Wednesday, September 3, 2014

Search for emails by size and more in Gmail

https://support.google.com/mail/answer/7190?hl=en

Advanced search operators are query words or symbols that perform special actions in Gmail search. These operators allow you to find what you're looking for quickly and accurately. They can also be used to set up filters so you can organize your inbox automatically. Some of the most useful operators are listed below.
You can also refine your search by clicking the arrow in the search box.

OperatorDefinitionExamples
from:Used to specify the senderExample: from:amy
Meaning: Messages from Amy
to:Used to specify a recipientExample: to:david
Meaning: All messages that were sent to David (by you or someone else)
subject:Search for words in the subject lineExample: subject:dinner
Meaning: Messages that have the word "dinner" in the subject
ORSearch for messages matching term A or term B*
*OR must be in all caps
Example: from:amy OR from:david
Meaning: Messages from Amy or from David
-
(hyphen)
Used to exclude messages from your searchExample: dinner -movie
Meaning: Messages that contain the word "dinner" but do not contain the word "movie"
label:Search for messages by labelExample: from:amy label:friends
Meaning: Messages from Amy that have the label "friends"
Example: from:david label:my-family
Meaning: Messages from David that have the label "My Family"
has:attachmentSearch for messages with an attachmentExample: from:david has:attachment
Meaning: Messages from David that have an attachment
list:Search for messages on mailing listsExample: list:info@example.com
Meaning: Messages with the words info@example.com in the headers, sent to or from this list
filename:Search for an attachment by name or typeExample: filename:physicshomework.txt
Meaning: Messages with an attachment named "physicshomework.txt"
Example: label:work filename:pdf
Meaning: Messages labeled "work" that also have a PDF file as an attachment
" "(quotes)Used to search for an exact phrase*
*Capitalization isn't taken into consideration
Example: "i'm feeling lucky"
Meaning: Messages containing the phrase "i'm feeling lucky" or "I'm feeling lucky"
Example: subject:"dinner and a movie"
Meaning: Messages containing the phrase "dinner and a movie" in the subject
( )Used to group words
Used to specify terms that shouldn't be excluded
Example: from:amy (dinner OR movie)
Meaning: Messages from Amy that contain either the word "dinner" or the word "movie"
Example: subject:(dinner movie)
Meaning: Messages in which the subject contains both the word "dinner" and the word "movie"
in:anywhereSearch for messages anywhere in Gmail*
*Messages in Spam and Trashare excluded from searches by default
Example: in:anywhere movie 
Meaning: Messages in All MailSpam, andTrash that contain the word "movie"
in:inbox
in:trash
in:spam
Search for messages in Inbox,Trash, or SpamExample: in:trash from:amy
Meaning: Messages from Amy that are inTrash
is:important
label:important
Search within messages thatPriority Inbox considers important.Example: is:important from:janet
Meaning: Messages from Janet that were marked as important by Priority Inbox
is:starred
is:unread
is:read
Search for messages that are starred, unread, or readExample: is:read is:starred from:David
Meaning: Messages from David that have been read and are marked with a star
has:yellow-star
has:red-star
has:orange-star
has:green-star
has:blue-star
has:purple-star
has:red-bang
has:orange-guillemet
has:yellow-bang
has:green-check
has:blue-info
has:purple-question
Search for messages with a particular starExample: has:purple-star from:David
Meaning: Messages from David that are marked with a purple star
cc:
bcc:
Used to specify recipients in thecc: or bcc: fields*
*Search on bcc: cannot retrieve messages on which you were blind carbon copied
Example: cc:david 
Meaning: Messages that were cc-ed to David
after:
before:
older:
newer:
Search for messages sent or received during a certain period of time
(using the date format yyyy/mm/dd)
Example: after:2004/04/16 before:2004/04/18 
Meaning: Messages sent between April 16, 2004 and April 18, 2004.*
*More precisely: Messages sent after 12:00 AM (or 00:00) April 16, 2004 and before April 18, 2004.
older_than
newer_than
Similar to older and newer, but allows relative dates using dm, and y for daymonth, and yearExample: newer_than:2d
Meaning: Finds messages sent within the last two days.
is:chatSearch for chat messagesExample: is:chat monkey
Meaning: Any chat message including the word "monkey."
deliveredto:Search for messages within a particular email address in the Delivered-To line of the message headerExample:deliveredto:username@gmail.com
Meaning: Any message with username@gmail.com in the Delivered-To: field of the message header (which can help you find messages forwarded from another account or ones sent to an alias).
circle:Search for messages that were sent from someone who you added to a particular Google+ circleExample: circle:friends
Meaning: Any message that was sent by a person in your "Friends" circle.

Examples: circle:"soccer friends (team blue)" or circle:"my \"fab four\""
Notes: For circle names that include a space, parentheses, curly brackets, or vertical bar, add quotes around the name. For names that include quotes, add a back slash immediately before the quotes.
has:circleSearch for all messages that were sent from someone who you added to your Google+ circlesExample: has:circle 
Meaning: Any message that was sent by a person in any of your circles.
category:Search for messages within a categoryExample: category:updates
Meaning: All messages in the Updates category.

Example: category:social Mindy
Meaning: Messages in the Social category that include “Mindy.”
size:Search for messages larger than the specified size in bytesExample: size:1000000 
Meaning: All messages larger than 1MB (1,000,000 bytes) in size.
larger:
smaller:
Similar to size: but allows abbreviations for numbersExample: larger:10M 
Meaning: All messages of at least 10M bytes (10,000,000 bytes) in size.
+
(plus sign)
Match the search term exactlyExample: +unicorn 
Meaning: Finds messages containing “unicorn” but not “unicorns” or “unciorn”
rfc822msgid:Find a message by the message-id headerExample:rfc822msgid:200503292@example.com
Meaning: Locates the exact message with the specified SMTP message-id. Learn more about headers.
has:userlabels
has:nouserlabels
Search for messages that have and have not had labels that you created applied to them.
NOTE: Gmail applies labels to individual messages, not to conversation threads.
Example: has:nouserlabels
Meaning: Finds all messages without any of your own labels (excludes automatic labels like inbox, spam, and trash). Since Gmail applies labels to individual messages, you might see results that appear to have labels; in this case, another message in the same conversation thread has had a label applied to it.

Boolean operators

You can use boolean operators such as 'OR' when searching in Gmail.
For example, to look for messages from username@gmail.com and messages that contain the subject line 'Meeting reminder', you can enter 'username@gmail.com OR meeting reminder' in your Gmail search box.
Using these along with Gmail's advanced operators can be a great way of making your search criteria more powerful.
The 'or' function in Gmail is represented by 'OR,' and the 'not' function is represented by a minus (-). You also can use quotes (" ") to specify an exact phrase.

How two-step logins protect iCloud, other accounts

http://www.usatoday.com/story/tech/personal/2014/09/02/two-factor-authentication/14954565/

A massive photo leak targeting celebrities including Jennifer Lawrence, Kate Upton and Kirsten Dunst has raised concerns over the safety of using services such as Apple's iCloud.
Reports suggest hackers used "brute force" attacks through Apple's Find My Phone feature to figure out account passwords and gain access. Apple tells the Associated Press it is investigating whether any iCloud accounts have been affected.
Once again, the hack is another reminder to practice proper password etiquette. But for many sites, including iCloud, users can opt to turn on an extra layer of security called two-factor authentication.
When two-factor authentication is enabled, a user will receive a special code sent to their mobile device once they've entered a password. After entering the code, users gain access to their accounts.
Some sites like Facebook and Google will recognize your browser, so once you've approved a computer, it won't ask for codes beyond the first time a user logs in. Others like Twitter require a code every time when two-factor is enabled.
In the case of Apple, users receive the code through text message or Find My Phone. They also get a master Recovery Key that Apple suggest users write down and store in a safe place in case they're locked out.
Yes, it's a bit of an inconvenience, but better than cleaning up after your account has been compromised.
Sites vary on the process for enabling and using two-factor authentication. Here's a list of some of the bigger sites that use two-factor authentication, with links to setting up the feature:

Tuesday, September 2, 2014

Understanding AIX Logical Volume Management

http://www.techrepublic.com/resource-library/whitepapers/understanding-aix-logical-volume-management/

Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

http://images.globalknowledge.com/wwwimages/whitepaperpdf/WP_IBM_AIX_LogicalVolumeManagement.pdf

Migrate systems from one version of Windows to another with the Zinstall Migration Suite

Greg Shultz shows you how to use Zinstall Migration Suite to migrate an existing Windows 7 system over to a new Windows 8.1 installation. 

http://www.youtube.com/watch?feature=player_embedded&v=jK41FUHgPys

Zinstall Migration Suite

Is your organization planning on replacing Windows XP boxes with new systems running Windows 7? Or maybe you're planning on upgrading Windows 7 systems to Windows 8.1. Regardless of the scenario, as the tech responsible for making such a transition a reality, you know that you are facing a monumental task. But then again, maybe it won't be.
Fortunately, the folks at Zinstall had you in mind when they developed their Zinstall Migration Suite. This tool will allow you to quickly and easily transfer an entire user workspace -- including applications, settings, personalization, documents, domain settings, security policies, and data files -- from one system to another in a multitude of scenarios. For example, you can migrate from one computer to another, transfer from a physical machine to a virtual machine, perform an in-place upgrade, or simply transfer profiles, settings, and data. There are several other migration scenarios that the Zinstall Migration Suite can perform, but these are probably the most common.
In this article, I'll show you how the Zinstall Migration Suite works. As I do, I'll use the package to migrate an existing Windows 7 system over to a new Windows 8.1 installation.

Overview

Now, as you may know, I've previously written other articles about Zinstall products and shown you how to move Windows XP from a physical machine to a virtual machine in Windows 7 and how to rescue Windows XP installation from a hard disk that was removed from a dead computer. Zinstall XP7, the single-user product that I used in those articles, worked great in those situations, but I've been wondering about large-scale migrations -- the type that the companies hanging onto Windows XP are (or will be) facing.
Thus, I contacted my friends at Zinstall and asked about their Zinstall Migration Suite product. As the discussion progressed, they offered to provide me with access to their test lab using a VPN connection and explained that I could run the entire migration procedure remotely. In this way, not only could I test their enterprise-level product, but I could also test one of the ways in which techs in a large organization might choose to migrate a large number of PCs -- via a remote connection.
To connect to the systems in the Zinstall test lab, I used TeamViewer, a free software package for remote control, desktop sharing, online meetings, web conferencing, and file transfer between computers. I was able to connect to two systems simultaneously inTeamViewer's tabbed user interface and run the entire migration procedure remotely.
The Zinstall Migration Suite is an enterprise-level product and, as such, pricing varies. For specific pricing details, contact the Zinstall sales department (sales@zinstall.com) for a quote.

Considerations

Before I get started, I want to point out a couple of things that you should take into consideration. First, some anti-virus and internet security software mistakenly consider Zinstall software to be a threat. So, you should disable the package or add Zinstall to the white list. In addition, you should close all running applications. There must be at least 1 GB free space on each system's hard drive.
Furthermore, when migrating between two computers in a domain environment, the target system must be joined to the domain prior to the migration in order to allow it to authenticate the transferred profiles. You'll then need to login as the same user on both systems.
For the machine-to-machine migration to be a successful venture, all the installed applications must be compatible with both operating systems. If you have older applications that are not compatible with the new operating system, you should consider the transfer from a physical machine to a virtual machine type of migration.

Installation

Of course, Zinstall Migration Suite must be installed on both the source and target systems. Installation is pretty straightforward and involves working through a Windows UAC and then a Zinstall activation procedure. Once you've performed the installation and activation procedure, you're ready to begin the migration.

The source

As I mentioned in the introduction, the source computer for my test is an existing Windows 7 system with Microsoft Office and several other applications, such as Adobe Reader, iTunes, and Mozilla Firefox installed. The system had a host of data files on it as well, including audio, video, documents, and internet shortcuts.
Once the Zinstall Migration Suite is installed on the source system, the application will immediately display the Scenario selection screen (Figure A). As you can see, there are five scenarios to choose from on this screen. I selected Moving between two machines. After you make your selection, click Next.
Figure A

Figure A

The Scenario selection screen displays five scenarios to choose from.
From the Machine selection screen, highlight This is the source computer (Figure B), and then click Next.
Figure B

Figure B

Select This is the source computer on the Machine selection screen.
Once you've specified the source computer, Zinstall will advance to the Prerequisite check step where it will run through a series of items to make sure that the source computer is ready for the migration operation. Once the Prerequisite checks are complete, the progress bar will reach 100% and the title will display Success (Figure C). You can then click Next.
Figure C

Figure C

When the Prerequisite check is successful, you can click Next.
Zinstall will let you know that the source machine is ready to begin the migration (Figure D). At this point, Zinstall will announce over the network that it is waiting for a connection from a Target system.
Figure D

Figure D

Zinstall will announce over the network that the source system is ready and waiting to connect to a target system.

The target

The target system for my test is a new computer with a fresh install of Windows 8.1. Once the Zinstall Migration Suite is installed on the Windows 8.1 target system, the application will immediately display the Scenario selection screen (Figure E). As you can see, I again chose Moving between two machines. After you make your selection, click Next.
Figure E

Figure E

On the target computer, I again chose Moving between two machines.
From the Machine selection screen, select This is the target computer (Figure F), and then,click Next.
Figure F

Figure F

Select This is the target computer on the Machine selection screen.
Once you've specified the target computer, Zinstall advances to the Prerequisite check step where it will run through a series of items to make sure that the target computer is ready for the migration operation. Once the Prerequisite checks are complete, the progress bar will reach 100%, and the title will display Success (Figure G). You can then click Next.
Figure G

Figure G

When the Prerequisite check is successful, you can click Next.
At this point, Zinstall scans the network, looking for a source machine advertising that it is ready for a migration procedure. It will then display the name, IP address, and hard disk of the source computer in the Source selection screen (Figure H).
Figure H

Figure H

Zinstall will display the source computer that it found on the network in the Source selection screen.
In a moment, you'll be prompted to choose the Target hard disk (Figure I). You'll see that there's an option here titled SSD Mode. This feature is designed for target systems that have both an SSD and a regular hard disk, and it will allow you to transfer your applications to the faster SSD and your data files to the hard disk.
Figure I

Figure I

If the target system has an SSD, you can select SSD Mode.
Once you click Next, the migration procedure will begin. Of course, this part of the operation is the most time-consuming, and it goes through a multitude of steps before it's complete (Figure J). In fact, this part of the procedure can take several hours. The amount of time required depends on a number of factors, such as the amount of information on the source hard disk and the speed of the hard disk itself.
Figure J

Figure J

The actual migration can take several hours to complete.
Once the migration is complete, you'll be prompted to restart the target computer (Figure K). While the restart is taking place, you can return to the source computer and exit Zinstall by pressing the Cancel button.
Figure K

Figure K

When the migration is finished, click the Restart button.

The result

When the system restarts, you'll find that all of the applications from the source computer are now installed on the target computer, and you can launch that as you normally would. You'll also find all of your data and the majority of your settings are now available on the target computer, allowing you to get right back to work as if nothing has changed.

Monday, September 1, 2014

The top 10 hottest IT skills today

http://www.infoworld.com/d/the-industry-standard/get-job-the-top-10-hottest-it-skills-today-249305?page=0,0&source=IFWNLE_nlt_daily_pm_2014-08-28


Skill set
August 2014
August 2013
Growth since 2013
August 2012
Growth since 2012
Cyber security
2,274
1,198
90%
975
133%
Puppet
1,141
673
70%
366
212%
Big data
2,277
1,512
51%
666
242%
NoSQL
1,801
1,206
49%
NA
NA
Salesforce.com
1,035
726
43%
572
81%
Hadoop
2,047
1,478
38%
896
128%
Cloud
6,650
5,057
32%
3,823
74%
Jira
1,305
1,003
30%
612
113%
CISSP (Certified Information Systems Security Professional)
1,634
1,287
27%
1,613
1%
Information security
2,367
1,908
24%
1,783
33%


Thursday, July 3, 2014

How to Remove Write Protection of any Flash Drives/Memory Cards

http://way2usefulinfo.blogspot.com/2014/07/how-to-remove-write-protection-of-any.html

In olden days we had lesser ways to store data, as technology advanced we got Floppy disk, Optical Disk and now flash drives, they are easily vulnerable as they can accessed by anyone, but flash drives had the feature to secure them from spammers



We can add Write protection so that no one can use it , the person who owns only can access it , this is good for security reasons, sometimes we need to remove those protection for some fair reasons, i will teach you the easy possible way which you can easily Remove write protection on any Flash Drives/ Memory cards

HOW TO REMOVE WRITE PROTECTION OF ANY FLASH DRIVES/ MEMORY CARDS

1) TRY LOW LEVEL FORMATTING

  • We cannot use the default windows method, so you need to download one special tool which is given here LOW LEVEL FORMATTING
  • Format the Password protected Pen Drive with this Tool
  • Now open the Run box ( Win+R) and type diskmgmt.msc in Box
  • You can see your Pen Drive, Flash the Drive and allocate the Space
  • There will be no error after you Allocated the Space to Flash Drive
2) Modify Registry Settings
  • Before doing things on Registry, please do backup of Registry
  • Open the Run box ( Win+R) and type regedit in the box
  • Search for the Following Registry Key in the Window
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
  • Click on Write Protect and change the Registry binary value from 1 to 0

  • Now you had successfully Removed the Write Protection on your Flash Drives/ Memory cards

Monday, June 23, 2014

Top 10 Cloud Computing Certifications

http://www.cio.com/slideshow/detail/129043#slide10

As the cloud becomes more critical to IT departments and businesses worldwide, it can be difficult to gauge whether you have the right skills or knowledge in a competitive job market. If you're looking for a way to get an extra edge -- whether you're job hunting, angling for a promotion, or just want tangible, third-party proof of your skills -- cloud certification is a great option. Certifications measure your knowledge and skills against industry- and vendor-specific benchmarks to prove to employers that you have the right mix of cloud skills, knowledge, and expertise. Here 10 ten cloud computing certifications you should consider.


1. CCSK -- Cloud Security Alliance
What it's all about: This is the mother of all cloud computing security certifications. The Certificate of Cloud Security Knowledge certification is vendor-neutral, and certifies competency in key cloud security areas. The test is based on the Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V3, English language version, and the ENISA report "Cloud Computing: Benefits, Risks and Recommendations for Information Security."
How to prepare: The best way to prepare is to study the CSA Security Guidance for Critical Areas of Focus in Cloud Computing v3, and the ENISA report "Cloud Computing: Benefits, Risks, and Recommendations for Information Security."
More on CSA Guidance
More on ENISA

2. Cloud U -- Rackspace
What it's all about: According to Rackspace, Cloud U is a vendor-neutral curriculum designed for IT professionals and business leaders that covers and certifies knowledge of the fundamentals of Cloud Computing. Cloud U content is available to any professional at any time, but if you want a formal recognition of your knowledge about Cloud Computing, you should complete the courses and requirements for a certificate.
How to prepare: Study each Cloud U lesson whitepaper, and then successfully complete each of 10 Cloud U lesson quizzes based on the whitepaper's content. Successfully complete a 50-question final exam drawn from materials covered in the 10 Cloud U lessons.
More on Cloud U

3. CompTIA Cloud Essentials -- Comp TIA
What it's all about: According to CompTIA, the Cloud Essentials Certification covers the basic fundamentals of cloud computing and shows that individuals understand cloud computing from both a business and a technical perspective. In addition, the certification covers migration to the cloud and governance of cloud computing environments.
How to prepare: CompTIA offers study and training materials, and -- while it's not required -- CompTIA recommends that individuals taking the exam have at least six months experience working in an IT services environment.

4. Cloud Certified Professional -- CloudSchool.com
What it's all about: CloudSchool.com offers a number of vendor-neutral cloud certifications, each based on a one-day course module and aimed at competency in specific areas of cloud computing. There are certificates for Cloud Architects, Cloud Technology Professionals, Cloud Governance, and Cloud security, among others.
How to prepare: Cloud School offers self-study kits as well as on-site and remote workshops and study sessions and instructor-led workshops to help prepare applicants for the exams.
More on CloudSchool.com

5 & 6. IBM Certified Cloud Solution Architect v1 and v3 - IBM
What it's all about: IBM has two cloud-specific certification: IBM Certified Solution Architect v1 and v3. These solutions architects will demonstrate the design, plan, architecture and management capabilities for IBM's cloud computing infrastructure once they've completed the certification requirements. According to IBM, these certifications, "Provide a reliable, valid and fair method of assessing skills and knowledge; provide IBM a method of building and validating the skills of individuals and organizations; and to develop a loyal community of highly skilled certified professionals."
How to prepare: You should have a working knowledge of cloud fundamentals and a basic knowledge of IBM cloud computing essentials. You will be required to take a test to confirm that knowledge for each version of the certification exam.

7. Google Certified Deployment Specialist -- Google
What it's all about: This is Google's technical certification; the applications giant also has a Google Certified Sales Specialist. This certification covers the fundamental skills, knowledge and technical expertise required to deploy Google Apps for Business and Education, according to Google.
How to prepare: Google recommends gaining practical experience by participating in at least three Google Apps for Business deployments, and having at least 3 to 6 years of hands-on IT experience. You'll also complete hands-on, online, self-paced training and, finally, take an exam.

8. Salesforce.com Certified Professional -- Salesforce.com
What it's all about: Salesforce.com offers several certification tracks, including Salesforce Administrator, Force.com Developer, Implementation Expert, and Architect.
How to prepare: According to Salesforce.com, the certification tests real-world knowledge as much as book learning, and each certification track offers a variety of ways to prepare for the exams. There are individualized programs available for everyone available on the company's web site.

9. VMware Certified Professional - VMware
What it's all about: The virtualization pioneer offers six cloud-specific certifications, from beginner to advanced. These tracks certify knowledge and expertise in a variety of cloud and virtualization-related technologies and methodologies. Offerings include the VMware Certified Associate -- Cloud, VMware Certified Professional -- Cloud, and VMware Certified Advanced Professional, among others.
How to prepare: Study and preparation materials are available through VMware, and real-world experience with cloud and virtualization are also highly recommended.

10. Red Hat Certificate of Expertise in Infrastructure-as-a-Service -- Red Hat
What it's all about: This is one of the newest cloud certifications available. The Red Hat Certificate measures professionals' ability to design, build, deploy and manage private clouds based on the Red Hat Enterprise Linux OpenStack platform.
How to prepare: Red Hat says the best way to prepare for the exam is hands-on, real-world experience. The exam is also a live, real- world test of skills and competency, requiring candidates to perform tasks on a live system.