You can easily edit a formula through the formula bar or directly in the cell. While this makes it convenient to create formulas in Excel, it comes with a few disadvantages as well. By default, all the cells are locked in Excel. Only when you protect the locked cells can you truly restrict the user from making changes. This also means that if a cell is not locked and you protect it, the user would be able to make changes.
[mai mult...]Getting High CPU usage in Excel – How to Fix?
Excel is the most popular spreadsheet software available in the Microsoft Office package. It is easy to use and it provides many useful features. But recently, Windows users have been complaining that Excel is using too much CPU.
Here’s a list of possible reasons that can provoke Excel to use too much CPU.
- Outdated Microsoft Office application
- Corrupted Excel file
- Interference by third-party applications
- Problematic Add-ins
Now that you have become familiar with the issues behind high CPU usage of Excel, let’s move forward to the solutions to these issues.
[mai mult...]Wireshark ‘no interfaces found’ error explained
When you start up Wireshark to capture network packets, the tool has to go through a series of initialization routines. Towards the end of its startup procedures, Wireshark scans the host computer for network connections. On the initial scan, if the program cannot find any networks attached to the computer on which it is running, it will show the message “No interfaces found.”
The error message appears in the area of the application window where you would expect to see a list of available networks. To capture network traffic packets, you first need to select one of these networks. So, if Wireshark can’t find any networks at all, you can’t progress to the packet capture phase.
[mai mult...]How do I read TLS packets in Wireshark?
Wireshark makes decrypting SSL traffic easy
I really like the way Wireshark handles the SSL decryption process. Cryptography is complicated, and the standards are constantly changing to be more secure. But once Wireshark and your environment are set up properly, all you have to do is change tabs to view decrypted data. It doesn’t get any easier than that.
[mai mult...]How to Decrypt SSL with Wireshark
Using Wireshark, you can look at the traffic flowing across your network and dissect it, getting a peek inside of frames at the raw data. SSL is an encryption protocol that operates on the Transport layer of the OSI model. It uses various encryption methods to secure data as it moves across networks. Note: In this guide, I’ll mostly be referring to SSL as a catchall term for SSL and TLS, its successor.
SSL encryption makes using Wireshark more challenging because it prevents administrators from viewing the data that each relevant packet carries. When Wireshark is set up properly, it can decrypt SSL and restore your ability to view the raw data.
[mai mult...]Restrict access to a website to some IP Addresses using the web.config file
In this post we’ll deal with one of the most undervalued and semi-unknown features of Internet Information Services, better known as IIS, the web server shipped with most Windows client and servers distributions – from Windows 95 to Windows 10 and Windows Server 2019: the IP and Domain Restrictions role service, which allows the system administrator to allow or deny access to the web server, web sites, folders, or files through various rules that can be configured for remote IP addresses or based on the domain name.
[mai mult...]Linux – Resize-Extend a disk partition with unallocated space (CentOS, Ubuntu, VM)
Expanding disk partitions to use all the available (unallocated) disk space is a common issue among Linux Administrators, expecially when working in a VMware-based Cloud environment. This often happens when deploying a Linux VM from an existing template using managed services like Amazon AWS or MS Azure, when we usually end up with disk partitions smaller than the disk space allocated during the VM configuration phase; but it can also happen after the deployment, for example when our VM’s main disk runs out of space – and we want to further expand it by allocating additional space from the vCenter.
[mai mult...]Linux – Set default permissions when creating new Files with SSH/FTP
The problem we want to fix is very similar to the one related to the default group: every time you upload some new files to a folder (such as var/www) that has specific group access (such as www-data) using your favorite SSH or FTP(s) client, those files are created with a default permission set (typically read-only) instead of having the read, write and/or execute permissions like we would like to.
[mai mult...]How to map network drive from command line
We can map a network drive from windows command line using the command net use. Syntax is given below.
[mai mult...]Get cdrom dvdrom information
We can find the details like serial number, manufacturer and other details about a cdrom or dvd drive from windows command line. We can use ‘wmic cdrom‘ command for this. We can use the below command to get the information about cdrom or dvdrom.
[mai mult...]