Sunday, December 16, 2018

How to install updates for Office apps

How to install updates for Office apps manually on Windows 10

Not sure if you're running the latest version of Office? Here's how to check, install, and verify whether you're using the latest version of Office 365 or Office 2019.

Although if you ask around, anyone will say that if you're using the Office 365 apps, then you're running the most up-to-date version of Office that Microsoft has to offer, you may still be missing out on new features and improvements if your device hasn't received the latest update.
Microsoft updates its Office apps on a regular basis, and even though updates should download and install automatically, it doesn't necessarily mean that you'll receive updates as soon as they become available. Also, if it happens that the automatic update service has been disabled, there's no way for your device to grab those new fixes and improvements.

How to update Office apps on Windows 10

To update the suite of Office apps to the latest version, use these steps:
Note: The interface may look a slightly different depending on the version of Office that you're running, but the steps are the same.
  1. Open an Office app. For example, Word.
  2. Create a new blank document.
  3. Click on File.
  4. Click on Account.
  5. On the right side, click the Update Options menu.
  6. Click the Update Now option.



    7- Continue with the on-screen directions to apply new updates (if applicable).
    Once you've completed the steps, Office will download and install any available update for your apps.

    Enabling updates for Office

    If you don't see the option to update Office, use these steps to enable the service:
      1-   Open an Office app. For example, Word.
      2-   Create a new blank document.
     3-  Click on File.
     4-  Click on Account.
     5-  On the right side, click the Update Options menu.
     6-  Click the Enable updates option.



After completing the steps, use the above steps to check, download, and install updates.

Checking the latest version of Office

To make sure that you're running the latest version of Office, use these steps:
  1. Open an Office app, such as Word.
  2. Create a new blank document.
  3. Click on File.
  4. Click on Account.
  5. On the right side, check the version information under About Word.



if you have an Office 365 Personal or Home subscription, the version number of your installation should match the number in this Office support website to confirm that you're using the latest release.



 

You can use these steps to update apps available through Office 365, Office 2019, 2016, and older versions. The only difference is that updating Office 365 apps will sometimes include new features and significant improvements along with security patches, while updates for the standalone version of Office (2019, 2016, 2013) will only include security and maintenance fixes.

How to take ownership

How to take ownership of files and folders on Windows 10

When you need to modify system files or gain full control over another account's files, use this guide to learn the steps to take ownership of files and folders on Windows 10.





 Windows 10's file system can be used to to assign permissions to specific groups and users to access files and folders on a computer.
When you're signed in to your Windows 10 account, you get full control over the files and folders you create, sometimes you may also need access to other files. It could be files from an old account from a user that's no longer around, or maybe some system files you need to tweak edit to customize certain aspects of the operating system.
 If you don't have specific permissions, Windows 10 will deny you access. But if your account has administrative privileges, you can take ownership of certain files and folders on your computer.
In this guide, we'll walk you through the steps to take ownership of files and folders on your Windows 10 PC without the need of a third-party tool

How to take ownership of files and folders

  1. Open File Explorer.
  2. Browse and find the file or folder you want to have full access.
  3. Right-click it, and select Properties.
  4. Click the Security tab to access the NTFS permissions.
  5. Click the Advanced button


6- On the "Advanced Security Settings" page, you need to click the Change link, in the Owner's field.

      7-Click the Advanced button.
      8-On the "Select User or Group" page, click the Find Now button.
      9-From the search result, select your user account, and click OK.

 10-On the "Select User or Group" page, click OK.
 11-Click Apply.
 12-Click OK

 13- Click OK again.
14-Click OK one more time to complete this task.

It's important to note that if you're taking ownership of a folder, you can check the Replace ownership on subcontainers and object option in the Advanced Security Settings page to take control of the subfolders inside of the folder
.
Now you'll need to grant full access control to your account, to do this use the following steps:

  1. Right-click the file or folder and select Properties.
  2. Click the Security tab to access the NTFS permissions.
  3. Click the Advanced button.
  4. Under the Permissions tab, click Add


 5-Click Select a principal to add your user account.
  6-On the "Select User or Group" page, click the Find Now button.
  7-From the search result, select your user account, and click OK.
  8-On the "Select User or Group" page, click OK
      09-On "Permission Entry", check the Full control option.
      10-Click OK.
 
           11-Click OK.
           12-Click Apply.
           13-Click OK.
           14-Click OK to close the file or folder properties to complete the task.

It's important to note that if you're taking ownership of a folder, you can check the Replace all existing inheritable permissions on all descendants with inheritable permissions for this object option in the Advanced Security Settings page to replace the subfolders permissions with the settings from the parent folder.











 

Sunday, December 02, 2018

Privacy Attacks

Here attacker uses various  automated   tools which are freely available  on the internet. Some of them  are as follows:

1) Trojan-:Trojan  is a Remote  Administration  Tool (R.<\T) which enable  attacker  to execute  various  software and hardware instructions on the target  system.

Most  troj ans consist  of two parts  -
  1. a) The Server Part:- It has to be installed  on the the victim's  
  2. b) The Client Part r- It is installed on attacker's sy  This part  gives attacker complete  control  over target  computer.


Netbus,  Girlfriend, subz,  Beast, Back Orifice are some of the popular trojans.

2) Ke.ylogger :- Keyloggers are the tools which enable  attacker  to record  all the keystrokes  made  by victim and send it's logs secretly  to the attacker's e-mail  address which is previously set by him.

Almost  all the Trojans  have keylogging function.

3) Spyware  :- Spyware utilities are the malicious programs that spy on the activities of victim, and covertlypass on the re.corded information to the attacker without the victim's consent. Most spyware utilities monitor and record the victim's interne.t• surfing habits. Typically, a spyware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spywarebecomes active on the victim's system.
Spyware tools can be hidden both in .exe files an even ordinary cookie files.
Most spyware tools are created and re.leased on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also usespyware tools for corporate espionage and spying purposes.

4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting networkproblems.
The Ethernet based sniffer works with network interface card (NIC) to capture
interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.
All email communications   on the internet are possible  by two protocols:
1) Simple Mail Transfer Protocol  (SMTP port-zg)
2) Post Office Protocol  (POP port-no)

E-Mail hacking  consists  of various  techniques   as discussed  below.

1) EMail Tracing:-  Generally,  the path taken  by an email while travelling from sender  to receiver  can be explained  by following diagram.

The most effective and easiest  way to trace an email is to analyze  it's email headers. This can be done by just  viewing the full header  of received email.  A typical email header  looks something  like this: