Thursday, April 30, 2009

NOW CREATE DOCUMENTS ONLINE

Documents at your Mail box

Create Personal Docs

Now Create Online Documents, Spread Sheets, Presentations in your Sify Mail

Upload Files

Upload files to Your Account and Edit them as you wish. We support formats such as Excel, PowerPoint, PDF, Word Documents and even HTML.

Share File

Use Documents to make your Resume and invite friends to view them across companies. Have an urgent meeting have to physically share updates regularly with colleagues, peers and friends. Just Share the Document with their email Ids.

Supports Format

You can also save the files as Excel sheet, Word and PDF Documents to the format you want to save using Sify Docs.

Multiple Editing

People can edit the same document dynamically at the same time making it easier for the teams to work and collaborate on the data together.

 

To Do-it-yourself

  • Click on Documents on the Top Right Corner of Your Inbox
  • Click on New and Make Your Documents
 
Make the best you of the Facility and create Documents online and in real time
 

Tuesday, April 28, 2009

EMAIL USER PRECAUTIONS

Don't share Personal Details
Never share Password, Date of birth, Security question, Security answer, and personal financial details, with any Individual or Group claiming to be a part of Sify.com. Your Sify Mail account is your asset, protect it.
 
Popular Email Scam Examples
  1. A foreign government official asking your assistance in transferring funds and will pay you a hefty commission if you agree to do so
  2. You are to inherit a lot of money in pounds, dollars, rupees etc from a relative you do not know
  3. You have won a lot of money in prize or a lottery that you have never participated in
 
So how to Spot Signs of Email Fraud ? Here they are...
  1. You don't know the sender personally who has sent you the message
  2. You have won a lot of money in prize or a lottery that you have never participated in
  3. You are promised huge sums of money for nothing in return
  4. You are asked to pay up money up to speed up the process of transaction or payment
  5. You are asked to provide your bank account numbers and other personal financial details, and the sender offers to deposit money into it
  6. The sender repeatedly asks you to keep the email conversations confidential
 

Wednesday, April 22, 2009

HOW GOOGLE CHANGED THE WORLD

See the slide show here at this given link:

GOOGLE STILL HIRING LOTS OF ENGINEERS (AND DAYCARE WORKERS TOO)

On Thursday, Google announced that the size of its workforce had dropped for the first time in its 11-year history.

But during the company's earnings call,chief finacial officer Patrick Pichette said it is still hiring in "critical areas." So what are those areas?

We perusedGoogle ( GOOG - news people )’s job listings to find out (it was no easy feat, mind you: the company, the leader in search, offers no good way to do advanced searches of its openings).

Seventy percent of the company’s 185 job openings in the United States are in software engineering and engineering operations—hardly a big shocker.

But Google is also still hiring in some support areas. For instance, it has two openings for its employee child-development program (one for a teacher and another for an operations manager). In the ad for the operations manager, Google says it is “expanding its employee child-development program by opening a high-quality center in the Mountain View area.” (The search giant is also looking for managers for its shuttle-bus system and food-services supply chain.)

But also interesting is what’s not listed—or barely listed. Product management/product marketing and user experience are significant areas for Google—but the company has a total of just six jobs available in those areas combined.


GOOGLE STILL HIRING LOTS OF ENGINEERS (AND DAYCARE WORKERS TOO)

On Thursday, Google announced that the size of its workforce had dropped for the first time in its 11-year history.

GOOGLE HITS DOUBLE DIGITS

How many searches do you think Google has done in 10 years?


The Daily Number: 10
Google turns 10 on Sunday. In the corporate world, it's still just a baby--but the Internet king's meteoric rise makes this birthday a milestone.

Since going public, the company has used its Googlebucks to acquire a slew of innovative startups--ranging from photo-sharing service Picasa, video site YouTube and even the core of its Google Earth mapping service. It also has raised a bunch of homegrown consumer favorites, including e-mail service Gmail and social networking site, Orkut.

The number of searches it handles has grown astronomically. In 1998, Google reported that it handled 10,000 searches a day. That number leaped to 500,000 a day in 1999. Google doesn't share those numbers widely now, but research group comScore estimates that Google hosted 235 million searches a day in July of this year.

There's another way to gauge Google's growth. The first Google index in 1998 had 26 million Web pages. In July, a Google search engineer tallied up how many unique URLs the company searches to find content: the number was 1 trillion. At this rate, a "googol" worth of pages (or 1 followed by 100 zeros) can only be a few years away.

Now the Internet king is going after much more: It wants to be a worldwide data center that stores every piece of personal and corporate information. Google is pushing cloud computing to accomplish this--and challenging tech's old top dog Microsoft(nasdaq: MSFT - news - people ) to pick up the pace or go home. This week, Google unveiled Chrome, a Web browser aimed at toppling Microsoft's Internet Explorer.

Google's maverick corporate culture and slogans have also made headlines. Employees work inside a compound that mimics a college campus, get free organic meals and are allowed to work on a pet project one day a week. The company has said repeatedly that it wants to make the world a better place. Its defining slogan was "Don't be evil," but it has been officially modified to "You can make money without doing evil.Indeed, Google has become one of those companies that epitomizes an era, introducing literally transformative technology on the global stage.But Google's meteoric rise wasn't part of a calculated plan--initially. Back in 1998, Stanford grad students Larry Page and Sergey Brin just happened to take an interest in organizing information on the Web, and in true Silicon Valley fashion, they founded Google in a friend's Menlo Park, Calif., garage. Soon after, Google stumbled upon a way to make money from advertisements placed alongside online searches results and hired Eric Schmidt, who had headed value.But what goes up must come down, right? Probably. Wall Street used to count on Google for hitting or surpassing analysts' earnings targets, but the company had a few misses the past year due to hiring sprees and technical changes to its search algorithms. And there's the perennial question of whether Google needs to diversify its revenue stream in case businesses find better and cheaper ways to advertise. So far, the company hasn't found another way to make money--and it's not very concerned about it either. Google believes that if superior technology finds users, users will help it find a business plan. It's time to celebrate 10 years in business. But don't expect music, dancing and laughter at the Googleplex Sunday. Even though Google was incorporated on Sept. 7, the company says it has never partied on this day and doesn't plan to start now.

WHY GOOGLE IS THE NEW PIRATE BAY

This week has offered a hard lesson for pirates, both water- and Web-based: Keep a low profile and your illicit business can flourish. But draw too much attention, and you're likely to get sniped.

On Friday, the trial of the Pirate Bay, the Web's highest-profile source of TV shows, movies and music, came to an end when a Swedish court found the administrators of the site guilty of copyright infringement, sentencing them to a year in prison and more than $3 million in fines.

The verdict comes as a surprise to many who assumed the site, which indexes the "tracker" files that allow users to share video and music, was beyond prosecution in its home country of Sweden. And though the sites' owners say they plan to appeal the decision, it may nonetheless lead to the takedown of the Web's most popular index of peer-to-peer downloads.

But even if the Pirate Bay sinks, putting an end to file-sharing isn't so simple. Waiting in the wings to absorb the site's audience are dozens of second-string bittorrent tracker and index sites that have avoided the Pirate Bay's level of notoriety, including Mininova, isoHunt and Demonoid. And according to Ben Edelman, a professor at Harvard's Business School focused on Internet regulation, that longer-tail assortment of piracy outlets means the starting point for finding pirated content has shifted to an even more resilient source: Google

"Google now can and does do what the Pirate Bay has always done," Edelman says. "And if they're prosecuted, they would have much more interesting arguments in their defense."

By searching for pirated music or video, Google users can easily scan a range of lesser-known pirate sites to dig up illicit content. Those looking for the upcoming film X-Men Origins: Wolverine, for instance, can search for "wolverine torrent." The first result is a link to file-sharing site isoHunt, with a torrent tracker file that allows the user to download the full film. In fact, searches for "wolverine torrent" on Google have more than quadrupled since the movie file was first leaked to peer-to-peer networks on April 5, according to Google Trends.

Googling more obscure films works just as well. For example, search for "the maltese falcon torrent," and the first result links to Torrentz.com, which in turn links to other sites listing torrents for the Bogart classic, including Mininova, BTjunkie, Torrenthound and Seedpeer.

Google, for its part, says it is vigilant about removing illegal content. "We are committed to respecting copyrights and have a well-established process under the [Digital Millennium Copyright Act] for removing links to infringing content when they appear in our search results," a company spokesman wrote in an e-mail. Yahoo! did not respond immediately to requests seeking comment.

But Google and Yahoo! have always been a starting point for peer-to-peer piracy, says Eric Garland, chief executive of the bittorrent research firm Big Champagne. In focus groups, Garland says he's found that users begin their searches for pirated movies on search engines as often as any source, including the Pirate Bay. That means preventing a user from downloading copyrighted files would mean not simply shutting down the Pirate Bay, but every one of the lesser-traveled sites that Google or Yahoo! provide links to.

"I've argued for years that the real battle rights holders are fighting isn't with individual users or file-sharing sites, but with search," Garland says. "As long as there's robust search that allows people to find the titles they're seeking, you will have this problem, period."

The Pirate Bay's guilty verdict was partly due to its notoriety as a flagrant source of pirated content. The site thumbed its nose publicly at its detractors in interviews with Wired, Vanity Fair,Forbes and other news outlets and its administrators publicly posted their retorts to cease-and-desist letters, including repeated suggestions that media company lawyers perform painful acts on their nether regions with a retractable baton.

Google, on the other hand, may be more legally defensible than any single torrent site. Any piracy-related activity by its users would be dwarfed by the search engine's massive number of legitimate users, says Big Champagne's Garland, and Google is careful to avoid any encouragement of copyright infringing activity.

"Google doesn't call itself 'The Pirate Google,'" Garland says. "If the number of queries looking for copyrighted works is massive, that's only because the number of searches on Google in general is massive."

Google's popularity as a resilient portal for piracy means that even if the media industry were to pursue torrent sites one by one, the search engine would always link to the newest site to host those tracking files, a potentially endless war on torrent sites.

"It's a cat and mouse game," says Harvard's Edelman. "Sometimes the mouse gets eaten. But there are always more mice scurrying around, willing to try their luck."

Saturday, April 18, 2009

FOLDING LAPTOP FILMED!

Do watch this video.In this video there is a laptop which is been folded.Just watch and you will all be wanting this type of laptop.It is easy to carry for travelling.



http://www.youtube.com/watch?v=oPl9c198KHY

OLD COMPUTER ADS








MICROSOFT

GOOGLE

HOW SECURE IS YOUR LAPTOP

The notebook/laptop computer is today’s essential business tool. But with even the best of technology, the mobile data in laptops is data at risk. And laptops with removable drives, thumb drives and portable data devices present their own set of security risks — any one can run out of your company doors with valuable IP/Product Design/Specifications/Data and even your customer database.

One recent study estimated that as much as 80 per cent of the business data that a company owns — customer files, product specifications, proposals, e-mail history files, contracts and financial information — is stored on notebook/laptop PCs. If your laptop/notebook breaks down, is stolen or hacked into, your productivity may be affected for weeks, and your company could even face significant financial loss. Multiply that by every laptop user in your organisation, and it’s a strong motivation to seek products with a reputation for reliability and security.But the million dollar question is – Is your laptop really secure?

Recently, Princeton researchers revealed that disk encryption, the standard approach to protecting sensitive data on laptops, can be defeated by relatively simple methods. They demonstrated a method of chilling a Laptop memory chip to defeat three popular disk encryption products: BitLocker, which comes with Windows Vista; FileVault, which comes with MacOS X; and dm-crypt, used with Linux. The research team was led by J. Alex Halderman at Princeton.

The method, which cannot be carried out remotely, exploits a little-known vulnerability of the dynamic random access, or DRAM, chip. Those chips temporarily hold data, including the keys to modern data-scrambling algorithms. When the computer’s electrical power is shut off, the data, including the keys, is supposed to disappear. In a technical paper published on the Web site of Princeton’s Centre for Information Technology Policy, the group demonstrated that standard memory chips actually retain their data for seconds or even minutes after power is cut off.

When the chips were chilled using an inexpensive can of air, the data was frozen in place, permitting the researchers to easily read the keys — long strings of ones and zeroes — out of the chip’s memory. The Princeton researchers used special pattern-recognition software of their own to identify security keys among the millions or even billions of pieces of data on the memory chip.

This has proved that so-called Trusted Computing hardware, an industry standard approach heralded as significantly increasing the security of modern personal computers, does not appear to stop potential attacks.

Several possibilities for securing against this type of attack have been suggested by experts.

Change location of keys during runtime:

This has no bearing on this issue since the DRAM is literally frozen at the time of the attack. Mounting this attack via a key search algorithm such as the one suggested by the Princeton researchers renders the location of the keys, and whether or not they are periodically moved, irrelevant.

Fragment keys into discontinuous pieces to increase obfuscation:

Similar to changing the location of the keys, this suggestion has no effect on key recovery. While in use, the encryption key must be unified, and careful study of the encryption software prior to the attack will remove any difficulty the attacker might face. The purpose of encryption is to ensure that obfuscation such as this is unnecessary. While this may delay an attack, it will not prevent it. It will also slow down decryption during regular system use. Use multiple keys for different parts of the disk:

This suggestion prevents the entire contents of the disk from being exposed at one time during a single attack. However, multiple encryption keys require additional authentication if they are to avoid exposure in the same attack instance. Although this suggestion is valid and is implemented in many Full Disk Encryption solutions, there is no reasonable presumption that the most sensitive data is not on the exposed partition.

Multiple keys used in sequence to decrypt the disk:

This might delay an attack by adding an additional layer of complexity, but the DRAM attack would ensure that all keys are available to the attacker. Since the search algorithms employed by the author do not rely on decrypting plaintext to check for key integrity, the attacker will simply have a variety of keys to check in order to decrypt the data correctly.

Use longer encryption keys:

As the contents of DRAM decay, more and more key data is lost. The more key data lost, the larger the searchable key space is and the less likely that an attacker can reconstruct the correct key required for decryption.

Utilising a longer decryption key means a larger searchable key space and makes it statistically more likely that a sufficient degradation of the key will take place during the same period of time that a shorter key might still be recoverable. Although it goes without saying that longer keys mean more security, this does not eliminate a potential DRAM attack since DRAM decay has a steep acceleration curve and most decay occurs in a relatively brief period of time. However, as a precaution, one can employ the largest available key lengths and use AES 256 algorithms for encrypting the Data Encryption and Key Encryption Key.

Erase dram free space periodically during system run:

This suggestion does not offer any real solution. The encryption keys must be available during normal use, and wiping DRAM does nothing if the keys are immediately replaced or moved to a location with similar vulnerabilities. There is also no guarantee that DRAM space happens to be wiped immediately prior to the theft and shutdown of the notebook.

Force a complete erasure of dram during shutdown, hibernate, or standby:

This suggestion is valid in theory, but impractical in reality. Wiping out DRAM during standby is unfeasible because recovering from standby would be impossible.In the case of shutdown or hibernate mode, erasure of DRAM is advisable, but still does not eliminate the basic attack proposed by the Princeton authors. There is no guarantee that an attacker cannot completely cut power and prevent any erasure before it takes place.

Leave fake keys in dram which will erase the disk if implemented:

This suggestion is an inconvenience at best. An attacker using this attack method is not attempting to decrypt the contents of the drive via the Full Disk Encryption program. Therefore, there is no way for the computer to recognise and execute any command indicated by the fake key. At best, this suggestion is obfuscation again and will slightly delay the attacker by forcing him to attempt decryption with more than one key.

Take steps to make boot code disassembly difficult:

Aside from open-source implementations, all encryption software vendors take steps to ensure their software is difficult to disassemble in order to preserve their competitive advantage.

However, an attacker implementing this attack should be presumed to have the foresight and preparation time to obtain and sufficiently examine a copy of the drive owner’s software. The purpose of encryption is that data should be secure regardless of the amount of preparation or the length of time available for an attack.

Use a trusted platform module (tpm) in conjunction with full disk encryption (FDE):

The use of a TPM chip in conjunction with FDE does nothing to eliminate the possibility of a DRAM attack since the TPM chip does not perform the drive decryption and the key must be copied into memory in order for decryption to take place.

Clear memory at boot time:

Some computers can be configured to require that RAM be cleared at startup before loading any operating system. This would prevent an attacker from using the stolen laptop to perform the DRAM attack, but an attacker could still move the DRAM to a separate computer. Configuring laptops to clear RAM at power up, regardless, is recommended.

Block accessible ports:

Eliminating the possibility of booting from separable media eliminates the possibility of using the stolen laptop to perform the DRAM attack (as above), but suffers from the same weakness. The DRAM can be moved to a separate computer or the hard drive can be entirely replaced during the DRAM attack.

Software-based defence inadequate

Although the likelihood of an attacker being able to successfully steal a laptop and implement an attack before the DRAM decays is low at best, software-based FDE is theoretically vulnerable to this attack. Potential fixes by software vendors cannot eliminate the possibility entirely. However, for those extremely security conscious individuals or enterprises, newer hardware encryption technology exists that eliminates many of the difficulties posed by this attack.

Recently, hard drive vendors such as Hitachi and Seagate released products that implement hardware-based Full Disk Encryption in their hard disk drives. Intel has also announced the implementation of a Trusted Platform Module (TPM) as well as Full Disk Encryption in its new chip set to be released in the third quarter of 2008. These newer technologies share a distinct advantage over software-based encryption in terms of DRAM attacks — the data encryption keys never enter into computer memory and are thus not vulnerable to this sort of attack.


Friday, April 17, 2009

COMPUTER MOUSE

SAVE YOURSELF FROM INTERNET FRAUD

Simple tips

Last year, one out of 13 people lost money due to internet fraud and identity theft, says a recent report. However, you can insure your password and data by following these easy-to-follow tips.


Don't use personal information

Always keep the cyber thieves guessing. Never use personal information to create a username, login or password. It could be the name of your pets, relatives, nicknames, dates of birth, etc.

Identity theft experts have become savvy at ferreting out these details. Hence, it is crucial to choose usernames and passwords that have nothing to do with your personal history.


Don't use same login and password

Avoid using the same login and password across multiple sites and/or cards and accounts. If a thief gains access to one, it will be like a house of cards, allowing them to quickly wreak havoc across your entire financial portfolio.

Studies have consistently shown that a large fraction of all user-chosen passwords are readily guessed automatically. Shorter passwords are more susceptible to commercially available password recovery tools.


Tips to choose passwords

Such software is capable of testing 200,000 passwords per second. To improve the cipher strength of your password, longer passwords are better. Include a minimum of 8 characters - using both upper and lower case letters and a mix of letters, numerals and symbols. Do not use words found in the English dictionary.

Put yourself into a thief's shoes - don't even think about using an overly simplified password such as '12345678,' '222222,' 'abcdefg.'


Make your password secure

Avoid sequential passwords or using passwords derived from the use of adjacent letters on your keyboard; this will not make your password secure. Also, avoid using only look-alike substitutions of numbers or symbols.

Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as replacing an 'i' with a '1' or an 'a' with '@' as in 'L@rgeSoftw@re' or 'P@ssw0rd.'


Strengthen your password

But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password.

There are many decent applications on the market that will digitally safeguard your various passwords. Avoid using the free ones 'built-in' to browsers as these have been widely exposed for their security flaws.


Password Manager

Consider software like Password Manager that memorises and securely stores each username and password that you enter on a website.

Whenever you return to that site, Password Manager being offered by largesoftware.com will automatically complete your login information and click the submit button, making your login a snap, said a release of www.largesoftware.com


VANISHING E-MAIL ADDRESS

Protect your e-mail ID

Our e-mail addresses are our identity, as it were, and we would like to keep them away from spammers' eyes.

But sometimes, if you want to download data or graphics from a Web site, you are required to fill out a sign-up form, go for Web site subscriptions, which may open the door to unsolicited spam.


Temporary e-mails

How can we avoid such risks and protect our main e-mail IDs?

www.10minutemail.com could be the answer - this will give you a temporary e-mail address valid for just 10 minutes.

Click over to the site. You will instantly be given a temporary e-mail address that vanishes after 10 minutes.


10 mins e-mail

More importantly, there is no registration or verification here. Any e-mails sent to that address would show up automatically on the Web page. Keep the Web page open for 10 minutes.

You can read and forward the messages sent to your e-mail address and even reply to the messages. The e-mail address will self-destruct after 10 minutes.


Spam-free

If you want to retain the e-mail address (given by the Web site) for some more time, you can also reset the timer by clicking on ''Give me 10 more minutes.''

For safer surfing, use this (temporary) e-mail address for any forum sign-ups and keep your inbox spam-free.


SNOOZY MOUSE!

Keyboard shortcuts

Do you really want to reduce the strain on your hand and wrist? Then give some rest to your overworked mouse and start using keyboard shortcuts.

Keyboard shortcuts are a big time saver not only for people who work all day on the same program but also for those working with different applications or programs.


For various applications

But where do we get the various keyboard shortcuts listed in one destination?

Try www.keyxl.com, which provides a list of keyboard shortcuts for various platforms/applications.

This provides an online database of keyboard shortcuts for popular software programs, browser-based applications and operating systems.


'Quick search'

Users can search the keyboard shortcuts by program, software category and also by platforms. The supported platforms are Windows, Mac, Linux and Web applications.

You can also do a 'quick search' for Microsoft applications, Adobe applications, Google Apps, Web Browsers, E-mail programs, Photo/Imaging, MP3, and HTML Editors.


Extensive list

For instance, if you are looking for keyboard shortcuts in Internet Explorer, just enter 'Internet Explorer' in the search field. It will list out the various versions of Internet Explorer and their shortcuts in an orderly manner.

The extensive list of keyboard shortcuts displayed on the Web site is more printer-friendly.

This Web site is a must for people passionate about keyboard shortcuts.



Saturday, April 11, 2009

INTERNET SHORTCUT

Internet Shortcut:

CTRL+A - Select all items on the current page
CTRL+D - Add the current page to your Favorites
CTRL+E - Open the Search bar
CTRL+F - Find on this page
CTRL+H - Open the History bar
CTRL+I - Open the Favorites bar
CTRL+N - Open a new window
CTRL+O - Go to a new location
CTRL+P - Print the current page or active frame
CTRL+S - Save the current page
CTRL+W - Close current browser window
CTRL+ENTER - Adds the http://www. (url) .com
SHIFT+CLICK - Open link in new window
BACKSPACE - Go to the previous page
ALT+HOME - Go to your Home page
HOME - Move to the beginning of a document
TAB - Move forward through items on a page
END - Move to the end of a document
ESC - Stop downloading a page
F11 - Toggle full-screen view
F5 - Refresh the current page
F4 - Display list of typed addresses
F6 - Change Address bar and page focus
ALT+RIGHT ARROW - Go to the next page
SHIFT+CTRL+TAB - Move back between frames
SHIFT+F10 - Display a shortcut menu for a link
SHIFT+TAB - Move back through the items on a page
CTRL+TAB - Move forward between frames
CTRL+C - Copy selected items to the clipboard
CTRL+V - Insert contents of the clipboard
ENTER - Activate a selected link
HOME - Move to the beginning of a document
END - Move to the end of a document
F1 - Display Internet Explorer Help

WINDOWS SHORTCUT KEYS

Windows Shortcut Easy move through PowerPoint

Apply subscript formatting - CTRL+EQUAL SIGN (=)
Apply superscript formatting - CTRL+PLUS SIGN (+)
Bold - CTRL+B
Capitalize - SHIFT+F3
Copy - CTRL+C
Delete a word - CTRL+BACKSPACE
Demote a paragraph - ALT+SHIFT+RIGHT ARROW
Find - CTRL+F
Insert a hyperlink - CTRL+K
Insert a new slide - CTRL+M
Italicize - CTRL+I
Make a duplicate of the current slide - CTRL+D
Open - CTRL+O
Open the Font dialog box - CTRL+T
Paste - CTRL+V
Print - CTRL+P
Promote a paragraph - ALT+SHIFT+LEFT ARROW
Repeat your last action - F4 or CTRL+Y
Save - CTRL+S
Select all - CTRL+A
Start a slide show - F5
Switch to the next pane (clockwise) - F6
Switch to the previous pane - SHIFT+F6
Undo - CTRL+Z
View guides - CTRL+G

EXCEL SHORTCUT KEY

Excel Time saving Shortcuts

Bold toggle for selection - Ctrl + B
Italic toggle for selection - Ctrl + I
Underline toggle for selection - Ctrl + U
Strikethrough for selection - Ctrl + 5
Change the font - Ctrl + Shift + F
Change the font size - Ctrl + Shift + P
Apply outline borders - Ctrl + Shift + 7
Remove all borders - Ctrl + Shift + Underline
Wrap text in same cell - Alt + Enter
Format cells - Ctrl + 1
Select font - Ctrl + Shift + F
Select point size - Ctrl + Shift + P
Format as currency - Ctrl + Shift + 4
Format as general - Ctrl + Shift + # (hash sign)
Format as percentage - Ctrl + Shift + 5
Format as number - Ctrl + Shift + 1
Autosum a range of cells - Alt + Equals Sign
Insert the date - Ctrl + ; (semi-colon)
Insert the time - Ctrl + Shift + ; (semi-colon)
Insert columns/rows - Ctrl + Shift + + (plus sign)
Insert a new worksheet - Shift + F11
Read Monitor Cell One - Alt + Shift + 1
Read Monitor Cell Two - Alt + Shift + 2
Read Monitor Cell Three - Alt + Shift + 3
Read Monitor Cell Four - Alt + Shift + 4
List Visible Cells With Data - Ctrl + Shift + D
Lists Data In Current Column - Ctrl + Shift + C
List Data In Current Row - Ctrl + Shift + R
Select Hyperlink - Ctrl + Shift + H
Move To Worksheet Listbox - Ctrl + Shift + S
Move To Monitor Cell - Ctrl + Shift + M
Select Worksheet Objects - Ctrl + Shift + O
List Cells At Page Breaks - Ctrl + Shift + B

Options Listbox - Insert + V

MICROSOFT OFFICE WORD SHORTCUT KEY

Microsoft Office Keyboard Shortcut Keys :Important Word Shortcuts


All Caps - CTRL+SHIFT+A
Annotation - ALT+CTRL+M
Auto Format - ALT+CTRL+K
Auto Text - F3 or ALT+CTRL+V
Bold - CTRL+B or CTRL+SHIFT+B
Bookmark - CTRL+SHIFT+F5
Copy - CTRL+C or CTRL+INSERT
Copy Format - CTRL+SHIFT+C
Copy Text - SHIFT+F2
Create Auto Text - ALT+F3
Date Field - ALT+SHIFT+D
Delete Back Word - CTRL+BACKSPACE
Delete Word - CTRL+DELETE
Dictionary - ALT+SHIFT+F7
Do Field Click - ALT+SHIFT+F9
Doc Maximize - CTRL+F10
Doc Move - CTRL+F7
Doc Restore - CTRL+F5
Doc Size - CTRL+F8
Grow Font - CTRL+SHIFT+.
Grow Font One Point - CTRL+]Hanging Indent - CTRL+T
Header Footer Link - ALT+SHIFT+R
Help - F1
Hidden - CTRL+SHIFT+H
Hyperlink - CTRL+K
Indent - CTRL+M
Italic - CTRL+I or CTRL+SHIFT+I
Justify Para - CTRL+J
Left Para - CTRL+L
Line Up Extend - SHIFT+UP
List Num Field - ALT+CTRL+L
Outline - ALT+CTRL+O
Outline Collapse - ALT+SHIFT+- or ALT+SHIFT+NUM -
Outline Demote - ALT+SHIFT+RIGHT

Outline Expand - ALT+SHIFT+=
Outline Expand - ALT+SHIFT+NUM +
Outline Move Down - ALT+SHIFT+DOWN
Outline Move Up - ALT+SHIFT+UP
Outline Promote - ALT+SHIFT+LEFT
Outline Show First Line - ALT+SHIFT+L
Lock Fields - CTRL+3 or CTRL+F11
Web Go Back - ALT+LEFT
Web Go Forward - ALT+RIGHT
Word Left - CTRL+LEFT
Word Left Extend - CTRL+SHIFT+LEFT
Word Right - CTRL+RIGHT

Tuesday, April 7, 2009

DOWNLOAD OF GOOGLE CHROME FOR WINDOWS VISTA/XP SP2

GOOGLE CHROME is the fastest browser which I have found till now.Latest version of Google Chrome is 1.0.154.53.You all can get it from here:

DOWNLOAD OF MOZILLA FIREFOX

There is more better browser than internet explorer which is MOZILLA FIREFOX.You all can download the latest version from here:


The latest version now is 3.0.8 for Windows.

FREE DOWNLOAD OF INTERNET EXPLORER 8

You all can get the latest version of internet explorer 8 which is totally free here:

DOWNLOAD SITE OF ADOBE ACROBATE

Latest version has come and that is version 9.So u can get it from here:


This is for free trial.

Saturday, April 4, 2009

NOW,GMAIL IN FIVE INDIAN LANGUAGES

If you couldn’t send an email to your grandmother because of the language barrier, now there’s reason to cheer. Google has come up with transliteration engine in the “Compose” box of its free email service that converts English text into phonetic-based script in vernacular languages.

It means that you can simply type in English and the mail will be converted into the desired language. Users can enable the feature in their Gmail ‘settings’.

At Present, the service is available in five Indian languages — Hindi, Tamil, Kannada, Telugu and Malayalam — but Google plans to add more. “A small set of population is online at present and we want more people to be online.Once the market develops, monetisation will follow,” Rahul Roy Chowdhury, product manager at Google India told HT.

“We built this new feature using Google’s transliteration technology, which is also available on Google India Labs, Orkut, Blogger and iGoogle. I hope you find this feature useful to communicate with those of your friends and family who prefer to write in their native language, and it will be available soon to businesses and schools using Google Apps,” Chandramouli Mahadevan, software engineer, wrote on the Official Google Blog.

Google, under its innovative Labs initiative, was already offering web-based transliteration for its services like Blogger, but that involved cutting and pasting regional language text from the site to the e-mail box.