In VBA, it is mandatory to understand the loops. A loop allows you to conduct the same activity for many cells or objects in excel. VBA For Each Loop can loop through all the set collections of objects or items. For example, a group means “All the opened workbooks,” “All the worksheets in a workbook,” and “All the collection of shapes and charts in the workbook.”
[mai mult...]How to Record a Macro in Excel
A macro is a code written in VBA (Visual Basic for Applications) that allows you to run a chunk of code whenever it is executed. When you record a macro, Excel closely watches the steps you’re taking and notes it down in a language that it understands – which is VBA.
And since Excel is a really good note taker, it creates a very detailed code (as we will see later in this tutorial). Now, when you stop the recording, save the macro, and run it, Excel simply goes back to the VBA code it generated and follows the exact same steps.
[mai mult...]How to Lock Formulas in Excel
You can easily edit a formula through the formula bar or directly in the cell. While this makes it convenient to create formulas in Excel, it comes with a few disadvantages as well. By default, all the cells are locked in Excel. Only when you protect the locked cells can you truly restrict the user from making changes. This also means that if a cell is not locked and you protect it, the user would be able to make changes.
[mai mult...]Getting High CPU usage in Excel – How to Fix?
Excel is the most popular spreadsheet software available in the Microsoft Office package. It is easy to use and it provides many useful features. But recently, Windows users have been complaining that Excel is using too much CPU.
Here’s a list of possible reasons that can provoke Excel to use too much CPU.
- Outdated Microsoft Office application
- Corrupted Excel file
- Interference by third-party applications
- Problematic Add-ins
Now that you have become familiar with the issues behind high CPU usage of Excel, let’s move forward to the solutions to these issues.
[mai mult...]Wireshark ‘no interfaces found’ error explained
When you start up Wireshark to capture network packets, the tool has to go through a series of initialization routines. Towards the end of its startup procedures, Wireshark scans the host computer for network connections. On the initial scan, if the program cannot find any networks attached to the computer on which it is running, it will show the message “No interfaces found.”
The error message appears in the area of the application window where you would expect to see a list of available networks. To capture network traffic packets, you first need to select one of these networks. So, if Wireshark can’t find any networks at all, you can’t progress to the packet capture phase.
[mai mult...]How do I read TLS packets in Wireshark?
Wireshark makes decrypting SSL traffic easy
I really like the way Wireshark handles the SSL decryption process. Cryptography is complicated, and the standards are constantly changing to be more secure. But once Wireshark and your environment are set up properly, all you have to do is change tabs to view decrypted data. It doesn’t get any easier than that.
[mai mult...]How to Decrypt SSL with Wireshark
Using Wireshark, you can look at the traffic flowing across your network and dissect it, getting a peek inside of frames at the raw data. SSL is an encryption protocol that operates on the Transport layer of the OSI model. It uses various encryption methods to secure data as it moves across networks. Note: In this guide, I’ll mostly be referring to SSL as a catchall term for SSL and TLS, its successor.
SSL encryption makes using Wireshark more challenging because it prevents administrators from viewing the data that each relevant packet carries. When Wireshark is set up properly, it can decrypt SSL and restore your ability to view the raw data.
[mai mult...]Restrict access to a website to some IP Addresses using the web.config file
In this post we’ll deal with one of the most undervalued and semi-unknown features of Internet Information Services, better known as IIS, the web server shipped with most Windows client and servers distributions – from Windows 95 to Windows 10 and Windows Server 2019: the IP and Domain Restrictions role service, which allows the system administrator to allow or deny access to the web server, web sites, folders, or files through various rules that can be configured for remote IP addresses or based on the domain name.
[mai mult...]Linux – Resize-Extend a disk partition with unallocated space (CentOS, Ubuntu, VM)
Expanding disk partitions to use all the available (unallocated) disk space is a common issue among Linux Administrators, expecially when working in a VMware-based Cloud environment. This often happens when deploying a Linux VM from an existing template using managed services like Amazon AWS or MS Azure, when we usually end up with disk partitions smaller than the disk space allocated during the VM configuration phase; but it can also happen after the deployment, for example when our VM’s main disk runs out of space – and we want to further expand it by allocating additional space from the vCenter.
[mai mult...]Linux – Set default permissions when creating new Files with SSH/FTP
The problem we want to fix is very similar to the one related to the default group: every time you upload some new files to a folder (such as var/www) that has specific group access (such as www-data) using your favorite SSH or FTP(s) client, those files are created with a default permission set (typically read-only) instead of having the read, write and/or execute permissions like we would like to.
[mai mult...]