World Time Clock

Dear Friends,

Many people want a good and quick world time clock (including adjustments for Summer & Winter – which I personally find most confusing) on their Browser.
I like to use the clock available at this location : http://www.timeanddate.com/worldclock/personal.html

Click on the first link for configuration, add the cities which you need to have, and bookmark the link. Any time you want to look up the time in those cities, you just have to click on the bookmark and the current time in those cities is available right on your browser.

Browse around the site and you will get very interesting information like :

* Search for city – and include it in your Personal World Clock
* The World Clock Meeting Planner
* Time Zone Converter – If it’s 3 pm in New York, what time is it in Sydney?
* Fixed Time Calculator – If it’s 3 pm in New York, what time is it in the rest of the world?

Good, fast and easy !

Advertisements

Tip – MS Word

Hello Friends,
This is a MS Word tip which many will find useful.

In our day to day work, we often use the same documents over and over again. You can keep frequently used documents readily available on Word’s menu bar so you don’t have to use the File menu and search through files and folders to find them. You do this by adding a Work menu to Word’s menu bar. Simply go to View | Toolbars | Customize, choose the Commands tab, and select Built-in Menus from the list of categories. Then choose Work from the list of commands and drag it to where you want it on the top-line menu. From your new menu, choose Add to work menu to attach a filename to the menu. To remove a filename, press Ctrl-Alt-Minus and click on the item you want to remove.

More next time……

What is a VIRUS

I found this very fine introductory note on the net, courtesy www.answers.com.

A Virus is a Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.

The effect of the virus may be a simple prank that pops up a message on screen out of the blue, or it may destroy programs and data right away or on a certain date. It can lay dormant and do its damage once a year. For example, the Michelangelo virus contaminates the machine on Michelangelo’s birthday.<!– D(["mb","

\n\n

Viruses Must Be Run to Do Damage
\nA virus is not inserted into data. It is a self-contained program or code that\nattaches itself to an existing application in a manner that causes it to be\nexecuted when the application is run. Macro viruses, although hidden within\ndocuments (data), are similar. It is in the execution of the macro that the\ndamage is done.

\n\n

E-Mail Attachments Are Suspect
\n
\nFile attachments in e-mail messages are a common way of infecting a computer,\nproviding the user clicks on the attachment. If the attachment is an executable\nfile, it can do anything when run. Examples of executables are files with\nextensions such as .BAT, .COM, .EXE, .SCR, and .SHS

\n\n

Viruses Are Relatively Recent
\n
\nThe term virus was coined in the early 1980s, supposedly after a graduate\nstudent presented the concept of a program that could “infect” other\nprograms. Since then, more than 80,000 viruses have been defined. However, 99%\nof the infections are from only a few hundred variants found “in the\nwild.”

\n\n

Be Careful Out There!
\nIf you use the Internet for any purpose, be sure you have an antivirus program\nrunning at all times.

\n\n

\n\n

\n\n

\n\n

\n\n\n\n\n
\n\n


\nNo virus found in this outgoing message.
\nChecked by AVG Free Edition.
\nVersion: 7.1.385 / Virus Database: “,1] ); //–>

Viruses Must Be Run to Do Damage
A virus is not inserted into data. It is a self-contained program or code that attaches itself to an existing application in a manner that causes it to be executed when the application is run. Macro viruses, although hidden within documents (data), are similar. It is in the execution of the macro that the damage is done.

E-Mail Attachments Are Suspect

File attachments in e-mail messages are a common way of infecting a computer, providing the user clicks on the attachment. If the attachment is an executable file, it can do anything when run. Examples of executables are files with extensions such as .BAT, .COM, .EXE, .SCR, and .SHS

Viruses Are Relatively Recent

The term virus was coined in the early 1980s, supposedly after a graduate student presented the concept of a program that could “infect” other programs. Since then, more than 80,000 viruses have been defined. However, 99% of the infections are from only a few hundred variants found “in the wild.”

Be Careful Out There!
If you use the Internet for any purpose, be sure you have an antivirus program running at all times.