Monday, September 5, 2016

How to display or hide sheet tabs and Sheet Tab Bar in Excel?

By default, Microsoft Excel shows sheet tabs at the bottom of the worksheet, which is functioning for navigating between worksheets quickly. Sometimes, the Sheet tabs may disappear by accident in Excel; in contrast, you may want to hide some sheet tabs or the entire Sheet Tab bar for some reasons. There are some useful tips to quickly display or hide sheet tabs and Sheet Tab bar in Excel.
Sheet Tab Bar: One/ multiple sheet tabs:
Display or hide Sheet Tabs Bar with Excel Options
Display or hide Sheet Tabs Bar with VBA code
Display or hide Sheet Tabs Bar with Kutools for Excelgood 3
Display or hide one or multiple sheet tabs with Hide & Unhide feature
Display or hide all sheet tabs except active/selected one with Kutools for Excelgood 3

One click to hide/unhide one or multiple sheet tabs in Excel

Kutools for Excel provides many handy utilities for Excel users to quickly toggle hidden sheet tabs, hide sheet tabs, or display hidden sheet tabs in Excel.
(1) Kutools > Worksheets: One click to toggle all hidden sheet tabs to be visible or invisible in Excel;
(2) Kutools > Show / Hide > Hide Unselected Sheets: One click to hide all sheet tabs except active one (or selected ones) in Excel;
(3) Kutools > Show / Hide > Unhide All Sheets: One click to display all hidden sheet tabs in Excel.

ad hide unhide sheet tabs


Hide one or multiple selected sheet tabs with Hide & Unhide feature
We can apply Excel’s Hide & Unhide feature to hide one or multiple selected sheet tabs easily.

1. Select one or multiple sheet tabs you will hide in the Sheet Tab bar.
Note:
(1) Holding the Shift key, you can select multiple adjacent sheet tabs with clicking the first sheet tab and the last one in the Sheet Tab bar;
(2) Holding the Ctrl key, you can select multiple nonadjacent sheet tabs with clicking each sheet tab in the Sheet Tab bar one by one.

2. Click Home > Format > Hide & Unhide > Hide Sheet. See screenshot:
And then you will see all selected sheet tabs are hidden from the Sheet Tab bar. See screenshot:

Display one hidden sheet tab with Hide & Unhide feature
1. Click Home > Format > Hide & Unhide > Unhide Sheet.
2. In the opening Unhide dialog box, select the sheet tab which you want to display in the Sheet Tab bar, and click the OK button. See screenshot:



Hide all sheet tabs except active/selected one with only one click
Just click Kutools > Show / Hide > Hide Unselected Sheets. And then all sheet tabs are hidden except the active one.

Note: For hiding all sheet tabs except selected ones, please select these sheet tabs you will not hide in the Sheet Tab bar, and then click Kutools > Show / Hide > Hide Unselected Sheets.
Free Download Kutools for Excel Now
Display all hidden sheet tabs with only one click
Just click Kutools > Show / Hide > Unhide All Sheets to batch display all hidden sheet tabs at once. See screenshot:

Free Download Kutools for Excel Now

arrow blue right bubble Display or hide the entire Sheet Tab Bar to display/hide all sheet tabs with Excel Options

We can display or hide the entire Sheet Tab Bar to display/hide all sheet tabs by Excel's Options. Please do as follows:
1. Click the File > Options (or > Excel Options) to open the Excel Options dialog box.
2. In the Excel Options dialog box, please do as follows:
(1) Click the Advanced in left bar;
(2) Check or uncheck the Show sheet tabs option in the Display options for this workbook section;
3. Click the OK button.
All of the worksheet tabs will be displayed or hidden.

arrow blue right bubbleDisplay or hide the entire Sheet Tab Bar to display/hide all sheet tabs with VBA code

The following two simple VBA codes also can help you to hide or show the sheet tabs.
1. Click Developer > Visual Basic, and a new Microsoft Visual Basic for applications window will display, click Insert > Module, and then input the following codes in the module.
VBA code to hide Sheet Tab Bar:
1
2
3
Sub Macro()
ActiveWindow.DisplayWorkbookTabs = False
End Sub
VBA code to show Sheet Tab Bar:
1
2
3
Sub Macro()
ActiveWindow.DisplayWorkbookTabs = True
End Sub
2. Then click Run button to run the code. You will get the result as you want.

Where are my worksheet tabs?

First, see if the option is, in fact, turned off. To do this, click the Microsoft Office button Office button image , and then click Excel Options. In the Advanced category, under Display options for this workbook, look at the Show sheet tabs check box. Is it cleared? If so, select it, and then click OK.

Show sheet tabs check box in Excel Options dialog box

Wednesday, August 3, 2016

Export contacts from Outlook 2013 and 2016



Step 1: Make sure you're using a desktop version of Outlook: 2007, 2010, 2013, or 2016. To verify you're using one of these apps, look at the picture below:
This is what the ribbon looks like in Outlook 2016. Now look at Outlook on your computer:
  • If your Outlook ribbon has a File option in the top left corner, then you're using a desktop version of Outlook and you're in the right place! See one of the procedures below to export your contacts.
When you export your contacts from Outlook, a copy of your contacts is saved to a file. You can then use this file to import your contacts to another application.

Export contacts to a csv file or Excel

  1. In Outlook 2013 or 2016 on a PC, choose File.
    This is what the ribbon looks like in Outlook 2016.
  2. Choose Open & Export > Import/Export.
    Choose Open & Export, and then choose Import/Export.
  3. Choose Export to a file.
    Choose Export to a file.
  4. Choose Comma Separated Values.
  5. THIS STEP IS KEY especially if you're borrowing a friend's computer: In the Select folder to export from box, scroll to the top if needed and select the Contacts folder that's under your account. Choose Next.
    Scroll up and then choose the contacts folder you want to export.
  6. Choose Browse, name your file, and choose OK.
    Assign a name to your contacts file.
  7. Confirm where your new contacts file will be saved on your computer, and choose Next.
  8. Choose Finish to start exporting your contacts immediately. Outlook doesn't display any message when the export process is complete but the Import and Export Progress box goes away.
    A picture of the export progress box.
  9. Locate the new .csv file on your computer and open it with Excel to verify your contacts are there. You'll likely have a lot of empty cells. That's normal.
    An example of what a csv file looks like after contacts are exported from Outlook
  10. Generally we recommend closing the file without saving any changes; otherwise the file might get messed up and you won't be able to use it for importing. If that happens you can always run the export process again and create a new file.
    You can use Excel to update the information in your .csv file. For tips about working with a list of contacts in Excel, see Create or edit .csv files.
  11. If you borrowed a friend's computer with Outlook on it, you can now remove your account from his version of Outlook. Here's how:
    1. In Outlook on the desktop, choose File > Account Settings > Account Settings.
    2. Choose the account you want to delete, and then choose Remove.
    3. Choose Close.
  12. Now that your contacts are copied to a .csv file, you can import them to another computer with Outlook for Windows on it, or import them to another email service. 

Sunday, June 19, 2016

NSEOS30615WBTT - Networking Software Essentials: OS 3 Key Features



















How to Create a Virtual Machine on VMware Workstation

The New Virtual Machine Wizard guides you through the key steps for setting up a new virtual machine on any hypervisor, you set various options and parameters for that virtual Machine. You can then use the virtual machine settings editor (VM > Edit Settings) if you need to make any changes to your virtual machine’s setup like increase RAM, Change Network type (NAT/Bridge/Host only), Increase harddisk etc.
You can details idea about Virtual machine from here
1. Start VMware Workstation from windows client.
Windows hosts: Double-click the VMware Workstation icon on your desktop or use the Start menu (Start > Programs > VMware > VMware Workstation).
  1. Start the New Virtual Machine Wizard.

When you start VMware Workstation,  create a new one from  File > New > Virtual Machine to begin creating your virtual machine.


2. The New Virtual Machine Wizard presents you with a series of screens that you navigate using the Next and Prev buttons at the bottom of each screen. At each screen, follow the instructions, then click Next to proceed to the next screen.

3. Select the method typical/Custom you want to use for configuring your virtual machine. basically used Custom for customized configuration. Otherwise you need to change later

4. Select the method of platform for hardware compatibility

5. Select Installation media/method. If you want to install from CD/DVD then chose “installer disk”. If you want to install from image/ISO then chose “installer Disk Image file (iso)”.
Note: For Windows server 2012 R2 you need select “I will install operating system Later

6. Select Operating system type like Microsoft windows/Linux/Solaris etc from operating system list:

7. Choose a server/machine Name what you want Like If you want to make a Domain controller the you can mentioned name “DC” and select machine store location via browse

8. Select hardware firmware type BIOS/EFI

9. Select Number of Processor, Core etc. from drag menu

10. Set Virtual Machine memory size/ RAM size

11. Choose Network type

12. Select I/O controller type as LSI logic SASS

13. Specify the type of the virtual disk.

14. Specify the  virtual disk as create new. If have existing HDD then choose existing and link that HDD

15. Specify the capacity of the virtual disk.

16. Specify the location of the virtual disk’s files.

17. Click Finish. If need to change then click customize hardware option and set changes

18. Your virtual machine is ready now:


How to Install Zabbix Server 3.0 on linux environment

At first update all package on your system
[root@localhost ~]#yum -y update
[root@localhost ~]#rpm –import http://repo.zabbix.com/RPM-GPG-KEY-ZABBIX

Installing repository configuration package

Install the repository configuration package. This package contains yum configuration files.
[root@localhost ~]# rpm -ivh http://repo.zabbix.com/zabbix/3.0/rhel/7/x86_64/zabbix-release-3.0-1.el7.noarch.rpm
Retrieving http://repo.zabbix.com/zabbix/3.0/rhel/7/x86_64/zabbix-release-3.0-1.el7.noarch.rpm
Preparing…                          ################################# [100%]
Updating / installing…
1:zabbix-release-3.0-1.el7         ################################# [100%]

Installing Zabbix packages

Now Install Zabbix packages. Example for Zabbix server and web frontend with mysql database.
[root@localhost ~]# yum -y install zabbix-server-mysql zabbix-web-mysql mysql mariadb-server httpd php
How to Install Zabbix Server 3.0 on linux environment

Creating initial database

Create zabbix database and user on MySQL. For instructions on doing that,
[root@localhost ~]# systemctl start mariadb
[root@localhost ~]# systemctl enable mariadb
[root@localhost ~]# mysql_secure_installation
In order to log into MariaDB to secure it, we’ll need the current
password for the root user.  If you’ve just installed MariaDB, and
you haven’t set the root password yet, the password will be blank,
so you should just press enter here.
Enter current password for root (enter for none):
OK, successfully used password, moving on…
Setting the root password ensures that nobody can log into the MariaDB
root user without the proper authorisation.
Set root password? [Y/n] Y
New password:
Re-enter new password:
Password updated successfully!
Reloading privilege tables..
… Success!
Remove anonymous users? [Y/n] Y
… Success!
Disallow root login remotely? [Y/n] Y
… Success!
Remove test database and access to it? [Y/n] Y
– Dropping test database…
… Success!
– Removing privileges on test database…
… Success!
Reload privilege tables now? [Y/n] Y
… Success!

Cleaning up…
How to Install Zabbix Server 3.0 on linux environment
All done!  If you’ve completed all of the above steps, your MariaDB
installation should now be secure.
[root@localhost ~]# mysql_secure_installation
MariaDB [(none)]>

MariaDB [(none)]> create database zabbix_db;
Query OK, 1 row affected (0.00 sec)
MariaDB [(none)]> grant all privileges on zabbix_db.* to zabbix@localhost identified by ‘redhat’;
Query OK, 0 rows affected (0.00 sec)
MariaDB [(none)]> flush privileges;
Query OK, 0 rows affected (0.00 sec)
MariaDB [(none)]> exit
[root@localhost ~]# cd /usr/share/doc/zabbix-server-mysql-3.0.2/
[root@localhost zabbix-server-mysql-3.0.2]# gunzip create.sql.gz
[root@localhost zabbix-server-mysql-3.0.2]# mysql -u root -p zabbix_db < create.
sql

Starting Zabbix server process


Edit database configuration in zabbix_server.conf
[root@localhost ~]# vi /etc/zabbix/zabbix_server.conf
DBHost=localhost
DBName=zabbix
DBUser=zabbix
DBPassword=zabbix

Editing PHP configuration for Zabbix frontend

Apache configuration file for Zabbix frontend is located in /etc/httpd/conf.d/zabbix.conf. Some PHP settings are already configured.
php_value max_execution_time 300
php_value memory_limit 128M
php_value post_max_size 16M
php_value upload_max_filesize 2M
php_value max_input_time 300
php_value always_populate_raw_post_data -1
# php_value date.timezone Asia/Dhaka

After changing the configuration file restart the apache web server.
Install Zabbix Server 3.0 on linux
[root@localhost ~]# systemctl start httpd

Finally Start Zabbix server process by
[root@localhost ~]#service zabbix-server start


Now you login your zabbix and install web content with Database.

Sunday, June 5, 2016

How to Show My Computer Icon on Windows 2012, R2 Server

As mentioned earlier, this feature is not included by default. If you can manage the server without  My computer icon on desktop or other personalization options, better continue with it without installing additional features. But if you desperately want my computer icon then follow these steps.missing personalize option
We must install ‘Desktop Experience’ feature to get back personalization options which will help to get My computer back on Windows 2012 R2 server desktop.
Go to ‘Add Roles and Features’ in server dashboard, select ‘Role-based or Feature-based installation’ , do not select anything in Server Roles, and under Features select ‘Desktop Experience’ as mentioned below.
select desktop experience in features
Install other required features too.
You must restart the server after the installation.
restart screen
Even though this feature would have added several options but our concern is to get My computer icon on desktop.
After the restart you must be seeing the ‘Personalize’ from right click menu from desktop (which was not shown in earlier screenshot).
Show My Computer Icon on Windows 2012
Click on Personalize and ‘Change desktop icons’ at top left corner. It will bring back our traditional desktop icons settings like Windows 7 or 8.
Select the icons you want to show, in our case it is My Computer icon.
Show My Computer Icon on Windows 2012
That will show My computer icon on Windows 2012 and R2 server desktop.

Saturday, May 14, 2016

Protection from Ransomware Malware

Ransomware is a type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system's hard drive, which become difficult or impossible to decrypt without paying the ransom for the encryption key, while some may simply lock the system and display messages intended to coax the user into paying. Ransomware typically propagates as a Trojan, whose payload is disguised as a seemingly legitimate file; thus, ransomware is an access-denial type of attack that prevents legitimate users from accessing files.
While initially popular in Russia, the use of ransomware scams has grown internationally;in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012. Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities,and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.

if you think that you are attacked by this virus or your server is attacked please search that highlighting file *.Locky ,_HELP_instructions.html or DDHMTTF.exe  

Please delete that file if you find that .

or if you use the mcafee antivirus please update the antivirus and the update version is 8164.

** This is to alert you that a spam email is currently being spreading globally from some malicious domains ( eg. wdru30918773@gaetanosonline) attached a word document file, notepad, *.zip, *.rar ,*.docm with it and the subject of the emails are like: Invoice, Ref. 54468561or bank statement or picture


So, if you got this type of email. Immediately delete it without opening the attachment file ASAP.

Sunday, May 8, 2016

Basic Switch Configuration

Switches are one of the most numerous devices installed onto the corporate network infrastructure. Configuring them can be fun and challenging. Knowing how switches normally boot and load an operating system is also important.

Switch Boot Sequence

After a Cisco switch is powered on, it goes through the following boot sequence:
Step 1. First, the switch loads a power-on self-test (POST) program stored in ROM. POST checks the CPU subsystem. It tests the CPU, DRAM, and the portion of the flash device that makes up the flash file system.

Step 2. Next, the switch loads the boot loader software. The boot loader is a small program stored in ROM and is run immediately after POST successfully completes.

Step 3. The boot loader performs low-level CPU initialization. It initializes the CPU registers that control where physical memory is mapped, the quantity of memory, and memory speed.

Step 4. The boot loader initializes the flash file system on the system board.

Step 5. Finally, the boot loader locates and loads a default IOS operating system software image into memory and hands control of the switch over to the IOS.

The boot loader finds the Cisco IOS image on the switch using the following process: The switch attempts to automatically boot by using information in the BOOT environment variable. If this variable is not set, the switch attempts to load and execute the first executable file it can by performing a recursive, depth-first search throughout the flash file system. In a depth-first search of a directory, each encountered subdirectory is completely searched before continuing the search in the original directory. On Catalyst 2960 Series switches, the image file is normally contained in a directory that has the same name as the image file (excluding the .bin file extension).
The IOS operating system then initializes the interfaces using the Cisco IOS commands found in the configuration file, startup configuration, which is stored in NVRAM.
In Figure 2-1, the BOOT environment variable is set using the boot system global configuration mode command. Use the show bootvar command (show boot in older IOS versions) to see the current IOS boot file version.
Figure 2-1 Figure 2-1 Configure BOOT Environment Variable

Bangladesh’s banks face up to 300 malwares a day, security investment neglected: Study

Md Mahbubur Rahman Alam, associate professor of Bangladesh Institute of Bank Management (BIBM), said banks face up to 300 malicious software attacks a day, 60 percent of them by the local hackers who he said can be trained as “ethical hackers” for defence.
He presented his study findings at a seminar on cyber defence on Saturday in the wake of the recent Bangladesh Bank cyber heist that led to $101 million being stolen.
The Chief Technical Officer (CTO) Forum Bangladesh organised the seminar, with the support of cyber security solutions FireEye and TVN, an ADN company, to make bank executives and technical professionals aware of the latest in cyber defence.
Global security experts along with Bangladesh officials including central bank executive director Subhankar Saha spoke at the seminar.
Alam said since the central bank’s incident, he has observed a growing interest among bank managements to invest on IT development. They have been pouring money into gap analysis and training.

“But even then eight percent managements are reluctant to invest in IT and 24 percent will wait for the central bank’s directives,” he said.
“They don’t invest in IT, but they blame IT after incidents”.
While seventy percent banks have no separate and independent IT security and risks management division, many banks have installed costly software in an “ineffective way”, the study found.
Prevention is not enough
An estimated Tk 300 billion has been invested in banks’ IT development since 1968 when Agrani Bank first installed a computer.
Each year Tk 10 billion is being invested in the IT processes in the overall banking segment except in the central bank.
But a major portion of the budget goes to buying hardware first, and then software.

Allocation for security, training and audit was “very poor” in the last four years, the study found. Only four percent of the IT budget is being used for security purposes and two percent for training
But cyber attack has become the key threat for any system’s security with the technological advancement.
Subhendu Sahu, head of commercial sales for the Asia Pacific region for FireEye said, about 60 percent organisations come to know from external sources that they have been attacked.
He said with the technological advancement the threat also increases, and the average time to contain a cyber attack has also increased. It took 31 days in 2014, 27 days in 2013.
“It takes an average 164 days just to get to know that your security has been breached,” he said.
“Prevention is not enough. The best prevention solution can be breached. Always keep in mind that you will be breached.”
“And for that there are some preparation,” he suggested.
He said preparing for the breach should be a part of the daily security routine of a company.
“The company should draw up a detailed plan and select those from the board who will deal with the attack when it happens. Each incident is unique.”
“But today is the best time for preparation,” he said, insisting that companies should not wait to be attacked.

“The whole security compliance should be looked at from the attackers’ point of view, not the consumers.”
Five key pillars
According to the security experts, a company must have the capabilities to identify, detect, protect itself from, respond to and recover from cyber security attacks.
The security experts at the seminar said those were the five key pillars. But the BIBM teacher, Alam, lamented that when he asked 25 Chief Technical Officers about those pillars, they replied: “We don’t know”.
“Seventy-four percent IT heads lack ‘adequate knowledge’ of IT security,” he said citing his study that also found that banks had to spend money for many purposes particularly reimbursements, and audit and consulting services, after facing software attacks.
“But banks do not want to spend money on improving the IT security department,” he said, adding that the IT departments are poorly staffed and those who work there are overburdened.
“This is also a risk from the security point of view. They may cause intentional or unintentional security harms”.

“It is very much alarming that 91 percent banks do not have Data leakage prevention (DLP) solution. To protect sensitive data, banks should introduce DLP as soon as possible,” he said.
The DLP solution is a system designed to detect potential data breach and protect data from any type of malicious activity.
Alam suggested setting up of an information sharing and analysis centre – as India did 20 years ago -- so that all financial institutes can be notified if an incident happens at a bank.
“What happened in the Bangladesh Bank, other banks came to know a month later, but by this time, they could face a similar kind of cyber security threat. If they knew, they would be alert.”
He said the central bank can also develop “ethical hackers” like Singapore and Malaysia who will help the other banks know their “vulnerability”.

Thursday, May 5, 2016

Apple updates MacBook with faster processors

The new MacBook is 13.1 mm thin, weighs 2 pounds and has a battery capable of up to 10 hours of wireless web browsing on a single charge.

The device, which starts with a price tag of $1,299, will be available for sale from Wednesday.

USA Immigration DV Visa Lottery for 2017 opened

Those applicants who have qualified are strongly recommended for registering as soon as possible. System delays could occur due to heavy demand in the registration period’s last day.
The US Department of State annually administers the DV Lottery by providing the immigrant visas (green cards) annually to the people from the countries which are having low immigration rates to the US.
There are 50,000 DVs available in the current year. The visas are being distributed between the 6 geographic regions, with maximum number of visas will be going to the regions who has low immigration rates. More than 50,000 immigrants have been send to the US in the last five years.
The natives of Hong Kong SAR, Taiwan, and Macau SAR are eligible to apply for this DV visa. People may qualify to apply if their spouse is born in the eligible country.
The people who are registering should possess high school education or its equivalent,  or they should have two year’s work experience in previous five years of job in an occupation, requiring a minimum of two year training or experience for performing the job.
Overseas national must submit the online form and a digital photo through the official website of the DV Lottery. Per person, only one entry is permitted. Multiple registrations made on behalf of one person is disqualified. This is free of cost application.
All the DV lottery applicants are required to visit the website of E-DV Entrant Status for finding their entry selection. Selected candidates will be notified through Entry Status Check, which will be available from 3rd May 2016 till 30th September 2017. The selected applicants can also apply for PR in the year 2017.

If you are a native of one of the following countries, then you are excluded from entering the DV2017 Green Card Lottery program this year:

Tuesday, May 3, 2016

Linux Samba Configuration

Installing Samba

1.    Use yum to install the Samba package:
        yum -y install samba
Creating Samba Test Directory and Files
For this part of the procedure, you'll use the su - (switch user) command to work as root. Although it’s not best practice to do this regularly, there are times where it's much more practical to work directly as root instead of trying to use sudo to do everything. This is one of those times.
You're going to create a new directory containing three empty files which you'll share using Samba.
2.    While logged on as root, create the new directory /smbdemo with the following command:
       mkdir /smbdemo
3.    Change the permissions on the new directory to 770 with the following command:
       chmod 770 /smbdemo
4.    Navigate to the new directory with the following command:
       cd /smbdemo
5.    Add three empty files to the directory with the following command:
        touch file1 file2 file3
Figure 1: Using touch to create files for the Samba exercise.
Adding the Samba User
You must add users to the Samba database in order for them to have access to their home directory and other Samba shares.
6.    Use the following command to add a new Samba user (the new Samba user must be an existing Linux user or the command will fail):
       smbpasswd -a <username>
        For example, to add the user don, use the command smbpasswd -a don.
Creating the Samba Group
7.    Perform the following steps to create a smbusers group, change ownership of the /smbdemo directory, and add a user to the smbusers group:
        groupadd smbusers
        chown :smbusers /smbdemo
        usermod -G smbusers don
Figure 2: Adding the smbusers group, changing ownership on /smbdemo, and adding a user to the smbusers group.

Configuring Samba

Note: In several of the steps in this exercise, I mention specific line numbers. The line numbers I mention are based on CentOS version 6.5. If you’re running any other version, your line numbers may be different. In that case, just search for the relevant text string.
Samba configuration is done in the file /etc/samba/smb.conf. There are two parts to/etc/samba/smb.conf:
  • Global Settings: This is where you configure the server. You’ll find things like authentication method, listening ports, interfaces, workgroup names, server names, log file settings, and similar parameters.
  • Share Definitions: This is where you configure each of the shares for the users. By default, there’s a printer share already configured.
Configuring smb.conf
8.    In the Global Settings section, at line 74, change the workgroup name to your workgroup name. I’m going to use soundtraining as a means of shamelessly promoting my company during your quest for knowledge. I’m sure you understand.
soundthinking point: Enable Line Numbering in vimYou can enable line numbering in vim with the command :set nu. If you want to turn it off, use :set nu!.
Figure 3: Changing the workgroup in the Samba configuration file.
9.    Now, confirm that the authentication type is set to user by going to the authentication section, still in Global Settings, and line 101. Make sure there is no hash mark at the beginning of the line to enable user security.
Figure 4: Confirming user authentication in the Samba configuration file.
This change allows users on your Red Hat/CentOS server to log in to shares on the Samba server.
10.    Next, add a section for /smbdemo, which you created earlier. You can just add it to the very bottom of /etc/samba/smb.conf with the following lines:
Figure 5: Configuring Samba share definitions.
11.    Be sure to save your changes with a :wq. 
You can use the command testparm to test the configuration. In order for the server to re-read the configuration file and make the changes, you must restart the Samba service with the commands service smb restart and service nmb restart.
When properly configured, you should be able to connect from a computer running the Windows operating system and see both the general share and the user’s home directory:
Figure 6: Viewing Samba shares from a Windows computer.
You can test it by opening the user’s home directory in Windows, adding a file, and then viewing that file on the Linux server.

Troubleshooting Samba

In addition to checking for spelling and typographical errors, check to ensure the Linux firewall is permitting Samba traffic. Similarly, if you're using SELinux on your system, you must explicitly permit Samba traffic, and finally you must enable Network Discovery on the Windows client machine.

MAC Mail Setup

    1. Open Mail. If you haven't added a new account yet, you'll be taken directly to the Add Account prompt. If you're adding an additional account, or this prompt doesn't otherwise load automatically, you'll need to select Add Account from the Mail menu. 
      534_mail_menu
    2. From the Add Account prompt, select Add Other Mail Account... and click Continue.534_opening_menu
    3. Enter your email account information.
      • Full Name: Your name as you would like it to appear.
      • Email Address: Your full email address.
      • Password: The password for your email account. 
        534_dvex_incoming1
      Click the Create button when you're ready.
    4. Mail will attempt to contact the mail server. The default search uses "autodiscover.example.com" -- unless you have this subdomain already created and an SSL Certificate installed, this will not work. However, don't worry! It's totally normal for this to happen, since Media Temple's servers do not have autodiscover settings enabled by default. 
      534_man_config_msg 
      When an autodiscover setting has been unsuccessful, an "Account must be manually configured" message will appear. Click the Next button to complete setup manually.
    5. Next, enter your incoming mail server information.
      • Account Type: We strongly recommend connecting via IMAP. To learn more, please see Using Email: How IMAP works.
      • Mail Server:Use your IP address or mail.yourdomain.com.
      • User Name: Your full email address.
      • Password: The password for your email account.534_dvex_incoming2
    6. Click the Next button to proceed. You will be taken to a second screen to confirm additional details. 
      534_dvex_incoming3_993
      • Path Prefix: Leave this area blank.
      • Port: You will want to connect using the correct port based on the settings you have selected.
        • IMAP: 143, or 993 if you are using SSL.
        • POP: 110, or 995 if you are using SSL.
        TIP:
        Recommended settings:
        • For incoming mail, we recommend using Port 993 with the Use SSL checkbox selected.
      • SSL Checkbox: Check this box if you wish to connect using SSL encryption. Note that you will also need to use an SSL port (above) if you select this option.
      NOTE:
      You may encounter an Unverified SSL Certificate warning if you have chosen to connect with SSL. This is common if you do not have your own SSL Certificate installed. You can add the certificate to your trust settings to avoid seeing this message in the future. The encryption in use IS safe, so you can safely select "Connect" to continue.
      • Authentication: Be sure that Password is selected from the dropdown menu.
    7. Next, we'll configure the Outgoing Mail Server. 
      534_dvex_outgoing1 
      • SMTP Server:Use your IP address or mail.yourdomain.com.
      • User Name: Your full email address.
      • Password: The password you assigned to the email account.
    8. Click the Create button when you're ready.
    9. Your email account has been created, but you'll want to verify a few steps before you get started. Select "Preferences" from the Mail menu, and click on the "Accounts" tab from the Preferences window.
    10. Select your new account from the left hand column. 
    11. Click the "Advanced" tab and uncheck the box to "Automatically detect and maintain account settings."
    12. Navigate back to the "Account Information" tab. This time, select Edit SMTP Server List... from theOutgoing Mail Server (SMTP) drop-down menu. 
      534_smtp_server_list 
    13. You will be taken to the SMTP server list. Click the Advanced tab and verify the following settings:
      • Be sure the box to "Automatically detect and maintain account settings" is not checked!
      • Enter your desired outgoing mail port. Since many ISPs block port 25 (the default outgoing mail port), we strongly suggest using port 587, or port 465 if SSL is enabled.
      • Select "Password" from the Authentication drop-down menu, and make sure the "Allow insecure authentication" box IS checked. If you don't see this option, you may need to update Apple Mail or Yosemite to the newest version.
        534_dv_smtp_advanced 
That's it! You just configured your Media Temple email address on Apple Mail.

how to animate individual cells, rows, or columns in my table in powerpoint

Duplicate the slide that has the table you want to animate. Leave the first instance of the slide untouched. For now, it ...