Monday, January 26, 2009

I am a big fan of using shortcuts since it helps to streamline computer use. Here is a link to a list of common shortcuts that works on most Microsoft applications (Link). Below is a list of the shortcuts that I use the most.

General keyboard shortcuts
• CTRL+C (Copy)
• CTRL+X (Cut)
• CTRL+V (Paste)
• CTRL+Z (Undo)
• DELETE (Delete)
• SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
• CTRL while dragging an item (Copy the selected item)
• CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
• F2 key (Rename the selected item)
• CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
• CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
• CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
• CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
• CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
• SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
• CTRL+A (Select all)
• F3 key (Search for a file or a folder)
• ALT+ENTER (View the properties for the selected item)
• ALT+F4 (Close the active item, or quit the active program)
• ALT+ENTER (Display the properties of the selected object)
• ALT+SPACEBAR (Open the shortcut menu for the active window)
• CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
• ALT+TAB (Switch between the open items)
• ALT+ESC (Cycle through items in the order that they had been opened)
• F6 key (Cycle through the screen elements in a window or on the desktop)
• F4 key (Display the Address bar list in My Computer or Windows Explorer)
• SHIFT+F10 (Display the shortcut menu for the selected item)
• ALT+SPACEBAR (Display the System menu for the active window)
• CTRL+ESC (Display the Start menu)
• ALT+Underlined letter in a menu name (Display the corresponding menu)
• Underlined letter in a command name on an open menu (Perform the corresponding command)
• F10 key (Activate the menu bar in the active program)
• RIGHT ARROW (Open the next menu to the right, or open a submenu)
• LEFT ARROW (Open the next menu to the left, or close a submenu)
• F5 key (Update the active window)
• BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
• ESC (Cancel the current task)
• SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
• CTRL+SHIFT+ESC (Open Task Manager)

Microsoft natural keyboard shortcuts
• Windows Logo (Display or hide the Start menu)
• Windows Logo+BREAK (Display the System Properties dialog box)
• Windows Logo+D (Display the desktop)
• Windows Logo+M (Minimize all of the windows)
• Windows Logo+SHIFT+M (Restore the minimized windows)
• Windows Logo+E (Open My Computer)
• Windows Logo+F (Search for a file or a folder)
• CTRL+Windows Logo+F (Search for computers)
• Windows Logo+F1 (Display Windows Help)
• Windows Logo+ L (Lock the keyboard)
• Windows Logo+R (Open the Run dialog box)
• Windows Logo+U (Open Utility Manager)

Saturday, January 17, 2009

Is your router secure?

The internet has become a staple in the most homes around the country. It is to the point where you might hear non technical persons talking about setting up their router and so for and actually knowing what they are talking about.

One of the biggest issues with this phenomenon is that the companies that sell the equipment for persons to have high speed internet from home do not provide proper instruction on how to keep them safe from the world in general. in the days of dial-up (hope they never come back) there was a degree of safety provided by the ISP. Now we have wireless and wire routers that provide our access (through a modem) to the internet and the protection is not as good. The biggest danger is with wireless routers since there is virtually no to physically barrier others from its communication.

If wireless routers are not setup correctly then it is possible for others to either hijack your router or the communications that you make through it. A devious person could go down to Radio Shack and buy the equipment to be able to scan your communications and steal personal and confidential information from you. It is also possible for someone to be able to do illegal activities from your internet connection which could get you in a lot of trouble. It is possible for these persons to also be able to access your computers and steal your information which can lead to identity theft and other problems.

I do not write this to scare people away from the internet but to scare them to protect themselves from those people who have no morals or ethics. I have friends and family that have all been affected by some of these scenarios all of which could have been prevented if they knew about some of the features that are available in their equipment. The reality is that it is almost impossible to be completely secure from the outside world. What you want to do is make it difficult enough that these persons either do not see it worth their time to get around all that or let them find someone else that an easier target.

I have compiled a list of suggested configuration changes to make on your home routers. Typically most people install their router, go through the wizard and leave all or most of their configuration setting at the default setting. The danger of this is that if someone is trying hack your router they will try all the default for the most common manufacturers.

  • Change the default IP address on your router.
  • Disable wireless broadcasting (if you are using Windows Vista you will need to change a default setting in your wireless network properties. There is a setting called "Connect even if the network is not broadcasting" and it will need to be check or you will not be able to connect after broadcasting is turned off)
  • Setup encryption, WEP, WPA, RADIUS... Something is better than nothing. Each of these different types have benefits and disadvantages and you should research each to determine which is best for you. None of them are completely secure though paired with some of these other tips they will keep you secure enough to prevent all but the most intent hackers.
  • Use a complex passphrash for your encryption key (other languages, words with nubmbers and characters, putting together a phrase and using parts of that phrase to make the passphrase....)
  • Setup the wireless MAC address filter and only allow MAC addresses that you define in the configuration.
  • Turn on the firewall features. I would think that this would be a no brainer though this is actually an option that you can turn off.
  • Set it up to block anonymous requests.
  • Do not open any ports that are not abosolutely necessary. One of the biggest offenders of this is file sharing programs. I hate these applications, they are the bane of safe systems everywhere and are the breeding ground for virus delivery and computer performance problems. I will leave the legal/illegal debate for others. I recommend never using them because they will eventually cause you more problems than good, and they require you to have ports open at all times that increases your risk to the outside world. Also most of the groups that create these applications make them almost impossible to remove them from the computer without having to modify your registry and other things that could also cause problems if you do not know what you are doing.
  • Never configure your router to have a computer in the DMZ unless it is absolutely necessary.
  • Change the defauly password on the router (e.g. on a linksys router the default login is a blank username and the password of admin).
  • If you need to have the remote management feature turned on for the router change the default port.
  • Last but not least is to make sure that you keep up-to-date on any firmware updates for your router. These can be found by going to the manufacuter's website and searching for your router model number.

I hope that some of these tips will be of use to anyone that reads this and it helps to keep you secure from any morons out there that try to take advantage of others.

Happy Computing!

The power of the [SHIFT] key

For anyone that has ever been frustrated by coputer systems and some applications like MS Access that launch in a mode the runs scripts to lock the environment down there is a secret that administrators and some developers would not like you to know about. There is a way to by pass the execution of these administrative scripts. By holding down the [SHIFT] key while the application is loading you can bypass the execution of these scripts.

Example: I have a computer that is setup to automatically log into a specified user account and run some administrative scripts to lock down the system. If I reboot the computer and start holding down the [SHIFT] key after the initial OS spalsh page appears then instead of the OS automatically logging in via the scripting it will go to the login screen so that I can log in with what ever account I want. Now if there are scripts that are tied to a user account this will not bypass that but it will bypass any scripts that are set to automatically run for that computer.

Another example: I have a MS Access database that is locked down to hide the database window and there is an Autoexec module set to execute at the launching of the application. If I hold down the [SHIFT] key and while holding it down and launch the application then I will bypass all of that and the application will open up to the database window. The only time where this will not work is when the database has been converted to the MDE file format.

I am sure that there are other applications where this feature exists though I have not done a lot of research on it.

--- 1/26/09 ---
I came across another use of the [SHIFT] key. If you want to insert a CD or DVD into your computer without being prompted to select an application to launch it then hold down the [SHIFT] key when inserting the CD or DVD.

Monday, January 12, 2009

SQL 2005 Time Zone Conversion Functions

Recently I published an article about how to create time zone conversion functions for use with MS SQL 2005. The article can be found here.

Updated code can be found here.