Pages

Thursday, November 28, 2013

The .NET AutoPostBack feature may not work for all users

The TextBox, CheckBox, RadioButton, and similar controls for ASP .NET Web Forms expose a property called AutoPostBack. If set to True, then any change to the state of the control triggers a postback to the server for some kind of programmatic action. This is all well and good, except for the fact that this functionality is implemented in client-side JavaScript. If users have disabled client-side script from executing, your code will fail unexpectedly. It's therefore not a particularly good idea to rely on this feature unless you warn your users not to disable the exëcutíon of client-side script.

Wednesday, November 27, 2013

Remember upcoming Excel work with a reminder from Outlook (2003)

Have you ever wanted to create a Microsoft Outlook task to remind you to do something with an Excel workbook? You could switch to Outlook, open a task form, and create the task item. However, there’s an easier way to create a task from Excel. When you're ready to create the task item, make sure that Outlook and Excel are both open. Also, ensure that you’ve saved the workbook and that the Reviewing toolbar is displayed in Excel. If the toolbar isn’t visible, just right-click on any toolbar and choose Reviewing from the shortcut menu.

Tuesday, November 26, 2013

Keep track of ports with this handy reference

When figuring out which ports to keep open or closed in your firewall, it helps to have a list of the ports used by various kinds of software. Here's a handy reference tool you can use to find ports: www.iana.org/assignments/port-numbers. Simply search the page for the number of the port or the application. When configuring your firewall, you may also want to check protocol numbers at the following site: www.iana.org/assignments/protocol-numbers

Monday, November 25, 2013

Getting from here to CISO: Conversations with a Chief Information Security Officer (webinar)

The demand for information security experts is outstripping the available supply by a widening margin. A report from Burning Glass Technologies, shows that demand for cybersecurity professionals over the past 5 years grew 3.5 times faster than demand for other IT jobs and about 12 times faster than for all other jobs. In this webinar, Dr Shawn Murray will share with you what it takes to become a successful CISO.

Thursday, November 21, 2013

Top 20 IT Training Companies Worldwide

New Horizons Computer Learning Centers has again earned a spot among the Top 20 Information Technology (IT) educational companies in the world for the sixth straight year since the award was first established in 2008 by the leading website TrainingIndustry.com. This prestigious award recognizes New Horizons’ excellence in leadership and innovation in IT training, breadth of IT training, delivery methods offered, geographic reach, and other qualifying criteria.

Wednesday, November 20, 2013

TODAY: Creating Complex Documents with Microsoft Word 2013 (online seminar)

Get informative tips for the new Microsoft Word 2013 documents. It is now easier than ever before to save time and simplify your work while working together from more locations. Witness how Microsoft Word 2013 facilitates the collaborative process, handles large documents, and provides easier building blocks for more clearly defined content. This session is for individuals who spend significant time writing and creating documents and are familiar with Microsoft Word.

Tuesday, November 19, 2013

Decrease your liability with email disclaimers

Law firms and businesses often use disclaimers to protect themselves against liability for incidents like a breach in confidentiality, a virus transmission, or faulty advice or advertising. Email disclaimers can't guarantee limitless protection against related liability, but they can deter some people from seeking legal compensation from your company and provide your message recipients with a reason to treat the contents of your message with due respect.

Monday, November 18, 2013

Protect your slide from accidental changes with an invisible shield (PowerPoint 2003/2007/2010)

When sharing presentation files, it’s inevitable that someone’s wayward clicks will accidentally alter your slide. For instance, an errant mouse movement could put your graph’s alignment out of whack. There’s an easy way to protect your slide from unwanted fiddling:


Thursday, November 14, 2013

TODAY: How to Use Social Media to be More Effective at your Job (online seminar)

This webinar will focus on the personal use of social media for success and being effective in your professional role. Learn the secret to being a super-star at work. Social media help you get things done and get noticed! Use social media for: recruiting, prospecting, networking, bringing value because of who is in your network, keeping up with industry trends. Attend this webinar to learn what tools are out there, the best tools for each task, where is the audience likely to be, the do’s and don’ts for each tool, the evolution of social media as a business tool.

Wednesday, November 13, 2013

TODAY: Getting the Most out of Microsoft PowerPoint 2010 (online seminar)

Discover the synergy of working with Microsoft PowerPoint to present and deliver information to your audience. You will learn about new features and timesavers to help in your day-to-day work. This session is good for beginner, intermediate, or advanced users – everyone will learn something!

Tuesday, November 12, 2013

Debug network performance problems with an open-source network sniffer

If your network is slow or experiencing other problems, one tool to help figure out what's wrong is a network sniffer (also called packet analyzer). Some free multi-platform network sniffers include Ettercap, ngrep, tcpdump, and Wireshark. To get started with network sniffers, Wireshark is a good place to start, as it has fairly extensive documentation and support, and features both GUI and command-line style interfaces. If you want to use Wireshark, don't go to www.wireshark.com. The address is www.wireshark.org.

Monday, November 11, 2013

A better way to create a Task from an email message (Outlook 2003/2007)

If you need to create a task and already have the relevant information in an email message, use it to your advantage. Just drag the email message from the Message list to the Tasks icon in the Navigation Pane. A new Task form launches with a subject line and the body of the email message in the message area of the Task form. This is all well and good, but where’s the attachment? This method won’t include any attachments from the e-mail message in the Task form, but here’s an easy way to get around that.

Thursday, November 7, 2013

Move the pattern - but not the shape (Illustrator CS)

When you apply patterns from the Swatches palette, you'll notice they always apply to graphics in the same way, which can occasionally be problematic. However, you don't have to accept it. You can manipulate the pattern without affecting the shape it's in by pressing the tilde key (~) as you use the Rotate tool, Reflect tool, Scale tool, or Shear tool. Distorting the pattern can make quite a difference in appearance. This trick is especially useful when you're working on a group of objects that all have the same pattern fill. In this case, you can tweak the pattern in each shape just a little bit to keep the patterns from lining up perfectly and inadvertently flattening out the form.

Wednesday, November 6, 2013

Find a huge glossary of internet terms online

If you're confused by internet jargon, such as Backbone, Extranet, MIME, and Proxies, there are many places you can go for descriptions, but one of the best is Matisse Enzer's Glossary Of Internet Terms. Found at http://www.matisse.net/files/glossary, this site has a huge number of terms that dwarfs Webopedia's collection, all with concise descriptions that are sure to help you better understand the changing technology we use.

Tuesday, November 5, 2013

Keep drive letters consistent for VPN users with this batch file trick

When you have users connecting to your network via VPN, you may want to automatically map drive letters to ensure that the paths are the same for everyone. To do this (when using Microsoft Windows machines), you can use a batch file containing the Net Use command.

Monday, November 4, 2013

Stop users from copying the text in your Access fields (2003/2007)

As you know, you can set a form field's Locked property to Yes to prevent users from changing the underlying data. However, users are still able to select and copy data from the field, and you may not always want this to be the case. The solution is to also set the field's Enabled property to No. Ordinarily, setting the Enabled property in Access this way causes the field and its associated label to be difficult to read. However, when you set the Enabled property to No and the Locked property to Yes, the fields and labels look exactly as they do when they're enabled for normal entry. The difference is that users will be unable to select or copy any of the displayed data.