Posts

Showing posts from February, 2017

Create a User Defined Function (macro)

Image
Create a User Defined Function   Excel allows you to  create custom functions , called " User Defined Functions " (UDFs) that can be used the same way you would use SUM() or some other built-in Excel function. This can be especially useful for  advanced mathematics  or special  text manipulation . In fact, many Excel add-ins provide large collections of specialized functions. This article will help you get started creating user defined functions with a couple of useful examples Open up a new workbook. Get into VBA (Press  Alt+F11 ) Insert a new module ( Insert > Module ) - Copy and Paste the Excel user defined function examples - Get out of VBA (Press  Alt+Q ) Use the functions (They will appear in the Paste Function dialog box,  Shift+F3 , under the "User Defined" category) If you want to use a UDF in more than one workbook, you can save your functions in your own custom add-in. Simply save your excel file that contains your VBA functions as an add-in file ( .xl

Formula won't calculate, shows it as text for open office calc

Image
Here is how we fix it. 1- go to Open Office - Preferences - OpenOffice.org Calc - View 2- Under Display options you will find the check box "Formulas". Make sure this is NOT checked. If it is click on it to unCheck it. 3- Click on "OK". Now you should see all the numbers back in the spreadsheet.

The Rising Threat of Smartphone Botnets

Image
"Versatile innovation" has enhanced our day by day lives on many levels and it has significantly raised the personal satisfaction for some. Yet, the dangers originating from portable innovation are likewise genuine and worried for data innovation and administrations. Essentially, botnets are substantial illicit systems of contaminated machines - normally desktop or smart phones, are regularly used to send active movement to different frameworks to taint their system or gadget. In any case, assailants are currently utilizing versatile botnets to taint the other system/gadgets utilizing cell phones. Tainted cell phones that turn out to be a piece of a botnet can increase finish access to the focused on gadget and unwittingly play out specific assignments like recording sound and video, taking photographs, sending instant messages, open pages, take client information, erase documents, dispatch refusal of administration assaults by means of HTTP surges and perform web infusions,

Easiest Ways to Beat Ransomware

Image
Ransomware dangers are not new to the online group today. Not at all like early days when ransomware assaulted clients on occasion, now it is barraging clients with different forms and updates practically consistently. This is imperative to comprehend that ransomware dangers are the genuine risk of today's chance. Assailants are bringing on genuine harm to the clients with their pernicious codes and practices. Consequently in current circumstance clients are likewise honing some keen strategies to forestall ransomware dangers. How about we examine few stages to turn away ransomware assaults. Take preventive measures: As a preeminent stride take preventive measures to stop ransomware assaulting you. These means can help you protect your framework at the lead position. These preventive measures incorporate underneath specified strides: Introduce a respectable security suite: Most of the ransomware assaults occur through vindictive connections in messages and through contaminated sit

Best Free 4 Antivirus for protect PC

Image
1-Amiti free Antivirus Amiti free Antivirus is a program that backings filtering and it has 4 unique sorts of examining, including the one that can at present check the infections that are right now running in the memory. There's a device incorporated that can be utilized to rapidly clean every one of the records to free up its circle space. There aren't a considerable measure of settings or choices, yet it monitors the examining documents naturally and bolsters updates to its database. Amiti Antivirus additionally gives some steady infection assurance, called occupant security, for nothing. Works with Windows 10, 8, 7, Vista and, XP. 2-Comodo free Antivirus This Antivirus is from the Comodo security arrangements and is another fantastic program, effectively one of the best Antivirus choices. This Antivirus shields you from such a variety of risk administrations, the same number of them on this rundown do. Comodo Antivirus likewise uses some different advances to make the proce

Why Bots Are The Future Of Marketing?

Image
At the outset (1966), there was ELIZA - she was the primary bot of her kind, had approximately 200 lines of code and was amazingly savvy. In any case, you likely don't have any acquaintance with her. Afterward, came PARRY who was more intelligent than ELIZA (and could mirror a distrustful schizophrenic patient). In any case, you most likely don't know PARRY either. On the other hand ALICE (1995) or JABBERWACKY (2005). Be that as it may, you do know Siri! What's more, that in that spot is splendid showcasing.  The bots have existed for quite a while now yet they weren't generally mainstream until Apple. Continuously one stage in front of its opposition, Apple presented the administrations of a chatbot as well as utilized it to make a one of a kind brand picture. It slaughtered two winged animals with one figurative stone known as Siri. There was no backpedaling from that point. Siri was/is an easily recognized name. She can read stories, foresee the climate, give to a g

How to show hidden file in USB for mac?

Image
We can show hidden file for usb like below: Open terminal Type in terminal  and hit enter defaults write com.apple.finder AppleShowAllFiles TRUE

How to print Screen in mac hackintosh?

Image
In mac we have short cut key for print screen by Press Alt+Shift+4  or Ctrl+Shift+4 Take mouse to drag on screen we want to capture Capture screen show in desktop That all for that

turn off automatic updates mac os x yosemite

Image
How to Enable or Disable Auto Apps Update on Mac OS X El Capitan or Yosemite Step #1. Pull down the Apple menu and navigate to System Preferences. Step #3. Along with those check boxes, also enable the one behind “install system data files and security updates.” Step #4. That's all to it.

How to reset Firefox to default setting?

Image
How to reset Firefox to default setting? Click the menu button and then click help . From the Help menu choose Troubleshooting Information . If you're unable to access the Help menu, type about:support in your address bar to bring up the Troubleshooting Information page. To continue, click Refresh Firefox in the confirmation window that opens. Firefox will close to refresh itself. When finished, a window will list your imported information. Click Finish and Firefox will open. 

Network Security Sandbox

Image
There is a good range of network security product accessible on the market currently. Despite these products, sure unobserved and ingenious cyber crimes take place by creating use of certain evasive binaries. They either make the network security system stop utterly or escape from the observance of it. So, a behavioral approach is required to sight APT (Advanced Persistent Threats) that square measure supported malware's activities. Market Definition by Segment kind There are 3 classes of the market for network sandboxing. 1. Standalone It is implemented severally of existing network security systems. It does not have an effect on the other security system. 2. Firewall/IPS/UTM It is an elective feature of existing network security and it's enforced within the cloud. 3. Secure web entranceway / Secure Email entranceway It is an elective feature of the present security solutions. Key Factors Driving the Market Growth Following are the major factors driving the market growth: Fact