Posts

Showing posts from October 25, 2009

MS Word Drawing Toolbar and Drawing Tools Working

DRAWING TOOLBAR Using the tools on the Microsoft Excel toolbars, you can draw graphic objects on worksheets and macro sheets. You can also import graphics, as pictures, from other applications to enhance the appearance of your worksheets and macro sheets. With the tools on the Drawing toolbar, you can draw lines, arcs, and transparent or filled ovals, rectangles, and polygons. Once you have added a graphic object, you can change its position, shape, or size; group it with other graphic objects; make copies of it; and format its color, border, or pattern. To display the Patterns dialog box so you can change formatting, double-click an object. You can also select an object and choose Patterns from the Format menu. To move a drawn object to another location on the worksheet or macro sheet, drag the object. To resize a drawn object, select the object, point to one of the handles, and drag until it is the size you want. Line tool Draws a straight line. Arrow Tool Creates an arrow on an acti

HOW TO ANALYZING EXTERNAL DATA IN EXCEL

ANALYZING DATA IN EXCEL Your users might not know that they can use Excel to analyze data from the various databases in your organization. They can use the powerful analytical tools of Excel on data they previously only viewed or edited within the database user interface. Using these features, they can pull data from your customer database, sales tracking database, product catalog, and HR systems into various sheets in a workbook and perform complex PivotTable analysis not possible using the separate applications. This ability is provided by the use of Microsoft Query, an Office application that lives "behind" Excel. You can access Microsoft Query by clicking Data | Get External Data. You'll find three options: Run Web Query, Run Database Query, or Create New Query. The Query interface is very similar to the Design view of a query in Access. Point Query at a database, and it will allow you to build complex relational queries to get the data you need. Running the query wil

Trojan Ports Block Trojan Ports to Protect System

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 Coma.109 TCP 420 Breach.450 TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100 TCP 623 Rtb666.160 TCP 660 Zaratustra.100 TCP 661 Noknok.800, Noknok.820 TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110 TCP 667 SniperNet.210, Snipernet.220 TCP 668 Unicorn.101, Unicorn.110 TCP 680 Rtb666.160 TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332 TCP 785 NetworkTerrorist.100 TCP 800 NeuroticKitten.010 TCP 831 NeuroticKat.