February 19, 2009

Build a quick training presentation using PowerPoint’s Photo Album feature

  • Date: December 16th, 2008
  • Author: Jody Gilbert

Putting together an educational slide show doesn’t have to be labor intensive. Using PowerPoint’s Photo Album tool, you can quickly assemble a series of screen shots and text slides for distribution as a training resource or as part of an informational package.


Trying to schedule training sessions for end users can be practically impossible — and attendance is never a sure thing, either. One good solution is to put together a series of annotated screen shots that illustrate a procedure or set of features or usage scenarios and create a PowerPoint presentation using those images. You can then distribute the presentation via e-mail, put it on the company intranet, share it on CD, or periodically host a brown bag lunch and run the slide show for those users who can make it.

It takes a certain amount of thought to grab the most useful screen shots and make sure your instructions are clear — but of course, that’s true of any training material or documentation you produce. At least you don’t have to worry about spending a lot of time creating the presentation. PowerPoint’s Photo Album feature makes that part of the process a breeze. Let’s run through the process.

Note: This information is also available as a PDF download.

First steps

  1. Launch PowerPoint and then close the blank presentation that opens by default. (We’re starting from scratch.)
  2. Choose Picture from the Insert menu and select New Photo Album (Figure A).

Figure A

insert photo album

  1. In the Photo Album dialog box (Figure B), you’ll find options for choosing the desired pictures.

Figure B

insert picture

  1. Click the File/Disk button to open the Insert New Pictures dialog box (Figure C).

Figure C

picture list

  1. Locate and select the images you want to use and then click Insert. As Figure D shows, PowerPoint will place them in the Picture In Album List. You can use the up and down arrow buttons to reorder the images, if necessary.

Figure D

is cialis over the counter

pictures in album

  1. By default, the Picture Layout option is set to Fit To Slide, which is what we want for this example. But with this setting selected, you can’t make any other design changes here. So go ahead and temporarily choose 1 Picture from the Picture Layout drop-down list to activate the other options.
  2. Choose a Frame Shape option if desired — we’ll go with Beveled. Then click Browse and locate the design template you want to apply to your presentation. (This is optional, but you’ll probably want to improve the readability and appearance of the slides, and this is the easiest way to do it.)
  3. There are various ways to add the instructions that will go along with your images, but to keep things simple we’re going to add a separate slide to hold the explanatory text that will precede each screen shot. To set this up, click the New Text Box button as many times as necessary, matching the number of images in your presentation (Figure E).

Figure E

adding text boxes

  1. Change the Picture Layout setting back to Fit To Slide and then click Create.

Final setup

The rest of the process is simply a matter of arranging the slides and entering/formatting the text. Figure F shows our sample presentation in Slide Sorter view. As you can see, all the text box slides are at the end of the presentation, so we’ll start by clicking on each one and dragging it to the correct spot.

Figure F

slide sorter view

Once the slides are all in place, we can double-click each text slide to display it in Slide view, enter the instructions that will introduce the screen shot that follows, and format the text, if necessary. In this case, we selected the heading text (Step 1, Step 2, etc.) and made it 48 points. Then, we formatted the body text to be 32 points. Once we edited the title slide (which PowerPoint creates automatically for photo albums), the job was complete. Figure G shows the results.

Figure G

finished presentation

Tweaks

This is a somewhat quick-and-dirty way to pull together a training presentation, and you may want to make various refinements. For instance, you might decide to include your instructions on the same slide as its corresponding screen shot, or you may want more than one image per slide. But even with the bare-bones approach we’ve outlined here, you’ll find that you can convey a set of instructions quite effectively with a presentation like this.

PowerPoint also offers the advantage of portability, making it easy to distribute and share your presentation. Just choose Package For CD from the File menu to create a CD that contains all the necessary files, along with the PowerPoint Viewer. (Prior to PowerPoint 2003, this feature was called the Pack And Go Wizard.) You can also export the package to a selected folder instead of putting it on a CD.

Permalink • Print • Comment

How do I … install KDE applications on Windows?

  • Date: December 9th, 2008
  • Author: Jack Wallen

With the help of Wine you can install Windows applications on Linux. But what if there are Linux applications you want to run on Microsoft Windows? Say, for example, you want to use Dolphin for your file manager instead of Windows Explorer. Thanks to a group of KDE developers, it’s possible.

Now don’t get overworked thinking you’re going to have the entire KDE workspace. You’re not. What you can get, however, is a lot of the KDE-specific applications up and running on Windows (2000, XP, and Vista). And many of these applications are integrated within themselves (so when you click an image in Dolphin, Gwenview automatically opens to display the image).

What is nice about KDE on Windows is that the aim of the project, since inception, is to create these applications as native ports. So there is nothing like Cygwin acting as a middle-layer to help run the KDE applications. This helps tremendously in keeping memory and CPU usage down to a minimum.

At this point I should warn you, some of the applications do not work perfectly. Take for instance Konqueror. Konqueror works perfectly as a file manger, but as a Web browser it is somewhat slow and prone to bugs. But it does work in both functions. Another application, Amarok, is unstable to the point of not being usable yet. That is not a problem; you can simply deselect the unstable applications during installation.

With that said, let’s get on with the installation.

This blog post is also available in PDF format in a TechRepublic download and as a TechRepublic Photo Gallery.

Getting and installing

The installation of KDE on Windows isn’t difficult, but it is time consuming. Fortunately much of this time is not interactive (so you can step away from the machine and get some work done). The first thing you need to do is download the KDE installer. Once the installer has finished downloading, double-click the .exe file and the installation will begin.

The first step in the installation is to select the Installation directory (Figure A).

Figure A

The default installation path is probably the best choice.

The next step is to choose the Install Mode (Figure B). The purpose of this is to dictate to the installer application if the installation is for an end user or a developer. If you are not planning to do any developing for KDE on Windows, your best bet is to select the End User option.

Figure B

If you select Development Mode you will also have to select a Compiler mode.

It’s very important that you select the proper Compiler Mode (if you plan on doing a Developer installation). Once you make your selection and install, you cannot change the compiler type without uninstalling and reinstalling. You can, of course, do another install and just install KDE into a different path on your hard drive. This will allow you to run different types of compilers on different installs.

Since most of you will not be doing a developer installation, we are going to continue on with an End User installation.

The next step is to configure a local storage location (Figure C). This local storage directory will be where all downloaded files are retained for the installation process.

Figure C

There shouldn’t be any reason you would need to change this directory.

Now it’s time to configure Internet settings (Figure D). This is necessary because the installer has to download everything it needs, so it must know how to get to it.

Figure D

If you are behind a proxy server, the installer will fail if the proxy is not configured here.

Along with the Internet connections configuration, you have to select a download server (Figure E). Naturally you will want to select the closest in proximity to your machine.

Figure E

Of course, even if the server is near you, that doesn’t always mean you will have the best speeds.

The next step is to choose the release you want to install (Figure F). As of this writing there are only four choices: 4.1.0, 4.1.1, 4.1.2, and 4.1.3. Installing 4.1.3 will bring you closest to the latest features of KDE 4.

Figure F

You can always go back and install other releases by installing them in different folders.

The next step is the final configuration in the installation. You now have to select the packages you want to install. As you can see in Figure G, I have opted to not install the unstable packages as well as the various language packages.

Figure G

Unless you have a need for the various language packages, not installing them will save a good deal of time during the installation.

The next window (Figure H) serves only to inform you what additional packages will be installed, based on your package selection. These are all dependencies (libraries, etc).

Figure H

You cannot deselect any of these packages.

Finally the installer will begin to download all packages necessary for the installation. In my case there are 50 packages to install (Figure I).

Figure I

Go work on that Apache server because you’re going to have the time.

Once everything has been downloaded, the installer will automatically compile and build the applications. When all is complete you will be greeted with a window (Figure J) informing you the installation is complete.

Figure J

Click Finish and you’re ready to rock the KDE way.

With the installation complete, there is no need to reboot. You are ready to take a peek at the KDE applications you now have installed on your Windows machine.

inexpensive cialis class=”entry” align=”justify”>A quick glance

One of the most welcome applications is the Dolphin file manager. I have never been a huge fan of Explorer, so having a Linux file manager is a welcome addition. To get to Dolphin you only need navigate to the KDE submenu in the Start menu. If you installed KDE 4.1.3 the menu entry will be titled “KDE 4.1.3 Release.” Within that submenu you will find a number of child menus (Figure K).

Figure K

You will notice as you navigate through the KDE menus that anything regarding the desktop is missing.

In the System submenu you will find the entry for Dolphin. Load Dolphin to see just how well the KDE applications have been ported to Windows. Figure L shows Dolphin in action.

Figure L

As you can see Dolphin contains many of the standard KDE features.

Like much of the KDE-ported applications, Dolphin works exactly as expected. The only feature I have yet to be able to take advantage of is connecting to a network connection. I have attempted to connect Dolphin through SSH (with the help of Putty) but have yet to have any luck. Outside of that small issue, Dolphin makes for an outstanding replacement for Explorer.

Final thoughts

There are many reasons why you would want to install KDE on Windows. And I am confident that eventually the developers will manage to port the entire desktop experience onto Windows. At this point, I can’t see any reason to run the standard Windows desktop.

Give KDE on Windows a try. Even if you find only one application that you use regularly, it will be worth the effort.

Permalink • Print • Comment

10 things to look for in a domain registrar

  • Date: December 9th, 2008
  • Author: Erik Eckel

When you start looking for a domain registrar, you may discover some surprising differences in what they offer — or neglect to offer. Erik Eckel learned the hard way that it pays to shop around. Here’s his list of the tools, services, and features that will make your job easier.


Having helped create, maintain, and administer Web site and e-mail domains for numerous clients, I’ve come to find that several elements are necessities when working with a domain registrar. Whether complex DNS issues, dreaded SMTP errors, or confusing IP address troubles arise — and no matter how well you prepare, issues inevitably surface — technology professionals need a good, dependable registrar that offers the tools, services, and features required to properly research and resolve these issues.

Toward that end, here are 10 elements to insist upon when selecting a domain registrar.

Note: This information is also available as a PDF download.

#1: Validity

Regardless of how much money some domain registrars might save you — and postal mail and Internet pages frequently tout marketing offers from questionable firms set up overseas — Web and e-mail domain registration isn’t a feature where corners should be cut, even in a down economy. Insist upon working only with reputable and legitimate domain registrars.

If a potential partner isn’t an ICANN-accredited registrar, don’t give them your business. Confirming that a potential registrar is ICANN-accredited helps ensure that your organization receives professional, stable, reliable service from a reputable provider.

#2: Knowledgeable technical support

When all else fails — and trouble will arise when transferring domains, delegating administrative permissions, or just renewing existing services — you need to know the registrar’s customer service department is capable and responsive. Almost all operate toll-free telephone numbers. That’s to be expected.

But when it comes to speaking with a mildly technically proficient support representative, that’s not always a given. Review a domain registrar’s support policies. Some offer live technical chat as well as live telephone support. My field experience has taught me that such additional technical accessibility options save time and angst.

#3: Intelligent DNS configuration utilities

The frustration that comes with trying to make sense of unintuitive and/or confusing DNS configuration tools can quickly prove overwhelming, particularly when e-mail service or Web site access is down. Even if you have to test a domain registrar’s DNS tools using a practice domain you create only for testing purposes, getting familiar with a registrar’s DNS configuration tools and their usage before administering a live site or production e-mail can prove invaluable. Avoid selecting a registrar whose DNS tools prove difficult to access or understand or that are error-ridden.

#4: Delegation tools

Often, organizations prefer to implement a separation of powers when managing domains. For example, senior staff might be the only ones able to transfer a domain, whereas network administrators might need permissions to occasionally update DNS records.

In such cases, delegation authority is required, in which specific permissions can be delegated to respective authorized users. If your organization is likely to find itself in such need, be sure to confirm the domain registrar selected supports such division of responsibilities.

#5: SSL Certificates

Take it from a consultant who’s received four separate bills for a single client’s domain needs; dividing domain registration, e-mail hosting, Web hosting, and SSL certificate services among four vendors quickly becomes confusing. And it’s inefficient and often cost ineffective.

Look for a domain registrar that can collect all these services within a single pricing package. Doing so simplifies recordkeeping and administration and lowers costs.

#6: Web hosting

Increasingly, many organizations are choosing not to invite port 80 public Internet traffic inside their corporate servers. File servers dedicated to user authentication and file and print sharing, while usually capable of hosting Web sites, are often configured specifically not to allow public Web traffic. Foregoing Web site hosting on an organization’s own local server helps secure the box and protect it from countless exploits.

However, most organizations require a Web presence. Just as with e-mail hosting, companies should look for a domain registrar that also offers competitive Web hosting services. For reasonable fees, organizations can keep such Web-related traffic off their main production servers by taking advantage of registrar Web-hosting packages instead.

#7: E-mail hosting

Not all small businesses want to maintain and administer their own servers. Many organizations that do go that route and implement small business servers often don’t want the hassles of maintaining their own Exchange or Sendmail boxes. In such cases, it’s much easier to allow the domain registrar to maintain e-mail services. Thus, organizations that don’t want to assume the challenge or expense of e-mail server administration should look for a domain registrar that can wrap those services within a single, integrated package.

#8: Site-building tools

The site-building tools provided by most leading domain registrars may not be able to create complex Web sites that set new and innovative design trends, but that’s not usually the goal of businesses, SMBs in particular, that need these tools.

Many organizations merely want to launch professional, informational Web sites that improve communications with clients and suppliers. In such cases, expensive Web design firms may not be required. Existing marketing materials may well be leveraged using these registrar-provided tools to quickly launch a simple but professional-looking Web site.

#9: Easily navigable Web site

Look for a domain registrar whose Web site is well organized. It’s not worth saving a few dollars a year if you have to invest an inordinate amount of time trying to chase down the menu for updating MX record entries or similar tools or to change account or billing information.

Look for registrars that have carefully designed their Web sites to group relevant tools by topic. Browse a potential registrar’s site to confirm it is easily navigable. Just because a domain registrar has purchased full-page advertisements in an electronics or tech magazine doesn’t mean its services or domain management tools are intuitive or readily accessible.

#10: Competitive pricing

Competition among domain registrars has been brutal. Consumers benefit, as domain names (complete with forwarding services and even an e-mail address) can be had from reputable registrars for less than $15 or $20 a year.

Be sure to review a domain provider’s pricing policies before committing. Pay special attention to potentially hidden fees, such as for domain forwarding or e-mail services. While price shouldn’t be the chief priority, it’s become a buyer’s how to get cialis market, certainly.

Permalink • Print • Comment

10 security tips for Microsoft Windows XP

  • Date: November 4th, 2008
  • Author: Chad Perrin

When installing and using MS Windows XP, there are some security practices you should keep in mind.


There are general security tips that apply to all operating systems, of course, but each operating system platform provides its own security challenges. The following tips are tailored to Microsoft Windows XP.

  1. Disable dangerous features. Microsoft Windows systems come with a number of features enabled by default that do little or nothing for convenience, but introduce significant security risks. Among these are Autorun, the Guest account, and even Automatic Updates — because letting someone in Redmond, WA decide when changes should be made to your system, when he has no idea what software you’re running and you haven’t tested the updates yet, is a bad idea. Microsoft Windows provides many features that are activated by default and either poorly conceived from a security perspective or, at best, unnecessary for the vast majority of users. Each of these features introduces its own risks, and any that you do not need should be deactivated.
  2. Disable unneeded services. In addition to local operating system features, you should disable unneeded services. Almost exactly one year ago, my article 10 services to turn off in MS Windows XP provided a brief checklist of services to turn off — or to ensure you know why you’re leaving them on, at least. The list is not comprehensive, of course, but it is a good start.
  3. Employ good email security practices. Make use of some basic email security tips to ensure you do not invite the bad guys to read your email, flood you with spam, and take advantage of you through phishing techniques.
  4. Install and maintain malware protection software. Regardless of the reason for it, the fact remains that malware is a significant threat to Microsoft Windows systems, and running one without malware protection is irresponsible. Research your options for antivirus and antispyware how to get cialis without prescription protection carefully, and choose well. Don’t let your malware protection software’s signature databases get out of date because the software only protects against the threats it can recognize, and don’t rely on your choice of antivirus software from six years ago because there’s no such thing as a trusted brand.
  5. Update more than just MS Windows. In the world of Microsoft Windows, the majority of the software most people run on their computers often comes from third-party vendors without any connection to Microsoft’s own software distribution channels. This means that when you install something like Adobe Photoshop or Mozilla Firefox you have to track security updates for these applications separately from the operating system. Just getting your Microsoft updates every month doesn’t always cover it — sometimes some third party application needs to be updated, too. You need to keep track of what’s installed and whether or not it has received any updates if you want to maintain security for your system, because security goes beyond the core operating system.
  6. Research and test your updates. It’s important to keep your system updated so that security vulnerabilities that receive patches from Microsoft and other software vendors will not remain open to exploit. It’s also important, however, to ensure that you research and test your software updates before applying them to a production system. All too often, users and sysadmins discover that untested updates are a cure worse than the disease, as they break functionality, open additional vulnerabilities in the system, and even occasionally undo the benefits of previously applied updates. Others may have tested the updates, or have simply applied them and run into problems, so researching others’ experiences can help you plan for such issues as they arise; testing them yourself by installing them on a test system before doing so on your production system is a next necessary step to ensure that your system in particular will not develop problems as the result of a bad update.
  7. Investigate alternatives to your default application choices. Should you be using a Web browser other than Internet Explorer, such as Google Chrome, Mozilla Firefox, or Opera? Is the multiprotocol IM client Pidgin with the OTR encryption plugin a better option for your instant messaging needs — including security — than the native clients for AIM, MSN, Y!M, ICQ, and gTalk? The only way to be sure is to determine your own needs and make an informed decision. Don’t settle for default applications without knowing the consequences of that choice.
  8. Use a quality desktop firewall. Desktop firewalls are in many respects applications like any other, but they deserve special mention for MS Windows security. Furthermore, even Windows servers are in effect desktop systems, so don’t let the fact that a given computer is a “server” deter you from installing a good “desktop” firewall application on the system if you can spare the CPU cycles and RAM. On an actual end user desktop system, desktop firewall software is even more important. Relying on the defaults you get when you buy the computer is a good way to get your system compromised without even knowing it. The Windows Firewall provided with MS Windows after Service Pack 2 is certainly better than nothing, but one can almost always do better. Look into alternatives to the Windows Firewall, and select the option that best suits your needs.
  9. Research your options before assuming MS Windows XP is what you need. The same principles that apply to applications may also apply to operating systems. Different OSes can provide different security and functionality benefits. Are you really certain that MS Windows XP is the operating system you need? Have you investigated other alternatives? What about MS Windows 2000 or Vista? Have you checked into the possibility of MacOS X, FreeBSD, or Ubuntu Linux for a workstation? What about OpenBSD, OpenSolaris, or OpenVMS for a server?
  10. Protect yourself the same way you would with any other operating system. In last year’s article, 10 security tips for all general-purpose OSes, I laid out a list of security tips that apply for good security practice in the use of any general purpose operating system — including MS Windows.

Installing MS Windows XP is only the first step to using it. If you stop there, you’re likely to run afoul of the various security threats roaming the wilds of the Internet. Make sure you take care to configure your system to best protect you against the dangers that lurk around every corner.

Permalink • Print • Comment

Use a form to display a list of reports and queries in an Access database

  • Date: December 9th, 2008
  • Author: Mary Ann Richardson

When you need to know what objects are being created for a database, you can run generic soft tabs cialis a query against an Access system table to generate a list of all current reports and queries.


Ever wonder exactly what reports and queries are being created for a database? As an administrator, you may need a quick way of determining what reports and queries are being run against a database. Fortunately, Access stores the names of all the top-level database objects in a system table called MSysObjects. You can run queries against MSysObjects just as you would any other table in the database.  Follow these steps:

  1. Open the database and create a form with two unbound list boxes, as shown in Figure A.

Figure A

two unbound boxes

  1. In Design view, right-click the first list box and select Properties.
  2. Under the Data tab, right-click the RowSource property box and select Zoom.
  3. Enter the code as shown in Figure B and click Close.

Figure B

rowsource property

  1. Right-click the second list box and select Properties.
  2. Under the Data tab, right-click the RowSource property box and select Zoom.
  3. Enter the code as shown in Figure C.

Figure C

queries

When you run the form, Access outputs all current reports and queries for that database to the respective list boxes (Figure D).

Figure D

object query

To access other object types, use their type value. For example, to list all the tables in the database, enter 6. To list forms, enter -32768. To list macros, enter -32766.

Permalink • Print • Comment
Next Page »
Made with WordPress and Semiologic • Sky Gold skin by Denis de Bernardy