Input Data Search Results

How To: Extract a unique list from a huge data set in MS Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 581st installment in their series of digital spreadsheet magic tricks, you'll learn how to use the advanced filter tool with criteria to extract a unique list of employees for each department from a huge data set with transactional records.

How To: Check if a cell is empty using macros in Excel

Microsoft Excel is used to store and work on data by storing them in rows and columns in tables. You can use a macros to check if a cell is empty. To do this you have to know two short cuts. The first is the VBA Window short cut which is Alt + F11 and the other one is View Macros short cut which is Alt + F8. So open an Excel spread sheet and insert some data into a small table. Now create a macro for this tutorial. You can use and IsEmpty() functions to check if a cell is empty. Use this func...

How To: Format the X and Y axes in Excel

This video is about formatting the charts in Excel especially the x and y axes. The video begins by selecting a chart and right clicking the dates at the bottom of the data points. The format axis window pops up and by making changes to the style, color and the weight of lines given in the patterns tab, you can change the way the x-axis looks like. You can also change appearance of characters appearing close to the x-axis by selecting options in the font menu. You can also change the format o...

How To: Install Ubuntu in a RAID 0 array

RAID, or Redundant Array of Independent Disks, lets you divide and replicate data among multiple hard disk drives for information storage security. This video tutorial demonstrates how to install Ubuntu in a RAID 0 array. Before starting, you'll need at least 2 hard drives and an Ubuntu alternate installation CD. RAID 0, or striped disks, let's you install an operating system, such as Ubuntu, on a partition, while using others for data storage, as illustrated in this instructional segment.

How To: Delete temporary internet files in Internet Explorer 8

In this Computers and Programming video tutorial you will learn how to delete temporary internet files in Internet Explorer 8. The video is from FreeComputerRepair. Click on Start -> control panel ->network and internet connections -> internet options. Now the internet properties dialog box opens up. Here you go down to browsing history and click ‘Delete’ button. This will open up the Delete Browsing History window. Here you check all the data that you want to delete. If you don’t want to del...

How To: Create data in a chart to graph in MS Word 2007

In this video the instructor shows how to create charts and graphs in Microsoft Word. First, open the Word document and select an area to insert the charts. Now go to the Insert tab in the ribbon and select the Chart icon. The Insert Chart window opens up with various chart templates. There are various categories of charts like Line, Pie, Bar in the left hand side. In the right hand side you can see the sample charts available and you can select any of them that you want. Now it transfers you...

How To: Prepare for a clean isntallation of Windows XP

This video demonstrates how to reformat a hard drive and perform a clean installation of Windows XP operating system. The tutor first advises to make a back up of everything, including the drivers and my folders. He explains various methods by which one can take the backup of the data in a system. Now he shows how to format the C drive where you can now install Windows. He also shows software that is used to take the backup of important data before formatting. This video shows how to reformat...

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: You Can Block Any App from Using Up Your iPhone's Precious Mobile Data by Doing This

If you have a limited mobile data plan on your iPhone, you know how tricky it can be to stay within your given allotment. Large app installs and updates, 4K resolution videos, and photo backups can waste precious data resources in no time. And apps like Apple News, Facebook, Mail, and Netflix eat data like it's candy. But you can nip the problem in the bud by restricting data hogs from your cellular network.

How To: Learn How to Play the Market with This Data-Driven Trading Bundle

If you're reading this, you're likely a tech-savvy coding pro whose analytical talents are mostly applied to designing apps, cracking passwords, and infiltrating networks — all of which are admirable activities for both aspiring and seasoned white hat hackers. But there are other profitable ways that you can put these types of skills to use, namely in the world of investment and trading.

How To: Get ALL of Your Data onto Your New Android Phone

Setting up a new Android phone can be a pain. Although Google has some automated features, it does not restore everything. When it comes to transferring certain types of data like files and SMS logs, it's even trickier. By following our steps, you can be sure that you all your data will follow you to your new device.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

Kodi 101: How to Get Free Live TV Legally

When most people first become aware of Kodi (formerly known as XBMC), they hear about its ability to stream illegal content. But the real Kodi community knows that it's much more than just a haven for pirated material — it's an all-in-one media player that addresses the majority of home theater needs, particularly for those that decided to cut the cord.

How To: Wardrive on an Android Phone to Map Vulnerable Networks

Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.

How To: Security-Oriented C Tutorial 0x21 - Linked Lists

Welcome to the final tutorial of the series on standard C. This article will cover the linked list abstract data type (ADT). There will be a lot of abstraction to try to deliver the understanding in the most basic way for easiest interpretation of what they are and how they work, then we will get into the guts of it and learn the technical code underneath. For those who have yet to grasp the concept of pointers, it's advisable that you do that first before approaching this. Having learned thi...

How To: Lock Your Files & Create Password-Protected Folders in Windows 7/8

Technology has progressed by leaps and bounds and has blessed people in a number of ways, but at the same time, it has troubled them also. Computers are now used in every aspect of life. No matter if you are a businessman, an employee, a student, or even a housewife, a computer can assist you in your routine work. You save your personal information, documents, and other similar sensitive stuff on your computer that can hurt you if they get compromised.