Windows common shortcut keys

Wednesday, January 2, 2008

The most important shortcut keys that are used in Microsoft Windows and Microsoft Office. 

Action                                                             Shortcut keys

 
Change the font                                  CTRL+SHIFT+F
Change the size of font                        CTRL+SHIFT+P
Increase the Font Size                          CTRL+SHIFT+>
Decrease the font size                          CTRL+SHIFT+<
Increase the font size by 1-point            CTRL+]
Decrease the font size by 1-point           CTRL+[
Change the case of letters                    SHIFT+F3
Close the active item                            ALT+F4
Format letters as all capitals                   CTRL+SHIFT+A
Apply or remove bold formatting              CTRL+B
Apply or remove underline                      CTRL+U
Minimize all windows                             Windows logo key+M
Underline single word                            CTRL+SHIFT+W
Double underline text                            CTRL+SHIFT+D
Apply or remove hidden text                  CTRL+SHIFT+H
Find Files or Folders                             WINDOWS+F
Apply italic formatting                          CTRL+I
Format letters as small capitals              CTRL+SHIFT+K
Apply automatic spacing                       CTRL+=
Remote formatting in plain text              CTRL+SHIFT+Z
Cancel the current task                        ESC
Change the selection to symbol font       CTRL+SHIFT+Q
Display nonprinting characters               CTRL+SHIFT+*

Windows Repair Installation

Tuesday, January 1, 2008

Some time windows missing the startup files due to the power failure, virus's attack and any illegal action by user. You can solve the windows startup problem with running the windows repair installation. Almost all windows serious problem can be solved using windows repair function. For repair windows XP, you should have the bootable windows CD.

  • First boot your computer using bootable windows XP, CD. To boot from CD, first change the booting order setting in your system BIOS.

  • When first blue screen will appear, do not choose any option here; simply press the Enter button to go for next option.


  • Next you will get "Windows License agreement" page, simply press F8 button to accept this agreement.


  • Now in second blue screen press the R on your keyboard to repair the windows XP installation. This recovery function repaired the all-missing windows features.


  • In half an hour windows will complete all recovery process. This recovery process will not disturbed your Desktop and My Document data. May be your some windows sitting will change after completing process.

    Battle of the Elite: openSUSE vs. Mandriva

    Mandriva and openSUSE are two well-established Linux distributions worthy to be considered elite. Both have successfully conquered the hearts of many Linux enthusiasts long before Ubuntu and PCLinuxOS took the stage. With their latest releases namely Mandriva Linux 2008 and openSUSE 10.3, they remained a force to be reckoned with.

    Conclusion:
    Mandriva Linux 2008 may have convincingly won the battle against openSUSE 10.3 but not unanimously because there’s only one judge and that is me :) So, to those who have experienced using these two distros and can compare which of them is better, feel free to give us some feedback.

    Read more at TechSource

    Testing Web application security using Google's ratproxy

    To help developers audit Web application security, Google has released an open source tool called ratproxy. It is a non-disruptive tool designed for Web 2.0 and AJAX applications that produces an easy-to-read report of potential exploits.
    Ratproxy is a local program designed to sit between your Web browser and the application you want to test. It logs outgoing requests and responses from the application, and can generate its own modified transactions to determine how an application responds to common attacks.

    The list of low-level tests it runs is extensive, and includes:
    • potentially unsafe JSON-like responses
    • bad caching headers on sensitive content
    • suspicious cross-domain trust relationships
    • queries with insufficient XSRF defenses
    • suspected or confirmed XSS and data injection vectors
    Read more at Linux.com

    Banner


    readbud - get paid to read and rate articles