Sometimes it can be helpful to add line numbers in the left margin of a Word document. Reviewers can then refer to the exact location of some text instead of giving a general description eg “near the top of the 4th page.”
When the Line Numbering feature is turned on you can print or email the file so that the reviewers can open the file with the line numbers displayed.
To turn on line numbering
- Click File, Page Setup
- Click the Layout tab, then select the Line Numbers button
- Within the Line Numbers box, click before “Add Line Numbering”
- Make your selections
If you want the entire document to have line numbering then you would choose “Continuous”.
Select “Restart each page” if you want to re-number each page beginning with the same number, such as 1.
Use the “Count by” box to skip lines. For example, type in the number 10 if you only want a number placed next to every 10th line.
- Click OK and line numbers are applied to the file.
courtesy : Kersi Mody
“We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.”
“During our regular verification of accounts, we couldn’t verify your information. Please click here to update and verify your information.”
Have you received email with a similar message? It’s a scam called “phishing” — and it involves Internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers, bank account information, PAN number, passwords, or other sensitive information) from unsuspecting victims.
Phishers send an email or pop-up message that claims to be from a business or organization that you may deal with — for example, an Internet service provider (ISP), bank, online payment service, or even a government agency. The message may ask you to “update,” “validate,” or “confirm” your account information. Some phishing emails threaten a dire consequence if you don’t respond. The messages direct you to a website that looks just like a legitimate organization’s site. But it isn’t. It’s a bogus site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name.
Tips to help you avoid getting hooked by a phishing scam:
- If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Legitimate companies don’t ask for this information via email. If you are concerned about your account, contact the organization mentioned in the email using a telephone number you know to be genuine, or open a new Internet browser session and type in the company’s correct Web address yourself. In any case, don’t cut and paste the link from the message into your Internet browser — phishers can make links look like they go to one place, but that actually send you to a different site.
- Use anti-virus software and a firewall, and keep them up to date. Some phishing emails contain software that can harm your computer or track your activities on the Internet without your knowledge.
Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. Anti-virus software scans incoming communications for troublesome files. Look for anti-virus software that recognizes current viruses as well as older ones; that can effectively reverse the damage; and that updates automatically.
A firewall helps make you invisible on the Internet and blocks all communications from unauthorized sources. It’s especially important to run a firewall if you have a broadband connection. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software “patches” to close holes in the system that hackers or phishers could exploit.
- Don’t email personal or financial information. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization’s website, look for indicators that the site is secure, like a lock icon on the browser’s status bar or a URL for a website that begins “https:” (the “s” stands for “secure”). Unfortunately, no indicator is foolproof; some phishers have forged security icons.
- Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. If your statement is late by more than a couple of days, call your credit card company or bank to confirm your billing address and account balances.
- Be cautious about opening any attachment or downloading any files from emails you receive, regardless of who sent them. These files can contain viruses or other software that can weaken your computer’s security.
- Forward spam that is phishing for information to the original organization that is sought to be represented, so that they can initiate action, and block the same.
Windows XP makes it easy to compress or zip files.
This is especially handy when you want to send a
folder containing several files in an e-mail message.
To compress a file or folder:
1. Right-click the file that you want to compress.
2. Point to Send To and click Compressed (Zipped)
Windows XP immediately creates a new compressed folder
in the same location as the source file. You can
identify the new compressed folder by a little zipper
on the folder’s icon. You can then safely delete the
Courtesy : H S
The Windows logo key, located in the bottom row of
most computer keyboards is a little-used treasure.
Don’t ignore it. It is the shortcut anchor for the
following commands: Windows: Display the Start menu
Windows + D: Minimize or restore all windows Windows +
E: Display Windows Explorer Windows + F: Display
Search for files Windows + Ctrl + F: Display Search
for computer Windows + F1: Display Help and Support
Center Windows + R: Display Run dialog box Windows +
break: Display System Properties dialog box Windows +
shift + M: Undo minimize all windows Windows + L: Lock
the workstation Windows + U: Open Utility Manager
Courtesy : H S
Moving Right Next Door
As I’m sure we all know, you can rearrange worksheets in an MS Excel file with a simple click-hold-and-drag of the sheet tab.
But, did you know that you can also move worksheets from one workbook to another using the same method?
Well, good news, you can, and it’s really as easy as it sounds.
First, open both workbooks. (The one with the worksheet and the one to which the worksheet needs to be relocated).
Next, arrange your workbooks side by side using the Window menu, Arrange choice and then making a choice from the Arrange window. Click OK.
Next, you need to click and hold the sheet tab to be moved.
Now, still holding down the left mouse button, drag the sheet tab into the other file.
You’ll see the small triangle that appears when a sheet is moved, so you can tell where it will be located.
When it’s where you need it to be, simply release the mouse button.
The sheet is moved from one workbook to another. No fuss, no muss!
To Connect or Disconnect When Not in Use?
This choice relates to so many friends’ questions. Should you leave your computer connected to the internet when you aren’t working online? “It takes so long to re-dial,” or “I can’t reach the connection cord, but I’ve heard (fill in your own favorite rumor here).”
Personally, I choose to only stay connected when I’m working at my computer, online or off. When I’m not physically sitting at my computer, I disconnect the cable line manually since it’s easy to reach on my system. I think of it as raising the drawbridge against the bad guys. When your computer is not online, there’s no route for remote unauthorized access. Of course, many PCs have their connection cables in the back where they can be hard to reach.
Other folks in the office like to use an option in their firewall Shut off Net Connection to disconnect from the web without reaching for the cords. This will look different in every firewall program, and it may not be available in all of them.
In XP, you also have the ability to disable net connections through My Network Places, typically found as an icon in the upper left corner. Click on that and the Network Connections window will appear. Right-click on your connection and choose Disable.
To get your connection back, repeat the above instructions, only choose Enable or Connect instead of Disable. There may be a brief delay and icon change while your PC gets a fresh IP address from your service provider.
In fact, it’s a good idea to run your antivirus and antispyware programs while your PC is offline every once in awhile. Some spyware can alert an offsite user (you know, the bad guy) that your scan has started so he can put the malware back onto your machine as soon as the scan has completed. Obviously, you’ll want to update your definition files online before you go offline to scan your system, but scanning while offline prevents outside interference with your security measures.
We all use Google to search for various things online. Did you know that if you open up your fridge and type what you have inside your fridge, into a Google Search Box, you can actually get a recipe to make something out of the ingredients you have ? Try it – you will be surprised !
For the more business minded, if you want a quick conversion of currency, type “USD to GBP” and presto ! You have the conversion rate right on your desktop !
Googling is one of the most used methods of searching the net. However, it often happens that when we search for something, it floods us with a zillion results. So now, our focus has to shift from “where to search” to “how to search”. http://www.googleguide.com offers a complete guide to search for both beginners and advanced users.
Many people want a good and quick world time clock (including adjustments for Summer & Winter – which I personally find most confusing) on their Browser.
I like to use the clock available at this location : http://www.timeanddate.com/worldclock/personal.html
Click on the first link for configuration, add the cities which you need to have, and bookmark the link. Any time you want to look up the time in those cities, you just have to click on the bookmark and the current time in those cities is available right on your browser.
Browse around the site and you will get very interesting information like :
* Search for city – and include it in your Personal World Clock
* The World Clock Meeting Planner
* Time Zone Converter – If it’s 3 pm in New York, what time is it in Sydney?
* Fixed Time Calculator – If it’s 3 pm in New York, what time is it in the rest of the world?
Good, fast and easy !
This is a MS Word tip which many will find useful.
In our day to day work, we often use the same documents over and over again. You can keep frequently used documents readily available on Word’s menu bar so you don’t have to use the File menu and search through files and folders to find them. You do this by adding a Work menu to Word’s menu bar. Simply go to View | Toolbars | Customize, choose the Commands tab, and select Built-in Menus from the list of categories. Then choose Work from the list of commands and drag it to where you want it on the top-line menu. From your new menu, choose Add to work menu to attach a filename to the menu. To remove a filename, press Ctrl-Alt-Minus and click on the item you want to remove.
More next time……
I found this very fine introductory note on the net, courtesy www.answers.com.
A Virus is a Software used to infect a computer. After the virus code is written, it is buried within an existing program. Once that program is executed, the virus code is activated and attaches copies of itself to other programs in the system. Infected programs copy the virus to other programs.
The effect of the virus may be a simple prank that pops up a message on screen out of the blue, or it may destroy programs and data right away or on a certain date. It can lay dormant and do its damage once a year. For example, the Michelangelo virus contaminates the machine on Michelangelo’s birthday.<!– D(["mb","
Viruses Must Be Run to Do Damage
\nA virus is not inserted into data. It is a self-contained program or code that\nattaches itself to an existing application in a manner that causes it to be\nexecuted when the application is run. Macro viruses, although hidden within\ndocuments (data), are similar. It is in the execution of the macro that the\ndamage is done.
E-Mail Attachments Are Suspect
\nFile attachments in e-mail messages are a common way of infecting a computer,\nproviding the user clicks on the attachment. If the attachment is an executable\nfile, it can do anything when run. Examples of executables are files with\nextensions such as .BAT, .COM, .EXE, .SCR, and .SHS
Viruses Are Relatively Recent
\nThe term virus was coined in the early 1980s, supposedly after a graduate\nstudent presented the concept of a program that could “infect” other\nprograms. Since then, more than 80,000 viruses have been defined. However, 99%\nof the infections are from only a few hundred variants found “in the\nwild.”
Be Careful Out There!
\nIf you use the Internet for any purpose, be sure you have an antivirus program\nrunning at all times.
\nNo virus found in this outgoing message.
\nChecked by AVG Free Edition.
\nVersion: 7.1.385 / Virus Database: “,1] ); //–>
Viruses Must Be Run to Do Damage
A virus is not inserted into data. It is a self-contained program or code that attaches itself to an existing application in a manner that causes it to be executed when the application is run. Macro viruses, although hidden within documents (data), are similar. It is in the execution of the macro that the damage is done.
E-Mail Attachments Are Suspect
File attachments in e-mail messages are a common way of infecting a computer, providing the user clicks on the attachment. If the attachment is an executable file, it can do anything when run. Examples of executables are files with extensions such as .BAT, .COM, .EXE, .SCR, and .SHS
Viruses Are Relatively Recent
The term virus was coined in the early 1980s, supposedly after a graduate student presented the concept of a program that could “infect” other programs. Since then, more than 80,000 viruses have been defined. However, 99% of the infections are from only a few hundred variants found “in the wild.”
Be Careful Out There!
If you use the Internet for any purpose, be sure you have an antivirus program running at all times.