Archive
Why is my Microsoft Excel 2013 not having power pivot add inn? I recently need to do some large data analysis using Microsoft excel power pivot, but when I check to enable the add inn, I was unable to find the add inn in the excel COM add inn. my friend that has the same excel 2013 on his laptop has power pivot add inn.
Read moreBackoff is the name of the malware that had hit retail chains like Target in the holiday season last year. Recent reports suggest the virus is back in action. What is the mode of operation of this software? How does it manifest itself in its victims? Is there a way this virus can be detected?
Read moreWhat are the different kinds of Virtual Private Networks (VPN) commonly in use? What is the difference between an intranet VPn and an extranet VPN? With reference to the protocol used, what is the Shiva Password Authentication protocol (SPAP)? Why is not desirable in terms of network Security?Explain EAP authentication method.When is it used? |
Read more
Comcast has been recently in the news post allegations from two California residents that the company has used their home router to create public Wi FI spots. Is there some truth to such allegations? Can my service provider use my router without my permission? What are the implications of such an action on me? |
Read more
Twitter and Facebook have fallen victims to Denial of service (DOS) attacks already and so has the White House official website. What can I do to protect my website against a DOS attack? What is a distributed Denial of service (DDoS) attack? How is it different from a DOS attack? What effect can it have on my website? |
Read more
What is the prospect of using biometrics (say iris scan) for increasing the security of enterprises? How does the cost of setting up such complex software measure up against the cost of administrative tasks incurred when people forget their password? Is it possible to breach this method of identification e.g. can iris scans be duplicated? |
Read more
Mobile devices are being considered a threat to enterprise security due to the ir increased usage in business. How can we turn around this situation and use phones to increase security instead? Can a phone’s advanced features like camera, GPS etc be used to determine the legitimacy of user login? Is there some data available on this topic? |
Read more
Password protection is no longer being considered safe by advanced enterprises as they pose a very easy target for hackers. In this context what would be some other methods to increase security? What is the two factor authentication and why is it being considered as a safer alternative? Is it a holistic solution for security? |
Read more
The Word 2010 has multiple views associated with it. How can I change between the different views available? Which one, can I choose to work on a long document which has different section in it? What are the other views for? In which circumstances can I use the other views available? |
Read more
The Word Spell Check option is not working in certain parts of my document. Could you help me to identify what could be wrong? Is it possible to tell the Spell Check to Not check certain parts of the document? How can I get Word to overlook parts of the document during a Spell Check? |
Read more