Saturday, December 27, 2025
Home Blog Page 349

IE8 and IE9: Shortcut for Always Opening in InPrivate Mode

By adding a simple command line switch to a shortcut, you can easily open Internet Explorer directly in the protective InPrivate mode without having to launch it from a non-private window. These directions will work for all modern versions of Internet Explorer including IE8 and IE9.

How Do I Change Text Size in IE?

With screens becoming larger and larger, many users have been asking us how to adjust the text size in Internet Explorer. Using these steps you can change the size of your text for easier viewing. These directions work for all versions of Internet Explorer including IE9. The zoom function is also described.

Change Title Text in IE7, IE8, or IE9

Often Internet Explorer will be tagged with extra text after the page title. AOL and other ISPs often add a indentifying message. This explains how to remove this text or add new text. This works with all current versions of IE.

How do I export IE9’s ActiveX filtering exceptions?

The ActiveX Filter feature in Internet Explorer 9 lets users browse the web without ActiveX controls for increased safety. However, most users will create exceptions in order to enjoy sites that require ActiveX features such as Facebook, YouTube, and Twitter. For users with more than one computer, it is very efficient to transfer these same ActiveX filter exceptions to all machines. Here are the steps to export these settings.

Configure ATM on a Cisco Router

0

ATM is growing in popularity as a wide-area network (WAN) medium. ATM offers small cell size and strict quality of service, allowing voice, video, and data to coexist.

IE 9: Use Ctrl + Tab to switch between tabs in recent order

Internet Explorer 9 lets users use the Ctrl + Tab combination on the keyboard to switch between tabs quickly. However, this feature will only let you switch tabs in a fixed position order. Many users may want to use the combination to switch tabs in the recent order, which is the way Alt + Tab acts. Fortunately, we can change this behavior easily.

Rsync over SSH

0

The combination of rsync and ssh is a very efficient and secure method of moving and backing up data.

SSH Public Key Usage

0

The following describes the creation and distribution of SSH public keys for ease of access to remote machines.

How to Create a Basic MySQL Table

Creating tables in databases is an important first step for storing data. The CREATE TABLE statement is rich and sometimes confusing. This tech-recipe with an example describes the basics of creating a table in MySQL.

Protect Against Unauthorized Switches

0

The following recipe contains one method to protect against the addition of unauthorized switches to a Cisco Catalyst. This refers to the 6500 series, but it may be available on other platforms as well.

Skype: Prevent unknown contacts from calling

By default Skype allows anyone to call you. This may lead to receiving unwanted or even abusive calls from unknown users. If you use Skype mostly for personal purpose, you may want to let only contacts in your list call you. This tutorial will show you how.

Configure a Cisco VWIC Card

0

Cisco VWIC cards need configuration before their serial ports will appear in the interface list. Once the VWIC is configured, HDLC, frame relay, or ATM with an AIM processor can be configured.

Latest Articles

Latest Reviews

Latest Comments

error: Content is protected !!