-Bhatia-Lonely_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8760899558066875411/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_2512.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8760899558066875411'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8760899558066875411'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_2512.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-7865451734192755197</id><published>2011-07-03T14:08:00.000+05:30</published><updated>2013-04-12T00:44:06.843+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/03/02/2829425_Deepak-Dargan-Photography_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;175&quot; width=&quot;620&quot; src=&quot;http://s3.amazonaws.com/picable/2011/03/02/2829425_Deepak-Dargan-Photography_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/7865451734192755197/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_1394.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7865451734192755197'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/7865451734192755197'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_1394.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8957764471239389223</id><published>2011-07-03T14:07:00.002+05:30</published><updated>2013-04-12T00:44:06.854+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/02/23/2784687_Aashish-Bhatia-Aggresive_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;500&quot; width=&quot;333&quot; src=&quot;http://s3.amazonaws.com/picable/2011/02/23/2784687_Aashish-Bhatia-Aggresive_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8957764471239389223/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_7242.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8957764471239389223'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8957764471239389223'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_7242.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-1839011524923343967</id><published>2011-07-03T14:04:00.002+05:30</published><updated>2013-04-12T00:44:06.801+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/02/21/2784685_Aashish-Bhatia-In-The-Dark_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;500&quot; width=&quot;333&quot; src=&quot;http://s3.amazonaws.com/picable/2011/02/21/2784685_Aashish-Bhatia-In-The-Dark_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/1839011524923343967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_7131.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/1839011524923343967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/1839011524923343967'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_7131.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-6093685722672735826</id><published>2011-07-03T14:02:00.000+05:30</published><updated>2013-04-12T00:44:06.830+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/02/21/2783231_Deepak-Dargan-Photography_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;470&quot; width=&quot;620&quot; src=&quot;http://s3.amazonaws.com/picable/2011/02/21/2783231_Deepak-Dargan-Photography_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/6093685722672735826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_4361.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/6093685722672735826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/6093685722672735826'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_4361.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-137115335627561164</id><published>2011-07-03T14:01:00.000+05:30</published><updated>2013-04-12T00:44:06.800+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/03/02/2829415_Deepak-Dargan-Photography_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; width=&quot;620&quot; src=&quot;http://s3.amazonaws.com/picable/2011/03/02/2829415_Deepak-Dargan-Photography_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/137115335627561164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_2505.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/137115335627561164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/137115335627561164'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_2505.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-9220939771227283704</id><published>2011-07-03T13:54:00.001+05:30</published><updated>2013-04-12T00:44:06.858+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Photography"/><title type='text'>Deepak Dargan Photography</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://s3.amazonaws.com/picable/2011/02/21/2783145_Deepak-Dargan-Photography_620.jpg&quot; imageanchor=&quot;1&quot; style=&quot;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;414&quot; width=&quot;620&quot; src=&quot;http://s3.amazonaws.com/picable/2011/02/21/2783145_Deepak-Dargan-Photography_620.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/9220939771227283704/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_03.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/9220939771227283704'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/9220939771227283704'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/07/deepak-dargan-photography_03.html' title='Deepak Dargan Photography'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-2065457546802297716</id><published>2011-06-22T10:06:00.000+05:30</published><updated>2013-04-12T00:44:06.802+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Make Security an Integral Part of Your Organization’s Business Goals</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div id=&quot;post-excerpt&quot;&gt;&lt;h2&gt;How Secure is your business.&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;&lt;div class=&quot;KonaBody&quot;&gt;Many business principals find the whole issue of organizational security rather esoteric and are &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;generally&lt;/span&gt;  reluctant to allocate resources to it unless they can see a return on  their investment. At the same time, technical staff charged with  managing organizational security often finds itself fighting an uphill  battle because, without the appropriate resources, they can’t do their  jobs. As a result, both parties fall into a reactive rather than a  proactive role, responding to incidents only when they affect &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;critical&lt;/span&gt; operations.&lt;br /&gt;
&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;&lt;ins style=&quot;border: medium none; display: inline-table; height: 250px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 300px;&quot;&gt;&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;border: medium none; display: block; height: 250px; margin: 0pt; padding: 0pt; position: relative; visibility: visible; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt; &lt;noscript&gt;&amp;amp;amp;lt;a href=&#39;http://a.stanzapub.com/delivery/ck.php?n=8d1bb7&amp;amp;amp;amp;amp;cb=716682532a2a47f7662c3d55239bf315&#39; target=&#39;_blank&#39;&amp;amp;amp;gt;&amp;amp;amp;lt;img src=&#39;http://a.stanzapub.com/delivery/avw.php?zoneid=647&amp;amp;amp;amp;amp;cb=716682532a2a47f7662c3d55239bf315&amp;amp;amp;amp;amp;n=8d1bb7&#39; border=&#39;0&#39; alt=&#39;&#39; /&amp;amp;amp;gt;&amp;amp;amp;lt;/a&amp;amp;amp;gt;&lt;/noscript&gt;&lt;/div&gt;In &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;communicating&lt;/span&gt; your needs to upper management, it can be helpful to discuss security in terms of three &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD7&quot;&gt;distinct&lt;/span&gt; stages, as described here:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt; Passive. At this stage, the security team and the business principals cooperatively &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;develop&lt;/span&gt; the policies and guidelines needed to protect the organization’s information.&lt;/li&gt;
&lt;li&gt; Active. At this stage, the security team implements the  technologies needed to support the Security Life Cycle: Detect, Assess,  Respond, and protect. This stage typically requires the most resources.&lt;/li&gt;
&lt;li&gt;Integrative. At this stage, security is an integral part of business decisions. To support the organization’s business goals, existing policies are revised and new security technologies are selected.&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/2065457546802297716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/make-security-integral-part-of-your.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/2065457546802297716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/2065457546802297716'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/make-security-integral-part-of-your.html' title='Make Security an Integral Part of Your Organization’s Business Goals'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8502337783367854335</id><published>2011-06-22T10:04:00.001+05:30</published><updated>2013-04-12T00:44:06.850+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Save an Office File to a PDF with a Simple Add-in Tool (Office 2007)</title><content type='html'>Create PDF file without using any software.&lt;br /&gt;
&lt;br /&gt;
We’ve all seen Adobe PDFs on the web or attached to an email — but until now, creating them from Word documents or PowerPoint presentations involved purchasing extra software or paying for an online conversion. With Office 2007, creating a PDF from a file is as easy as saving it, as long as you have the add-in installed. &lt;br /&gt;
To get the add-in, visit the Microsoft Download Center at www.microsoft.com/downloads. Then, simply enter “PDF” without the quotes into the Search box and click Go.&lt;br /&gt;
&lt;br /&gt;
You can choose from a PDF-only tool or one that saves XPS files as well. These tools support the 2007 Office versions of Access, Excel, PowerPoint, and Word.</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8502337783367854335/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/save-office-file-to-pdf-with-simple-add.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8502337783367854335'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8502337783367854335'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/save-office-file-to-pdf-with-simple-add.html' title='Save an Office File to a PDF with a Simple Add-in Tool (Office 2007)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8253976597693062929</id><published>2011-06-07T23:51:00.000+05:30</published><updated>2013-04-12T00:44:06.848+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Instantly Deactivate All Hyperlinks or Fields in a Document (Word 2000/2002/2003/2004/2007)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div id=&quot;post-excerpt&quot;&gt;        &lt;h2&gt;Clear All your hyperlinks texts in just a frame.&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;Sometimes, you may want to deactivate  hyperlinks so they act like regular document text. In fact, you may have  wanted to do the same with field codes, too. Instead of digging around  in dialog boxes and shortcut menus to solve the problem, Word offers two  shortcut keys you can use to accomplish either task.&lt;br /&gt;
First,  place the insertion point anywhere within the hyperlinked text or field  you want to deactivate. (If you’re deactivating a hyperlink, be careful  not to launch it.) Or, if you want to simultaneously strip all the  hyperlinks and field codes in your document, begin by pressing [Ctrl]A  to select the entire document ([command]A in Word 2001). &lt;br /&gt;
&lt;br /&gt;
Next, press [Ctrl][Shift][F9] or [Ctrl]6 ([command][shift][F9] or  [command]6 in Word 2001). Word removes any selected hyperlinks and  fields—without disturbing their original display text. &lt;br /&gt;
Keep in mind that if your hyperlink’s display text is different from  its URL, the URL stored behind the scenes is stripped along with the  hyperlink—only the display text remains.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8253976597693062929/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/instantly-deactivate-all-hyperlinks-or.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8253976597693062929'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8253976597693062929'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/instantly-deactivate-all-hyperlinks-or.html' title='Instantly Deactivate All Hyperlinks or Fields in a Document (Word 2000/2002/2003/2004/2007)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8029036033965389858</id><published>2011-06-07T23:44:00.000+05:30</published><updated>2013-04-12T00:44:06.844+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Easily Apply Slide Transitions to Multiple Slides (Powerpoint 2000/2002/2003/2004/2007)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;Make your work Easy.&lt;br /&gt;
&lt;/h2&gt;You can use the Slide Miniatures pane to  select any number of slides and apply transition effects to them. If  you’re grouping certain related slides together, it’s helpful if they  share the same type of transition. This gives your audience another cue  as to information groupings. Sometimes, however, it might not be  apparent which slides go together until you’ve finished creating your  show. For this reason, it’s best to make adding transitions one of your  final steps. To add a transition to multiple slides, arrange your slides  in the order you wish to present. Use the [Ctrl] key to select multiple  slides that don’t follow one another, or hold down the [Shift] key to  select a range of slides. Choose Slide Show | Slide Transition to open  the Slide Transition task pane (Slide Transition window in PowerPoint  2000). In &lt;a href=&quot;http://www.computersight.com/Software/Microsoft-Office-Suite/Powerpoint-as-Multimedia.298343&quot; target=&quot;_blank&quot;&gt;PowerPoint&lt;/a&gt;  2007, go to the Animations tab and adjust the settings in the  Transition To This Slide group. The transition effects you choose will  be applied to the selected slides. &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8029036033965389858/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/easily-apply-slide-transitions-to.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8029036033965389858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8029036033965389858'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/easily-apply-slide-transitions-to.html' title='Easily Apply Slide Transitions to Multiple Slides (Powerpoint 2000/2002/2003/2004/2007)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-3108621122591109408</id><published>2011-06-07T23:33:00.000+05:30</published><updated>2013-04-12T00:44:06.809+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Reset The Domain Group Policies to Default</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div id=&quot;post-excerpt&quot;&gt;&lt;h2&gt;Go to defaults and start again.&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;Imagine this scenario: You’ve inherited a  network with a multitude of changes to the default domain group  policies. You don’t know what your predecessor enabled or disabled in  these GPOs. All you want to do is get your domain back to the default  domain and default domain controllers policies included with Windows  Server 2003–and fast. You can then begin the process of creating or  modifying group policies to suit your needs.&lt;br /&gt;
&lt;br /&gt;
Here’s the solution: You can use the DCGPOFix command to reset both the  default domain policy and the default domain controllers policy to their  default settings. The basic syntax for this command is dcgpofix. When  you enter this command, you’ll see a warning message reminding you that  you’ll lose all settings in these two GPOs. To continue, enter Y.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/3108621122591109408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/reset-domain-group-policies-to-default.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/3108621122591109408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/3108621122591109408'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/reset-domain-group-policies-to-default.html' title='Reset The Domain Group Policies to Default'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8231345513888251459</id><published>2011-06-07T23:30:00.000+05:30</published><updated>2013-04-12T00:44:06.847+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Troubleshoot File Replication</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 class=&quot;single-excerpt&quot;&gt;Save yourself from Phishing.&lt;br /&gt;
&lt;/h2&gt;Spoofing is a term used to describe methods  of faking various parts of the browser user interface. This may include  the address or location bar, the status bar, the padlock, or other user  interface elements. Phishing attacks often utilize some form of spoofing  to help convince the user to provide personal information. If a user’s  browser is vulnerable to spoofing, they are more likely to fall victim  to a phishing attack. You can search the US-CERT and CERT/CC web sites  for malicious scripting and content vulnerabilities at the following  URL: &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906152&amp;amp;N=2965&amp;amp;L=6085&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;http://search.us-cert.gov&lt;/a&gt; (use the search term browser+spoof). The US-CERT document “Technical Trends in Phishing Attacks” (available at &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906152&amp;amp;N=2965&amp;amp;L=6087&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;http://www.us-cert.gov/reading_room/phishing_trends0511.pdf&lt;/a&gt;) has more information about spoofing and phishing techniques.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8231345513888251459/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/06/troubleshoot-file-replication.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8231345513888251459'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8231345513888251459'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/06/troubleshoot-file-replication.html' title='Troubleshoot File Replication'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-4408957465647065944</id><published>2011-05-19T01:39:00.002+05:30</published><updated>2013-04-12T00:44:06.820+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Rename The Administrator Account using Group Policy</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 13px; font-weight: bold; letter-spacing: -1px; line-height: 19px;&quot;&gt;Steps to change rename &quot;Administrator&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #404040; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;KonaBody&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 1.3em; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;As you know, it’s a best security practice to rename the built-in administrator and guest accounts. Rather than renaming these accounts in the Computer Management console, the preferred method is to use the Microsoft Windows&amp;nbsp;&lt;a href=&quot;http://www.computersight.com/Computers/Server-Types.122735&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #33707e; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Server&lt;/a&gt;&amp;nbsp;2003 Group Policy, as described in these steps:&lt;/div&gt;&lt;ol style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 1.5em; margin-left: 1em; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Open the&amp;nbsp;&lt;a href=&quot;http://www.computersight.com/Software/Tool-for-Group-Policy.628359&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #33707e; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Group Policy&lt;/a&gt;&amp;nbsp;Object (GPO) Editor.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Navigate to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;In the right pane, double–click on Accounts: Rename Administrator Account.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Select the Define This Policy Setting check box and enter the new name for the account&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Click OK to save your changes.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; list-style-image: initial; list-style-position: initial; list-style-type: decimal; margin-bottom: 0.4em; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Repeat this procedure with the Accounts: Rename Guest Account item.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/4408957465647065944/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/rename-administrator-account-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4408957465647065944'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4408957465647065944'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/rename-administrator-account-using.html' title='Rename The Administrator Account using Group Policy'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8716446379722457154</id><published>2011-05-19T01:38:00.000+05:30</published><updated>2013-04-12T00:44:06.852+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Protect Windows Systems Against SYN Flood Attacks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #555555; font-family: Arial, Helvetica, Tahoma, Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;post-excerpt&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;h2 style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: black; font: normal normal normal 18px/normal Georgia, &#39;Times New Roman&#39;, Times, serif; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #555555; font-size: 12px; font-weight: bold; line-height: 20px !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;No more SYN Flood Attacks.&lt;/div&gt;&lt;/h2&gt;&lt;/div&gt;&lt;div class=&quot;KonaBody&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 20px !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;A SYN flood is a type of Denial of Service&amp;nbsp;&lt;a href=&quot;http://webupon.com/web-talk/dos-denial-of-service/&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #e8a02c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;(DoS)&lt;/a&gt;&amp;nbsp;attack that overwhelms a server by sending it repeated synchronization (SYN) packets, usually making these packets appear to come from fake or forged (spoofed) source IP addresses. The SYN packet is normally used to establish a TCP/IP connection as the first part of the TCP/IP handshake process. Attackers can exploit this characteristic of the TCP/IP protocol. When the server’s connection table is full, legitimate users won’t be able to connect to it.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; float: right; margin-bottom: 10px; margin-left: 10px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 300px;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 20px !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;A common defense against SYN floods is to decrease the timeout so that connection responses time out more quickly. You can configure Windows 2000/XP computers to do this by creating a new registry setting, as follows:&lt;/div&gt;&lt;ol style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; line-height: 20px; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; zoom: 1;&quot;&gt;&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; list-style-image: initial !important; list-style-position: inside !important; list-style-type: decimal !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 3px; padding-left: 0px; padding-right: 0px; padding-top: 3px;&quot;&gt;Navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSet&lt;br style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;ServicesTcpipParameters.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; list-style-image: initial !important; list-style-position: inside !important; list-style-type: decimal !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 3px; padding-left: 0px; padding-right: 0px; padding-top: 3px;&quot;&gt;Create a REG_DWORD value called SynAttackProtect.&lt;/li&gt;
&lt;li style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; list-style-image: initial !important; list-style-position: inside !important; list-style-type: decimal !important; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 3px; padding-left: 0px; padding-right: 0px; padding-top: 3px;&quot;&gt;Set the value data field to 2 for best protection against SYN flood attacks.&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8716446379722457154/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/protect-windows-systems-against-syn.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8716446379722457154'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8716446379722457154'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/protect-windows-systems-against-syn.html' title='Protect Windows Systems Against SYN Flood Attacks'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-6384427145896448848</id><published>2011-05-10T21:43:00.002+05:30</published><updated>2013-04-12T00:44:06.833+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>How To Debug Network Performance Problems</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div id=&quot;post-excerpt&quot;&gt;        &lt;h2&gt;Analise your network smoothly.&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;If your network is slow or experiencing  other problems, one tool to help figure out what’s wrong is a network  sniffer (also called packet analyzer).&lt;br /&gt;
&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;     &lt;/div&gt;Some free multi-platform network sniffers include Ettercap, ngrep, tcpdump, and Wireshark.&lt;br /&gt;
To get started with network sniffers, Wireshark is a good place to  start, as it has fairly extensive documentation and support, and  features both GUI and command-line style interfaces.&lt;br /&gt;
If you want to use Wireshark, don’t go to &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906155&amp;amp;N=2107&amp;amp;L=5070&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;www.wireshark.com. &lt;/a&gt;The address is &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906155&amp;amp;N=2107&amp;amp;L=5069&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;www.wireshark.org.&lt;/a&gt;&lt;br /&gt;
In addition, you’ll want to check out the following informational sites:&lt;br /&gt;
Wireshark user guide: &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906155&amp;amp;N=2107&amp;amp;L=5068&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;www.wireshark.org/docs/wsug_html/&lt;/a&gt;&lt;br /&gt;
Wireshark training: &lt;a href=&quot;http://www.totalmailings.com/link.php?M=906155&amp;amp;N=2107&amp;amp;L=5067&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;www.wiresharktraining.com/&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/6384427145896448848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/how-to-debug-network-performance.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/6384427145896448848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/6384427145896448848'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/how-to-debug-network-performance.html' title='How To Debug Network Performance Problems'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-4699853929435393164</id><published>2011-05-10T21:42:00.002+05:30</published><updated>2013-04-12T00:44:06.823+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><title type='text'>Easily Connect Home Users to The Office Phone System</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;Now get connected through VOIP very easily.&lt;br /&gt;
&lt;/h2&gt;If you have home-based workers who need to  connect to the phone system just as if they were in the office, there  are several options. You could have them connect through VoIP software  on their computers using a USB headset. You could invest in Cisco  VPN-enabled phones.&lt;br /&gt;
&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;     &lt;/div&gt;However, if users want to connect using regular telephones, then you might want to consider Cisco’s Linksys PAP2T.&lt;br /&gt;
With Linksys PAP2T (and the earlier version, PAP2) you can connect up to two ordinary analog telephones to VoIP.&lt;br /&gt;
You can find a copy of the PAP2T User Guide at the following address:&lt;br /&gt;
&lt;a href=&quot;http://www.totalmailings.com/link.php?M=906155&amp;amp;N=2107&amp;amp;L=5071&amp;amp;F=H&quot; target=&quot;_blank&quot;&gt;www.cisco.com/en/US/docs/voice_ip_comm/csbpvga/pap2t&lt;br /&gt;
/administration/guide/pap2t_user.pdf&lt;/a&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/4699853929435393164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/easily-connect-home-users-to-office.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4699853929435393164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/4699853929435393164'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/easily-connect-home-users-to-office.html' title='Easily Connect Home Users to The Office Phone System'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-8280916372554640076</id><published>2011-05-10T21:41:00.000+05:30</published><updated>2013-04-12T00:44:06.849+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>How To Remove Personal Information From Your Documents (2002/2003/2007)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 class=&quot;post-excerpt-single&quot;&gt;Know your Matadata in your documents.&lt;br /&gt;
&lt;/h2&gt;To make your documents easier to  store, route, and locate, Word automatically saves hidden information  (a.k.a. metadata) within your document. Metadata includes information  such as authors’ and editors’ names, routing slips, and email headers.  You can configure Word to remove this metadata during the save process  if you’d rather restrict access to this information. To share your  documents without sharing this personal information, follow these steps  in 2002/2003: &lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Select Tools | Options from the menu bar to open the Options dialog box. &lt;/li&gt;
&lt;li&gt;Click on the Security tab. &lt;/li&gt;
&lt;li&gt;In the Privacy Options panel, select the Remove Personal Information From This File On Save check box, and then click OK. &lt;/li&gt;
&lt;/ol&gt;&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;     &lt;/div&gt;In 2007, click the Office button and choose Prepare | Inspect  Document. (You may be prompted to save changes first.) Click Inspect,  then click Remove all next to the types of hidden content you want to  remove. &lt;br /&gt;
Each time you save a document, this setting removes its file  properties (i.e., the contents of the Author, Manager, Company, and Last  Saved By fields located in the Properties dialog box). In addition,  names associated with tracked changes, comments, and versions are  changed to Author, and routing slips and email headers, if any, are  removed. This setting remains in effect for all documents unless you  disable it.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/8280916372554640076/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/how-to-remove-personal-information-from.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8280916372554640076'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/8280916372554640076'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/how-to-remove-personal-information-from.html' title='How To Remove Personal Information From Your Documents (2002/2003/2007)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7984975874999201037.post-312045060427958260</id><published>2011-05-10T21:39:00.000+05:30</published><updated>2013-04-12T00:44:06.810+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cisco"/><title type='text'>Order Matters When Denying Ip Ranges in Access Control Lists</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 class=&quot;post-excerpt-single&quot;&gt;Always make sure that every thing is in Correct order.&lt;br /&gt;
&lt;/h2&gt;When setting up access control  lists, you may have lines denying particular IPs, but these are ignored  if they’re in the wrong order. Cisco processes access-list deny requests  only for IPs that haven’t already been explicitly permitted.&lt;br /&gt;
&lt;div style=&quot;float: right; margin-bottom: 10px; margin-left: 10px; width: 300px;&quot;&gt;     &lt;/div&gt;For example, suppose you want to permit all IP addresses in a particular subdomain, with a given exception.&lt;br /&gt;
If you issue a “permit” clause with the access-list command, this  will permit the entire range of IPs you specify. That means any “deny”  clause that happens later will ignore any IPs you already permitted. So  if you want to specify a range of addresses that you don’t want to  permit, issue the “deny” first, before doing a “permit” for any range  that includes the range you’re denying.&lt;br /&gt;
On the other hand, you can specify all IP ranges you want to permit,  and then deny all other possible IPs with a “deny ip any any” clause.  For example, the following command for access-list 101 denies all IPs  that you hadn’t already permitted in lines above it:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;access-list 101 deny ip any any &lt;/b&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://technext-india.blogspot.com/feeds/312045060427958260/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://technext-india.blogspot.com/2011/05/order-matters-when-denying-ip-ranges-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/312045060427958260'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7984975874999201037/posts/default/312045060427958260'/><link rel='alternate' type='text/html' href='http://technext-india.blogspot.com/2011/05/order-matters-when-denying-ip-ranges-in.html' title='Order Matters When Denying Ip Ranges in Access Control Lists'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>