Chapter 3. Shortcuts
|
|
- Rosamund Ball
- 5 years ago
- Views:
Transcription
1 Chapter 3 Shortcuts
2 Link Files Practical Exercise - Manually Decoding Link Files 1. Use WinHEX to open up the file named \Student Files\03_Link Files\c-3.txt.lnk. 2. First, let s look at the file header part of the file, file offsets Next, let s look at the Global Unique Identifier (GUID) part of the file, file offset 4 through Note that this value is likely the same value for all Windows systems. Shown below is how this number is registered in the Windows Registry.
3 4. Let s look at the File Flags (bit reference) for the target file at the time the shortcut was created. Highlight the DWORD at file offset 20 (bytes 20-23). This is not forensic value data but we will look at it because it is there. Note that a DWORD includes 4 bytes, or 32 bits, and WinHex s Data Interpreter only shows one byte of binary value (the byte the cursor is on) but that is okay because this particular bit reference only uses 7 of the 32 bits, so, reading right to left we are looking at the 7 underlined bit values Now let s look at the reference guide to decode the Bitmap meanings for this bit reference. What this decodes to is:
4 5. Next let s look at the File Attributes [for the target file at the time the shortcut was created] bit reference. Highlight the DWORD at file offset 24 (bytes 24-27). This is not forensic value data but we will look at it because it is there. This bit reference used 13 of the 32 bits. As mentioned above WinHex s Data Interpreter only shows binary for the byte the cursor is on but again, in this case, that is okay because the only thing not being displayed for the other three bytes are zeros. So our bit reference values are the underlined values; Now let s use the reference for the meanings of the bits. Only one bit is active, bit # 5.
5 6. Next, let s discuss and examine the embedded file dates and times. Note that these are the dates that were assigned to target file at the time the link file was created. QWORD at File Offset 28 (offsets 28 35) is the Creation Date & Time QWORD at File Offset 36 (offsets 36 43) is the Modification Date & Time QWORD at File Offset 44 (offsets 44-51) is the Last Access Date & Time 6.1. First let s decode the embedded CREATED DATE AND TIME; file offsets /27/ :17:16 UTC 6.2. Next let s decode the embedded MODIFIED DATE AND TIME; file offsets /27/ :21:53 UTC
6 6.3. Next let s decode the embedded LAST ACCESS DATE AND TIME; file offsets /27/ :17:16 UTC 7. Now, let s determine the TARGET FILE SIZE for c-3.txt ; file offset Note that this was the size of the file at the time the shortcut was created and the current file size may not match if the file was modified after the shortcut was created Next, let s determine the start of the null-terminated LOCAL FILE PATH for the file this shortcut points to c-3.txt.lnk. This is a multi-step process. Refer to the following graphic First, skip 16 bytes (not of forensic value) from the end of the file size (QWORD) Note the value of the next WORD, in this example file offsets (88 00) 8.3. What is the WORD value (88 00) in decimal? 136
7 8.4. Now, skip 136 bytes following the relative WORD point (88 00). Bookmark the 136 bytes that were jumped for ease of future navigation. Use a different bright color Next, identify 8 DWORDS following the 136-byte block To make it easier to navigate the data for the next steps let s bookmark the abovementioned WORD [88 00] in a bright color and then bookmark the 136 bytes following the WORD [88 00] in a different bright color. Bookmark is done by: highlighting the data right click Add Bookmark Use bright color You should end up with something that looks like the below.
8 8.7. Now let s determine the null-terminated full path and file name for the target file. Decode the value for the 8 th DWORD, which is 24 decimal. Now jump 24 bytes from the beginning of the 8 th DWORD and note the following null-terminated string. C:\Documents and Settings\Randy\My Documents\TempR\c-3.txt 8.8. This step shows an example only of a relative file path. This data is not on your computer. Note the 00h in the middle of the path name. A possible explanation of using 00h is allowing the operating system to separate the network shared folder and the subfolder path and filename.
9 9. Now let s determine the TARGET VOLUME SERIAL NUMBER, the serial number of the drive on which drive the file c-3.txt was stored. Decode the value of the 2 nd DWORD following the 136 byte block, which is 28 decimal. 10. Now jump 28 bytes from the end of the 2 nd DWORD. What are the following the 4 bytes? C How would these values be displayed while running windows, which uses the Little Endian numbering system reading right to left? C4 If executing a DIR command in a Command Prompt window would result in the following. Note that this data is not relative to your classroom computer because it did not come from that computer.
10 12. Now, let s determine the VOLUME LABEL for the drive on which the link file c-3.txt.lnk was created. Decode the value of the 4 th DWORD following the 136 byte block, which is 28 decimal. 13. Now jump 28 bytes from the end of the 4 th DWORD. What is the following nullterminated string? DRIVE_C How would these values be displayed while running windows? DRIVE_C (Note that if there was no volume label then expect to find only the byte 00h at this location.). Note that this data is not relative to your classroom computer because it did not come from that computer.
11 14. Now let s determine if the NETBIOS for the target machine on which the target file resided is embedded. This is a multi-step process (see image below) Decode the value of the 1 st DWORD following the 136 byte block, which is 112 decimal Jump 112 bytes beginning with the first byte of the DWORD (70h) Next, read the following WORD value [1D 00], convert to decimal (29), multiply by 2, and then jump that value (29x2=58) following the WORD value that was decoded Next, read the following WORD value [32 00], convert to decimal (50), multiply by 2, and then jump that value (50x2=100) following the WORD value. Note that the following DWORD value is an IF-OR situation Situation #1: If the following DWORD is [ ] (as it is in our case) then jump 32 bytes (including the DWORD) and note the following null-terminated NETBIOS name string rb Situation #2: If the following DWORD is [ ] (not as in our case) then jump 16 bytes (including the DWORD). (Our example uses situation 1.)
12 15. Now let s determine if the MAC (Media Access Code), the unique ID for the network card, for the target machine on which the target file resided is embedded. 16. If the DWORD 10h 00h 00h 00h was found in the above-mentioned Situation #1, which it was, then jump the value of the DWORD (16 decimal) (including the DWORD), beginning with the 10h, and note the following DWORD If the DWORD is 60h 00h 00h 00h was found in the above-mentioned Situation #2, which it was in our case, then then jump 60h (96d) from the beginning of the DWORD. The last six bytes of this block is the six-byte MAC address E4 00. In this case, the byte order is as shown in raw data. (It is not read right to left in raw data.) So, when running IPCONFIG /ALL command from a Command Prompt will show these bytes as the MAC with dashes added.
13 Link Files Practical Exercise Decoding Link Files Using DataLifter Start DataLifter s Recycle Bin module. 1. Confirm option 3 is selected 2. Navigate to the folder \Student Files\03_Link Files where the link files are located. 3. Check the Select All Files box. 4. Click on Finish
14 5. NotePad will pop open with the results in a file named lnk data.txt. The following fields of information are captured. File Name: Name of the link file. File Flags: Decimal value of file flags QWORD. (Need to convert to binary to determine bitmap values.) File Attributes: Decimal value of file attributes QWORD. (Need to convert to binary to determine bitmap values.) Target Created Date: The created date associated with the target file at the time the shortcut was created. Target Modification Date: The last modified/written date associated with the target file at the time the shortcut was created. Target Last Accessed Date: The last access date associated with the target file at the time the shortcut was created. Target File Size: The size of the target file. Target Volume Label: The volume label of the drive where the target file resided. Target Volume Serial No: The volume serial number of the drive where the target file resided. NETBIOS: The NETBIOS name, if any, for the machine where the target file was located. Target MAC Address: The MAC Media Access Control) address, if any, for the machine where the target file was located. Relative Path: The network path, if applicable, the to the target file. Local Path: The local path, if applicable, to the target file.
15 6. Use NotePad s Save As menu option to save the results into your DESKTOP. Keep DataLifter s default filename of lnk data.txt You can now import lnk data.txt into an Excel spreadsheet using the procedure discussed in the INFO2 files lesson block. Note you have three dates and times to deal with.
Chapter 2. Index.dat
Chapter 2 Index.dat Internet History Practical Exercise Anatomy of a MSIE / History.IE5\Index.dat File 1. Use WinHEX to open up the file named: \Student Files\02_Internet_History\Index.dat. 2. Let s examine
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationFRONTLINE TEST SYSTEM
FRONTLINE TEST SYSTEM SETUP AND QUICK START GUIDE ETHERTEST 04 Feb 09 300 DOC ET 000 Copyright 2000 2009 Frontline Test Equipment, Inc. All rights reserved. You may not reproduce, transmit, or store on
More informationComputer Forensics CCIC Training
Computer Forensics CCIC Training Chapter 6: Recent Files Lauren Pixley and Cassidy Elwell May 2017 (Version 1) This work by California Cyber Training Complex is licensed under a Creative Commons Attribution-NonCommercial
More informationMicrosoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010
Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.
More informationCollage II Tips and Tricks
Collage II Tips and Tricks Peter Mosinskis, Supervisor of Web Services, CSUCI Table of Contents Introduction... 1 Copy and Paste from Word... 2 Option 1. Word Notepad Collage... 2 Option 2. Word Dreamweaver
More information2 Spreadsheet Considerations 3 Zip Code and... Tax ID Issues 4 Using The Format... Cells Dialog 5 Creating The Source... File
Contents I Table of Contents Part 1 Introduction 1 Part 2 Importing from Microsoft Excel 1 1 Overview... 1 2 Spreadsheet Considerations... 1 3 Zip Code and... Tax ID Issues 2 4 Using The Format... Cells
More informationCase Study. Log Analysis. Automated Windows event log forensics. Engagement Preliminary Results Final Report. Extract Repair. Correlate.
Automated Windows event log forensics Case Study Engagement Preliminary Results Final Report Log Analysis Extract Repair Interpret Rich Murphey ACS Extract Repair DFRWS Aug 13, 2007 1 Sponsor: Special
More information444/544 Advanced Lab Manual Astronomy
444/544 Advanced Lab Manual Astronomy INTRODUCTION The purpose of this lab is to familiarize the student with contemporary astronomical methods. Astronomers use CCD detectors to measure light variations
More informationBinary Markup Toolkit Quick Start Guide Release v November 2016
Binary Markup Toolkit Quick Start Guide Release v1.0.0.1 November 2016 Overview Binary Markup Toolkit (BMTK) is a suite of software tools for working with Binary Markup Language (BML). BMTK includes tools
More informationMobi View. Charging: Turning on Mobi View: Using Your Mobi View: Writing Notes:
Mobi View Charging: Remove the RF hub (jump drive-like device) from the back of the Mobi View. Store in the RF hub on the charging stand. Place Mobi View on charging stand. Plug into power outlet for about
More informationComputer Forensics CCIC Training
Computer Forensics CCIC Training Chapter 7: Recycle Bin Lauren Pixley and Cassidy Elwell May 2017 (Version 1) This work by California Cyber Training Complex is licensed under a Creative Commons Attribution-NonCommercial
More informationIdentifying Updated Metadata and Images from a Content Provider
University of Iowa Libraries Staff Publications 4-8-2010 Identifying Updated Metadata and Images from a Content Provider Wendy Robertson University of Iowa 2010 Wendy C Robertson Comments Includes presenter's
More informationHW Label the following computer parts: E-Banking E-Government E-Commerce
HW 1 1. Label the following computer parts: (7 marks) 2. The Internet has provided the community with online services which are becoming more common in everyday life. Using the below terms give the name
More information1. Setup Everyone: Mount the /geobase/geo5215 drive and add a new Lab4 folder in you Labs directory.
L A B 4 E X C E L For this lab, you will practice importing datasets into an Excel worksheet using different types of formatting. First, you will import data that is nicely organized at the source. Then
More information1 Ctrl + X Cut the selected item. 2 Ctrl + C (or Ctrl + Insert) Copy the selected item. 3 Ctrl + V (or Shift + Insert) Paste the selected item
Tips and Tricks Recorder Actions Library XPath Syntax Hotkeys Windows Hotkeys General Keyboard Shortcuts Windows Explorer Shortcuts Command Prompt Shortcuts Dialog Box Keyboard Shortcuts Excel Hotkeys
More informationComputer Networks A Simple Network Analyzer PART A undergraduates and graduates PART B graduate students only
Computer Networks A Simple Network Analyzer PART A undergraduates and graduates PART B graduate students only Objectives The main objective of this assignment is to gain an understanding of network activities
More informationPython Working with files. May 4, 2017
Python Working with files May 4, 2017 So far, everything we have done in Python was using in-memory operations. After closing the Python interpreter or after the script was done, all our input and output
More information1. A folder inside a folder is called. a) Mini Directory b) Sub Directory c) Root Folder d) Child Folder e) None of these
1. A folder inside a folder is called. a) Mini Directory b) Sub Directory c) Root Folder d) Child Folder 2. A mouse is this kind of device a) Input b) Output c) Network d) Storage 3. All deleted files
More informationReading: Managing Files in Windows XP
Student Resource 13.4a Reading: Managing Files in Windows XP Directions: All recent versions of Windows (XP, Vista, Windows 7) have fairly similar ways of managing files, but their graphic user interfaces
More informationSoftware Reference Sheet: Inserting and Organizing Data in a Spreadsheet
Inserting and formatting text Software Reference Sheet: Inserting and Organizing Data in a Spreadsheet Column headings are very important to include in your spreadsheet so that you can remember what the
More informationSetting up PyCharm Professional
Page 1 Setting up PyCharm Professional You should have already done the following, per a previous document: 1. Install PyCharm Professional 2. Install Git 3. Create a Github account If you have not already
More informationBlackboard 5. Instructor Manual Level One Release 5.5
Bringing Education Online Blackboard 5 Instructor Manual Level One Release 5.5 Copyright 2001 by Blackboard Inc. All rights reserved. No part of the contents of this manual may be reproduced or transmitted
More informationIntroduction to Personal Computing
Introduction to Personal Computing Academic Computing Services www.ku.edu/acs Abstract: This document explains the basics of the Microsoft Windows operating system. It is intended for users who are either
More informationexpressreports Guide
expressreports Guide i Table of Contents expressreports Guide TABLE OF CONTENTS Chapter Chapter 1. Chapter 2. Page INTRODUCTION...1 Internet Access to Reports...1 Documentation...2 ACCESSING YOUR REPORTS...4
More informationExercise 03 Creating and Editing Shapefiles Assigned Feb. 2, 2018 Due Feb. 9, 2018
Exercise 03 Creating and Editing Shapefiles Assigned Feb. 2, 2018 Due Feb. 9, 2018 On the class website I've posted an exercise_03_data.zip file which contains a USGS 7.5' quad map of Laramie (as laramie_quad_usgs_1963.tiff)
More informationLegal Notices. AccessData Corp.
Legal Notices AccessData Corp. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability
More informationLearning Ally s Link Quick start for Mac
Learning Ally s Link Quick start for Mac Welcome to Link! We want to make sure installing and using Link is as easy as possible. Follow these simple steps to begin your learning experience. SYSTEM REQUIREMENTS
More informationIssues in Information Systems Volume 15, Issue II, pp , 2014
DETERMINING USER ACTIONS IN OS X BASED ON QUICKLOOK THUMBNAIL CACHE DATABASE ENTRIES Sara Newcomer, Lockheed Martin, sara.r.newcomer@lmco.com ABSTRACT The purpose of this study was to document the structure
More informationSSB for Advisors. Setup Guide. SSB for Advisors Setup Guide Page 1 of 7
SSB for Advisors Setup Guide Page 1 of 7 BACKGROUND Academic staff do not currently have access to Banner INB (Banner forms) or Infoview. However, Self-Service Banner (SSB where Gradebook is accessed)
More informationTECHNOLOGY COMPETENCY ASSESSMENT MODULE Microsoft Access
TECHNOLOGY COMPETENCY ASSESSMENT MODULE Microsoft Access This module was developed to assist students in passing the SkillCheck Incorporated Access 2003 Technology Competency Assessment. It was last updated
More informationThe QuickCalc BASIC User Interface
The QuickCalc BASIC User Interface Running programs in the Windows Graphic User Interface (GUI) mode. The GUI mode is far superior to running in the CONSOLE mode. The most-used functions are on buttons,
More informationAdding entry information
BioNumerics Tutorial: Adding entry information 1 Aim Adding entry information to a BioNumerics database can be done in two ways: either manually via the keyboard, or with the import tools available in
More information. Click on the File Sharing link to access File Sharing..
FILE SHARING OVERVIEW File Sharing enables students to quickly and easily share documents, files, and information, right from the LMS home screen Students can upload files like homework and assignments,
More informationWindows 10 Registry AGENDA. What is the Registry? About Dan Purcell. Copyright Dan Purcell 2014
Windows 10 Registry Copyright Dan Purcell 2014 What is the Registry? AGENDA About Dan Purcell 1 What is the Registry? AGENDA Basic Registry Terminology & Structure Physical v. Logical Date & Time Formats
More informationAdobe Acrobat DC for Legal Professionals - Quick Reference Guide
Adobe Acrobat DC for Legal Professionals - Quick Reference Guide Adobe Acrobat is an important tool in the legal field giving you the ability to create, view, and edit PDF (portable document format) documents.
More informationWindows Me Navigating
LAB PROCEDURE 11 Windows Me Navigating OBJECTIVES 1. Explore the Start menu. 2. Start an application. 3. Multi-task between applications. 4. Moving folders and files around. 5. Use Control Panel settings.
More informationWindows 2000 Professional
The American University in Cairo Academic Computing Services Windows 2000 Professional prepared by Soumaia Ahmed Al Ayyat 4 August 2003 Table of Contents Starting Up the Computer Windows Environment Start
More informationSetting Up and Using CCC Pathways Auto Workfile Entry Feature
Setting Up and Using CCC Pathways Auto Workfile Entry Feature In order to get the most out of CCC Pathways version 4.3 s new Auto Workfile Entry feature, we suggest you create desktop shortcuts that will
More informationLab PC Network TCP/IP Configuration
Lab 1.1.6 PC Network TCP/IP Configuration Objective Background Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection,
More informationJob Aid. Remote Access BAIRS Printing and Saving a Report. Table of Contents
Remote Access BAIRS Printing and Saving a Report Table of Contents Remote Access BAIRS Printing a Report PDF HTML... 2 Remote Access BAIRS Printing a Report Export to PDF Interactive Reporting... 3 Remote
More informationWindows File Management
Class Description This is an introductory class for those who know how the basics of using a computer, but need help finding and organizing files of all sorts: pictures, documents, spreadsheets, music,
More informationTurnitin in Moodle Guide for AUB faculty
Turnitin in Moodle Guide for AUB faculty Table of Contents Introduction... 2 Creating a Turnitin Assignment in Moodle... 2 Viewing Student Submissions and Originality reports... 4 Originality report Modes...
More informationRev. 1.5 (Preliminary)
Part No. Description Version 2.0 Documentation Rev. 1.5 (Preliminary) Vuolas Electronics Oy Ltd. Kunnansarka 2 FIN-37150 Nokia, Finland Tel. +358 (0)3 342 6900 Fax +358 (0)3 342 5800 e-mail: vuolas@vuolas.com
More informationCMPSCI 145 Spring 2014 Lab #1. Professor William T. Verts
CMPSCI 145 Spring 2014 Lab #1 Setting Up This project must be performed on a Microsoft Windows-based PC, and not on an Apple Macintosh, unless you have installed Windows through Boot Camp, Parallels 9
More informationUnit: Rational Number Lesson 3.1: What is a Rational Number? Objectives: Students will compare and order rational numbers.
Unit: Rational Number Lesson 3.: What is a Rational Number? Objectives: Students will compare and order rational numbers. (9N3) Procedure: This unit will introduce the concept of rational numbers. This
More informationExcel & Business Math Video/Class Project #01 Introduction to Excel. Why We Use Excel for Math. First Formula.
Excel & Business Math Video/Class Project #01 Introduction to Excel. Why We Use Excel for Math. First Formula. Topics Covered in Video: 1) USB Drive to store files from class... 2 2) Save As to Download
More informationSQL Parsers with Message Analyzer. Eric Bortei-Doku
SQL Parsers with Message Analyzer Eric Bortei-Doku Agenda Message Analyzer Overview Simplified Operation Message Analyzer Parsers Overview Desktop UI Demos Analyzing Local Ping Traffic Analyzing a Capture
More informationSTEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder.
PC Support and Repair Chapter 5 Data Migration Lab 5144 When a new computer is purchased or a new operating system is installed, it is often desirable to migrate a user s data to the new computer or OS.
More informationUniversity of North Dakota PeopleSoft Finance Tip Sheets. Utilizing the Query Download Feature
There is a custom feature available in Query Viewer that allows files to be created from queries and copied to a user s PC. This feature doesn t have the same size limitations as running a query to HTML
More informationOneDrive for Business Online
MAC Desktop/Laptop Microsoft OneDrive for Business is a part of Office 365 (O365) and is your private professional document library, it uses Microsoft Office 365 to store your work files in the cloud and
More informationFILE SHARING OVERVIEW HOW DO I ACCESS FILE SHARING? NAVIGATION
FILE SHARING OVERVIEW File Sharing enables teachers to quickly and easily share documents, files, and information directly from the LMS home page You can view shared files from students and add comments
More informationJoin me. Make join.me your free, kick-butt, Web-based screen-sharing app! And did I mention free?
Join me Make join.me your free, kick-butt, Web-based screen-sharing app! And did I mention free? Read additional information about join.me at https://join.me January 2013 Sharing Your Screen for Free with
More informationThe following content has been imported from Legacy Help systems and is in the process of being checked for accuracy.
Processor Debug Old Content - visit altium.com/documentation Modified by Admin on Nov 6, 2013 The following content has been imported from Legacy Help systems and is in the process of being checked for
More informationComputer Networks A Simple Network Analyzer Decoding Ethernet and IP headers
Computer Networks A Simple Network Analyzer Decoding Ethernet and IP headers Objectives The main objective of this assignment is to gain an understanding of network activities and network packet formats
More informationNAVIGATING WINDOWS. What is WINDOWS? DESKTOP ICON PROGRAM
NAVIGATING WINDOWS What is WINDOWS? It is simply a computer program, like WORD, EXCEL, with one VIP difference (the boss), it is the program that manages all the other programs and documents [aka files].
More informationAssembly Language Programming
Assembly Language Programming Integer Constants Optional leading + or sign Binary, decimal, hexadecimal, or octal digits Common radix characters: h hexadecimal d decimal b binary r encoded real q/o - octal
More informationChapter 8 Managing Your Files
Chapter 8 Managing Your Files Learning Objectives LO8.1: Organize Files and Folders LO8.2: Manage Files and Folders LO8.3: Work with Compressed Files CMPTR Chapter 8: Managing Your Files 2 1 LO8.1: Organizing
More informationTable of Contents COURSE OVERVIEW... 5
Table of Contents COURSE OVERVIEW... 5 DISCUSSION... 5 THE NEW DATABASE FORMAT... 5 COURSE TOPICS... 6 CONVENTIONS USED IN THIS MANUAL... 7 Tip Open a File... 7 LESSON 1: THE NEW INTERFACE... 8 LESSON
More informationNavigating Viewpoint V6 Function Keys
Navigating Viewpoint V6 Function Keys Table of Contents About this Course 3 F1 Online Help 4 F2 Rename Folder & Edit Cell 4 F3 Field Properties 4 F4 Lookup 6 F5 Setup 8 F6 Calculator 9 F7 Calendar 10 F8
More informationNAVIGATING TO INITIAL SCREENS WITH THE FAVORITES FOLDERS
Mazzullo_SP-R3.book Page 65 Friday, June 17, 2005 4:00 PM Lesson 6 NVIGTING TO INITIL SCREENS WITH THE FVORITES FOLDERS This lesson describes the creation, management, and use of the Favorites folders
More informationUsing a set-up file to read ASCII data into Stata
Using a set-up file to read ASCII data into Stata The download file is saved to the desktop. The first step is to remove the files from the zip folder that are needed to read in the data. Double-click
More informationFormatting, Saving and Printing in Word 2013
Revision 3 (--04) Computer Basics Formatting, Saving and Printing in Word 03 MICROSOFT WORD 03: This program allows you to create new documents, make easy changes, insert media, and effectively save and
More informationOneDrive for Business User Guide
OneDrive for Business User Guide Table of Contents OneDrive for Business Quick Start Guide... 2 Sign-in and initial tasks... 2 Set your Language, Time zone and Region... 3 Folders and Files... 5 Sharing
More informationLesson 11 Exploring Microsoft Office 2013
Exploring Microsoft Office 2013 Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition 1 Objectives Start Microsoft Office 2013 applications. Switch between application windows. Close applications.
More informationSwitch between open apps Close the active item, or exit the active app
Ctrl + X Ctrl + C (or Ctrl + Insert) Ctrl + V (or Shift + Insert) Ctrl + Z Alt + Tab Alt + F4 L D F2 F3 F4 F5 F6 F10 Alt + F8 Alt + Esc Alt + underlined letter Alt + Enter Alt + Spacebar Alt + Left arrow
More informationFile System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT)
File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) 1 FILE SYSTEM CONCEPTS: FILE ALLOCATION TABLE (FAT) Alex Applegate
More informationThe playhead, shown as a vertical red beam, passes each frame when a movie plays back, much like movie fi lm passing in front of a projector bulb.
The project: AIRPLANE I will show you a completed version of this project.. Introducing keyframes and the Timeline One of the most important panels in the Flash workspace is the Timeline, which is where
More informationTUTORIAL MADCAP DOC-TO-HELP 5. New User
TUTORIAL MADCAP DOC-TO-HELP 5 New User Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is
More informationBeginner s Guide to Microsoft Excel 2002
Beginner s Guide to Microsoft Excel 2002 Microsoft Excel lets you create spreadsheets, which allow you to make budgets, track inventories, calculate profits, and design charts and graphs. 1. Open Start
More informationAdvanced Diploma synoptic (AVSY) assessment: guidance document for students
Students are permitted to take this document into the examination room Advanced Diploma synoptic (AVSY) assessment: guidance document for students This guide has been created to support you through your
More informationModule 5. Databases. Astro Computer Training. Page 1
Module 5 Databases Astro Computer Training Page 1 1. Database Terminologies What is a Database? A database is a collection of data related to a particular topic organised and stored for easy retrieval.
More informationINSTITUTE BUSINESS SYSTEMS IMSS COGNOS REPORT STUDIO GUIDE
INSTITUTE BUSINESS SYSTEMS IMSS COGNOS REPORT STUDIO GUIDE Table of Contents Logging into Cognos... 3 Viewing Summary Information... 6 Running a Report... 6 Rerunning a Report... 9 Comparing Summary Information...
More informationCreating Avid Projects, and Media Sharing with Small Tree TitaniumZ
When using Avid Media Composer System with Small Tree's Titanium Z storage, there are a few steps to take to share project and media files. It is important to note that While Small Tree can work in an
More informationLaserfiche Agenda Workflow Training. Submitting an Agenda Item Through Laserfiche Web Access Version 10.2
Laserfiche Agenda Workflow Training Submitting an Agenda Item Through Laserfiche Web Access Version 10.2 May 2017 Contents LASERFICHE LASERFICHE AGENDA REVIEW WORKFLOW... 3 IMPORTING DOCUMENTS INTO WEB
More informationDepending on the computer you find yourself in front of, here s what you ll need to do to open SPSS.
1 SPSS 11.5 for Windows Introductory Assignment Material covered: Opening an existing SPSS data file, creating new data files, generating frequency distributions and descriptive statistics, obtaining printouts
More informationMicrosoft OneDrive. How to Use OneDrive Online. What do you want to do?
Microsoft OneDrive Microsoft OneDrive solves many of the issues related to hard drive and network drive file storage. OneDrive provides a solid cloud storage solution available to all BJU faculty, staff,
More informationUser Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution
User Guide Kronodoc 3.0 Intelligent methods for process improvement and project execution 2003 Kronodoc Oy 2 Table of Contents 1 User Guide 5 2 Information Structure in Kronodoc 6 3 Entering and Exiting
More informationLife Without NetBeans
Life Without NetBeans Part A Writing, Compiling, and Running Java Programs Almost every computer and device has a Java Runtime Environment (JRE) installed by default. This is the software that creates
More informationNdaw, Maam Awa. Microsoft Office Excel 2007
Download the Project3.E01 file from Blackboard under Projects & Labs\Project 3 and verify the integrity of the image after downloading (open image in FTK Imager right-click on image - verify Drive/Image).
More informationWindows 10 Essentials
Windows 10 Essentials User Interface START MENU Start typing to search for applications or files Once the start menu is open you can change its size by dragging a side Right-click on an application and
More informationManaging Files. In this chapter
In this chapter Displaying Your Computer s Contents Navigating Folders Creating a New Folder Displaying and Selecting Files Deleting and Undeleting Files and Folders Renaming a File or Folder Moving Folders
More informationUsing InfoDirect FTP September 2006
Using InfoDirect FTP September 2006 COPYRIGHT AND MARKS Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any
More informationTHE AMERICAN LAW INSTITUTE Continuing Legal Education. Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017
1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Adobe Acrobat for Lawyers October 4, 2017 Video Webcast Studio Recorded August 3, 2017 By Craig Brody C. Brody Associates, LLC Philadelphia, Pennsylvania
More informationIntroduction to Microsoft Excel 2010
Introduction to Microsoft Excel 2010 THE BASICS PAGE 02! What is Microsoft Excel?! Important Microsoft Excel Terms! Opening Microsoft Excel 2010! The Title Bar! Page View, Zoom, and Sheets MENUS...PAGE
More informationModule 3: Working with C/C++
Module 3: Working with C/C++ Objective Learn basic Eclipse concepts: Perspectives, Views, Learn how to use Eclipse to manage a remote project Learn how to use Eclipse to develop C programs Learn how to
More informationLibraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15
10 Classes 2 nd Exam Review Lesson - 15 Introduction Windows 7, previous version of the latest version (Windows 8.1) of Microsoft Windows, was produced for use on personal computers, including home and
More informationEXCEL BASICS: MICROSOFT OFFICE 2007
EXCEL BASICS: MICROSOFT OFFICE 2007 GETTING STARTED PAGE 02 Prerequisites What You Will Learn USING MICROSOFT EXCEL PAGE 03 Opening Microsoft Excel Microsoft Excel Features Keyboard Review Pointer Shapes
More informationMicrosoft Excel 2010 Training. Excel 2010 Basics
Microsoft Excel 2010 Training Excel 2010 Basics Overview Excel is a spreadsheet, a grid made from columns and rows. It is a software program that can make number manipulation easy and somewhat painless.
More informationPrivate Company Audit System (PCAS) Quick Start Guide
Private Company Audit System (PCAS) Quick Start Guide Thank you for subscribing to PCAS. This guide will help you understand how to use the toolkit. Let s first look at the Contents on the PCAS homepage
More information16 Starting Optional Application
16 Starting Optional Application 16.1 Try to Start Optional Application...16-2 16.2 Setting Guide...16-21 16-1 16.1 Try to Start Optional Application [Action Example] Detect the rising of the trigger device
More informationHow to Create Student Accounts and Assignments
How to Create Student Accounts and Assignments From the top navigation, select My Classes and click My Students Carolina Science Online will allow you to either create a single student account, one at
More informationACER Online Assessment and Reporting System (OARS) User Guide
ACER Online Assessment and Reporting System (OARS) User Guide January 2015 Contents Quick guide... 3 Overview... 4 System requirements... 4 Account access... 4 Account set up... 5 Create student groups
More informationSTUDENT WORKBOOK. Teach Yourself: Computer Basics Expert. In 24 Hours or less
STUDENT WORKBOOK Teach Yourself: Computer Basics Expert In 24 Hours or less Student Workbook Table of Contents Section 1: Understanding Applications... 1 Lesson 1.1: Application Basics... 2 Step-By-Step...
More informationKIN 147 Lab 02: Acceleration Data Analysis
KIN 147 Lab 02: Acceleration Data Analysis Excel analyses work much better on PCs than on Macs (especially older Macs) Your goal is to correctly analyze accelerometer data Analyzing the Acceleration Data
More informationIMPORTING A STUDENT LIST FROM SYNERGY INTO A GOOGLE CONTACT LIST
IMPORTING A STUDENT EMAIL LIST FROM SYNERGY INTO A GOOGLE CONTACT LIST In Synergy create a report for each class. 1. Log in to Synergy. 2. Open the list of available reports; select the Reports icon from
More informationStandards of Learning Introduction to TestNav 8: Writing Tool
Standards of Learning Introduction to TestNav 8: Writing Tool For use with the Practice Writing Tool in TestNav TM 8 Introduction to TestNav 8: Practice Writing Tool Page 1 Table of Contents Introduction...
More informationMath 1525 Excel Lab 1 Introduction to Excel Spring, 2001
Math 1525 Excel Lab 1 Introduction to Excel Spring, 2001 Goal: The goal of Lab 1 is to introduce you to Microsoft Excel, to show you how to graph data and functions, and to practice solving problems with
More informationCS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal
CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on
More information21 keyboard shortcuts Mac users need to know - Computerworld
21 keyboard shortcuts Mac users need to know - Computerworld This collection of keyboard shortcuts for macos can users get the most from their imacs, MacBook Pro and MacBook laptops. I m sure most Mac
More information