Posts

How To Use ABS Function In MS Excel

Image
Use of ABS Functions in Microsoft Excel ABS Formula Syntax and usage in MS Excel explanation by ComputerFlicks… The easiest function of Excel, easy to use, and understand. If we need to get the absolute value irrespective of negative or positive, we can use ABS function . As a reference, we can use a number or a cell reference.   Let suppose we have huge data that contains positive and negative values, but our requirement is to get the sum of all values. For example, we have two values +20 and -20 , if we add both values it will be zero, instead of zero we want the sum of both values "40" . In such cases the first step is to use  ABS function and convert all values into absolute values, after getting absolute values, we can add both values and we will get the output "40" . Syntax:   = ABS (number) We place the number of which we want the absolute value. In the place of no we can also select the cell reference in the excel sheet. Imag...

How To Use IF Formula In Excel.

Image
Use of "IF" Formula in easy form. MS Excel – “IF” Formula Explanation By Computer Flicks … In order to understand easily we have divided the if formula in multiply example (Simple to Hard) Definition : IF formula is very popular function among excel formulas, it is a logical function biased on true and false value. We have to create a logic between the values. In logical function we can put two condition, result will display as per true and false defined values. According to logic, value can hit the true or false condition and the result will display accordingly. Simple Example: If  (Cell A:1 is Blank , then print 1, otherwise print 2 ) The above example is for your understanding, the correct syntax is given below. The function is divided in three parts. In the first Part we have to define a logic. if cell A:1 is blank then, the true value will print or reflect  "1"  as output and if A:1 is not blank the...

Short Cut Keys in Microsoft Excel

Image
Microsoft Excel – Short Cut Keys. Some important Excel Short Cut Keys. If you are a daily excel user, you must know some short cut keys to get a good speed over your reporting with excel sheets. In this article we have defined short cut keys depends on your requirement. Some of the short cut keys you must know. Make a habit to use short cut keys to improve your work style with excel. Some of the keys are not limited to Microsoft Excel but you can use it with MS Word and any other application also. We have divided this article into three parts. First is basic short cut keys, second is the text formatting and third is Good to know if you want to learn. The first and second parts are important to learn.   Let's see the table below and start learning.   Image: 1 - Microsoft Excel Short Cut Keys. See the Excel short cut keys above. We have defined only important excel short cut which is important for daily use. Please post a comment or any...

PPTP vs L2TP vs SSTP vs OpenVPN

PPTP PPTP stands for Point To Point Tunneling Protocol, which is also termed as P2TP, is a protocol designed by Microsoft to provide secure communication and it is a very common protocol being used from windows 95. It has some drawbacks like it is no more secure at all now. Although, it is easy to use and set up but vulnerable with lots of weaknesses. The major advantage of this protocol is that it is built-in with the Windows operating system. It has almost been obsoleted. It's better to go for an advanced and secure feature. OpenVPN OpenVPN is more secure than PPTP and also provides more flexibility like it can be mount on any port, so it is difficult for a firewall to block it properly. OpenVPN uses open technologies like OpenSSL encryption library and SSLV3 and TLS v1 protocols. It is most popular and can be more secure if it uses AES encryption rather than a Blowfish encryption technique. It is required to install a third-party software before configuring OpenVPN bec...

what is LDAP Injection?

Image
LDAP Injection " LDAP(Lightweight Directory Access Protocol) Injection is a way to exploit in LDAP databases, which fails to sanitize or validate user's input at the client-side. This Injection is similar to SQL Injection but prior exploitation than SQL injection though uses the same method to exploit with databases and with LDAP directory structure. " LDAP which stands for Lightweight Directory Access Protocol is a protocol used to access the directory on a server in web browser applications to search, connect, and modify data on a server. It is based on TCP/IP, and It works on client-server technology. The LDAP injection is designed to exploit in databases and directories where LDAP fails to sanitize input given by the user to authorize themselves on the client-side. LDAP injection works in a similar way with SQL injection but SQL injection has some advanced features than LDAP injection. Both are used to inject queries into databases. LDAP injection can authoriz...

what is Biclique Attack?

Biclique Attack "Biclique attack is a publicly well known single key(symmetric key) attack on AES (Advanced Encryption Standard) cryptanalysis. Biclique attack is a MITM (Men In The Middle) attack variant. And uses biclique (complete Bipartite graph a mathematical concept) technique to increase or extend the number of rounds to decrypt AES encryption." Biclique is a well known attack which uses MITM(Men In The Middle Attack) technique by extending the overall attempt or rounds power to decrypt AES .The interesting thing is, it uses a mathematical concept called Biclique or complete Bipartite graph to extend the number of MITM attacks to break into AES cryptanalysis. Biclique attack breaks full AES encryption by using full attempts and ensure to provide computational complexity of the attack is 2^126.1, 2^189.7 and 2^254.4 for AES128, AES192 and AES256, respectively. Becauses this attack uses MITM as a base it has also used to break encryptions and hash functions . It h...

what is Men In The Middle Attack?

Image
Men In The Middle Attack "Men in the middle is a security attack, which is based on eavesdropping , being used to get sensitive information transmitting between user and server by means of getting access or entry in the middle with the help of relay/proxy to eavesdrop in sensitive information." MITM(Men In The Middle) is a very common attack, which is also termed as Meet In The Middle attack is a kind of eavesdropping attack to listen or gain access on private conversation or data being transferred between user and the server without user and server consent. Men In The Middle Attack is used to breach AES(Advanced Encryption Standard) algorithm used in encryption. Because AES works on Symmetric key encryption , so if an intruder takes place in between or middle he can sniff key to decrypt the data. How Does it work Men In The Middle attack works in a very simple manner, a hacker or an intruder gain access in between a private conversation or data transferring sessio...