Features of MS Excel 2003

MS Excel can be customized in a way that suits a user to achieve his goal. It is extensively used in financial organizations. The features of MS Excel are as follows:

Workbooks: A document in MS Excel is called a workbook. Each workbook contains sixteen worksheets by default. A user can change this number by resetting the default options. Worksheets within workbooks make it easy to bind files of related information. When a user opens a workbook, he can use all the worksheets to perform a task. To create a workbook, a user will have to select the New command from the File menu. To open an existing workbook, a user will have to select the Open option from the File menu. A user can insert a worksheet between two worksheets by choosing the Worksheet option from the Insert menu.

Using keyboard: The following table provides different keyboard shortcuts for selecting a row, column, current cell, worksheet, etc.

To Select Keyboard Shortcuts

Current Cell Enter

Entire Column CTRL+Spacebar

Entire Row hift+Spacebar

Entire Worksheet CTRL+SHIFT+Spacebar

A user can perform various kinds of entries in a cell. He can enter text, number, data, and time in a cell. He can also enter some special characters such as $ % + – / ( ). He can also enter date and time in a cell. He can select different formats for date and time according to his own requirements.

Entering Data in Series: A user can fill a range of cells either with the same value or with the series of values. This can be done using the Autofill handle (small square on the bottom-right corner of the active cell).

Cell References: MS Excel provides three types of cell references: relative, absolute, and mixed. Relative references refer to the cell relative to the given position. Absolute references refer to the specific cell irrespective of the position of the formula. The ‘$’ sign is used to denote an absolute reference. Mixed references are a combination of both relative and absolute references. It has one absolute co-ordinate and one relative co-ordinate. $CI and C$1 are both examples of mixed references.

MS Excel allows fast searching and instant replacing of data. To search or replace the data entered by a user, he can use the Find or Replace command from the Edit menu.

Inserting or Deleting Rows and Columns:

MS Excel provides the facility to insert rows or columns into the existing worksheet. Inserting a row of data shifts the rest of the rows down and removes the last row of the worksheet. Similarly, inserting a column shifts the rest of the columns to the right and deletes the rightmost column. This occurs because the total number of rows and columns remain the same in any case.

MS Excel provides several formatting features that enhance the appearance of the data, which is presented in the worksheets. Some of them are described as follows: MS Excel allows setting up a page before printing. To set up a page, a user will have to open the File menu and click on the Page Setup. The Page Setup dialog box will appear that will allow the user to set the paper size, orientation of the data, scaling of the area, set the left, right, bottom, and top margin, set the header and the footer, etc.

MS Excel provides the autofit selection that adjusts the width of the column according to the widest entry in that column. A user can hide or unhide certain rows or columns. He can also provide the default column standard width.

MS Excel allows a user to align the characters in different ways by using the Alignment tab page of the Format Cells dialog box. The dialog box provides a number of alignment options.

Horizontal Alignment options:

General: The text is left aligned and the numbers are right aligned. This is the default status.

Left: Aligns the contents to the left of the cell.

Center: Aligns the cell contents to the center of the cell.

Right: Aligns the contents to the right of the cell.

Fill: Fills the selected cells with the single character.

Justify: This option is selected with multiple lines of text as it wraps the contents from left to right.

Vertical Alignment options:

Top: Aligns the text at the top of the cell.

Center: Places the text in the center of the cell.

Bottom: Aligns the text on the bottom of the cell.

Justify: Wraps the text from top to bottom.

MS Excel provides a facility of viewing the same worksheet simultaneously in more than one window. This is accomplished by selecting the New Window command in the Windows menu. A user can also create more than one window to arrange the workspace to promptly access the information needed. Using MS Excel, a window can be arranged in different ways by using the Arrange command from the Windows menu.

If a user wants to move between different windows, he can do so by pressing Ctrl+F6 to go to the next window or by pressing Ctrl+Shift+F6 to go to the previous window. He can temporarily hide or unhide windows by choosing the Hide command in Window menu to hide the active window or by choosing the Unhide command in the Window menu to unhide the hidden window.

When a user works on a very large worksheet with row and column headings, the row headings scroll off to the left when he moves towards the right. Similarly, when he moves down to see the data, the column headings scroll up. To overcome this problem, he can split the active window into two, with row or column headings in one window and the data on the other window.

Controls: The controls are the special objects, which enhance user interface and facilitate user input. MS Excel provides several custom controls such as list boxes, check boxes, and dialog boxes, etc. A large number of toolbars are found in the View menu. Users can add a toolbar or a number of toolbars into the working document depending upon the work involved and use different controls in their documents.

Functions and formulas: The built-in formulas are called functions. MS Excel provides analyzing data and manipulating text by using different functions. Users can easily calculate percentage, interest, average, etc. by using built-in functions. This can be done either by typing in the function-based formulas or by using function wizards. Formulas are widely used in simple computing (such as addition, subtraction, multiplication and division) and advanced computing. They provide the power to analyze data extensively.

Auto-calculation: MS Excel spreadsheet allows a user to automatically recalculate the whole worksheet every time a change is made in a single cell. There are basically two kinds of recalculations.

Automatic: In this type of calculation, the change in the value of the cell automatically recalculates the whole worksheet.

Manual: In this type of calculation, the recalculation of the complete worksheet is performed by pressing the F9 key. This option can be selected on the Calculation tab page of the Options dialog box, which is opened by choosing Options from the Tools menu.

Charts: One of the most important features of MS Excel is a chart. MS Excel allows users to view data entered as tables in a graphical form as charts, which helps a user to easily understand, analyze, and compare data. Excel allows its users to create either two-dimensional charts or three-dimensional charts. A user can enhance the chart by adding chart items, such as data labels, a legend, titles, text, and gridlines. He can also do formatting on these items by using colors, alignment, fonts, and other formatting attributes. MS Excel also allows users to view charts along with the data by using embedded charts. These charts are included in the worksheet and can be copied, moved, and resized in the same way as can be done with any other graphical object.

Database: Data are raw facts, information is processed data, and a database is an organized collection of information. Every organization heavily depends upon databases to store, retrieve, and maintain different kinds of data. MS Excel provides all this in the form of its database feature. In MS Excel, database can be created in two ways:

Enter the data in the form of table in the worksheet.

Use the Data Form command

Records can be inserted, deleted, and sorted by using the Data menu.

With the above-described features of MS Excel, users can perform almost all the operations they want in a very efficient and easy way. Its advanced features have made it the first choice for professionals working in a financial organization to perform their lengthy tasks in an easy way and in a quick manner. Therefore, MS Excel has become the most preferred choice for most of the users as well as professionals throughout the world.

CSV vs XML vs JSON – Which is the Best Response Data Format?

Whether you are building a thin client (web application) or thick client (client-server application) at some point you are probably making requests to a web server and need a good data format for responses. As of today, there are three major data formats being used to transmit data from a web server to a client: CSV, XML, and JSON. In order to develop an application with a solid architecture, it’s a good idea to understand the differences between each format and know when to use them. The purpose of this post is to define each data format, lay out the pros and cons for each, and discover which situations work best with each format.

CSV

CSV stands for “comma separated values”. As the name implies, this data format is basically a list of elements separated by commas. Let’s say that your response is sending back a list of people in a particular family. The format would look like this:

Eric,Andrea,Kusco

Pros – This format is the most compact of all three formats. Generally speaking, CSV formats are about half the size of XML and JSON formats. This is the major advantage of CSV because it can help reduce bandwidth

Cons – This format is the least versatile of all three formats. This is because a homemade parser is required to convert the CSV data into a native data structure. As a result, if the data structure changes, there is an associated overhead of having to change or even redesign your parsers. Furthermore, since the program creating the CSV and the program parsing the CSV reside on different machines (remember that we are passing data from one machine to another) then both programs must be updated simultaneously to prevent the receiving program to crash. Otherwise, an outage is required to update both programs individually to prevent incompatibility issues.

Finally, CSV does not really support data hierarchies. What if you wanted to send back attributes for each person in each family? You would then have to design a complex parser that knows which parts of the CSV are referring to elements of a family, and which parts are referring to elements of each person. One way to solve this problem is to use another delimiter like “;” to separate each person’s attribute:

Eric;male;26,Andrea;female;26,Kusco;male;8

The problem with creating customized formats, however, is that you incur an overhead of maintaining an even more complex parser.

XML

XML stands for “extensible markup language”. XML was designed in 1996 and officially became a W3C standard in 1998. It was created to better represent data formats with a hierarchical structure. The format looks like this:

<person> <name><br /> Eric<br /> </name><br /> <age><br /> 26<br /> </age> </person> <person> <name><br /> Andrea<br /> </name><br /> <age><br /> 26<br /> </age> </person> <person> <name><br /> Kusco<br /> </name><br /> <age><br /> 8<br /> </age> </person>

Pros – This data format fully supports hierarchical data structures and is very appropriate when receiving complex data as a response. It is also very human readable. Most browsers have built in XML readers that allow you to inspect XML files. Since XML was the first standard hierarchical data format, most APIs have built in functionality to automatically convert XML data streams into native data structures like objects.

Cons – This data format is about three times as large as CSV. This is because each data element has an associated open and close parameter tag.

JSON

JSON stands for (Javascript Object Notation). It was invented in 2001 and became popularized by Yahoo and Google in 2005 and 2006. It was created as an alternative to XML. Like XML, however, it represents hierarchical data with the use of commas, curly braces and brackets. An example of JSON looks like this:

{“name”:”Eric”,”age”:”26″},

{“name”:”Andrea”,”age”:”26″},

{“name”:”Kusco”,”age”:”8″}

Pros – This data format supports hierarchical data while being smaller in size than XML. As its name implies, it was also created to more easily parse data into native Javascript objects, making it very useful for web applications. JSON is the best of both worlds with respect to CSV and XML. It’s simple and compact like CSV, but supports hierarchical data like XML. Unlike XML, JSON formats are only about twice as large as CSV formats.

Cons – This data format has a little bit less support than XML. Since JSON is relatively newer than XML, fewer APIs exist to automatically convert JSON to native data structures. However, this is rapidly changing because newer APIs and plugins are supporting both XML and JSON.

Conclusion

As a general rule of thumb, JSON is the best data exchange format to date. It’s light weight, compact, and versatile. CSV should only be used if you are sending huge amounts of data and if bandwidth is an issue. Today, XML should not be used as a data exchange format because it’s better suited for document markups.

Advantages of Archiving Old Mails in Outlook

Obviously, as time goes by, this file too keeps increasing in size. The problem is the larger the PST file, the more time Outlook takes in doing various tasks, including downloading and opening up emails. It is therefore very important that you keep the size of the main PST data file fairly small so that it is manageable and Outlook can function smoothly. You could always enable Outlook to AutoArchive or you could manually divide the email messages between several PST files so that the main PST file that you use every day, stays small.

In order to create an archive of old and unwanted messages, go to the main menu in Outlook and select File -> Data Management and click on ‘Add…’ Now proceed to ‘Office Outlook Personal Folders File (.pst)’. Name this folder appropriately. If you are archiving your email messages every six months or so, it may be a good idea to name the file by the period in which you have sent or received those emails. You could choose the archive period depending on how often and how many big emails you receive. Just bear in mind that you need to keep the size of the resulting PST file around one or two GB since anything larger will not prove efficient.

To start moving messages or other items to the newly created folder, you could simply drag and drop entire folders to this new folder. If you have already created an ‘Archive’ folder where you have moved all old mail, you could simply select it, drag and drop it into the new archive file. If you have not sorted your mail or other items in any manner so far and would like to move mail before a certain date to your new archive file, you could follow these steps. Go to the main menu in Outlook and select File -> Archive. In the window that appears, highlight the folder that you want sorted. Specify the date, emails sent prior to which will be moved to the newly created Archive PST file. Use the ‘Browse…’ feature to select this PST file and to carry out the transfer.

You could use the AutoArchive feature of Outlook to reduce the size of your main Outlook PST file. If any of your files, including the main PST file or other archived such files get damaged, you can use Advanced Outlook Repair from DataNumen for quick PST recovery. You can recover very large files and split the output PST files into more manageable files using the PST recovery feature of Advanced Outlook Repair.

You can thus keep Outlook working smoothly and without errors using the Archive feature and with the help of Advanced Outlook Repair.

More information about Advanced Outlook Repair can be found at http://www.datanumen.com/aor/index.htm

The 7 Secret Windows Shortcuts You Never Knew About

What if it only takes you a split of a second to initiate a command from fingers? For years, regular users of the Windows computer have been using their mouse more than these cool shortcuts which could very well save them time and effort.

You can be sure that the seasoned tech experts have been using these secretly. And now, you will be shown the way as well. Hang on! Here they come.

1. Windows logo key + L key

Moving away to pantry for a new cup of coffee? Keep curious eyes out of your work with this quick shortcut – you can lock your windows instantly.

2. Shift key + Delete key

Do you find it troublesome to always empty your Recycle Bin after you take out the trash? Now with this quick shortcut, you can bypass the Recycle Bin and get rid of it instantly. But do note of the downside – you won’t be able to retrieve any accidentally deleted files.

3. Alt key / Windows logo key + Tab key

Too many multiple windows opened? This handy shortcut will allow you to select the right screen easily.

4. Shift key + Ctrl key + N key

Want to create a new folder instantly, without having to do the clicking? Now you can. Hit this 3 key combination, and a new folder will appear with the name ‘New folder’ already highlighted – so you can type in your preferred name.

5. Windows key + M key

Uh oh, did you load too many windows that they are cluttering your screen? Or are you sensing that your boss is coming right behind you? Use this quick shortcut to minimize all of the windows instantly. It’s a great way to save your time, and sometimes, your appraisal at the end of the year.

6. Windows logo key + Left or Right Arrow key

If you are using a two monitors for your desktop, you may prefer some windows to appear on your left, and some others on the right monitor. Hitting this quick shortcut allows your window to move from one monitor to the next one. And if you only have a single monitor, this shortcut will re-position your window to the side of the screen.

7. Windows logo key + (+/- key)

Can’t see that super small font? Or would you like to view your smaller? Press windows key and + key together to zoom in for a magnified view. Or you could hit windows key and – to get a zoom out view.

10 Reasons Why Regular Network Administration and Housekeeping is So Important

Data storage housekeeping is an essential part of the process for keeping systems running smoothly. Below are 10 reasons why regular network administration and housekeeping is so important:

1. Backup administration: it is important for all networks to be properly backed up, but the back up process can be in a compressed for off site and off server so that redundant data does not slow down the day to day operation of network systems.

2. Anti-virus updates: for obvious reasons, anti-virus software has to be updated but the continual updating gradually uses up an inordinate amount of space on hard drives. Removing anti virus software and reinstalling the updated version can free up space on hard drives.

3. Operating system updates: updates that are regularly loaded and then installed use up more space on hard drives than the latest updated version of an operating system. It is advisable for operating systems to be reviewed and renewed so that the debris from past updates can be safely removed to free-up space.

4. Old archive data: many organisations archive work in process that often has no relevance to the finished product especially years later. It is usually the fear that data may one day be required that ensures its continual storage, but if it is not to be destroyed then it should be compressed and stored in a separate offline storage facility that does not affect the day to day running of your network.

5. Data storage: the issue surrounding data storage is full of myths and legends but a reasonable level of data storage is advisable. However, it is easy for data storage to use up so much space that the cost of the storage far outweighs its possible value. Of course, items to do with HM Customs & Revenue need to be securely stored but old projects, long out of date can and should be quietly deleted.

6. Email boxes: many network systems offer a means of distributing mail to individual mail boxes. When individuals leave an organisation, the mail boxes are often forgotten and gradually fill up with mail and a great deal of junk all, of which, uses up precious space on servers.

7. Disused software: regular housekeeping should make note of programs that can slow down a system through background operation and yet are entirely not used or needed. The removal of those programs should be a priority.

8. Anti-virus programs: it has been mentioned above that anti virus programs leave a lot of update debris but it should also be noted that often anti virus programs that are believed to have been uninstalled to allow for a new program, in effect, often still retain a background presence on hard drives and should be removed.

9. Time saving: even with sophisticated computer systems, individuals misname and misfile documents. Once an item has been archived then it will be almost impossible to find if hidden within the wrong folder. Before items are archived, documents should be checked for relevance and filed correctly. It is very easy for an archive to have over one million documents and if an item is misfiled a lot of time is wasted trying to retrieve it.

10. KITS: keep it tidy, Sam and then when you are sick or away on holiday it is possible for another person to find all the information and material you’ve been working on, easily. Individuals, unless coerced, often have their own private files and means of storage for easy personal access. Often, these files are password protected and are therefore inaccessible when the individual is away or sacked from a position. Squirreling of files should be discouraged.

Your Guide to an Efficient Filing System

Your Guide to Filing

An efficient filing system has become critical, but still, more often than not, filing systems are acquired without consideration to WHAT is being stored, WHY it’s being stored, WHERE and HOW it’s being stored. You need to ensure resources are not wasted by replacing your filing system just for replacement sake; it may well be that your current filing system will meet your required criteria by adopting different soft folder and indexing formats.

Many filing organisations will recommend replacing your current system with space efficient filing systems without consideration to the filing process.

Filing Facts

The freedom of Information Act and the Data Protection Act has made a huge impact on the way records are stored.

Certain types of records have to be stored by law for certain periods of time.

The amount of paper and records stored by organisations is increasing every year.

Misplaced or lost records cost many organisations a substantial amount of money through lost time looking for them. Some types of records will also incur an organisation a heavy fine if the record can not be produced on demand.

Clear indexing and identifiable records will speed up the retrieval process for when the file is needed – not when it is too late.

An inefficient filing system will take up more floor space costing the organisation more money through floor space rates.

An efficient filing system will save time, space and money making your organisation run much more effectively, leading to greater success.

Filing Audit

If you want to improve your filing efficiency you need to know the strengths and weaknesses of your current filing system. The questions below are a good list of questions that once answered will outline specific areas that need attention.

The Records

o How are your records stored? (Lever Arch, Foolscap file)

o What is the volume of records in linear meters

o Are there any duplicates or copies? If so what for?

Indexing

o How effective is your indexing?

o What do you like or dislike about your indexing?

o Is misfiling a common occurrence?

File Storage

o How effective is the storage system?

o What do you like or dislike about it?

o What are the present floor space costs?

Record Access

o How frequently are records retrieved from the system?

o How many people use the filing system?

o Do the records need to be secure?

o Are records returned accurately and on time?

Record Tracking

o Are the records needed for filing Audits?

o How do you keep track of your records?

o Does your tracking system work?

Evaluating your system

The answers to the above should enable you to evaluate:

o Records which are not needed could be archived or destroyed

o Records needing consolidation

o Any indexing improvements

o Effectiveness of the system

Creating an efficient filing system

o Avoid complicated indexing methods

o Avoid handwritten indexes

o Before opening a new record make sure its unique.

o When indexing a record think of the first identifying reference that comes to mind

o Be specific with titles, never use general or miscellaneous.

o Allocate a unique reference ID.

o All correspondence in the file should be dated or marked for reference

o Separate archive from live records

Further details on file creation refer to RMS 1.1 Standard written by the National Archives.

Tracking Records

What happens to your records when they are away from the system?

Case studies show that traditional tracking methods have become inefficient and unreliable An electronic system using a bar codes or RFID tags will improve file tracking.

Locating and Controlling Records must be efficient. Record users should be able to file and retrieve records quickly and efficiently.

Tracking records in a filing system should:

o Assist with accurate retrieval of records

o Ensure access of records to staff authorised to do so

o Assist with record retention periods

o Record a complete history of a record’s movement

If a record is removed from the system, the following information should be documented:

o The record’s index details

o Who retrieved the record

o The date the record was retrieved

o A proposed return date and the actual return date

Conventional Filing Methods Vs End Tab Colour Coded Filing Methods

It has been established by the industry that traditional suspended pocket filing is the most inefficient way of storing documentation. The suspended file pocket, by design, is estimated to waste between 15-20% of valuable storage space within the system. Furthermore, suspended file pockets have a tendency to split and as a result cause misfiling/lost files.

File Indexes in a hand-written or text-printed format can be difficult to read enhancing the opportunity for slow retrieval and misfiling.

Using standard folders, filing/retrieval times are slow and misfiling is a common occurrence purely because another folder hides a records index.

Portrait Lever Arch Files are designed with a fixed centre of between 73-78mm, invariably the folder houses less capacity than the file offers wasting valuable shelf storage space, in addition because of its design, fewer storage levels can be achieved in a standard storage system.

By simply employing a colour coded index system these inherent problems can be overcome.

Disposal

Disposing of records is an important part of maintaining control of your records. Before a disposal schedule is put into place you must understand all of your legal and regulatory business requirements.

Legal and regulatory requirements including the Freedom of Information Act 2000, the Data Protection Act 1998 and the Public Records Act 1958 all effect the disposal of records. All have imposed new and more stringent duties on public sector bodies with regards to records disposal.

So what does this mean?

Disposal doesn’t mean destruction. It means any action taken to determine the fate of the record including transfer to an archive system. When it is not possible at any time to determine the disposal of the records they may be scheduled for review at a later date.

Retention usually means the length of time records are kept, sometimes known as disposal schedules. If a disposal schedule is not put into place, the tendency is to store records indefinitely taking up unnecessary space.

Confidential information must be stored securely and disposed of by way of shredding.

For further details on disposal scheduling please refer to Disposal Scheduling (RMS 5.1) Standard written by the National Archives.

Delete Browsing History – How to Clear & Permanently Delete Cookies and Cache From Your Web Browser

It has always been pretty simple to delete your Internet browsing search history. Your favorite browser, whether it is Internet Explorer, Firefox or some other, has long come with the option to delete your Internet, web and browser search history and to clear cookies and memory cache. The trick is your simply knowing what to do.

Now, remember that as in deleting other files, these files are not permanently erased until they are written over, so there are numerous special programs out there to permanently erase your search and Internet history. However, while most users do not know how to erase the history, even fewer know how to retrieve it, so using these built in functions is going to be successful for most computer users.

Most people surfing the web still use Internet Explorer. On the top menu, simply click Tools/Options/Internet Options/General. Then click “delete files”, then click OK. Finally click “clear history”, then click Yes when prompted.

Safari users have it easy. Simply click History on the top menu, and then click Clear History on the bottom of the list that appears. Just in case you did not know, Safari is now freely available for Windows users. It is one of the best browsers when it comes to protecting your search history and enabling private browsing.

If you are a Mozilla FireFox user, you will choose Tools/Options/Privacy/Clear. It is a piece of cake, right?

AOL is just as simple…Settings/Preferences/Toolbars and Sounds/Clear History Trail Now.

Granted, having to choose “toolbars and sounds” does not sound intuitive, but it does bring up an important point. If you have toolbars on your browser, like the Google, Yahoo, or Alexa toolbars, those also keep your search history for future reference…which is actually quite handy when you are trying to find something again and cannot remember what search term was successful.

However, if you are trying to cover your tracks, you do not want that information left there for prying eyes. As an example, click the Down arrow to the right of where you enter your search on the Google toolbar, and you will see your search history right in front of you. Fortunately, you will also see a link that says Clear History. Just click there, and your history is gone from sight.

All toolbars provide this sort of option, as well as an option to not even remember your Internet search history, although you might have to go into your browser and turn off the AutoComplete function.

But, again, if you want to truly make sure your search history is gone forever, you are going to need third-party privacy control software to do it. These programs cannot only clear history, cache and cookies, but they will usually permanently delete them from your computer where they cannot be recovered using undelete or data recovery software. Most programs on the market use government and military level deletion protocols, which wipe the data from your computer for good.

Cryptowall 4.0 Virus – How to Decrypt Your Files

Over the past few years an insidious malware has infected computers around the world in a sophisticated manner that has managed to stay one step ahead of most antivirus platforms. Cryptowall has been used mostly against businesses along with end-user machines to block the information that is stored until a ransom is paid.

This relatively simple method of extortion is led by one of the most complex computer virus or malware programs that have been developed in recent years. Cryptowall is part of a family colloquially called ransomware in which the result profits come from the extortion paid to the hackers by those whose computers have been affected.

Origin & History

Cryptowall 4.0 is the latest variant of the feared Cryptowall malware which has spread around the world attacking various computer systems where it basically prevents access to the information until a ransom is paid. The 3.0 version of the malware has caused at least $325 million of damage in the US alone.

The new 4.0 will actually alter the file names for the now encrypted data so that it becomes virtually impossible to tell what is affecting the program. Add to this that all system restore points are deleted and this new threat is now even more dangerous.

It is believed that Russian hackers are behind the Cryptowall because the malware does not affect computers that use a Russian language. In addition, the spam servers that generate the Cryptowall have been located within the Russian border.

So far, the countries that have been affected by the Cryptowall malware include the following countries;

China

France

Germany

India

Italy

Kuwait

Philippines

South Africa

Spain

United States

Infection Techniques

In essence, the program blocks access to the information stored on computers and servers by encrypting it in a manner that makes it very difficult, if not impossible to remove without the proper encryption key which only the hackers know. Until the ransom is paid to the hackers, the block will stay in place which may cripple the ability of businesses to do their jobs.

In most cases, the hackers select a particular business or corporation that may offer the promise of a great reward and then infect the computer systems. The Cryptowall is quite efficient at sealing up the information that is stored. Because it does not try to destroy, but instead encrypt the information it can slip past most antivirus or antimalware systems.

Our Tips about Removal Methods

There are very few techniques that work against the Cryptowall 4.0 simply because of its sophistication to slip by most antivirus and antimalware programs and ability to encrypt information once inside.

About the only sure prevention method is for companies to continually back up their information and store in on the cloud or other platforms that remain hidden from the hackers. In this manner, instead of trying to retrieve the information from the affected computers, the computers themselves are instead wiped clean and then reloaded with the information that was stored in the backup systems. We recommend you to use Google Drive. It is a free service from Google that allows you to store your files online and access them anywhere on the world using the cloud. Google Drive allows you to use 15 gigabytes (15GB) of free storage space.

Official website: https://www.google.com/intl/com/drive/

About the other possibilities and new antimalware techniques which were created in order to directly combat the new Cryptowall 4.0. you can read on:

Website: http://nabzsoftware.com/types-of-threats/cryptowall-4-0

We hope we could help you.

Comparison of Document Files With Extensions DOCX and PDF

It is significant to know the difference between DOCX and PDF formats especially when you are converting a Word file into PDF. The DOCX file is created using Microsoft Word which is a word processing software released first in 1983 by Microsoft for IBM personal computers. In the earlier versions of MS Word the file extension was DOC and since the 2007 version onwards it is DOCX. Unlike the older version of DOC, DOCX is based on using XML.

PDF stands for Portable Document Format which is a file type created for document exchange by Adobe systems in the 90’s. Unlike the Word document, fonts specified in the PDF format are portable. It means, they move along with the file. The main advantage of PDF over Word is that PDF documents can be read on any PC. All that is required is to install Adobe Reader on your computer. PDF files can be opened using Foxit Reader and, of course, Adobe Acrobat Reader. DOCX files can be viewed with the help of OpenOffice.org. It can also be opened using the MS Word and Microsoft Office Suite.

Microsoft Word is used to create and edit written documents. Actually both DOCX and PDF can accept different types of data including images, graphics, audio and text. However, PDF files display documents as they would look on printer.

MS Word is a paid application while OpenOffice, Foxit Reader and Adobe Reader are open sources that can be downloaded from the respective websites for free.

There are many methods of converting the DOCX file to PDF. The easiest way is via Adobe Acrobat which has a host of different programs made for viewing, manipulating, managing and creating files in PDF format.

How to Resolve Outlook OST File Error "File.ost Can Not Be Accessed"

At a work place MS Exchange server and MS Outlook collaboratively provides an efficient e-communication environment. All the mails and other mailbox data gets stored on the MS Exchange server. A unique profile is created on Exchange Server for every user which can be accessed with MS Outlook client. For each profile an ost file is automatically created on the user’s local system which is exact replica of the users mailbox on the Exchange Server. The OST file facilitates the user to work in offline mode, and gets synchronized with the Exchange Server when the internet connection is restored, to reflect the changes in one another.

Here it is to be considered that.ost file can not be accessed with the MS Outlook. When it get synchronizes with the exchange server it automatically gets converted in.pst file that is directly accessible with outlook. But what happen if in any case you can not connect with the Exchange server.

Consider a practical scenario, where you had left your job but have some of your important personal mails and data in the company’s mailbox. But now you do not have permission to access the MS Exchange Server. In such a case when you open MS Outlook and try to access the.ost file it results into the error message

Unable to open your default e-mail folder.

The file C:Documents and Settings/User Name/Local Settings Application

DataMicrosoftOutlookoutlook.ost cannot be accessed. You must connect to your MS Exchange

Server at least once before you can use your offlline folder file.

In this situation you only have the OST file that contains all your mails and data. The only way to access your desired mails and data is to convert the ost file into pst file using a third party ost pst converter, that converts the Otlook ost file into pst file that is accessible with outlook and can be stored on any disk visible to host system.

Convert OST to PST tools are fabricated to convert the damaged or inaccessible Outlook OST to PST file to make then accessible with Outlook. Such tools are very efficient, easy to use and are able to convert all the contents of the ost file (mails, tasks, notes, attachments, calendar entries, journals etc.) into pst file. Using ost to pst conversion tool individual mails can be stored in EML or MSG format. Convert OST to PST software can convert the password protected or encrypted OST file to PST file. Software supports Windows 7, VISTA, XP, 2003 and outlook 2010, 2007, 2003, 2002, 2000.