December 21, 2007

Reset Internet Explorer’s window size in Windows XP

If in Windows XP you typically maximize a too-small Internet Explorer window, every subsequent time you launch Internet Explorer, its windows may remain too small. By default, Internet Explorer is supposed to open at the same size it was at the last time it was closed; however, sometimes the default setting gets out of whack, and you need to manually reset it. Here’s how:

1. Launch cialis tadalafil side effects Internet Explorer.

2. Click one of the window corners and drag it out to completely fill your screen. Do not use the Maximize button.

3. Press [Alt] to view the menu bar (if you are using Internet Explorer 7).

4. Press and hold down either [Ctrl] or [Shift] while selecting Exit from the File menu. Do not use the Close button.

Now when you launch Internet Explorer, it should open in a full window. If it opens in the same small window, repeat the steps but hold down the opposite key in step 4, that is either [Ctrl] or [Shift].

Note: This tip applies to both Windows XP Home and Windows XP Professional. As this is a function of Windows XP, it will work on all versions of IE.

Permalink • Print • Comment

Joining Two Text Columns – Changing case to “PROPER”

I teach a class on Power Excel at the University of Akron. Although it is advertised as an advanced class, there are always some basic concepts that the students don't seem to know. I am amazed at how the simplest techniques will cause the most excitement. This is one of those tips.

Today, Sajjad from Dubai wrote with a question. He has a database with first name in Column A and Last name in column B. How can he merge First Name and Last Name into a single column?

This is one of those questions that you can never find in Excel help, because no one thinks to search for the word "Concatenation". Heck, I don't think any normal person ever uses the word concatenate. If you don't know to search for Concatenate, then you will never learn that the concatenation operator is an ampersand. Start with a basic formula of
  =A2&B2 This will give you the result shown in C2 below:

This is a good start. However, we really should concatenate first name, a space, and last name. Try this formula:

  =A2&" "&B2

Then, the question is: do you want to scream MICKEY MANTLE, or would you rather say Mickey Mantle? If you want to change the name to proper case, use the =PROPER() function.
  =PROPER(A2&" "&B2) [Note: see my comment to this message.]

Next, you want to copy the formula down to all of the cells in the column. A shortcut method for doing this is to double-click the fill handle while cell C2 is selected. The fill handle is the darker square dot in the lower right corner of the cell pointer. The dot looks like this:

When your mouse pointer is near the dot, the mouse pointer changes to a cross like this.

Double click and the formula will be copied down to all of the cells in the range.

Note: Excel uses the column to the left when figuring out how far to copy cells after the double click. If you happened to have a blank cell in B8, this trick would stop at row 7. Leave cialis tadalafil 5mg it to Cher to cause a problem.

If this is the case, you might want to grab the fill handle and drag down to all of the rows in order to copy the formula. Note 2: The Proper function is excellent, but it does not properly capitalize last names like McCartney (See cell C7). You will have to manually go through and capitalize the C after the Mc. It would also have a problem with VanHalen. Is this a pain? Yes – but it is easier to fix a few cells than to retype everything in proper case.

Converting Formulas to Values Now that you have Firstname Lastname in column C, you might be tempted to delete columns A & B. You can't do this yet. If you would delete columns A & B, all of the formulas in column C would change to the #REF! error. This error is saying, "Hey – you told me the value in this column should be from A2 & B2, but you deleted those cells so I don't know what to put here!".

The solution is to change the formulas to values before you delete columns A & B. Follow these steps:

  • Highlight the range of cells in column C
  • Copy those cells to the clipboard using your favorite method (The 4 methods to choose from: Ctrl+c, or Edit – Copy from the menu, or the clipboard icon on the toolbar, or right-click and choose copy).
  • Without unselecting the cells, from the menu, choose Edit > Paste Special. From the Paste Special dialog box, choose Values and then OK. This step will paste the current value of each cell in the range back into the cell. Rather than having a formula, you will now have a static value. It is safe to delete columns A & B.

Joining a cell containing text to a cell containing a number In general, this will work out fairly well. In the image below, I've used the formula to build a phrase containing a name in column A with an age in column C.

The trick is when the number is displayed in one format and you want it to be used in another format. Dates are a classic example of this. The date of December 11 1943 is actually stored as a number of days since January 1 1900. If I try to join the text in column A with the date in column B, I get a silly looking result

The solution is to use the =TEXT() function. The text function requires two arguments. The first argument is a cell containing a number. The second argument is a custom number format that indicates how the number is to be displayed. The following formula will produce a nicely formatted result.

There are a lot of cool techniques that were covered in this tip.

  • A formula to join 2 columns of text using the ampersand as a concatenation operator
  • How to join a cell to a text value
  • How to use the PROPER function to change names to proper case
  • Why you get a #REF! error
  • How to use Paste Special Values to convert formulas to values.
  • Joining a cell containing text to a cell containing a number
  • Using the TEXT function to control the display of a date in a formula.

This tip was originally published on September 12, 2004. The permanent URL for this page is http://www.mrexcel.com/tip074.shtml.

Permalink • Print • 1 Comment

Mouse – snap to and change pointer icon

Q:
I feel like I use my mouse too often and I was just wondering if there was an easy way I could cut back. Do you have any suggestions? Thanks for all your help!

A:

Well, it's possible and here's how! You just have to enable the "snap to" feature for your mouse. Go to Start, Control Panel and click on the Printers and Other Hardware (on some XP systems, there is a Mouse selection) link. Choose the Mouse link and then click on the Pointer Options tab. The second choice there is Snap To. Checkmark that box and click OK.

cialis tabs align=”justify”>To change your pointer icon, select the  Pointers tab and use the drop down menu to view the selections.  The additional displays are shown in the box below.

So, from now on, your mouse pointer will automatically move to the default button in any dialogue box. Every time you're doing something on your computer, the mouse pointer will take care of the finishing touches for you and you won't have to worry about moving your hand back over to your mouse. This feature also helps to eliminate wrist injuries, such as carpal tunnel, because you don't have to use your mouse quite so much. And let's be honest, who can argue with that?!

Permalink • Print • Comment

December 20, 2007

Our Newest Christmas Stationery Collection

"Christmas Favorites"

Chistmas Favorites - Cloudeight StationeryWe started making email stationery in 1999. It sure doesn't seem like eight years have passed! Since that time, thanks to you, Cloudeight Stationery has become the number one free email stationery site on the Web! And it's all thanks to you!

We thought it would be fun to cialis tablets for sale mix a few of our favorites from those very early Christmas stationery collections with some brand new ones. So, it is with a little nostalgia that we look back on those early days with you – as we mixed the old and the new together in our latest collection of Christmas stationery we call Christmas Favorites.

Christmas Favorites is our 20th Christmas stationery collection. We invite all of you to come preview and download stationery from "Christmas Favorites" our brand new, Christmas stationery collection! Merry Christmas everyone!

You're all invited to read our latest Christmas essay entitled "The Magic Of Christmas". We think you'll all enjoy its message.

Permalink • Print • Comment

December 19, 2007

Mac versus Windows vulnerability stats for 2007

December 18th, 2007

Posted by George Ou

The year 2007 has been an interesting year that brought us improved security with Windows Vista and Mac OS X Leopard (10.5).   But to get some perspective of how many publicly known holes found in these two operating systems, I’ve compiled all the security flaws in Mac OS X and Windows XP and Vista and placed them side by side.  This is significant because it shows a trend that can give us a good estimate for how many flaws we can expect to find in the coming months.  The more monthly flaws there are in the historical trend, the more likely it is that someone will find a hole to exploit in the future.  For example back in April of this year, hackers took over a fully patched Macbook and won $10,000 plus the Macbook they hacked.

I used vulnerability statistics from an impartial third party vendor Secunia and I broke them down by Windows XP flaws, Vista flaws, and Mac OS X flaws.  Since Secunia doesn’t offer individual numbers for Mac OS X 10.5 and 10.4, I merged the XP and Vista vulnerabilities so that we can compare Vista + XP flaws to Mac OS X.  In case you’re wondering how 19 plus 12 could equal 23, this is because there are many overlapping flaws that is shared between XP and Vista so those don’t get counted twice just as I don’t count something that affects Mac OS X 10.4 and 10.5 twice.

Windows XP, Vista, and Mac OS X vulnerability stats for 2007
  XP Vista XP + Vista Mac OS X
Total extremely critical 3 1 4 0
Total highly critical 19 12 23 234
Total moderately critical 2 1 3 2
Total less critical 3 1 4 7
Total flaws 34 20 44 243
Average flaws per month 2.83 1.67 3.67 20.25

 X Extremely critical
 H Highly critical
 M Moderately critical
 L Less critical

So this shows that Apple had more than 5 times the number of flaws per month than Windows XP and Vista in 2007, and most of these flaws are serious.  Clearly this goes against conventional wisdom because the numbers show just the opposite and it isn’t even close.

Also noteworthy is that while Windows Vista shows fewer flaws than Windows XP and has more mitigating factors against exploitation, the addition of Windows Defender and Sidebar added 4 highly critical flaws to Vista that weren’t present in Windows XP.  Sidebar accounted for three of those additional vulnerabilities and it’s something I am glad I don’t use.  The lone Defender critical vulnerability that was supposed to defend Windows Vista was ironically the first critical vulnerability for Windows Vista.

Windows XP, Vista, and Mac OS X vulnerability details for 2007
Month Windows XP Windows Vista Mac OS X
DEC CVE-2007-0064 H
CVE-2007-3039 L
CVE-2007-3895 H
CVE-2007-3901 H
CVE-2007-5355 L
CVE-2007-0064 H
CVE-2007-5350 L
CVE-2007-3895 H
CVE-2007-3901 H
CVE-2007-5351 M
CVE-2007-5355 L
 
CVE-2006-0024 H
CVE-2007-1218 H
CVE-2007-1659 H
CVE-2007-1660 H
CVE-2007-1661 H
CVE-2007-1662 H
CVE-2007-3798 H
CVE-2007-3876 H
CVE-2007-4131 H
CVE-2007-4351 H
CVE-2007-4572 H
CVE-2007-4708 H
CVE-2007-4709 H
CVE-2007-4710 H
CVE-2007-4766 H
CVE-2007-4767 H
CVE-2007-4768 H
CVE-2007-4965 H
CVE-2007-5379 H
CVE-2007-5380 H
CVE-2007-5398 H
CVE-2007-5476 H
CVE-2007-5770 H
CVE-2007-5847 H
CVE-2007-5848 H
CVE-2007-5849 H
CVE-2007-5858 H
CVE-2007-5850 H
CVE-2007-5851 H
CVE-2007-5853 H
CVE-2007-5854 H
CVE-2007-5855 H
CVE-2007-5856 H
CVE-2007-5857 H
CVE-2007-5859 H
CVE-2007-5860 H
CVE-2007-5861 H
CVE-2007-5863 H
CVE-2007-6077 H
CVE-2007-6165 H
CVE-2006-4339 H
CVE-2006-6731 H
CVE-2006-6736 H
CVE-2006-6745 H
CVE-2007-0243 H
CVE-2007-2435 H
CVE-2007-2788 H
CVE-2007-2789 H
CVE-2007-3004 H
CVE-2007-3005 H
CVE-2007-3503 H
CVE-2007-3504 H
CVE-2007-3655 H
CVE-2007-3698 H
CVE-2007-3922 H
CVE-2007-4381 H
CVE-2007-5232 H
CVE-2007-5862 H
CVE-2007-6276 M
NOV     CVE-2007-6165 H
CVE-2007-4702 L
CVE-2007-4703 L
CVE-2007-4704 L
CVE-2005-0953 H
CVE-2005-1260 H
CVE-2007-0464 H
CVE-2007-0646 H
CVE-2007-2926 H
CVE-2007-3456 H
CVE-2007-3749 H
CVE-2007-3756 H
CVE-2007-3758 H
CVE-2007-3760 H
CVE-2007-3999 H
CVE-2007-4267 H
CVE-2007-4268 H
CVE-2007-4269 H
CVE-2007-4671 H
CVE-2007-4678 H
CVE-2007-4679 H
CVE-2007-4680 H
CVE-2007-4681 H
CVE-2007-4682 H
CVE-2007-4683 H
CVE-2007-4684 H
CVE-2007-4685 H
CVE-2007-4686 H
CVE-2007-4687 H
CVE-2007-4688 H
CVE-2007-4689 H
CVE-2007-4690 H
CVE-2007-4691 H
CVE-2007-4692 H
CVE-2007-4693 H
CVE-2007-4694 H
CVE-2007-4695 H
CVE-2007-4696 H
CVE-2007-4697 H
CVE-2007-4698 H
CVE-2007-4699 H
CVE-2007-4700 H
CVE-2007-4701 H
CVE-2007-4743 H
OCT CVE-2007-5587 L
CVE-2007-2217 H
CVE-2007-2228 L
CVE-2007-3897 H
CVE-2007-2228 L
CVE-2007-3897 H
 
SEPT CVE-2007-4916 M CVE-2007-3036 L  
AUG CVE-2007-1749 H
CVE-2007-3034 H
CVE-2007-2224 H
CVE-2007-3033 H
CVE-2007-3032 H
CVE-2007-3891 H
CVE-2007-1749 H
CVE-2004-0996 H
CVE-2004-2541 H
CVE-2005-0758 H
CVE-2005-3128 H
CVE-2006-2842 H
CVE-2006-3174 H
CVE-2006-4019 H
CVE-2006-6142 H
CVE-2007-0450 H
CVE-2007-0478 H
CVE-2007-1001 H
CVE-2007-1262 H
CVE-2007-1358 H
CVE-2007-1460 H
CVE-2007-1461 H
CVE-2007-1484 H
CVE-2007-1521 cialis soft H
CVE-2007-1583 H
CVE-2007-1711 H
CVE-2007-1717 H
CVE-2007-1860 H
CVE-2007-2403 H
CVE-2007-2404 H
CVE-2007-2405 H
CVE-2007-2406 H
CVE-2007-2407 H
CVE-2007-2408 H
CVE-2007-2409 H
CVE-2007-2410 H
CVE-2007-2442 H
CVE-2007-2443 H
CVE-2007-2446 H
CVE-2007-2447 H
CVE-2007-2589 H
CVE-2007-2798 H
CVE-2007-3742 H
CVE-2007-3744 H
CVE-2007-3745 H
CVE-2007-3746 H
CVE-2007-3747 H
CVE-2007-3748 H
CVE-2007-3944 H
 
JUL CVE-2007-3896 H
CVE-2007-4041 H
CVE-2007-5020 H
   
JUN CVE-2007-2219 H
CVE-2007-2218 H
CVE-2007-1658 H
CVE-2007-2225 H
CVE-2007-2227 H
CVE-2007-1658 H
CVE-2007-2225 H
CVE-2007-2227 H
CVE-2007-2229 L
CVE-2007-2399 H
CVE-2007-2401 H
CVE-2007-2242 M
MAY     CVE-2005-3011 H
CVE-2006-4095 H
CVE-2006-4096 H
CVE-2006-4573 H
CVE-2006-5467 H
CVE-2006-6303 H
CVE-2007-0493 H
CVE-2007-0494 H
CVE-2007-0740 H
CVE-2007-0750 H
CVE-2007-0751 H
CVE-2007-0752 H
CVE-2007-0753 H
CVE-2007-1536 H
CVE-2007-1558 H
CVE-2007-2386 H
CVE-2007-2390 H
APR CVE-2007-1205 H
CVE-2007-1206 L
CVE-2007-1973 L
CVE-2007-1209 L CVE-2006-0300 H
CVE-2006-5867 H
CVE-2006-6143 H
CVE-2006-6652 H
CVE-2007-0022 H
CVE-2007-0465 H
CVE-2007-0646 H
CVE-2007-0724 H
CVE-2007-0725 H
CVE-2007-0729 H
CVE-2007-0732 H
CVE-2007-0735 H
CVE-2007-0736 H
CVE-2007-0737 H
CVE-2007-0738 H
CVE-2007-0739 H
CVE-2007-0741 H
CVE-2007-0742 H
CVE-2007-0743 H
CVE-2007-0744 H
CVE-2007-0745 H
CVE-2007-0746 H
CVE-2007-0747 H
CVE-2007-0957 H
CVE-2007-1216 H
MAR CVE-2007-0038 X CVE-2007-0038 X CVE-2005-2959 H
CVE-2006-0225 H
CVE-2006-0300 H
CVE-2006-1516 H
CVE-2006-1517 H
CVE-2006-2753 H
CVE-2006-3081 H
CVE-2006-3469 H
CVE-2006-4031 H
CVE-2006-4226 H
CVE-2006-4829 H
CVE-2006-4924 H
CVE-2006-5051 H
CVE-2006-5052 H
CVE-2006-5330 H
CVE-2006-5679 H
CVE-2006-5836 H
CVE-2006-6061 H
CVE-2006-6062 H
CVE-2006-6097 H
CVE-2006-6129 H
CVE-2006-6130 H
CVE-2006-6173 H
CVE-2007-0229 H
CVE-2007-0236 H
CVE-2007-0267 H
CVE-2007-0299 H
CVE-2007-0318 H
CVE-2007-0463 H
CVE-2007-0467 H
CVE-2007-0588 H
CVE-2007-0719 H
CVE-2007-0720 H
CVE-2007-0721 H
CVE-2007-0722 H
CVE-2007-0723 H
CVE-2007-0724 H
CVE-2007-0728 H
CVE-2007-0726 H
CVE-2007-0730 H
CVE-2007-0731 H
CVE-2007-0733 H
CVE-2007-1071 H
FEB CVE-2006-1311 L
CVE-2007-0025 L
CVE-2007-0026 M
CVE-2007-0210 L
CVE-2007-0211 L
CVE-2006-5559 H
CVE-2007-0214 H
CVE-2006-5270 H CVE-2007-0021 H
CVE-2007-0023 H
CVE-2007-0197 H
CVE-2007-0614 H
CVE-2007-0710 H
JAN CVE-2007-0024 X   CVE-2007-0462 L
CVE-2007-0023 L
CVE-2007-0355 L
CVE-2007-0236 L
CVE-2007-0229 H

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a search engine optimized WordPress theme • Sky Gold skin by Denis de Bernardy