Thursday, November 6, 2025
Home Blog Page 341

SSH Public Key Usage

0

The following describes the creation and distribution of SSH public keys for ease of access to remote machines.

How to Create a Basic MySQL Table

Creating tables in databases is an important first step for storing data. The CREATE TABLE statement is rich and sometimes confusing. This tech-recipe with an example describes the basics of creating a table in MySQL.

Protect Against Unauthorized Switches

0

The following recipe contains one method to protect against the addition of unauthorized switches to a Cisco Catalyst. This refers to the 6500 series, but it may be available on other platforms as well.

Skype: Prevent unknown contacts from calling

By default Skype allows anyone to call you. This may lead to receiving unwanted or even abusive calls from unknown users. If you use Skype mostly for personal purpose, you may want to let only contacts in your list call you. This tutorial will show you how.

Configure a Cisco VWIC Card

0

Cisco VWIC cards need configuration before their serial ports will appear in the interface list. Once the VWIC is configured, HDLC, frame relay, or ATM with an AIM processor can be configured.

Word: Learn How to Use the Proofreading Functions

Word comes with a “red pen” to make proofreading more efficient.

XP: Stop Modem Connections from Automatically Disconnecting

XP will automatically disconnect your modem connections if your connection has been idle for a while. The following recipe describes how to disable this.

Word: Counting Characters, Lines, Pages, and Words Within a Document

Often one must know how many lines or words are within a document. Here’s the easy way to find out.

XP: General Page File Tweaks For Improving Your System Speed

The following contains general hints regarding how to optimize your virtual memory in XP.

Delete an Entry from Safari Auto-Complete

Like most modern browsers, Safari will attempt to autocomplete the web page address as you type. However, accidentally entering an errant address and led to annoying results. By removing or deleting this troublesome entry from Safari’s history, you can return your auto-complete to normal.

Office 2010: Add, remove or modify a trusted location

Office programs like Word, Excel or PowerPoint all have a Trusted Location. Documents in this location will be opened without being checked by the Trust Center; and therefore, they will be opened without Protected View. If you want to get rid of the annoying Protected View mode, just follow these steps.

Determine the TiVo Software Version

Many of the cool things you can do with your TiVo depend on what software version is running. This simple recipe lets you determine the version.

Stay Connected

16,985FansLike
2,458FollowersFollow
61,453SubscribersSubscribe

Latest Articles

Latest Reviews

Latest Comments

error: Content is protected !!