Best Keyboard Shortcuts

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

 

Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box

acessability shortcuts

Right SHIFT for eight seconds…….. Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN……. Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK……. Switch MouseKeys on and off.

SHIFT……. five times Switch StickyKeys on and off.

NUM LOCK…… for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END……. Display the bottom of the active window.

HOME……. Display the top of the active window.

NUM LOCK+ASTERISK……. on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN……. on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN……. on numeric keypad (-) Collapse the selected folder.

LEFT ARROW…… Collapse current selection if it’s expanded, or select parent folder.

RIGHT ARROW……. Display current selection if it’s collapsed, or select first subfolder.

Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog

Other shortcuts:

Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don’t forget about the “Right-click” key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you’ve opened up any program.

Internet browser

type in u’re adress “google”, then press [Right CTRL] and [Enter]
add www. and .com to word and go to it

For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:

Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:

Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it’s expanded, or select parent folder. LEFT ARROW
Display current selection if it’s collapsed, or select first subfolder. RIGHT ARROW

Create a Captcha with PHP

We’re going to learn how how CAPTCHA (CompletelyAutomated Public Turing test to tell Computers and Humans Apart) works and how it minimizes automatic sign-up of forms. We will also be creating a simple CAPTCHA script in PHP to illustrate this.

Basically CAPTCHA works in the following manner:

  1. Create Random Value: Some random string is generated, random values are often hard to guess and predict.
  2. Generate an Image: Images are used as these are generally a lot harder to read for computers while being nice and readable to humans. This is also the most important step as simple text in images can be read (and CAPTCHA cracked) quite easily. To make it difficult for them, developers employ different techniques so that the text in the image becomes hard to read for computers. Some create zig-zag lines for background while others twist-and-turn individual characters in the image. Possibilities are many and new techniques are being developed all the time as crackers are always into finding ways to break them.
  3. Store it: The random string generated (which is also in the image) is stored for matching the user input. The easiest way to do so is to use the Session variables.
  4. Matching: After the above step, the CAPTCHA image is generated and shown on some form which we want to protect from being abused. The users fills in the form along with the CAPTCHA text and submits it. Now we have the following:
    1. All submitted form data.
    2. CAPTCHA string (from form), input by user.
    3. CAPTCHA string (real one, generated by us), from session variable. Session variable is generally used as it can keep stored values across page requests. Here, we needed to preserve stored values from one page (form page) to another (action page-that receives form data).
  5. If both match, it’s okay otherwise not, in that case we can give the user a message that the CAPTCHA they had entered was wrong and their form could not be submitted. You could also ask them to verify it again.

The following image might illustrates this better:

CAPTCHA Generation and Matching

CAPTCHA Generation and Matching

From the above image it’s quite clear that when someone requests the form page, the CAPTCHA text is generated and sent back to requesting user, but only in the form of an image. If the requester is a human he’d not have much difficulty reading the image and inputting the text when asked but if it’s a bot it might face difficulties guessing whats in the image. In the next step when we match the string generated and the one the user had input, we can restrict automated form submissions.

The following is the code that does this, it’ll just output the CAPTCHA image to the browser when the script is requested:

Awesome Content Curation Tools

Have you been ever stuck finding the most accurate content related to your search criteria? Do you think content should be compiled in a way that enables you to find the right piece of information over internet without having to waste time reading the unwanted information? Yes, Content Curation is the answer to your query. This enables you to swim across the ocean of websites over internet and reach the right direction via filtering online content based on the subject of information. This is usually inform of status updates, tweets, articles and more. Listed here are some great Content Curation tools that might come handy for you anytime anywhere.

content-dictionary1. Digg

Sharing news of interest within your own community is all about Digg. This social networking platform allows you to share content with a specific group who can then rank your content value In this process, the higher the rate or ranking of your content, greater are the views you receive. This results in increased clicks or higher site traffic. For instance, as an e-commerce related content, your information will fall under either business or technology. And if you happen to chose a different and specific classification for your content, undoubtedly you would increase your site’s relevance as a tool for social media.

2. Equentia

Reaching your target audience and influencing your prospects and current clients with all the information that is useful and engaging is all synonymous to Equentia. You can dig the most relevant information and flesh out the most crisp and pertinent content as per your requirement. Equentia also helps you socialize the same content by allowing you to re-publish or use it privately.

3. Technorati

The world of internet is full of bloggers and Technorati is their friend. It is a blog search engine to serve as a content purifier. It is a directory that scans and indexes content from over a million blogs. Technorati was founded in 2002 and was the first among social networking platforms like Facebook and Twitter. In case you are the one who wants to be included in Technorati’s information bank, you will have to create an account and submit the blog’s website address. You can create a personal profile and use this tool to ignite the social media. It helps you to become critical and relevant amongst your readership.

Conclusion

Remember you should exploit the content curation tools to benefit you directly. The ideal curation solution can be achieved when you actually index your information into your private CMS. This way your traffic is not diverted to a third party site however your searchers stay and view your own site. There are more tools like Sphinn, BizSugar, PaperLi among many more who can help you get organized on this online bank of information. You need to find the most appropriate way to filter information to suit your needs in your own special way. Share socially for increased social capital.

Temp Files Explained

hances are you have some useless files sitting around on your computer, like junk in the Recycle Bin that you haven’t emptied in weeks. But one of the biggest wastes of space on your PC are the Temp folders in the Windows and AppData directories.

As the name suggests, Windows uses these folders to store files that are only needed for a short time: error logs, images, cached files, etc. Their presence helps your computer run smoothly during your current session, but you rarely need them after a reboot, or even after closing a program.

You can easily delete these temporary folders to free up space on your computer. But using the Disk Cleanup tool only deletes temporary files that are older than seven days. Even the new Storage Sense feature in Windows 10 won’t automatically clear temp files all the time.

Apps that you’re using create temporary files for a purpose. Whether you’re downloading something, editing a picture or video, or just want to quickly access data in the app thanks to cache, it needs these temporary files. Windows doesn’t know whether every application is done with its temporary files when you run the Disk Cleanup, so it errs on the side of caution. Most people won’t need an app’s temporary files for more than a week.

For instance, let’s say you were working on a large video in and decided to delete every temporary file on your PC while you had the video player open. This would very likely cause issues because you removed files it needed while it was still working with them. But three days later when you’re done with that Premiere session, you can safely delete those files.

Unless you have a tiny hard drive, temporary files don’t take up enough space to become a problem. If you want to clear them automatically, you can easily set up Windows to delete these temp files when you shut down.

Saving Your Battery in iOS 11

Like many people, I noticed a decrease in battery life after I installed iOS 11 on my iPhone.

This is actually a very common problem on all iOS versions. However it does seem that each new version of iOS brings complaints about faster battery drain. Some say it’s because you’re using the phone more as you explore all the new features and updates. I have also heard the argument that the new OS is doing a bunch of rewriting or caching or something, and that battery life will even out after the first couple days.

With iOS 11, however, there may be another culprit.

Email Drag

If you’ve ever searched for tips on prolonging iPhone battery life, you’ve almost certainly encountered this one: turn off email fetch. The reasoning is that battery life suffers if your phone automatically checks for new mail every 15 or 30 minutes.

That’s why I always kept my accounts set to “manual,” as I prefer to retrieve mail when I want to retrieve mail.

However, after installing iOS 11, I noticed there were frequently new messages waiting for me each time I opened the Mail app. So I checked my email account settings (which, incidentally, are no longer found in Settings > Mail and, sure enough, all my accounts had been set to Fetch!

Needless to say, you are better off disabling Fetch. Here’s how: tap Settings > Accounts & Passwords > Fetch New Data and change it to Manually. You can also change this to check for email hourly, every 30 minutes or every 15 minutes. Try one of these if you iPhone battery is suffering.

 

Saving Data Usage with Facebook

Are you a Facebook addict? Aside from needing to break the addiction as soon as possible (seriously, it’s not a healthy way to live your life), you should give some serious consideration to your data usage. Facebook like other apps just loves to use data – even when you are not looking at the app.

If you’ve had a few “shock” bills from your carrier, Facebook could be to blame. Between high-resolution images and auto-playing videos, the app can burn through data in no time.

Of course, you can turn off auto-playing videos by going to More (the three horizontal lines in the top right-hand corner of the screen) > Help and Settings > App Settings > Auto-play.

But there’s a better way: use the Data Saver tool.

What Does Data Saver Do?

Data Saver not only prevents videos from playing automatically but importantly, it also reduces the resolution of any images in your feed.

To set it up, head to the More menu in the top right-hand corner or your screen. Scroll down until you find Data Saver. It’s in the Help and Settings section.

On the next screen, make sure you slide the toggle next to Data Saver on into the On position. When you enable the setting, a new option will appear. It allows you to disable the Data Saver feature while you’re connected to a Wi-Fi network.

Other Options to Save Data

To further reduce your data usage, there are a couple of other hidden settings you might find useful.

Go to More > App Settings and turn off the toggles next to Upload photos in HD and Upload videos in HD.

As a last resort, you can install Mobile Protect. Navigate to More > Mobile Data to get started.

Reading Aloud with Microsoft Word

Microsoft Word has a new trick up its sleeve, and it should help anyone who struggles with the written word. The new feature is called Read Aloud, and it’s a significant improvement on the previous text-to-speech offerings in Word.

Image result for microsoft word read aloud

Most of us can look at a word and immediately tell whether it’s spelt wrong. Or look at a sentence and tell whether it’s structured correctly. However, some people struggle with these things. Which is the main reason why Microsoft has upped its text-to-speech game with Read Aloud.

Microsoft Word Can Now Read Your Documents Aloud

 

Read Aloud is a new feature which has arrived as part of the latest Office 365 updates. Read Aloud does exactly what you’d expect it to do, with Word reading your document back to you. However, Word can now highlight each word as it’s read aloud right from within your workflow.

In its blog post detailing all of the new Office 365 updates Microsoft states that Read Aloud “makes it easier to recognize and correct errors as you write, improving reading and editing accuracy for everyone, especially users with learning disabilities such as dyslexia.”

Read Aloud, which is listed under the Review tab, is currently only available to Office Insiders. However, Microsoft promises it will become widely available to the general population “later this year”. Which, in Microsoft parlance, means anytime between now and December 31st.

Let’s Make Typos a Thing of the Past

Not everyone will need to make use of the new Read Aloud feature in Word. However, for those who struggle with spelling for whatever reason, this is sure to be useful. And if Read Aloud makes typos a thing of the past then people like myself will be able to sleep more soundly.

The Ctrl Key in Word Allows You to Master the Paragraph

Slow Tech News Cycle = A Tech Tip!

In order to create professional looking documents, you need to understand the formatting tools. All of these great Microsoft Word formatting tools are a mouse-click away – on the Ribbon. For instance, you can format blocks of neat paragraph with the Paragraph group on the Home tab. But we often overlook another important tool that could speed up our work across a multi-page Word document.

The shortcut key.

The time it takes you to remove one hand and reach for the mouse adds up across the day. Keyboard ninjas know the time-saving benefits of shortcut keys. Microsoft Word has lots of them.

Some shortcuts are essential, and then you can tie some of them to muscle memory with a bit of practice each day. Here are a few paragraph-formatting commands you should exercise with because manipulating a paragraph into shape is the basic job on any document.

Use the Ctrl key to call them up.

paragraph-formating-shortcut-key

 

The Paragraph dialog box gives you more fine-tuned controls. But these shortcut keys can be time-savers in their own right.

Are you on solid ground with Microsoft Office shortcut keys? Can you quickly format a paragraph with confidence?  If you can master this tip you will begin to master the formatting of your document.

Turn Your Smartphone Upside Down

Even with today’s advanced batteries, the quest for better battery life rages on. With the bigger screens of modern devices, you might have trouble getting through half a day with your battery.

Developers have come up with all sorts of tricks to squeeze a bit more life out of device batteries. Here is one tip for saving battery life that you may not be aware of.

Image result for iphone upside down

Turn Your Smartphone Upside Down

The secret is that when your iPhone is face down, incoming notifications don’t turn on the screen. This means that when you’re sitting at your desk for hours not looking at your phone anyway, setting it face-down can be a big battery booster. Of course, there are times when you want to glance at notifications, and can certainly keep your phone face-up when that’s the case.

Screens are one of the biggest battery drainers, so you should see an improvement in battery life when practicing this nifty little tip. It does require motion sensing to be turned on in your Settings. Browse to Settings > Privacy > Motion & Fitness and make sure Fitness Tracking is enabled. If it’s turned off, your iPhone will turn the screen on no matter if it’s face-down or not.

Avoiding Email Scams with 10 Easy Tips

Recently I have been asked about a couple of suspicious email messages, which were both of course not legitimate messages but scams in which the sender, a truly bad guy was “phishing” in order to steal money from the receiver.

Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages are so outlandish that they are obvious frauds, others can be a bit more convincing. So how do you tell the difference between a phishing message and a legitimate message? Unfortunately, there is no one single technique that works in every situation, but there are a number of things that you can look for.

1: The message contains a mismatched URL

One of the first things I recommend checking in a suspicious email message is the integrity of any embedded URLs (or website addresses). Often the URL in a phishing message will appear to be perfectly valid. However, if you hover your mouse over the top of the URL, you should see the actual hyperlinked address (at least in Outlook). If the hyperlinked address is different from the address that is displayed, the message is more then likely fraudulent or malicious.

2: URLs contain a misleading domain name

People who launch phishing scams often depend on their victims not knowing how the DNS naming structure for domains works. The last part of a domain name is the very telling. For example, the domain name info.brienposey.com would be a child domain of brienposey.com because brienposey.com appears at the end of the full domain name (on the right-hand side). Conversely, brienposey.com.maliciousdomain.com would clearly not have originated from brienposey.com because the reference to brienposey.com is on the left side of the domain name.

I have seen this trick used countless times by phishing artists as a way of trying to convince victims that a message came from a company like Microsoft or Apple. The phishing artist simply creates a child domain bearing the name Microsoft, Apple, or whatever. The resulting domain name looks something like this: Microsoft.maliciousdomainname.com.

I have found that sadly this often works because most people trust companies like “Microsoft” and “Apple” so when long standing names like this are used people often let their guard down. The lesson here is to never let your guard down when it comes to email messages.

3: The message contains poor spelling and grammar

Whenever a large company sends out a message on behalf of the company as a whole, the message is usually reviewed for spelling, grammar, and legality, among other things. So if a message is filled with poor grammar or spelling mistakes, it probably did not come from a major corporation’s legal department.

4: The message asks for personal information

No matter how official an email message might look, it’s always a bad sign if the message asks for personal information. Your bank does not need you to send it your account number. It already knows what that is. Similarly, a reputable company should never send an email asking for your password, credit card number, or the answer to a security question.

5: The offer seems too good to be true

There is an old saying that if something seems too good to be true, it probably is. That holds especially true for email messages. If you receive a message from someone unknown to you who is making big promises, the message is probably a scam.

6: You didn’t initiate the action

Just yesterday I received an email message informing me I had won the lottery! The only problem is that I have never-ever bought a lottery ticket. If you get a message informing you that you have won a contest you did not enter, you can bet that the message is a scam.

7: You’re asked to send money to cover expenses

One telltale sign of a phishing email is that you will eventually be asked for money. You might not get hit up for cash in the initial message. But sooner or later, phishing artists will likely ask for money to cover expenses, taxes, fees, or something similar. If that happens, you can bet that it’s a scam.

8: The message makes unrealistic threats

Although most of the phishing scams try to trick people into giving up cash or sensitive information by promising instant riches, some phishing artists use intimidation to scare victims into giving up information. If a message makes unrealistic threats, it’s probably a scam. Let me give you an example.

Just recently a workmate received an official looking email that was allegedly from a co-worker. The email went on to ask for our “account number” and “routing number”. Although it appeared to be an email from one staffer to another staffer the email originated from a hidden domain and as I mentioned in Tip #3 the spelling and grammar was poor.

Also – As I mentioned in Tip #4 – legitimate companies will not ask for sensitive information by email and you – of course should never-ever send this type of information via email.

9: The message appears to be from a government agency

Phishing artists who want to use intimidation don’t always pose as a bank. Sometimes they will send messages claiming to have come from a law enforcement agency like the IRS, the FBI, or just about any other entity that might scare the average law-abiding citizen.

I can’t tell you how government agencies work outside the United States. But here, government agencies do not normally use email as an initial point of contact. That isn’t to say that law enforcement and other government agencies don’t use email. However, law enforcement agencies follow certain protocols. They do not engage in email-based extortion.

10: Something just doesn’t look right

In Las Vegas, casino security teams are taught to look for anything that JDLRjust doesn’t look right, as they call it. The idea is that if something looks off, there’s probably a good reason why. This same principle also applies to email messages. If you receive a message that seems suspicious, it is usually in your best interest to avoid acting on the message.

1 2 3 6