Data Network Search Results

How To: Validate data & look up values in Microsoft Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 5th installment in their series of digital spreadsheet magic tricks, you'll learn how to name a cell range, use data validation to add a drop-down list, and how to use the VLOOKUP function to look up values.

How To: Extract a unique list from a huge data set in MS Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 581st installment in their series of digital spreadsheet magic tricks, you'll learn how to use the advanced filter tool with criteria to extract a unique list of employees for each department from a huge data set with transactional records.

How To: Check if a cell is empty using macros in Excel

Microsoft Excel is used to store and work on data by storing them in rows and columns in tables. You can use a macros to check if a cell is empty. To do this you have to know two short cuts. The first is the VBA Window short cut which is Alt + F11 and the other one is View Macros short cut which is Alt + F8. So open an Excel spread sheet and insert some data into a small table. Now create a macro for this tutorial. You can use and IsEmpty() functions to check if a cell is empty. Use this func...

How To: Format the X and Y axes in Excel

This video is about formatting the charts in Excel especially the x and y axes. The video begins by selecting a chart and right clicking the dates at the bottom of the data points. The format axis window pops up and by making changes to the style, color and the weight of lines given in the patterns tab, you can change the way the x-axis looks like. You can also change appearance of characters appearing close to the x-axis by selecting options in the font menu. You can also change the format o...

How To: Install Ubuntu in a RAID 0 array

RAID, or Redundant Array of Independent Disks, lets you divide and replicate data among multiple hard disk drives for information storage security. This video tutorial demonstrates how to install Ubuntu in a RAID 0 array. Before starting, you'll need at least 2 hard drives and an Ubuntu alternate installation CD. RAID 0, or striped disks, let's you install an operating system, such as Ubuntu, on a partition, while using others for data storage, as illustrated in this instructional segment.

How To: Create data in a chart to graph in MS Word 2007

In this video the instructor shows how to create charts and graphs in Microsoft Word. First, open the Word document and select an area to insert the charts. Now go to the Insert tab in the ribbon and select the Chart icon. The Insert Chart window opens up with various chart templates. There are various categories of charts like Line, Pie, Bar in the left hand side. In the right hand side you can see the sample charts available and you can select any of them that you want. Now it transfers you...

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Automatically Delete Your Google History on a Schedule

Your Google history is mostly a binary choice — either you enable it fully, taking advantage of all its features while letting Google record your activity, or you disable it, staying incognito but also missing out on some fun stuff. But now, Google will let you auto-delete your history, allowing you to utilize all the perks that come with recording your history while maintaining some level of privacy.

News: Google Fi Finally Added Support for RCS Messaging

Despite being at the helms of the RCS push, Google Fi has yet to support the new messaging protocol. It would've made too much sense if the Google-created MVNO was one of the first to support the feature Google's been pushing on other OEMs and carriers for years, but alas, they haven't. Well, better late than never — Google has finally announced support for RCS Universal Profile on Fi.

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, but a hacker can surgically disable a webcam or other Wi-Fi connected device without disturbing the rest of the network.

Facebook 101: How to View, Delete & Disable Location History Data That's Been Collected on You

Facebook's shadiness when it comes to user privacy has never been much of a secret. The Cambridge Analytica scandal, however, has thrown the company and its practices into the limelight, with users taking their data more seriously than ever. If you're one of those users, you might want to check your "Location History" to see if and how Facebook's kept tabs on your whereabouts.

How To: Make an Anonymous Facebook Profile to Keep Your Personal Data Private

Between the Cambridge Analytica scandal and the revelation that Facebook logs your calls and text history on Android, many are considering joining the #DeleteFacebook movement. But it can be difficult to leave the site, because so much of its content is only available to active users. If you want to keep in the loop without sacrificing your privacy, you'll want to follow the steps below.

How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on — users!