Skip to content

The Cyber Security, Compliance & Cloud

Cyber Security | Digital Transformation | Cloud Computing

  • Home
  • About Me
  • Contact Me:
The Cyber Security, Compliance & Cloud

Category: word

Disable protected mode in office 2010

April 9, 2013 Baz msoffice, tech, tips, word Leave a comment

The protected mode is enabled by default in Office 2010. So whenever you try to open a protected file it

Continue reading

Force the documents to open in the browser instead of the application handler

March 22, 2013 Baz tech, tips, windows, word Leave a comment

To force the documents to open in the browser instead of the application handler.Set Browser flag to 80000024. Following are

Continue reading

Bypass the Open, Save, Save as Dialog window

March 22, 2013 Baz tech, tips, windows, word Leave a comment

Bypass the Open, Save, Save as Dialog window    [HKEY_CURRENT_USERSoftwareMicrosoftWindowsShellAttachmentExecute  {0002DF01-0000-0000-C000-000000000046}]   “Word.Document.12″=hex(0):   “Word.Document.8″=hex(0):   “Excel.Sheet.12“=hex(0):   “Excel.Sheet.8″=hex(0):  

Continue reading

Letters are overlapping in a word or outlook document

March 12, 2013 Baz outlook, tips, windows, word Leave a comment

WordYou may see in word document that text are overlapping and it may persist when we print the document. To

Continue reading

Categories

ADADFSAmazonAppleAppsArticlesAWSAzureAzure PolicyAzure PurviewbackupCertificatesCiscoCloudComplianceCyberSecuritydamwaredataData GovernanceDigital ForensicexcelExchangeflashflexGPOHadoopHPInformation ProtectionIntelligent securityJSON

Recent Posts

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types

Top Cyber Security Posts

Datbricks vs SQL Server

April 14, 2023

Designing SQL Database in Azure

February 21, 2023

Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault

December 13, 2022

FIDO – FIDO2: an open authentication standard

June 20, 2022

Build next-generation security operations with Azure Sentinel

December 16, 2020

How to Apply Microsoft Information Protection’s (MIP) sensitivity labels to Azure assets in Azure Purview

December 4, 2020

The Cyber Security, Compliance & Cloud

  • The Ultimate Cybersecurity Certification Roadmap for 2025
  • Marks & Spencer (M&S), Co-op Group and Harrods cyber attack – Technical Analysis
  • Top 25 Most Dangerous Software Errors and Mitigations- CWE
  • Datbricks vs SQL Server
  • Designing SQL Database in Azure
  • Deploy certificates by using Azure Key Vault. Certificate auto-rotation in Key Vault
  • Azure Sentinel: The connectors grand (CEF, Syslog, Direct, Agent, Custom and more)
  • Cloud Adoption and Audit Planning
  • Digital Forensic & E-Discovery (Legal Hold) Types
  • FIDO – FIDO2: an open authentication standard
WordPress Theme: Tortuga by ThemeZee.