Secondary Symptoms of AD/HD

AD/HD is not limited to the classic (or primary) symptoms of inattention, impulsivity, and hyperactivity. Many other (secondary) symptoms exist that can negatively impact your life and can include, but aren’t limited to:



  • Worry



  • Boredom



  • Loss of motivation



  • Frustration



  • Low self-esteem



  • Sleep disturbances



  • Hopelessness



  • Procrastination



  • Difficulty getting along with others



  • Difficulty managing time or money











dummies

Source:http://www.dummies.com/how-to/content/secondary-symptoms-of-adhd.html

Suggested Frequency of Medical Tests for Canadians with Diabetes

Medical tests are one way that you can avoid potential complications with your diabetes. Different tests are required at different frequencies. The Canadian Diabetes Association recommends the following testing schedule for most adults with diabetes:



  • A1C: Every 3 months



  • Blood glucose meter:



    • On 2 or more injections of insulin therapy per day: at least three times daily



    • On 1 injection of insulin per day: at least once daily



    • Not taking insulin: individualized





  • Lipids: Total cholesterol (TC), HDL cholesterol, TC/HDL ratio, LDL cholesterol, triglycerides (TG) at time of diagnosis and then every 1 to 3 years (more frequently if treatment has been initiated or changed.)



  • Urine albumin/creatinine ratio (“ACR”), blood creatinine, eGFR:



    • Type 1 diabetes: annually if you have had diabetes for more than 5 years (every 6 months if you have kidney damage)



    • Type 2 diabetes: at the time of diagnosis then annually (every 6 months if you have kidney damage)





  • Blood pressure: At every diabetes visit



  • Screening for peripheral neuropathy (with a 10-gram monofilament or tuning fork):



    • Type 1 diabetes: annually beginning 5 years after the onset of diabetes



    • Type 2 diabetes: at the time of diagnosis then annually





  • Foot examination:



    • By your doctor: at least annually (more frequently if you are at risk of foot ulceration)



    • By you: daily





  • Eye exam (by an expert eye specialist):



    • Type 1 diabetes: annually, beginning 5 years after the onset of diabetes if you are 15 years of age or older (more frequent eye exams may be necessary depending on the presence and severity of retinopathy)



    • Type 2 diabetes: at the time of diagnosis and then every 1 to 2 years (more frequent eye exams may be necessary depending on the presence and severity of retinopathy)













dummies

Source:http://www.dummies.com/how-to/content/suggested-frequency-of-medical-tests-for-diabetics.html

Opening Dialog Boxes in Visio 2007 with Keyboard Shortcuts

Check out this list of keyboard shortcut combinations to open specific dialog boxes in Visio 2007 so you can quickly communicate to the computer and get the desired task completed:



























































Ctrl+KDisplay Hyperlinks dialog box
Ctrl+ODisplay Open dialog box
Ctrl+PDisplay Print dialog box
F1Display Help pane
F3Display the Fill dialog box
Shift+F3Display Line dialog box
F5Display drawing in full-screen mode
Shift+F5Display Page Setup dialog box
Alt+F8Display Macros dialog box
Alt+F9Display Snap and Glue dialog box
F11Display Text dialog box
F12 or Alt+F2Display Save As dialog box
Ctrl+F4Close active file
Ctrl+F2Print Preview








dummies

Source:http://www.dummies.com/how-to/content/opening-dialog-boxes-in-visio-2007-with-keyboard-s.html

How to Control Data in Cloud Computing


4 of 6 in Series:
The Essentials of Managing Data in Cloud Computing





Controls on data in the cloud computing environment include the governance policies set in place to make sure that your data can be trusted. The integrity, reliability, and confidentiality of your data must be beyond reproach. And this holds for cloud providers too.


For example, assume that you’re using a cloud service for word processing. The documents you create are stored with the cloud provider. These documents belong to your company and you expect to control access to those documents. No one should be able to get them without your permission, but perhaps a software bug lets other users access the documents. This privacy violation resulted from a malfunctioning access control. This is an example of the type of slip-up that you want to make sure doesn’t happen.


You must understand what level of controls will be maintained by your cloud provider and consider how these controls can be audited.


Here is a sampling of the different types of controls designed to ensure the completeness and accuracy of data input, output, and processing:



  • Input validation controls to ensure that all data input to any system or application are complete, accurate, and reasonable.



  • Processing controls to ensure that data are processed completely and accurately in an application.



  • File controls to make sure that data are manipulated accurately in any type of file (structured and unstructured).



  • Output reconciliation controls to ensure that data can be reconciled from input to output.



  • Access controls to ensure that only those who are authorized to access the data can do so. Sensitive data must also be protected in storage and transfer. Encrypting the data can help to do this.



  • Change management controls to ensure that data can’t be changed without proper authorization.



  • Backup and recovery controls. Many security breaches come from problems in data backup. It is important to maintain physical and logical controls over data backup. For example, what mechanisms are in place to ensure that no one can physically get into a facility?



  • Data destruction controls to ensure that when data is permanently deleted it is deleted from everywhere — including all backup and redundant storage sites.






dummies

Source:http://www.dummies.com/how-to/content/how-to-control-data-in-cloud-computing.html

Ports, Protocols, and IP Address Ranges for Firewalls

If you’re building or installing a firewall to protect your computer and your data, basic information about Internet configurations can come in very handy. The following tables give you the facts on IP protocols, ports, and address ranges.

































Common IP Protocols
ProtocolName
1ICMP (ping)
6TCP
17UDP
47GRE (PPTP)
50ESP (IPSec)
51AH (IPSec)















































































Common TCP and UDP Ports
ProtocolPortName
TCP20FTP data
TCP21FTP control
TCP23Telnet
TCP25SMTP (E-mail)
TCP/UDP53DNS query
UDP67/68DHCP (Dynamic IP address configuration)
TCP80HTTP (Web)
TCP110POP3 (E-mail)
TCP119NNTP (Newsgroups)
TCP143IMAP4 (E-mail)
TCP389LDAP (Directory service)
TCP443HTTPS (Web SSL)
UDP1701L2TP (Virtual Private Networks)
TCP1723PPTP (Virtual Private Networks)




















Private and Automatic IP Address Ranges
A10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
B172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
C192.168.0.0 to 192.168.255.255 (192.168.0.0/16)
APIPA169.254.0.0 to 169.254.255.255 (169.254.0.0/16)



dummies

Source:http://www.dummies.com/how-to/content/ports-protocols-and-ip-address-ranges-for-firewall.navId-323648.html

Use the Patch Tool in Photoshop CS5

Grouped together in the Tools panel of Photoshop Creative Suite 5 are the tools used for painting and retouching images. Hidden behind the Healing Brush tool in the Tools panel is the Patch tool. Use it to repair larger areas, such as a big scratch or a large area of skin, by following these steps:



  1. Click and hold the Healing Brush tool to select the Patch tool; on the Options bar, select the Destination radio button.


    You can patch either the source area or the destination — it’s up to you. We recommend dragging a good source over the area that needs repaired.



  2. With the Patch tool still selected, drag to create a marquee around the source you want to use as the patch.


    The source is an unscratched or wrinkle-free area.



  3. After you create the marquee, drag the selected source area to the destination to be repaired.


    The Patch tool clones the selected source area while you drag it to the destination (the scratched area); when you release the mouse button, the tool blends in the source selection and repairs the scratched area!




Make the patch look better by choosing Edit→Fade Patch Selection immediately after you apply the patch. Adjust the opacity until no telltale signs show that you made a change.











dummies

Source:http://www.dummies.com/how-to/content/use-the-patch-tool-in-photoshop-cs5.html

Some QuickBooks Simple Start Calculation and Editing Tricks

These Quickbooks Simple Start tips can help you work easily through math calculations if you’re in the amount field, and editing the day if you’re in the date field. Here’s a guide for help:


If the selection cursor is on amount field, you can use these symbol keys to make calculations:























PressWhat Happens
+To add the number you just typed to the next number you
type
-To subtract the next number you type from the number you just
typed
*To multiply the number you just typed by the next number you
type
/To divide the number you just typed by the next number you
type

If the selection cursor is on a date field, you can use these tricks to edit the date:



































PressWhat Happens
+Adds one day to the date shown
tReplaces the date shown with today’s date
Subtracts one day from the date shown
yChanges the date to the first day in the year
rChanges the date to the last day in the year
mChanges the date to the first day in the month
hChanges the date to the last day in the month



dummies

Source:http://www.dummies.com/how-to/content/some-quickbooks-simple-start-calculation-and-editi.html

Video-Sharing Marketing Demographics and Usage

Young adults (under 35) continue to comprise the primary audience for YouTube, which serves as a fairly accurate stand-in for video demographics overall when compared to the 2010 Pew Report “The State of Online Video”.


YouTube video users are also younger than the average Internet user, and minorities have a greater presence than they do (see Quantcast.com/youtube.com). Note that Quantcast did not directly measure the data in; these are estimates only. For additional YouTube statistics, see Youtube.com/Press_Statistics.


The number of people sharing video is staggering. By 2012, Cisco expects video to account for more than 50 percent of online consumer traffic. ClickZ reports 172 million U.S. users of all ages — almost 82 percent of the country’s Internet population — watched video online in April 2011.


Even when only adult Internet users are counted, 69 percent have used the Internet to watch or download video — roughly half the entire U.S. adult population. If you want eyeballs, you want video.


The percentage of video watchers drops slowly with age: from more than 80 percent for users from 18 to 22 years old to 40 to 49 percent for people from 64 to 73 years old. Video watching drops below 30 percent only for users older than 75.


When non-YouTube sites such as Facebook are included in video usage surveys, women are shown to be as likely as men to upload and share videos.











dummies

Source:http://www.dummies.com/how-to/content/videosharing-marketing-demographics-and-usage.navId-811455.html

How to Listen to Internet Radio on Windows Media Player

You may have noticed that Windows Media Player no longer contains an option to access Internet radio stations in the Windows Vista version, but don't let that slow you down. You can still play your favorite Internet radio stations using Windows Media Player. You just have to work a little harder.


Most likely, the reason the Internet radio station feature went away is that Microsoft set up agreements with online stores like URGE to give you the opportunity to buy listening rights. That being said, there is still a way to listen to free stations. You just have to access the station first to get there.



  1. Search for the words Internet Radio Station at any search engine to see what turns up.



  2. Select one of the search results or go to your favorite station's Web site.



  3. Check the fine print to see what format the station broadcasts in.


    You need to find a station broadcasting in MP3 or Windows Media Audio (WMA) format.



  4. Once you find a station that's broadcasting in the right format, click the Web site’s Tune In or Listen Now button.


    The Windows Media Player will load with the radio station playing.






dummies

Source:http://www.dummies.com/how-to/content/how-to-listen-to-internet-radio-on-windows-media-p.html

Workarounds for the MacBook Air's Lack of Optical Drive

Can a laptop survive in the jungle that is Real Life without a DVD drive? The terse answer is no. Ripping an audio CD or burning an iDVD slideshow disc without an optical drive is like finding a cheap tank of gas: impossible. And the wonders of digital media are a big part of the iWorld. So what was Apple thinking?


First, a bit of explanation. Today’s DVD drives are thin, but not Air thin. In order to create the stunning Air design with truly revolutionary dimensions, Apple’s engineers had to leave out the drive. However, if you own a MacBook Air, you have two choices when it comes to reading the contents of a CD or DVD: Go external, or learn to share.


Use an external USB with your MacBook Air


Some people have no problem at all toting around an external USB DVD burner with a MacBook Air. Heck, half the time, you don’t rip tracks from an audio CD or install software every day.


The folks at Cupertino want you to download your music and movies from the iTunes Store (and your applications from the App Store), so if you follow the Apple Path, you still don’t need an optical drive!


A USB SuperDrive from Apple costs a mere $100, and it can read and write DVDs as well as the built-in SuperDrive you’ll find in the MacBook and MacBook Pro.


You can also use any third-party USB DVD drive that’s compatible with Apple’s laptops and Mac OS X Lion (they’re easy to find on any online store that sells Mac external hardware).


Share a CD or DVD drive for your MacBook Air


The other option for installing software or reading a DVD on the MacBook Air is Lion’s built-in CD/DVD Sharing feature. Sharing is an option if you have a wired or wireless network with at least one of the following:



  • A Macintosh running Mac OS X Tiger, Leopard, Snow Leopard or Lion



  • A PC running Windows XP, Vista or Windows 7: This requires you to install a Windows application supplied by Apple with your MacBook Air.




You can only read, not write, from a shared optical drive. You can’t write data to the remote drive, even if that drive is a DVD recorder. (If you’re a big fan of iDVD or burning your own audio CDs, this is a no-brainer. . . Time to invest in an external USB optical drive.)


To enable sharing, open System Preferences on the Macintosh with the optical drive, click the Sharing icon and then select the DVD or CD Sharing check box. Note that you can set whether the Mac will request your permission when another computer attempts to share the drive.


On a PC, display Control Panel, click the DVD or CD Sharing icon and then select the Enable DVD or CD Sharing check box. Again, you can specify that permission is required, in case security is a concern.


After you set up the shared drive, just load the disc and select the Remote Disc item in any Finder Sidebar. (Remote Disc appears under the Devices heading in the Sidebar.) Now you can access the drive as if it were directly connected to your MacBook Air. Ah, technology!




dummies

Source:http://www.dummies.com/how-to/content/workarounds-for-the-macbook-airs-lack-of-optical-d.html

Kid-Safe Online Communities: Segment Activities by Age

Most kids’ social networks have age limits set by the online community manager so that children can hang out in an age-appropriate atmosphere. Networks such as Facebook aren’t for tweens or younger kids, but what do kids do before they’re teenagers? Most join communities that allow them to interact with others, but in different ways from Facebook, Google+, or Twitter.


Most kids’ communities don’t accept children younger than 7 or 8 because before those ages, they’re too young to grasp the importance of the rules and implications of sharing too much information with strangers, or because they’re simply too immature to participate in the available activities.


Programs are available for kindergarteners and preschoolers, but they’re basic learning games, not places where very young kids interact. When they’re older — say, 7 or 8 — they might begin with the social-networking sites, but more for fun and games than serious networking.


Kids play games using creative avatars and see other kids playing in the same community, but they’re not having full-fledged conversations. Because children socialize differently, it’s important for these networks to set limits so that that 7-year-olds and 14-year-olds aren’t interacting in the same room.


Age limits do more than prevent kids from viewing inappropriate content. They also ensure that kids are interacting with other kids in their own age groups.


As children get older, their levels of membership and the types of content they view can also change. Allowing them to unlock new areas of the community on each birthday will give them a special gift, and they’ll feel more like a grownup as they explore new experiences within the community.


Online community common spaces


Communities that allow a wide range of ages should denote the appropriate ages for all aspects of the community, whether they’re games, chats, or articles. However, it’s nice to have special common areas, too — places where the entire community can get together for a common cause. Perhaps older kids can offer advice or mentoring to younger kids.


If you’d like to have one of these areas for your community, it requires continual moderation.


Online community content


Communities have different types of content. In addition to community-sponsored content such as informative articles, newsletters, and community updates, they have user-generated content. If a community allows teens, and a member is writing about dating, that content isn’t appropriate for an 8-year-old. If content isn’t appropriate for everyone, age limits need to be imposed.


Online community chat rooms


Unless you want to have someone on call to moderate all day, every day, it’s not a good idea to have chat rooms in younger children’s communities unless they’re occasional special events.


Sometimes networks offer chats or interviews with celebrities or authors, and members can ask questions. Moderated chats for these special occasions are a fun way for the community to interact. Note the age level of the chat so that a teenager doesn’t get bored in a very basic children’s chat or a young child doesn’t attend a chat that’s way over his head.


Online community games


As many children’s communities are made up of games, it’s important to note the age levels of the games. You wouldn’t want a 7-year-old to play violent shooting games, and a 12-year-old doesn’t want to play first-grade-level matching games. This doesn’t mean you have to check IDs before allowing others to play, but parents may want to set the controls so that younger kids can’t play mature games.




dummies

Source:http://www.dummies.com/how-to/content/kidsafe-online-communities-segment-activities-by-a.html

Defining Arcs in AutoCAD 2008

AutoCAD 2008 offers you an easy way to define arcs: Just specify three points on-screen. These points tell AutoCAD where to start the arc, how much to curve it, and where to end it. The trouble is that you must nearly always specify arcs more exactly than is possible by using this method. AutoCAD helps you specify such arcs, too, but the procedure isn't easy.



You can start your arc by specifying the center of the arc or the start point. If you choose the Center option, AutoCAD prompts you for the center point first and the start point second. AutoCAD defines arcs counterclockwise, so pick a start point in a clockwise direction from the endpoint. After you specify the center and start point, AutoCAD presents several options you can choose, including the following:



  • Angle: This option specifies the included angle that the arc sweeps out. A 180-degree angle, for example, is a semicircle.

  • Length of chord: This option specifies the length of an imaginary straight line connecting the endpoints of the arc. Most people seldom or never use this option.

  • Endpoint: This option specifies where the arc ends. It's the default option and is often the easiest to use.

If you specify the start point as the first option, you can choose among the following three command line options as well:



  • Center: This option prompts you for the arc's center point and then finishes with the three options listed previously.

  • End: This option specifies the endpoint of the arc. You then need to define the angle the arc covers, its direction, its radius, or its center point.

  • Second point: This is the default option. The second point you choose is not the endpoint; instead, it's a point on the arc that, along with the start and end points, defines how much the arc curves. After you enter the second point, you must enter an endpoint to complete the arc.

To get a feel for how these permutations can be strung together to create different arc-drawing methods, choose Draw --> Arc and look at the impressive submenu that unfurls.



The following example shows how you draw an arc with the default start point/second point/endpoint method:



1. Set the desired layer current and set other object properties that you want applied to the arc that you'll draw.


2. Click the Arc button on the Draw toolbar.


AutoCAD starts the ARC command and prompts you to specify the first endpoint of the arc. The command line shows


Specify start point of arc or [Center]:



3. Specify the start point by clicking a point or typing coordinates.


AutoCAD prompts you to specify a second point on the arc.


4. Specify a second point on the arc by clicking a point or typing coordinates.


The second point lies somewhere along the curve of the arc. AutoCAD determines the exact curvature of the arc after you choose the final endpoint in the following step. To align the second point with an existing object, use an object snap mode.



AutoCAD prompts you to specify the other endpoint of the arc; as you move the crosshairs around, AutoCAD shows how the arc will look.


5. Specify the other endpoint of the arc by clicking a point or typing coordinates.


AutoCAD draws the arc.


Pressing Enter repeats the last command. What often throws new AutoCAD users is that Enter does not repeat the options of the last command. If you go through the command prompts or the Draw menu to draw an arc using the Center, Start, End option, for example, pressing Enter is not going to repeat that method — it's going to repeat the ARC command in its default form, and the three points you pick will probably not give you the arc you meant to draw. Luckily though, AutoCAD has you covered. If you right-click instead of pressing Enter to repeat the ARC command, the first option is Repeat Start, Center, End.










dummies

Source:http://www.dummies.com/how-to/content/defining-arcs-in-autocad-2008.html

How to Use Remote Desktop on Your Windows 7 Home Network




Type the public IP address of the computer you wish to connect to, and click Connect. When prompted, enter your username and password.


>

If you have used Remote Desktop to connect to a computer before, the computer name or IP address will appear in the Computer drop-down list. After you click Connect and enter the username and password, your computer will connect to the remote computer.





>
dummies

Source:http://www.dummies.com/how-to/content/how-to-use-remote-desktop-on-your-windows-7-home-n.pageCd-storyboard,pageNum-2.html

Record Special Moments between a Pooch and His People

If you want to capture some images of your favorite canine with his favorite humans (well, aside from you), think about what is specific to the relationship and aim to photograph at times that present those special moments.


For example, if Argos is amazing with your young son, you may want to pull out your camera when the two are napping together or playing their daily game of chase. If you want to convey the special bond that Swayze has with your husband, try snapping a few posed photos of them nose to nose.


Capturing these connections is all about being aware of the precious moments people share with their pets and having your camera at the ready, like when you come home from work and Delilah is ready to give you a big hug.


Because the star of these photos is the relationship between a dog and his humans, the shooting location doesn’t really matter too much, as long as it has decent light and a usable background. You could consider choosing certain settings that are meaningful to the pair, such as the two of them



  • Sharing a pillow and blanket in bed during a lazy Sunday morning



  • Watching TV together on their favorite chair



  • Watching the world go by from the front porch



  • Tackling their favorite hike together



  • Tackling their favorite hike together



  • Lounging in the sun with each other






dummies

Source:http://www.dummies.com/how-to/content/record-special-moments-between-a-pooch-and-his-peo.html

Samsung Galaxy Tab 10.1 For Dummies

It’s really a heck of a gizmo, so much so that a major fruit company has sued Samsung over its marvelous Galaxy Tab 10.1. That fact plays to no audience here, because though it may be marvelous and lawsuit-worthy, the Galaxy Tab is still a complex piece of electronics in need of gentle hand-holding and careful explanation. This Cheat Sheet provides that information, plus plenty of tips and tricks you can’t find anywhere else.






>


>


The Galaxy Tab Home Screens


The main screen on the Galaxy Tab is called the Home screen. There are actually five Home screen panels, each of which you can adorn with icons, widgets, and sneeze globs. Only the sneeze globs are easily removed with a microfiber cloth.


image0.jpg



>



>


>


The Galaxy Tab Buttons


The Galaxy Tab features various icon buttons, found around the touchscreen. You use the buttons to manipulate apps or to control the Galaxy Tab. They provide a welcome consistency, so knowing how they work is important to getting the most from your Tab.


image0.jpg

In addition to the icon buttons, other buttons festoon the screen. They aren’t always available, but they provide consistency between the various apps. These buttons are shown here:


image1.jpg



>



>


>


Basic Galaxy Tab Touchscreen Operations


It takes a certain finesse to work a touchscreen gizmo like the Galaxy Tab. Here are some of the common operations you can perform using your fingers on the Galaxy Tab's touchscreen:


image0.jpg



>



>


>


Galaxy Tab Tricks to Remember


You can get more done quickly on your Galaxy Tab if you know a few tricks. Here’s an assortment of handy time-saving tricks for you to keep in mind while you use, abuse, or excuse the Galaxy Tab:



  • Dictation! You can speak into the Galaxy Tab as an effective and quick alternative to using the onscreen keyboard.



  • Quickly switch between two or more programs by using the Recent Apps button found at the bottom left of the Home screen.



  • It’s often easier to read long web pages or eBooks by turning the Tab to a portrait (vertical) orientation.



  • Remember that you can add icons and widgets to the Home screen panels.



  • The Galaxy Tab can make phone calls, but you must install the proper app. For traditional phone calls, Skype is a good idea. You can use the Talk app for video chat.



  • Whenever possible, try to use the Galaxy Tab's Wi-Fi Internet connection to avoid incurring data usage charges.



  • Use the various Search commands to look for things on the Galaxy Tab, on the Internet, or in a specific app.







>



>


>


Galaxy Tab Help and Support


For whatever reason, something might go wrong with your Galaxy Tab. When things get really tough, you'll need to contact either Samsung itself or your cellular service provider. Here are their contact numbers and links to their websites:






>






>
dummies


Source:http://www.dummies.com/how-to/content/samsung-galaxy-tab-101-for-dummies.html

Formatting the X-axis and Y-axis in Excel 2007 Charts


8 of 12 in Series:
The Essentials of Working with Charts in Excel 2007





>

When charting values, Excel 2007 isn’t always careful how it formats the values that appear on the y-axis (or the x-axis when using some chart types, such as the 3-D Column chart or the XY Scatter chart).


If you’re not happy with the way the values appear on either the x-axis or y-axis, you can easily change the formatting.


>


>


>

1

Select the axis values you want to format.



>

Click the x-axis or y-axis directly in the chart or click the Chart Elements button (in the Current Selection group of the Format tab) and then click Horizontal (Category) Axis (for the x-axis) or Vertical (Value) Axis (for the y-axis) on its drop-down list. Be sure to select the axis values, not the axis title. Excel surrounds the axis you select with selection handles.


>



>


>

>

Enlarge
>


>

2

Click the Format Selection button in the Current Selection group of the Format tab.



>

Excel opens the Format Axis dialog box containing the following tabs: Axis Options, Number, Fill, Line Color, Line Style, Shadow, 3-D Format, and Alignment.


>



>


>


>

3

Change the appropriate options on the Axis Options tab as needed.



>

These options include those that fix the maximum and minimum amount for the first and last tick mark on the axis, display the values in reverse order (highest to lowest), apply a logarithmic scale, display units on the axis (hundreds, thousands, and millions, and so forth) and divide the values by those units, reposition the tick marks on the axis, and modify the value at which the other axis crosses.


>



>


>


>

4

Click the Number tab and change the number formatting as needed.



>

For example, to select the Number format with the comma as the thousands separator and no decimal places, you select Number in the Category list box; then leave the Use 1000 Separator (,) check box selected and enter 0 in the Decimal Places text box.


>



>


>


>

5

Click the Alignment tab and adjust how the labels appear.



>

Indicate the new orientation by clicking the desired vertical alignment in the Vertical Alignment drop-down list box and desired text direction in the Text Direction drop-down list.


>



>


>


>

6

Click Close.



>

As you choose new options for the selected axis, Excel 2007 shows you the change in the chart. These changes are, however, set in the chart only after you click Close in the Format Axis dialog box.


See also:


Customizing the Type and Style of an Excel 2007 Chart


Editing a Chart's Date Source in Excel 2007


Changing Chart Elements in Excel 2007



>











>
dummies


Source:http://www.dummies.com/how-to/content/formatting-the-xaxis-and-yaxis-in-excel-2007-chart.html

U.S. Time Zone Chart for eBay Sellers

Successful eBay sellers are always aware of the time zone differences across the United States. When you have an item listed for auction on eBay, you want as many people as possible to have the opportunity to see it. Remember that eBay officially runs in the Pacific time zone. Keep this time chart handy and refer to it when you post an eBay auction to make sure it doesn't close while part of the country is asleep.



























































































































































U.S. Time Zone Chart
eBay/PacificMountainCentralEastern
00:00 (midnight)1:00 a.m.2:00 a.m.3:00 a.m.
01:002:00 a.m.3:00 a.m.4:00 a.m.
02:003:00 a.m.4:00 a.m.5:00 a.m.
03:004:00 a.m.5:00 a.m.6:00 a.m.
04:005:00 a.m.6:00 a.m.7:00 a.m.
05:006:00 a.m.7:00 a.m.8:00 a.m.
06:007:00 a.m.8:00 a.m.9:00 a.m.
07:008:00 a.m.9:00 a.m.10:00 a.m.
08:009:00 a.m.10:00 a.m.11:00 a.m.
09:0010:00 a.m.11:00 a.m.Noon
10:0011:00 a.m.Noon1:00 p.m.
11:00Noon1:00 p.m.2:00 p.m.
12:00 (noon)1:00 p.m.2:00 p.m.3:00 p.m.
13:002:00 p.m.3:00 p.m.4:00 p.m.
14:003:00 p.m.4:00 p.m.5:00 p.m.
15:004:00 p.m.5:00 p.m.6:00 p.m.
16:005:00 p.m.6:00 p.m.7:00 p.m.
17:006:00 p.m.7:00 p.m.8:00 p.m.
18:007:00 p.m.8:00 p.m.9:00 p.m.
19:008:00 p.m.9:00 p.m.10:00 p.m.
20:009:00 p.m.10:00 p.m.11:00 p.m.
21:0010:00 p.m.11:00 p.m.Midnight
22:0010:00 p.m.Midnight1:00 a.m.
23:00Midnight1:00 a.m.2:00 a.m.



dummies

Source:http://www.dummies.com/how-to/content/us-time-zone-chart-for-ebay-sellers.navId-390597.html

How to Exclude Traffic from NAT on a Junos SRX

After you have configured SRX NAT services using either the egress interface or the pool method, you can create a rule to exclude certain traffic from the NAT process. This configuration can be done to allow certain servers (such as a public web or FTP site) to have public IP addresses on otherwise private LAN address space, but the choice is really up to the network administrator.


Naturally, you need a new rule. This one applies to 192.168.2.2 and is called NO_translate:


[edit security nat source rule-set internet-nat]
root# set rule NO_translate

Now, you need a match rule and action for the new rule so you can turn NAT off for 192.168.2.2, as shown here:


[edit security nat source rule-set internet-nat rule NO_translate]
root# set match source-address 192.168.2.2/32
root# set then source-nat off

It might look like you’re done, but you’re not.


If you commit this configuration, the SRX continues to translate 192.168.2.2, even though the rule is fine and the SRX should not translate it.


Here's what happened: The order of the rules is established by the order in which they're configured in the CLI. The NO_translate rule was added after you configured the basic admins-access rule, so the NO_translate rule was simply added after the existing admins-access rule. Unfortunately, because admins-access matches the entire LAN address space (192.168.2.0/24), no traffic is left for the NO-translate rule to match!


This is a common policy issue with Junos and is easy enough to fix. One statement puts the rule in the correct order:


[edit security nat source rule-set internet-nat]
root# insert rule NO_translate before rule admins-access

Always make sure your configured rules are in the proper order to achieve the results you want. As the number of rules grows, the possibility of error grows even faster.




dummies

Source:http://www.dummies.com/how-to/content/how-to-exclude-traffic-from-nat-on-a-junos-srx.html

How to Use NaturallySpeaking with Other E-Mail Applications

Dragon NaturallySpeaking can make managing your email more manageable, even when using email applications other than Outlook. For most businesspeople, reading and answering e-mail takes up way too much time. Several books have been written about how to cope: when to check e-mail and how to manage your inbox. But, there’s no good way to eliminate its presence. NaturallySpeaking can be your ally in dispatching the job quickly.


Using NaturallySpeaking with Gmail


In NaturallySpeaking, Gmail is a Full Text Control application that doesn’t work with Natural Language Commands. That means it has limitations in what you can do. If you were using Outlook and move to Gmail, you may be frustrated that it isn't as easy to use with NaturallySpeaking.


For example, adding contacts is not supported. But it gets the job done, and if Gmail is your application of choice, fear not. It can work for you.


One secret to using Gmail with NaturallySpeaking is to use the Click command. Doing so enables you to manage e-mail tasks quickly. For example, you can say, “Click reply,” “Click delete,” or “Click report spam.”


The Gmail program doesn’t have a reading pane, but closely follows the other structures of other e-mail programs. To send mail in Gmail after launching NaturallySpeaking and your Gmail window, follow these steps:



  1. Say, "Click compose mail.”


    The e-mail window opens with the cursor in the address box.



  2. Dictate the address and then say, “Move to next field.”


    Move through the subject field the same way.



  3. Dictate your e-mail.



  4. Say, “Click send.”




Using NaturallySpeaking with Windows Live Mail


If you move to the Windows 7 operating system, you must upgrade from Outlook Express to Windows Live Mail (WLM). WLM was created to work with the Windows 7 operating systems. To send an e-mail with WLM, make sure that NaturallySpeaking 11.5 is running and do the following:



  1. Say, "Open Windows Live Mail."


    The application opens.



  2. Open the e-mail form by saying, “Create a message.”


    The mail form opens.



  3. Move through each field by saying, “Go to <field name>.”


    For example, say, “Go to Subject field.”



  4. When you move into the body field, dictate your message.



  5. Say, "Send message."


    The e-mail is sent.




Four other commands you can use with WLM are



  • Go to address book



  • Reply to author



  • Forward the message



  • Go to the outbox folder




When NaturallySpeaking is unclear about the instructions for Live Mail, it shows numbered options as it does in most other applications. Just as you would anywhere else, select the option by saying, “Choose <number>." Once you get used to doing this, it’s easy to get around.











dummies

Source:http://www.dummies.com/how-to/content/how-to-use-naturallyspeaking-with-other-email-appl.html

How to Check and Triage an Injured Chicken


2 of 12 in Series:
The Essentials of Tending a Sick or Injured Chicken





Raising chickens is not without its difficult moments, such as finding a wounded chick or discovering a sick bird. Sick or injured chickens need immediate attention — and special handling. If a chicken has been wounded or you suspect it was in a situation where wounds may have been inflicted, you need to check it over carefully.



  1. Gently catch the chicken. Do not chase the chicken!


    If the chicken is still up and walking and you want to examine or treat it, try to catch it without too much more stress. Sometimes chickens run to their shelters when scared, so try to shoo the injured bird into a safe area where you can close it in. Rather than chase it, which can hasten bleeding of wounds, let the chicken settle down first. Then catch it as calmly as possible.



  2. Gently examine the entire chicken with gloved hands.


    Feathers can hide some wounds that don’t bleed very much, including deep puncture wounds. Part the feathers, remove loose clumps of feathers and sponge off bloody areas so you know the depth and extent of the wounds. Use gloves when handling injured birds in case a disease is also present.



  3. Determine the next step. If injuries are extensive and dirty, as from a predator attack, it’s probably kinder to euthanize the chicken rather than to try to cure it.


    If you decide that you’re going to try and treat the bird, begin treatment quickly or proceed to a veterinarian. Do everything you can to minimize shock when transporting a bird to a vet or when treating at home.



  4. After treatment, put the bird in a safe, darkened, isolated place.


    A comfortable place will soothe a recovering bird and keep it from going into shock at home. Also, injured chickens are subject to abuse by their flock mates, so isolation prevents injury.



  5. Unless the weather is hot, provide an overhead source of heat, such as a heat lamp.


    Hang the heat source about 18 inches above the bird. Put your hand under it at the level of the bird’s back and leave it there a few minutes. Your hand should feel warm, but not uncomfortable or burning. Check frequently to make sure the chicken isn’t too warm, especially if the chicken cannot move easily on its own. If it’s more than 90 degrees Fahrenheit and humid and the chicken is panting, you don’t need additional heat. Try to move the chicken somewhere a little cooler.



  6. Offer water at once, but do not feed for a few hours.


    You can dip the beak of a chicken into shallow water but you shouldn’t do any more than that to get the bird to drink. Never force food down the bird.




If you are caring for sick birds, care for them after you have cared for the rest of the flock and wash your hands between locations. If your birds have been diagnosed with a highly contagious disease, you may want to change your clothes and shoes after caring for them.


Don’t use the same tools or containers to carry food and water between locations without disinfecting them. Don’t let children or anyone else handle a sick bird without gloves. If many birds appear ill, you may want to remove those that don’t seem ill to another location instead of moving the sick birds. Handle them with gloves also.




dummies

Source:http://www.dummies.com/how-to/content/how-to-check-and-triage-an-injured-chicken.html

How to Change the Name of a Windows Network Workgroup

There’s no magic to creating a workgroup. Out of the box, Windows assigns your PC to a workgroup named WORKGROUP, or possibly MSHOME. You can stick with those names. In fact, that’s probably what you’re doing now on your computer. Or, you can change the names of the workgroup. Here’s how:



  1. Press the Win+Break key combination to summon the System window or System Properties dialog box.



  2. Activate the Computer Name dialog box.



    • In Windows 7 and Windows Vista, click the Change Settings link in the Computer Name area.



    • In Windows XP, click the Computer Name tab in the System dialog box.





  3. In Windows Vista, type the administrator’s password or click the Continue button.



  4. Click the Change button.


    Another dialog box appears.



  5. Type a new workgroup name.


    In Windows 7 or Vista, you may need to choose the Workgroup option first.


    Workgroup names should contain only letters and, possibly, some numbers. The name cannot contain any spaces, and Windows converts the name into ALL CAPS no matter what you type.



  6. Click OK.


    After a few seconds, you see a dialog box welcoming you to the workgroup.



  7. Click OK.


    Windows begs you to restart your PC, which is necessary for the computer to really join the workgroup.



  8. Click OK to dismiss the dialog box.



  9. Restart your computer.




After your computer is restarted, it belongs to the new workgroup. The workgroup affects networking on your PC as far as which network computers show up in the Network window.



  • Ensure that all computers connected to the network use the same workgroup name.



  • To join a workgroup, enter the workgroup name as described.



  • If you have trouble joining a workgroup, check the name; it must be spelled exactly.



  • There’s no reason to change the workgroup name from WORKGROUP or MSHOME. More important than resetting the workgroup name is to ensure that your network is properly identified as public or private.



  • Nonetheless, you may want to change the network name for your laptop. At a public wireless hot spot, everyone using the Windows default names are in the same workgroup. This may present privacy or security concerns.






dummies

Source:http://www.dummies.com/how-to/content/how-to-change-the-name-of-a-windows-network-workgr.html

Strategic Planning, Phase 2: SWOT Analysis

To plan your strategic position, take a look at the industry or market you’re operating in. Also, look at your company culture — teamwork, leadership, climate for action, as well as your employees and their skills and capabilities. This culture is the scenery surrounding your organization. In this phase, you begin collecting and analyzing this information and data and use it to assess your strategic position.


Before you jump in to this phase, determine as a team how wide and how deep you want to go with collecting and analyzing information. A good rule is this: You need the right information and data, not too much or too little, to feel confident in making strategic choices and decisions.


The methods to collect that information include conducting web research on macro, market, and industry trends; sending out customer and employee surveys; and acquiring information about your competitors through secret shopper, trade shows, or industry reports.


Making sense of the data comes from synthesizing main themes into a SWOT, which is a handy 2-x-2 matrix of your strengths, weaknesses, opportunities, and threats. In Phase 3, you use your SWOT to make strategic decisions.


The duration of this phase is estimated at two to four weeks. During this time, you answer the following business questions:



  • What are our strengths, weaknesses, opportunities, and threats?



  • What is our position in the competitive landscape?



  • What are the political, economic, social, and technical trends that may impact our organization?






dummies

Source:http://www.dummies.com/how-to/content/strategic-planning-phase-2-swot-analysis.html

Freshwater Fish Finder

The abundance of rivers and lakes in Australia and New Zealand provide a variety of habitats worthy of frequent fishing forays. Target your favourite freshwater species easily, by selecting the best baits to lure them onto your plate. (The number of stars in the Edibility column indicates the tastiness of the species.)




















































Type of FishPreferred HabitatsBest BaitsBest LuresEdibility
BarramundiTidal tropical estuaries, freshwater rivers, billabongs,
lagoons, some stocked lakes
Small live and dead fish, prawns, cherabin, cut fish pieces
(successful occasionally)
Minnows, plugs, soft plastics, jigs****
BassFreshwater rivers, upper reaches of estuaries, some stocked
lakes
Live insects (crickets, cicadas), earthworms, shrimp,
grubs
Minnows, plugs, poppers, jigs, soft plastics, spinnerbaits***
Golden perchInland freshwater rivers, billabongs, stocked lakesEarthworms, shrimp, yabbies, grubsDeep-diving plugs, spinners, soft plastics***
Murray codInland freshwater rivers, many stocked lakesGrubs, yabbies, shrimp, earthworms, small live fish (where
permitted)
Deep-diving plugs, spinnerbaits, spoons****
SalmonBays, harbours, estuaries, riversPilchards, herringMetal spoons, spinners, slices, slugs****
TroutCooler rivers, streams, freshwater lakesEarthworms, shrimps, grasshoppers, crickets, grubs, insect
larvae
Spinners, spoons, minnows, small jigs, flies***








dummies

Source:http://www.dummies.com/how-to/content/freshwater-fish-finder.html

Document Retention in QuickBooks 2012

People sometimes ask how long they should keep old QuickBooks reports, copies of invoices, and other bits of accounting information. Unfortunately, there isn't really a one-size-fits-all answer to this. However, here are some things to think about:



  • Consider whether the other party to a transaction is ever going to want the information. For example, if you’re chronically arguing with a vendor about whether you’ve paid some bill, it makes sense to hang on to those vendor bills and any records of your payment for as long as the argument may go on.


    This means that any paperwork that documents vendor bills and payments doesn’t necessarily have to be retained if you don’t have a problem.



  • Consider tax accounting requirements. By law (a lot of people don’t realize this), a business is required to maintain accounting records in order to report its profits, losses, income, and deductions to the Internal Revenue Service. This means that anything that you need to calculate your profits or substantiate elements of your calculations should be maintained.


    However, a statute of limitations exists that typically runs three years from the date you last filed the return. This means that, in most cases, you don’t need to keep paperwork that’s any older than three years past the return that it relates to.


    In other words, if you have data from the year 2007 and you filed the year 2007 tax return on March 15, 2008, by March 16, 2011, you shouldn’t (in most cases) need to keep all that old paperwork. The statute of limitations dictates that you should be able to discard the old stuff.


    A word of caution is in order because a handful of exceptions exist to this three-year statute of limitations:



    • If you’ve been really sloppy and through your sloppiness omitted gross income in excess of 25 percent of what your return shows, the statute of limitations equals six years.



    • If no return is filed or a fraudulent return is filed, no statute of limitations exists.



    • States without income taxes (like Washington) use a different set of rules and may use a longer statute of limitations. Washington, for example, says the statute of limitations runs four years, not three.





  • Consider the old records that you may need in the future in order to calculate an item for your tax return. These need to be retained. For example, if you bought a factory 30 years ago, keep those purchase records until 3 (or 6) years after you sell the factory.



  • Consider that in some industries, other document retention rules or regulations exist. For example, if you’re a physician, you keep your old patient records — and this may include patient accounting information — for longer than just three years. These other document retention rules vary by industry. Find out what the rules are for your industry.




How do you make sense of these vague suggestions? Come up with a rough guess as to how long you think you should hang on to stuff.


You may want to think twice about simply tossing out financial records. You may want to shred the documents first. By the way, some big-box office supply stores offer in-store shredding services for reasonable prices.




dummies

Source:http://www.dummies.com/how-to/content/document-retention-in-quickbooks-2012.html

How to Install a Pedestal Sink

After you assemble your drain, you can move on to the actual installation of your new pedestal sink. Before a pedestal sink takes its place, you need to repair and reinforce the wall behind it to hold its weight. After you do that, you can install the sink easily.


Some sinks require you to install a separate bracket first, although others mount directly to the wall. The following directions are for a sink with a bracket, so you can skip them if the sink you’re installing doesn’t have a bracket.



  1. Position the bracket on the wall and use it as a template to mark the location for the mounting lag bolts (large screws with a square or hex head).


    To determine the exact location of the mounting bracket, consult the roughing-in dimensions provided by the manufacturer. Make sure that the bracket is level.



  2. Drill pilot holes through the layout marks on the wall into the wall reinforcement.


    Make the holes about 1/8-inch smaller than the lag bolts that came with the sink.



  3. Install the bracket with the lag bolts.



  4. Hang the basin on the wall bracket and then install the mounting screws to hold the sink to the bracket and wall.


    If the sink doesn’t have a mounting bracket, install it directly to the wall with the fasteners provided.



  5. Test-fit the pedestal, mark its location, and then move it safely out of the way.


    You don’t install the actual pedestal until after installing the P-trap and attaching the riser tubes to the faucet. Dealing with the P-trap and the rider tubes are discussed in a separate article.






dummies

Source:http://www.dummies.com/how-to/content/how-to-install-a-pedestal-sink.html

Deciding What Kind of Web Site to Build

Whether you are putting up family photos or representing a large corporation, you can create a Web site to meet your needs. The major types of Web pages are listed here to help you decide what type of Web page you want to create:



  • Personal sites: You can also use a personal Web site to share family photos and events. Following these simple rules:



    • What’s on first? The upper part of your Web page needs to make the main point of the site clear.



    • Keep it simple. Start with modest goals and get something up on the Web; then create a list of ways to extend your site.



    • Provide lots of links. One of the best ways to share your interests is to share links to your favorite Web sites, books, and other resources.



    • Consider your privacy. Don’t put anything up on your Web page that you wouldn’t want on a billboard.





  • Picture sites: It’s easier to share pictures on the Web than to mail them around. Here are some tips to help keep your site interesting:



    • Get organized. Post new content at the top of your page.



    • Be a photo editor. One or two photos of a given event are enough to give a flavor of it.



    • Watch the megabytes. Use a photo-editing program to save your files as JPEG images with the appropriate degree of compression.



    • Protect your identity. Make sure not to provide full names, addresses, or phone numbers.





  • Topical sites: Your site can focus on any interest, volunteer group, cause, concern, or obsession. Here are some things to consider:



    • What’s on first? The title of a topical Web page and the first screen need to clarify the page’s topic.



    • Keep focused. A topical Web site loses some of its value if it goes beyond a single topic.





  • Business sites: Business Web sites cover a wide range of styles because their goals and resources vary. Following a few rules can help you create a page that meets your goals:



    • What’s on first? A business Web page should make the name and purpose(s) of your business immediately clear.



    • Get the right look. Make sure that your Web site looks professional.



    • Get permission. Unless you own the business, ask for permission before putting a company page on the open Web.



    • Find experts. Businesses similar to yours likely have Web sites. Look to similar sites for guidance and inspiration.



    • Monitor usage. A good way to measure the use of your site is with a basic hit counter.





  • Entertainment sites: Humorous pages and shared games on online services are now a major presence on the Web. Here are a few suggestions for creating entertainment sites:



    • Keep it fresh. You have to update the content on your entertainment site frequently, or allow participants to provide new content.



    • Push the technology. You probably need to figure out and use at least one advanced Web technology, such as Flash.








dummies

Source:http://www.dummies.com/how-to/content/deciding-what-kind-of-web-site-to-build.html

Behaviors that Lower Your Metabolic Rate

You’re probably switching to a low-glycemic diet in an effort to lose weight, and congratulations, you’ve made a smart and healthy choice. But along with the food you eat, the activity you do or don’t do affects your metabolism and the rate at which you burn calories. You want to boost your metabolism and increase your lean muscle mass, but several behaviors can set you back.


If you want to boost your metabolic rate, don’t do these at home — or anywhere:



  • Skip meals: The problem with skipping meals is that your body begins to compensate for this bad behavior. Without you even realizing it, your body is decreasing your overall metabolic rate to match the down times when it’s not getting the energy it needs. (Ever wonder why you sometimes feel less hungry when you skip breakfast? Now you know.) You’re also losing out on the little peaks in metabolism that come with digestion.


    If you’re a notorious meal-skipper, you may need more than that knowledge to motivate you to eat regular meals. Following are the benefits of not skipping meals:



    • Increased metabolic rate



    • Improved energy levels



    • Decreased fatigue



    • Easier weight loss



    • A better mood



    • Improved concentration





  • Eat too few calories: Eating a very-low-calorie diet can be extremely harmful to your body’s metabolism. If you dip too low in your calorie intake, your body simply compensates by decreasing your overall metabolic rate, which can ultimately hinder your weight-loss goals.


    Many weight-loss programs prescribe very-low-calorie diets (1,000 calories or less) to help you lose excess pounds. Although your body decreases its metabolic rate to compensate for this lower calorie level, your body may turn to lean body tissue, or muscle, for energy. This decrease in overall lean body mass lowers your metabolic rate even further.


    The other issue with getting too few calories is that the minute you go off the low-calorie diet, your body celebrates by putting the pounds right back on.


    To avoid falling into the trap of eating too few calories, remember this: You still have to eat in order to lose weight. Yes, this statement may go against all other dieting concepts you’ve encountered, but you’re seeking a long-term weight-loss solution, not a short-term fad diet.













dummies

Source:http://www.dummies.com/how-to/content/behaviors-that-lower-your-metabolic-rate.html

Components of Good Singing Posture: Engaged Legs

For singing, you want to engage the entire body in making sound. The legs are your support system, and you want them to hold you up without tightening. Try the following suggestion to discover how to engage your legs.


To feel the legs engage as you sing, use a plié as you take the breath. Plié means “to bend,” and you want to bend your knees as you inhale. This bending helps you feel an opening sensation through your body and down into your legs. As you sing, you can gradually stand back up from the bend.


With each new breath, plié again to create the opening sensation in your legs and gradually stand back up. After you practice this way for a few weeks, you’ll be able to sing your song and bend or plié as you inhale. If you visualize that you’re bending, you feel your legs open as you inhale and engage as you sing.


For singing, you don’t want to lock your knees, or push your knees back. Locking your knees also locks your lower back, and you want your lower back to open for inhalation.


Instead, you want to keep your knees released. Released knees aren’t locked — but they’re also not bent. To find the difference between released knees and bent knees, stand and lock your knees. Without bending the knees, release the muscles around them.


Lock the knees again, and when you release the muscles, bend your knees. Move back and forth from the locked position to the bent position. You want to feel the released position, which is between locked and bent. Bent knees make you a little shorter. Released knees keep you the same height, without tight muscles around your knees.


To prevent tension in your knees, you can visualize a spring in your knees or pretend that you have oil in your knees, like the Tin Man in the Wizard of Oz, so that they move smoothly. Try using the visual of the spring to feel the difference between weight evenly distributed through the legs and feet and sinking your weight into your legs and knees and creating tension.




dummies

Source:http://www.dummies.com/how-to/content/components-of-good-singing-posture-engaged-legs.html

Managing Server Access with Contribute

In order to control workflow, Contribute installs a file in a specific folder at the root of any Web site you connect to. This file, called the Shared Settings File, enables Contribute to store all the settings you choose when you administer the Web site. Whenever you make a change to one of the user groups or any of the other site settings the change gets stored in this centrally located file.



The Shared Settings File enables you to create various groups within a site and to modify the access levels for each of these groups individually without having to send new connection files to the users each time you make a change. For example, you define a group called Editors and give the users the right to add images to pages. Later, you decide that maybe it wasn't a good idea to let them add images. You create another group called Designers, let them add images, and prohibit the Editors group from adding images. Without sending the Editors new connection files, you disabled their access to images, saved yourself some time, and gave the designers something to do.



The Shared Settings File


The Shared Settings File is nothing more than a plain text XML file that holds the settings for the Contribute site connection. After you complete setup, Contribute automatically creates a directory named _mm and places the Share Settings File (an XML text file) within it.



Tempting as it may be for some, do not modify the Shared Settings File manually. Contribute expects the settings file to have a specific format. It is possible to make a change to the file that Contribute does not understand and lose all the settings as a result. Change settings and permissions from within Contribute to avoid headaches.



Using rollback files to back up pages


One of the many features available with Contribute is that of keeping various versions — or backup copies — automatically when editing and publishing Web pages. This feature is especially useful when someone makes a mistake while editing a page and you want to go back and use a previous version. Contribute automatically saves key information within another directory, labeled _baks, created at the root of the Web site.



For the rollback feature to function properly, the _baks directory and any files it contains should not be deleted.



Keeping Your Settings Secure


Because Contribute stores many of the most important files, the setting and record-keeping files, in directories whose names begin with an underscore (for example _mm), making sure that people browsing the Web site can't access these directories by mistake or, even worse, on purpose is very important.



If your Web site is being served by a computer running Microsoft's Internet Information Server (IIS),these folders probably are already secure because IIS is automatically configured to prevent access to folders named in this manner. Many other commercial Web servers are also set up to act this way. Unfortunately, Apache's Web server (one of the world's more popular Web servers) is not among them. If you're using an Apache Web server, you need to set it up yourself to disallow access to any files you want to protect. Because configuring Apache settings is not a part of Contribute's features, consult your Apache Administrator's guide or visit The Apache Server Project for more information.



dummies

Source:http://www.dummies.com/how-to/content/managing-server-access-with-contribute.html

Secure the Infrastructure with Juniper Security Solutions

The security needs of networks are continuously changing as new threats emerge and as data is shared across many different users and applications. Staying ahead of both the new threats and business needs means frequent assessment as to whether the current security infrastructure adequately meets the full set of demands from the organization, or whether it makes sense to migrate to a new solution.


Inbound and outbound threats


Relatively simple network level attacks have morphed into more complex attacks that use both network and application-level components to achieve their malicious goals. An IT manager must not only stop attacks at each layer of the network, for each application and for all types of content, but they also need to stop both inbound and outbound threats.



  • Inbound threats: Are those that originate from outside the corporate network. These threats include virtually all types of attacks from worms to viruses to spyware to phishing e-mails.



  • Outbound threats: Are those that originate from someone inside, such as an employee who has a machine that has been compromised and is propagating a worm or virus throughout the network or spyware resident on an employee’s machine that quietly sends sensitive corporate information.




Meeting new security needs


To protect the network against application-level attacks via the network such as targeting software vulnerabilities, an Intrusion Prevention System (IPS) should look deep into the application layer traffic to detect attacks.


It is important to choose a solution that does more than merely inspect the packets at the network layer or that decodes only a few protocols at Layer 7. The solution should understand and inspect application traffic of all types, fully understand the details of each protocol, and use a combination of methods such as application level stateful inspection, anomaly detection, and other heuristics to stop threats.


Juniper security solutions


To provide protection against inbound and outbound attacks at all levels, Juniper Networks integrates a complete set of content security software features (commonly referred to as Unified Threat Management, or UTM, features) into the secure router and firewall/VPN line of platforms. By leveraging the development, support, and market expertise of many leading content security partners, Juniper is able to deliver a set of best-in-class UTM features.


Integrated on Juniper Networks branch firewall/VPN platforms is the Deep Inspection firewall, a proven IPS solution that builds on the strengths of stateful inspection and integrates stateful signatures and protocol anomaly detection mechanisms to provide both network and application-level attack protection at the perimeter.


Using policy-based management, administrators can pick and choose which protocols to inspect with protocol anomaly detection and/or stateful signatures, what types of attacks to look for, and which action to take if an attack is discovered.


Integrated partner solutions provide antivirus, web filtering, and inbound spam and phishing attacks. The partner-based antivirus solution detects and protects against the most dangerous and virulent viruses, worms, malicious backdoors, dialers, keyboard loggers, password stealers, trojans, and other malicious code. Included in the joint solution is a best-of-class detection of spyware, adware, and other malware-related programs.


To block access to malicious websites, an administrator can assemble an appropriate web-use policy based on 54 different categories encompassing over 25 million URLs (and growing every day). The branch and regional office platforms provide antispam features to help slow the flood of unwanted e-mail and the potential attacks they carry.




dummies

Source:http://www.dummies.com/how-to/content/secure-the-infrastructure-with-juniper-security-so.html

Motivating Your Dog: Choosing Rewards for Dog Training

Using positive reinforcement to train your dog means rewarding him when he does something you want to encourage. This kind of dog trick training is most effective when you know which treats and rewards really motivate your dog.


Dogs are like people — each one is excited by different things. Some are dedicated foodies — a tiny cereal snack or jerky bit will have them jumping through hoops and tearing up the A-frame in no time flat!


Others turn their principled noses from food bribes, but a squeak toy or a ball? How high and how fast? And then, of course, there are the praise junkies. For the sheer joy of affection — a loving touch or a cheery word — this happy soul will repeat sequences over and over. Find out what excites your dog the most, and use it as you teach him tricks and agility.


To conduct a tail-wagger ratings test, assemble some treats and a favorite toy or two. Practice your best “Yippee! Good Boy!” phrases.


Note: You’ll be testing each of these rewards separately, so conduct the test when you have a not-too-busy block of time. Then do the following:



  1. Begin with the treats. Ask your dog to “Sit.” When he does, reward him with a treat. Repeat this three times.



  2. One hour later, bring the toys to another part of your home and repeat the “Sit,” this time offering a toy or ball toss each time he sits.



  3. The next day, repeat the sequence again, but this time, offer only enthusiastic praise.




Okay. Score the results. Did your dog’s butt hit the floor in a nanosecond when you waved a biscuit? Did the toy send quivers down his spine? Or was it your happy voice that got the best back-end response? Of course you can mix it up and use all three when teaching your dog new tricks, but usually, one will stand out as the most beloved — the true tail-wagger. Use this one when first introducing anything new.




dummies

Source:http://www.dummies.com/how-to/content/motivating-your-dog-choosing-rewards-for-dog-train.html

How Do I Handle Investments when Stocks Are Up?

The market returns of 2009 and 2010 have been above average, leading many investors to wonder, “What do I do now?” Concerns about how to handle a rising stock market is just as prominent as how to handle a declining market. Investment strategies for the current stock market environment may not be as complex as you think, especially if you keep the following investing considerations in mind:



  • Diversify your investment portfolio: Chasing the latest hot sector may be tempting when the market is rising rapidly: Hot stocks or sectors may grow at 100% or more annually.


    The only return you get is from the date you actually invest your money. Past returns are a poor predictor of future results. Keep your portfolio diversified across many sectors, including large-cap stocks, small-cap stocks, international stocks, bonds, real estate, and commodities. This will ensure that no matter which sector is hot, you will take advantage of it.



  • Keep your investment protections in place: It is very tempting during a rapidly growing market to invest all cash and bonds in that growing market. It's not hard to understand why. The thought of earning 5-6% on cash and bonds when the market is serving up double-digit returns may seem too much to bear.


    When the market music stops, you don’t want to be the only one without a seat. Bonds and cash insure that when the market does decline, you have not only a counterweight to keep the portfolio afloat, but also the ability to buy stocks at much cheaper prices. You wouldn’t cancel your life insurance policy just because you are confident you won’t die prematurely. The same philosophy holds true with the safety nets in your portfolio.



  • Focus on financial markets' cyclical nature: No matter how good the market or the economy looks at any given time, both are cyclical. The market experiences good times that are always followed by bad times. Those bad times are then followed by good times.


    Those who invested in the late '90s thought the financial outlook was somehow different. The Internet had provided a technological advance that would ensure continued economic and market growth. This was far from the truth. All this elated thinking did was create an equities bubble that, when finally broken, led to a much larger downside than anyone could have imagined.



  • Enjoy the ride as markets go up: Financial markets are supposed to go up. Our economy is naturally supposed to grow, thus increasing earning potential and stock prices. This growth is almost never in a straight line; it can be dynamic or gradual in its rise.




Just because the stock market has gone up recently does not mean it's overvalued. If the market didn’t make new highs regularly, it would never grow. Don’t be scared out of riding a growth wave. Remain diversified, keep your protections in place, understand how markets go through rise and fall cycles, and feel comfortable being a part of the market as it runs to new highs.




dummies

Source:http://www.dummies.com/how-to/content/how-do-i-handle-investments-when-stocks-are-up.html