Explorer Keyboard shortcuts

The following table contains keyboard shortcuts for working with Windows Explorer windows or folders.

Press this key
To do this

CTRL+N

Open a new window

END

Display the bottom of the active window

HOME

Display the top of the active window

F11

Maximize or minimize the active window

NUM LOCK+ASTERISK (*) on numeric keypad

Display all subfolders under the selected folder

NUM LOCK+PLUS SIGN (+) on numeric keypad

Display the contents of the selected folder

NUM LOCK+MINUS SIGN (-) on numeric keypad

Collapse the selected folder

LEFT ARROW

Collapse the current selection (if it is expanded), or select the parent folder

ALT+LEFT ARROW

View the previous folder

RIGHT ARROW

Display the current selection (if it is collapsed), or select the first subfolder

ALT+RIGHT ARROW

View the next folder

CTRL+Mouse scroll wheel

Change the size and appearance of file and folder icons

ALT+D

Select the Address bar

Get on the BUS – an eleven-day odyssey across America aboard the Career Express bus beginning May 1st in Tampa, Florida and ending May 11th at TechEd 2009 in Los Angeles, California!

Over the last few months, Microsoft has introduced Career Assist, Elevate America, and Thrive—great opportunities and resources, each designed to help you get a job, keep a job, or accelerate you toward your next job.

Our Learning Solutions Partners in the U.S. joined us in holding hundreds of events during Microsoft Skills Week to help raise awareness of our certifications, and of the people who hold them (that’d be you guys).

Here on Born to Learn, we amped up our publishing, bringing you more information and more opportunities; more insights and more answers, all as it happened (and sometimes before!)

In other words: we been busy.

You’d think we’d be ready to take a break, right?

Heck no: We’re fired up! Ready to go!

…go on the road, that is:

Today, we’re announcing Get on the Bus! – an eleven-day odyssey across America aboard the Career Express bus beginning May 1st in Tampa, Florida and ending May 11th at TechEd 2009 in Los Angeles, California!

If you’re along our route, stay tuned for information about MCP and MCT meet-ups, special offers, giveaways and opportunities. If you’re not on our route, follow our trip here as we visit and profile MCPs and MCTs, CPLS partners and IT Academies, authors and user groups, and more—live blogging all the way on the new Born to Learn (more on that next week).

Who would be crazy dedicated enough to live on a bus for eleven days? (and I’m not exaggerating that much: the Career Express is a rock band-style touring bus, complete with bunks, a kitchenette, and workspace… all of which I suspect will come in handy).

That’d be us: your Microsoft Learning Community team and Born to Learn bloggers, and we’re excited to have the opportunity to come to your town!

And because we’re so committed to helping you advance your career; because we’re not about to let a tough economy get in the way of a great opportunity; and because we just love spending time with you guys:

We want to take you with us!

We’re reserving six seats on the Career Express for MCPs and MCTs (U.S. residents only)—you can join us in one of six cities, and we’ll take you to TechEd! You’ll enjoy our scintillatingly geeky conversation on the bus; represent the MCP and MCT communities as we meet lots of Microsoft customers, partners, and community members; be a featured blogger on the new Born to Learn; see America at ground level; and, of course, enjoy our premier technical education (and IMHO professional networking) event of the year: TechEd 2009 – without having to buy a $2,000 show pass!

With such a cool opportunity on the line, though, we need to make sure that only outstanding community representatives join us. How are we going to do that?

We’re going to ask you to decide who comes with us!

How’s that going to work?

Stay tuned… all will be revealed here over the next week, with the full Official Rules and registration site available on Monday, March 23rd.

Want to watch the itinerary develop and see who else will be attending in your town? Join our Facebook event page!

And considering that we’re putting this all together in real time, and there are bound to be frequent updates and limited-time opportunities leading up to and during our tour… follow us on Twitter (@MSLearning) to stay up-to-date.

If you’re in the Tampa, Atlanta, Charlotte, Philadelphia, Columbus, Indianapolis, St. Louis, Kansas City, Denver, Albuquerque, Phoenix, or Las Vegas metro areas—we’re coming to a town near you. And when we do:

Get on the Bus!

Change your web site to meet IE 8 Compatibly

CHECKING COMPATIBILITY
• For those who outsource website management, please contact your developer to determine if
your website is Internet Explorer 8 compatible. And for more general information, please check here.

• For those who manage your own website, reference the Resource links below and/or the
following steps:
1. Download Internet Explorer 8 here.
2. Navigate to your website in the Internet Explorer 8 browser.
3. If pages look as they should, you’re done! If pages look different from how they did in Internet Explorer 7 or
don’t work the same way, follow one of the following options:

• Preferred: Revise site content to support the standards-compliant default view for web
pages in Internet Explorer 8
Internet Explorer 8 supports the HTML 4.01 Specification more closely than any previous version and
supports some features of the HTML 5 Specification. This release of Internet Explorer also offers
full support for CSS 2.1 and supports some popular features of CSS 3.0. For more information, please see
http://msdn.microsoft.com/en-us/library/cc817575.aspx.

Or you can

•Tell Internet Explorer 8 to display your site in Internet Explorer 7 mode
1) On a per-site basis, add the HTTP header: X-UA-Compatible: IE=EmulateIE7
2) On a per-page basis, add a special HTML tag to each document, right after the <title> tag (and before
any other tags following <title>):
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />

Internet Explorer is 8 released

 

This Is It: Windows Internet Explorer 8 Released to Web

 

Build applications, revenue, brand, and customer trust.

 

Build applications, revenue, brand, and customer trust.

In this fast-tracked world, you need a flexible, fast, and secure browser. One with developer tools to help you build applications quickly and deploy them reliably. Designed to work seamlessly with other browsers. Develop once, render always—that’s the Internet Explorer 8 mantra, and it means that you can save time and money writing applications for Web-wide deployment.
With the special features of Internet Explorer 8, like Web Slices and Accelerators, you can extend your presence and brand, and create more services opportunities for your businesses. And it can help you build trust in your business. Because almost everyone using the Internet is at least a little bit worried. About viruses and worms. About spying. About identity theft. That’s why unique features like InPrivate browsing and SmartScreen filter can help you convince your customers that they’re in good hands with your Microsoft-based browser solutions. Stability features like automatic crash recovery build credibility, too.

bullet

Get a complete features overview with this video series.

bullet

Find valuable information and links to key resources in the Internet Explorer 8 FAQ.

bullet

Learn more about Microsoft’s commitment to interoperability.

bullet

Ensure the compatibility of customer sites with the simple metatag option.

bullet

Personalize your browser offerings with the add-ons available in the Internet Explorer 8 Gallery—and get the logos you need, too.

bullet

No-charge support is now available in Online Technical Communities.


Army database may have been breached

An Army database that contains personal information about nearly 1,600 soldiers may have been penetrated by unauthorized users, Army officials have announced.
Soldiers who registered with, or participated in, the Army-sponsored Operation Tribute to Freedom program during the past five years may be affected by the security breach, Army officials said March 10. The service is notifying those soldiers about the issue through e-mail messages and letters.
The information that may have been breached includes the service members’ names, e-mail messages, phone numbers, home addresses, awards received, ranks, gender, ethnicity, and dates the soldiers deployed and returned from their deployment, Army officials said.
Only information that was provided at the time of registration was potentially compromised, officials said. The Criminal Investigation Command is investigating how the password-protected, secure Web-based information was penetrated.
Operation Tribute to Freedom lets soldiers share their stories with the public. The program’s speakers service helps event coordinators find the soldiers for events and the service members speak about their experiences in Iraq and Afghanistan.

as reported by

Doug Beizer is a staff writer for Federal Computer Week

STEP Member

What is STEP ?
STEP = Springboard Series Technical Experts Panel
I am one of 70 people world wide chosen as the original members of the program. Our volunteer job is to inform you with talks and presentations on  who deals closely with Windows 7 and Server 2008 r2. Last weekend i did a talk in Florida for the FACUG with over 140 user where we went over new features about Windows 7.

Stay turned as i post my schedule  for upcoming events I be talking at, We also be working on build events, where you can come and get help loading Windows 7 on you computer.

Zombies and botnets: Help keep your computer under your control

Here a great article from a friend on this important topic.

Online criminals can use a virus to take control of large numbers of computers at a time, and turn them into "zombies" that can work together as a powerful "botnet" to perform malicious tasks.

Botnets, which can include as many as 100,000 individual "zombie" computers, can distribute spam e-mail, spread viruses, attack other computers and servers, and commit other kinds of crime and fraud.

Botnets are highly valued by online criminals, and have become a serious problem on the Internet.

How to tell if your computer has been infected

A virus that makes your computer into a zombie might cause your computer to slow down, display mysterious messages, or work in an unexpected manner.

These viruses usually do not disable your computer, because zombie computers must be plugged in and connected to the Internet in order for the botnet to work.

You can get a free virus scan with the Windows Live OneCare safety scanner. If you want continuous protection, you should use antivirus software such as Windows Live OneCare, which is free for 90 days.

Read other ways to tell if a virus has infected your computer.

What to do if your computer is infected

If your computer shows symptoms of virus infection, first make sure that the software on your computer is up to date. Then run the Microsoft Malicious Software Removal Tool. The Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software and helps remove any infection found.

Read detailed information about how to help remove a virus.

5 ways to help keep your computer from becoming a zombie

1.

Never open an attachment in an e-mail, instant , or mobile message unless you know exactly what the attachment is, even if it’s from someone that you know. Attachments can contain e-mail viruses.

2.

Use an Internet firewall.

  Note: Windows XP with Service Pack 2 (SP2) has a firewall already built-in and active.

3.

Stay up to date. Visit Microsoft Update and turn on Automatic Updates.

Note: If you’ve installed the 2007 Microsoft Office System, Microsoft Office 2003 or Microsoft Office XP, Automatic Updates will also update your Office programs. If you have an earlier version of Microsoft Office, use Microsoft Office Update.

4.

Subscribe to industry standard antivirus software and antispyware software, and keep them current. Microsoft offers Windows Live OneCare, which is free for 90 days and Windows Defender. Windows Defender comes with Windows Vista. If you use Windows XP SP2, you can download Windows Defender for no charge.

5.

Use licensed software products. Botnets are often comprised mostly of computers that run illegally copied versions of operating system and productivity software. Unlicensed software can be more susceptible to viruses, and can even come with viruses already installed without your knowledge.

 

to see the orginal posted article go here

 

Well done Rob

Bitlocker to Go – or securing external devices in Windows

 

Windows Vista was the first to introduce BitLocker, full-disk encryption. With server 2008 and Vista Service pack1, we were given the to encrypt other non-boot fixed drives in addition to the boot partition.   In Windows 7 (both the client and Server versions), you now the ability to protect removable storage devices, such as USB-based hard drives, flash devices, and other Microsoft is call this feature "BitLocker To Go".

BitLocker to GO is only available in the Enterprise and Ultimate versions of Windows 7, to create the protected storage. Once this is added to a storage device, that device can be used normally with any version of Windows XP , Vista, and Windows 7. So now you can protect external hard drive and flash drives.

I be speaking at Tech-ed This year about NAP

 

Server 2008 and Vista working better together but until then here is some information for you

 

Implementing Network Access Protection in Windows Server 2008

This Snack describes the benefits of implementing Network Access Protection (NAP) in Windows Server 2008. It describes how to configure network and health policies for various types of clients. It identifies the options for configuring Dynamic Host Configuration Protocol (DHCP) enforcement for NAP and demonstrates the steps for testing a NAP implementation with DHCP enforcement.