list

Thu
14
Dec
Dennis Faas's picture

'Ie Cache List Lite', and 'Why Reboot'

Ie Cache List Lite IECacheList Lite displays the contents of Internet Explorer's index.dat files, including 'lost' and hidden content. http://exodusdev.com/ Why Reboot WhyReboot is a small (~60KB) Windows application that displays a list of pending ... file operations that will occur after rebooting your computer. http://exodusdev.com/ (view more)

Fri
25
Aug
Dennis Faas's picture

A Night at the Movies: Best Film Sites on the Internet

Who doesn't love watching movies? And of course, there's the thrill of the big theater experience: a giant screen, a large tub of popcorn, and the excited hustle and bustle of hundreds of other people. And then there's the relaxation and comfort of ... staying at home and cozily spreading out on your living room couch with a DVD, a bag of grapes, and a mug of beer. Whichever option you choose, there's something undeniably magical about sitting back with a good flick and getting swept up in another world. Whether you're a diehard film buff or just a casual moviegoer, the following websites are ... (view more)

Tue
22
Aug
Dennis Faas's picture

Printing Comments: MS Word

You can print the markup balloons as they appear in a document by selecting the 'Document Showing Markup' option from the 'Print What' list via the Print dialog box. You can also print the Reviewing Pane without the document text by selecting the ... 'List Of Markup' option from the Print What list. Markup balloons printed with the document appear in the margin designated on the 'Track Changes' page in the Options dialog box. Whether you print comments with the document or just the Reviewing Pane, the number of the pages on which the comment mark appears is included with the comment text, as well ... (view more)

Thu
17
Aug
Dennis Faas's picture

'Vmware Server', and 'Ultimate List Of Free Windows Software From Microsoft'

Vmware Server Begin enjoying the benefits of server virtualization with the free VMware Server. VMware Server installs on any existing server hardware and partitions a physical server into multiple virtual machines by abstracting processor, memory, ... storage and networking resources, giving you greater hardware utilization and flexibility. Streamline software development and testing and simplify server provisioning as you utilize the ability to "build once, deploy many times." http://www.vmware.com/products/server/ Ultimate List Of Free Windows Software From Microsoft Microsoft has ... (view more)

Mon
17
Apr
Dennis Faas's picture

Sort Lists of Information: MS Word

Although sorting a list in MS Word seems like an obvious, simple task, many users aren't familiar with how to do it. Using the Sort Function, you can sort text, number, or date lists in Word. Here's how you can Sort a List in MS Word: Launch MS ... Word. Paste or create a list (of text, numbers, or dates). Highlight the entire list using the mouse. From the Table menu on the toolbar, click the Sort option; the Sort Text window will appear. Under the Sort By Field, make sure that Paragraphs is selected. Beside the type field, use the drop down arrow to select the type of data you want to sort. For ... (view more)

Wed
08
Mar
Dennis Faas's picture

'Lost Goggles', and 'List Mixer'

Lost Goggles A real Google-enhancer. See page preview thumbnails on your Google results. "Open in New Window" button - lets you do just that. Not a Toolbar, saves screen real estate. Get accurate site access statistics. Retrieve older versions of a ... web site. Find more related web sites. For Internet Explorer only. http://www.lostgoggles.com/ List Mixer Throwaway your Bookmarks! ListMixer is an easy way to track web pages that momentarily hold your interest. It's handy for tracking blog comments or for pooling timely web pages among friends. No account is required. Really! http://listmixer.com/ (view more)

Thu
02
Mar
Dennis Faas's picture

Request Read Receipts for Specific Outgoing Emails: MS Outlook

Do you have a list of important people in MS Outlook? Do you need to a way to automatically request a "Read Receipt" for these people (but not everyone you email)? In that case, you can set up a specialized "After Sending" Mail Rule: Click Tools | ... Rules and Alerts, and select New Rule; this will start the Open Rules Wizard. Select the option to 'Start from a Blank Rule' (near the top of the Window); also choose the 'check messages after sending' option. Click next. In the Conditions window Step #1, checkmark "sent to people or distribution list". In Step #2, click the link to "sent to people ... (view more)

Tue
21
Feb
Dennis Faas's picture

Access Frequently Used Documents in a Jiffy: MS Word

If you have a few documents that you work on regularly, you can add the "Work Menu" to your Menu Bar. The Work Menu allows you to save a reference to your most frequently used documents for quick retrieval. Launch MS Word. From the Tools menu, ... choose Customize; then, click the Commands tab. From the Categories heading, scroll down and select Built-In Menus. From the Commands heading, drag the Work menu to the Menu bar (next to Help near the very top-right of the screen). Close the Customize dialog box. Load a frequently used document into MS Word. To add the document to your Work ... (view more)

Thu
15
Sep
Dennis Faas's picture

'Lcars 24', and 'Data Recovery Freeware List'

Lcars 24 Fast, smooth, powerful, and handsome 32-bit, TrueColor Starfleet-standard GUI with many LCARS games, applications, and utilities, the real thing, programmed from scratch in C, not Visual Basic or Flash. http://lcars24.sourceforge.net/ Data ... Recovery Freeware List Freeware for your data recovery needs. http://www.s2services.com (view more)

Wed
10
Aug
Dennis Faas's picture

Dictionary Attack

A dictionary attack refers to the general technique of trying to guess some secret by running through a list of likely possibilities, often a list of words from a dictionary. It contrasts to a brute force attack in which all possibilities are tried. ... The attack works because users often choose easy-to-guess passwords, even after being exhorted against doing so. Dictionary (and brute force) attacks may be applied in two main situations: in cryptanalysis, in trying to determine the key needed to decrypt a given piece of encrypted data; in computer security, in trying to gain unauthorized access ... (view more)

Pages

Subscribe to RSS - list