A formatting that is applied to a cell or multiple cells and activated only if condition is met is called conditional formatting. For example, if a condition is applied in a selection that when any value in the selection is greater than 50, the value in the respective cell will be italic. In figure below, the conditional formatting is applied to the cells C03 to CIO. When values in these cells are changed, Excel automatically updates the format of the cell's.
To apply the conditional formatting, follow the steps.
• Select the cell's, you want to apply conditional formatting.
• Choose Conditional Formatting command from the Format menu. The Conditional Formatting dialog box will appear as shown below.
• Specify the condition.
• Click Format button to apply formatting. Format Cells dialog box will appear. Specify the format you want.
• Click Add button to specify another condition. You can specify up to three different conditions.
• Click OK.
To delete the conditional formatting, follow these steps.
• Select the cell's, you want to delete the conditional formatting.
• Choose Conditional Formatting command from the Format menu. The Conditional Formatting dialog box will appear.
• Click Delete button to remove a condition. You will be asked to choose which condition (1, 2 or 3) you want to remove.
• Select the condition and click Ok button.
See Also
microsoft windows technical support
malicious spyware removal
computer continually Restarts
Protect your PC
How to increase virtual memory in windows
Normally this warning message shows when you run many programs same time than the RAM installed on your computer is designed to support. Your can solve this problem by increasing the system paging file size also called as virtual memory. Using this virtual memory windows moving information to and from the paging file for fast processing. This will free up enough RAM for other programs to run properly.
To increase the system page file follow the give path:
Control Panel > System > Advanced > Click on Settings (Under Performance) > Advanced > Change
Here under Drive (Volume label), you have option to select any of your hard disk drive, but the best choice is, select any drive other than C drive for virtual memory.
Set the double Initial & Maximum Size of your Virtual Memory. Here set initial size 700 MB and maximum size up to 1OOOMB; you can change this size according to the free space available on your hard drive.
See Also
home computer support
how to remove cipav spyware
Will Your Device Work with Windows 7
Fix Windows Registry To Speed Up Your Comuter
To increase the system page file follow the give path:
Control Panel > System > Advanced > Click on Settings (Under Performance) > Advanced > Change
Here under Drive (Volume label), you have option to select any of your hard disk drive, but the best choice is, select any drive other than C drive for virtual memory.
Set the double Initial & Maximum Size of your Virtual Memory. Here set initial size 700 MB and maximum size up to 1OOOMB; you can change this size according to the free space available on your hard drive.
See Also
home computer support
how to remove cipav spyware
Will Your Device Work with Windows 7
Fix Windows Registry To Speed Up Your Comuter
For my next trick I will make a user account disappear, yet remain a full functioning account. Today's Security Tip is another way to lock down your system, and it does this by hiding specified user accounts. This feature is only available in XP and 2000, so unfortunately the rest of you are out of luck. This process does involve an easy registry edit, but if you're uncomfortable with that you might want to think twice about attempting this.
Normally when you log into XP, you see the startup screen where you see all the icons for the users who can access. What this tip does is allow you to hide a desired account from this screen. If you want to log on as this user you have to press Cntrl+Alt+Del twice at the Welcome screen to make a Windows Security dialog box appear. Here you can type in the user name and password 0f the hidden account and log in. Limited Users shouldn't be able to see any sign of you except for the listing in the Documents and Settings folder. Other administrative users will be able to see your hidden account in Control Panel/User Accounts, so keep this in mind when you're planning this out.
All right, now down to the good stuff. If having a hidden account sounds like your cup of tea, and you have no problem with small Registry augmentation, then let's go:
* First we need to open up the Registry Editor. Go to Start/Run and type "regedit" and click OK
* You should be looking at the Registry editor, and what we need to do now is navigate to H-KEY\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist . You will not see this folder if you do not have "show hidden system files" turned on.
* Once here we need to create another DWORD value. This is easier than it sounds, right click on the User list label file on the left side of the screen and select New>DWORD . You'll see the new entry in the right pane of the window, rename this value the name of the user account you want hidden (exactly how it is listed in the Startup screen, case sensitive) and leave the value at 0.
* Close your Registry Editor and restart the PC. When the Welcome screen comes up you'll notice that there's no icon for the user you just concealed. So how do you log in? This is where you press Cntrl+Alt+Del 2x's and the Windows Security Dialog box will come asking you to authenticate (name/password) after this the system should log you in.
Here's one more thing you might want to keep in mind, Windows logon screen. This is the screen where you see the available users you can choose to log in as. You can turn this option on/off in the User Accounts ( Start/Control Panel/User Accounts then "Change the way Users log in or off" and "Use Windows Welcome Screen" and you need to turn it off if you plan on using a hidden account and there are no other accounts on the system. The reason why is that the Windows doesn't have any user accounts to display in the Welcome screen, so it will continuously reboot. Now if you do run into this 0r any problems simply enter Safe mode at the next boot, this will allow you to go to the User Accounts Window and fix any problems. If you find that you can't log in at all with your hidden account go back and look at the registry value you created. Make sure you're spelling the user name is correct and that it's in the right location in the registry.
See also
microsoft windows vista support
Computer Support – MSCONFIG Command
PC Repair Services and Computer Support
Easy Way To Get Computer Help
Normally when you log into XP, you see the startup screen where you see all the icons for the users who can access. What this tip does is allow you to hide a desired account from this screen. If you want to log on as this user you have to press Cntrl+Alt+Del twice at the Welcome screen to make a Windows Security dialog box appear. Here you can type in the user name and password 0f the hidden account and log in. Limited Users shouldn't be able to see any sign of you except for the listing in the Documents and Settings folder. Other administrative users will be able to see your hidden account in Control Panel/User Accounts, so keep this in mind when you're planning this out.
All right, now down to the good stuff. If having a hidden account sounds like your cup of tea, and you have no problem with small Registry augmentation, then let's go:
* First we need to open up the Registry Editor. Go to Start/Run and type "regedit" and click OK
* You should be looking at the Registry editor, and what we need to do now is navigate to H-KEY\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist . You will not see this folder if you do not have "show hidden system files" turned on.
* Once here we need to create another DWORD value. This is easier than it sounds, right click on the User list label file on the left side of the screen and select New>DWORD . You'll see the new entry in the right pane of the window, rename this value the name of the user account you want hidden (exactly how it is listed in the Startup screen, case sensitive) and leave the value at 0.
* Close your Registry Editor and restart the PC. When the Welcome screen comes up you'll notice that there's no icon for the user you just concealed. So how do you log in? This is where you press Cntrl+Alt+Del 2x's and the Windows Security Dialog box will come asking you to authenticate (name/password) after this the system should log you in.
Here's one more thing you might want to keep in mind, Windows logon screen. This is the screen where you see the available users you can choose to log in as. You can turn this option on/off in the User Accounts ( Start/Control Panel/User Accounts then "Change the way Users log in or off" and "Use Windows Welcome Screen" and you need to turn it off if you plan on using a hidden account and there are no other accounts on the system. The reason why is that the Windows doesn't have any user accounts to display in the Welcome screen, so it will continuously reboot. Now if you do run into this 0r any problems simply enter Safe mode at the next boot, this will allow you to go to the User Accounts Window and fix any problems. If you find that you can't log in at all with your hidden account go back and look at the registry value you created. Make sure you're spelling the user name is correct and that it's in the right location in the registry.
See also
microsoft windows vista support
Computer Support – MSCONFIG Command
PC Repair Services and Computer Support
Easy Way To Get Computer Help
After weeks of warning about the Conficker worm, April 0ne came and went without any major problems. But where did the worm go?
Computer worm is now parading as an anti-virus program called Spyware Protect 2009. The worm takes users to a fake security Web site, asks them to pay $50.00 for a spyware program that actually is the Conficker worm, then keeps your credit card information, to boot. "It infects your computer," she told co-host Harry Smith. "And it keeps that $50.00"
She says it can pop up on your computer and advertise a way to prevent the worm. To be safe, she says not to click on anything you're not familiar with.
Del Conte stressed that now is the time to be extra-careful
Computer worm is now parading as an anti-virus program called Spyware Protect 2009. The worm takes users to a fake security Web site, asks them to pay $50.00 for a spyware program that actually is the Conficker worm, then keeps your credit card information, to boot. "It infects your computer," she told co-host Harry Smith. "And it keeps that $50.00"
She says it can pop up on your computer and advertise a way to prevent the worm. To be safe, she says not to click on anything you're not familiar with.
Del Conte stressed that now is the time to be extra-careful
Related search
virus removal
Password-Manipulating Virus Spreading
How To Secure Yourself Against Conficker Worm
Runtime error r6025 is an error more frequently associated for users who are using Visual Basics or any code compiling software to develop programs. While there are some other reasons for the runtime error, this article will discuss this first, then touch briefly on the other possible errors associated with this as well as some of the ways you can avoid having this runtime error again.
Most of the time, Windows will identify the error and this inform the end user through the runtime error dialogue box. Most coders would suggest that you run a debug program to solve this problem as it will track down the wobbly code within your project and attach the problem there and then. It is relatively a minor problem when detected early. Some cases, this runtime error is a direct result of a program conflict with Norton Antivirus and some other, more popular virus software that is available to customers.
What happens is that older systems that run older versions of their OS are not friendly with newer code that is written within new antivirus programs and thus the conflict occurs and Windows detects it as Runtime Error r 6025. These are some of the major causes of this error and the entire runtime error library has many different and varying causes. While the problem shooting process will take a while as they each have different unique ways to solve (as can be seen with this runtime error), one of the main ways to solve any of these errors is to have a single universal solution.
Sometimes, Windows flashes these errors due to confusion in the registry, or perhaps a virus or a worm (or even spyware) has left behind a code or entrenched key within its matrix that confuses the operating system into operating it as a runtime error. Technicians all agree that one of the first steps to solving a runtime error (or also known as an error when a program execution or command line is broken) is to fix the registry.
The reason for this is because of the fact that everything is logged down into the registry and most of the time, the error can be traced in the registry as a broken command or code. A good registry cleaner can solve most of these problems by cleaning up the registry and highlighting the conflicts. Advanced registry cleaners can even solve these conflicts through a re shuffling of data within the registry, which is a good thing to have when you want a specific program to work. Runtime error r6025 and hundreds more like it can be solved with a single download and a single click of a mouse - most of the time. It is a harmless way to root out one possibility, and most of the time, it works.
Most of the time, Windows will identify the error and this inform the end user through the runtime error dialogue box. Most coders would suggest that you run a debug program to solve this problem as it will track down the wobbly code within your project and attach the problem there and then. It is relatively a minor problem when detected early. Some cases, this runtime error is a direct result of a program conflict with Norton Antivirus and some other, more popular virus software that is available to customers.
What happens is that older systems that run older versions of their OS are not friendly with newer code that is written within new antivirus programs and thus the conflict occurs and Windows detects it as Runtime Error r 6025. These are some of the major causes of this error and the entire runtime error library has many different and varying causes. While the problem shooting process will take a while as they each have different unique ways to solve (as can be seen with this runtime error), one of the main ways to solve any of these errors is to have a single universal solution.
Sometimes, Windows flashes these errors due to confusion in the registry, or perhaps a virus or a worm (or even spyware) has left behind a code or entrenched key within its matrix that confuses the operating system into operating it as a runtime error. Technicians all agree that one of the first steps to solving a runtime error (or also known as an error when a program execution or command line is broken) is to fix the registry.
The reason for this is because of the fact that everything is logged down into the registry and most of the time, the error can be traced in the registry as a broken command or code. A good registry cleaner can solve most of these problems by cleaning up the registry and highlighting the conflicts. Advanced registry cleaners can even solve these conflicts through a re shuffling of data within the registry, which is a good thing to have when you want a specific program to work. Runtime error r6025 and hundreds more like it can be solved with a single download and a single click of a mouse - most of the time. It is a harmless way to root out one possibility, and most of the time, it works.
Related Search
antivirus software installation setup support
America's Best-Known Hackers
So here are some of the most popular -- or, perhaps, infamous -- hackers, collected with the help of Symantec, the Justice Department, and several technology consultants. Please feel free to suggest others.
Fred Cohen
In 1982, Fred Cohen, then a Ph.D. student at the University of Southern California, wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was benign. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk -- something few computers sold today can accommodate anymore.
Other computer scientists had warned that computer viruses were possible, but Cohen's was the first to be documented. A professor of his suggested the name "virus." Cohen now runs a computer security firm.
Kevin Mitnick
It takes some diligence to get the Justice Department to call you "the most wanted computer criminal in United States history." Kevin Mitnick was diligent.
He was first arrested when he was 17, and spent time in and out of jail. He broke into computer systems at Novell, Motorola, Sun, Fujitsu and other firms, stealing their software and crashing their machines. He was caught, for the last time, in 1996.
He did time -- four years of it -- before he was convicted and sentenced to 46 months in prison with credit for time already served.
When he was released, and finished a period when he was under orders to stay away from computers, he wrote two books -- with hacker-ish titles like "The Art of Intrusion." (If you ever saw a movie called "Takedown," it's about Mitnick.) He now runs a computer security firm.
Robert T. Morris
In 1987, Robert T. Morris, a graduate student at Cornell, unleashed the first widely known computer "worm" -- a virus that spread over the Internet.
Morris said the whole thing was a benign experiment that got out of control, but prosecutors said he had caused hundreds -- if not tens of thousands -- of dollars in lost productivity for each computer affected. He was sentenced to three years' probation, community service, and a fine of $10,001 plus legal costs.
But like many of his ne'er-do-well brethren, he was a bright guy. In 1996 he co-founded a startup company that made software for online stores. In 1999 the firm was bought out, for about $45 million, by another online startup called Yahoo.
Morris is now a professor in the Computer Science and Artificial Intelligence Laboratory at M.I.T.
Kevin Poulsen
Kevin Poulsen had good taste in cars. In 1991 a Los Angeles radio station (102.7 on the FM dial) promised a free Porsche to the 102nd caller of the day. He'd already hacked into their phone lines, and mysteriously became caller number 102.
The government was already after him. Having first been caught in his teens -- and rewarded, after punishment, with a computer-security job at a high-tech lab -- he broke into computers run by the FBI and the Defense Department.
After 18 months on the run, he was arrested in 1992 and held without bail. The sentence he finally served -- 52 months -- was the longest for computer crimes at the time.
He does not run a computer security firm. Instead, he writes about it. His blog at Wired News is called "Threat Level."
Shawn Fanning
Shawn Fanning, by most people's definition, is hardly a hacker, but he did more to change the way computers are used than most hackers, for good or evil, can ever hope.
Does his name ring a bell? Perhaps you'll remember his nickname: Napster. Friends at college called him that because of his short, kinky hair; he went on to use it as the name of a Web site for sharing his favorite music with friends.
Napster soon had a lot of friends -- a lot -- and music has never been the same since. People found that music, saved digitally in the MP3 format, sounded just about as good as the music recorded on Compact Discs -- and even better if the CD cost $15 while the MP3 download was free.
So here are some of the most popular -- or, perhaps, infamous -- hackers, collected with the help of Symantec, the Justice Department, and several technology consultants. Please feel free to suggest others.
Fred Cohen
In 1982, Fred Cohen, then a Ph.D. student at the University of Southern California, wrote a short program, as an experiment, that could "infect" computers, make copies of itself, and spread from one machine to another. It was benign. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk -- something few computers sold today can accommodate anymore.
Other computer scientists had warned that computer viruses were possible, but Cohen's was the first to be documented. A professor of his suggested the name "virus." Cohen now runs a computer security firm.
Kevin Mitnick
It takes some diligence to get the Justice Department to call you "the most wanted computer criminal in United States history." Kevin Mitnick was diligent.
He was first arrested when he was 17, and spent time in and out of jail. He broke into computer systems at Novell, Motorola, Sun, Fujitsu and other firms, stealing their software and crashing their machines. He was caught, for the last time, in 1996.
He did time -- four years of it -- before he was convicted and sentenced to 46 months in prison with credit for time already served.
When he was released, and finished a period when he was under orders to stay away from computers, he wrote two books -- with hacker-ish titles like "The Art of Intrusion." (If you ever saw a movie called "Takedown," it's about Mitnick.) He now runs a computer security firm.
Robert T. Morris
In 1987, Robert T. Morris, a graduate student at Cornell, unleashed the first widely known computer "worm" -- a virus that spread over the Internet.
Morris said the whole thing was a benign experiment that got out of control, but prosecutors said he had caused hundreds -- if not tens of thousands -- of dollars in lost productivity for each computer affected. He was sentenced to three years' probation, community service, and a fine of $10,001 plus legal costs.
But like many of his ne'er-do-well brethren, he was a bright guy. In 1996 he co-founded a startup company that made software for online stores. In 1999 the firm was bought out, for about $45 million, by another online startup called Yahoo.
Morris is now a professor in the Computer Science and Artificial Intelligence Laboratory at M.I.T.
Kevin Poulsen
Kevin Poulsen had good taste in cars. In 1991 a Los Angeles radio station (102.7 on the FM dial) promised a free Porsche to the 102nd caller of the day. He'd already hacked into their phone lines, and mysteriously became caller number 102.
The government was already after him. Having first been caught in his teens -- and rewarded, after punishment, with a computer-security job at a high-tech lab -- he broke into computers run by the FBI and the Defense Department.
After 18 months on the run, he was arrested in 1992 and held without bail. The sentence he finally served -- 52 months -- was the longest for computer crimes at the time.
He does not run a computer security firm. Instead, he writes about it. His blog at Wired News is called "Threat Level."
Shawn Fanning
Shawn Fanning, by most people's definition, is hardly a hacker, but he did more to change the way computers are used than most hackers, for good or evil, can ever hope.
Does his name ring a bell? Perhaps you'll remember his nickname: Napster. Friends at college called him that because of his short, kinky hair; he went on to use it as the name of a Web site for sharing his favorite music with friends.
Napster soon had a lot of friends -- a lot -- and music has never been the same since. People found that music, saved digitally in the MP3 format, sounded just about as good as the music recorded on Compact Discs -- and even better if the CD cost $15 while the MP3 download was free.
Related Search
antivirus software installation setup support
How To Secure Yourself Against Conficker Worm
Subscribe to:
Posts (Atom)