

We are one of the technical leaders in INDIA, we are providing solutions & training in Hardware networking & JAVA.............

| CTRL+C (Copy) |
• | CTRL+X (Cut) |
• | CTRL+V (Paste) |
• | CTRL+Z (Undo) |
• | DELETE (Delete) |
• | SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) |
• | CTRL while dragging an item (Copy the selected item) |
• | CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) |
• | F2 key (Rename the selected item) |
• | CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) |
• | CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) |
• | CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) |
• | CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) |
• | CTRL+SHIFT with any of the arrow keys (Highlight a block of text) |
• | SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) |
• | CTRL+A (Select all) |
• | F3 key (Search for a file or a folder) |
• | ALT+ENTER (View the properties for the selected item) |
• | ALT+F4 (Close the active item, or quit the active program) |
• | ALT+ENTER (Display the properties of the selected object) |
• | ALT+SPACEBAR (Open the shortcut menu for the active window) |
• | CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously) |
• | ALT+TAB (Switch between the open items) |
• | ALT+ESC (Cycle through items in the order that they had been opened) |
• | F6 key (Cycle through the screen elements in a window or on the desktop) |
• | F4 key (Display the Address bar list in My Computer or Windows Explorer) |
• | SHIFT+F10 (Display the shortcut menu for the selected item) |
• | ALT+SPACEBAR (Display the System menu for the active window) |
• | CTRL+ESC (Display the Start menu) |
• | ALT+Underlined letter in a menu name (Display the corresponding menu) |
• | Underlined letter in a command name on an open menu (Perform the corresponding command) |
• | F10 key (Activate the menu bar in the active program) |
• | RIGHT ARROW (Open the next menu to the right, or open a submenu) |
• | LEFT ARROW (Open the next menu to the left, or close a submenu) |
• | F5 key (Update the active window) |
• | BACKSPACE (View the folder one level up in My Computer or Windows Explorer) |
• | ESC (Cancel the current task) |
• | SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) |
• | CTRL+SHIFT+ESC (Open Task Manager) |
If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control.
• | CTRL+TAB (Move forward through the tabs) |
• | CTRL+SHIFT+TAB (Move backward through the tabs) |
• | TAB (Move forward through the options) |
• | SHIFT+TAB (Move backward through the options) |
• | ALT+Underlined letter (Perform the corresponding command or select the corresponding option) |
• | ENTER (Perform the command for the active option or button) |
• | SPACEBAR (Select or clear the check box if the active option is a check box) |
• | Arrow keys (Select a button if the active option is a group of option buttons) |
• | F1 key (Display Help) |
• | F4 key (Display the items in the active list) |
• | BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) |
• | Windows Logo (Display or hide the Start menu) |
• | Windows Logo+BREAK (Display the System Properties dialog box) |
• | Windows Logo+D (Display the desktop) |
• | Windows Logo+M (Minimize all of the windows) |
• | Windows Logo+SHIFT+M (Restore the minimized windows) |
• | Windows Logo+E (Open My Computer) |
• | Windows Logo+F (Search for a file or a folder) |
• | CTRL+Windows Logo+F (Search for computers) |
• | Windows Logo+F1 (Display Windows Help) |
• | Windows Logo+ L (Lock the keyboard) |
• | Windows Logo+R (Open the Run dialog box) |
• | Windows Logo+U (Open Utility Manager) |
| Right SHIFT for eight seconds (Switch FilterKeys either on or off) |
• | Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) |
• | Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) |
• | SHIFT five times (Switch the StickyKeys either on or off) |
• | NUM LOCK for five seconds (Switch the ToggleKeys either on or off) |
• | Windows Logo +U (Open Utility Manager) |
| END (Display the bottom of the active window) |
• | HOME (Display the top of the active window) |
• | NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) |
• | NUM LOCK+Plus sign (+) (Display the contents of the selected folder) |
• | NUM LOCK+Minus sign (-) (Collapse the selected folder) |
• | LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) |
• | RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) |
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
• | RIGHT ARROW (Move to the right or to the beginning of the next line) |
• | LEFT ARROW (Move to the left or to the end of the previous line) |
• | UP ARROW (Move up one row) |
• | DOWN ARROW (Move down one row) |
• | PAGE UP (Move up one screen at a time) |
• | PAGE DOWN (Move down one screen at a time) |
• | HOME (Move to the beginning of the line) |
• | END (Move to the end of the line) |
• | CTRL+HOME (Move to the first character) |
• | CTRL+END (Move to the last character) |
• | SPACEBAR (Switch between Enlarged and Normal mode when a character is selected) |
| CTRL+O (Open a saved console) |
• | CTRL+N (Open a new console) |
• | CTRL+S (Save the open console) |
• | CTRL+M (Add or remove a console item) |
• | CTRL+W (Open a new window) |
• | F5 key (Update the content of all console windows) |
• | ALT+SPACEBAR (Display the MMC window menu) |
• | ALT+F4 (Close the console) |
• | ALT+A (Display the Action menu) |
• | ALT+V (Display the View menu) |
• | ALT+F (Display the File menu) |
• | ALT+O (Display the Favorites menu) |
| CTRL+P (Print the current page or active pane) |
• | ALT+Minus sign (-) (Display the window menu for the active console window) |
• | SHIFT+F10 (Display the Action shortcut menu for the selected item) |
• | F1 key (Open the Help topic, if any, for the selected item) |
• | F5 key (Update the content of all console windows) |
• | CTRL+F10 (Maximize the active console window) |
• | CTRL+F5 (Restore the active console window) |
• | ALT+ENTER (Display the Properties dialog box, if any, for the selected item) |
• | F2 key (Rename the selected item) |
• | CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console) |
| CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box) |
• | ALT+PAGE UP (Switch between programs from left to right) |
• | ALT+PAGE DOWN (Switch between programs from right to left) |
• | ALT+INSERT (Cycle through the programs in most recently used order) |
• | ALT+HOME (Display the Start menu) |
• | CTRL+ALT+BREAK (Switch the client computer between a window and a full screen) |
• | ALT+DELETE (Display the Windows menu) |
• | CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.) |
• | CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.) |
| CTRL+B (Open the Organize Favorites dialog box) |
• | CTRL+E (Open the Search bar) |
• | CTRL+F (Start the Find utility) |
• | CTRL+H (Open the History bar) |
• | CTRL+I (Open the Favorites bar) |
• | CTRL+L (Open the Open dialog box) |
• | CTRL+N (Start another instance of the browser with the same Web address) |
• | CTRL+O (Open the Open dialog box, the same as CTRL+L) |
• | CTRL+P (Open the Print dialog box) |
• | CTRL+R (Update the current Web page) |
• | CTRL+W (Close the current window) |
| Some keyboard shortcuts may not work if StickyKeys is turned on in Accessibility Options. |
• | Some of the Terminal Services client shortcuts that are similar to the shortcuts in Remote Desktop Sharing are not available when you use Remote Assistance in Windows XP Home Edition. |
• | Some of the other Microsoft Knowledge Base articles that have similar information as this article are: 126449 (http://support.microsoft.com/kb/126449/) Keyboard shortcuts for Windows 255090 (http://support.microsoft.com/kb/255090/) Keystroke navigation in Windows 2000 Help |
• | Refer to Help for the most current information regarding keyboard navigation and visit the following Microsoft Accessibility Web site for additional information that relates to keyboard shortcuts and keyboard navigation in Windows and other Microsoft products: http://www.microsoft.com/enable (http://www.microsoft.com/enable) |
• | Microsoft Windows XP Home Edition |
• | Microsoft Windows XP Professional By Mr. Raja mohan |
Computer Virus FAQ for New Users This FAQ answers some of the questions that new users ask about computerviruses and Trojan horse programs. It also tries to clear up some commonmisconceptions about viruses and E-mail. If you need help with a virus infection or want more advanced informationabout viruses, please see 'Dealing with virus infections:' and 'Sources ofadditional information: near the end of this FAQ. And if you don't read anything else, at least read the very first topic:"Why should I care...". -------------------------------------------------------------------------- Why should I care about computer viruses? Isn't all this just a bunch ofhype drummed up by marketing departments for anti-virus software companies? I'm writing this in early May 1999. For the past week, the alt.comp.virus newsgroup has been flooded with pleas for help from people whose computers were clobbered by the CIH virus, which activated on April 26. Many of those people wound up having to put in large amounts of time and effort to get their computers operational; some people have had to buy replacement chips or pay for a repair shop to get their systems back in operation. And some of those people have lost data they will never be able to replace. Yet the CIH virus was well-known almost a year before it activated, and virtually every single current anti-virus program could handle it. But a lot of people didn't have a-v software, and many of those who did have it didn't use it regularly or keep it updated. So a lot of people lost time, money, and irreplaceable data when the CIH virus activated simply because they didn't take basic precautions to protect themselves. The virus threat is not going away: from reading the alt.comp.virus newsgroup, it's obvious that there are lots of people who would just love to create the same kind of havoc with their own virus creations. -------------------------------------------------------------------------- 1. What is a computer virus? A computer virus is a program designed to spread itself by first infectingexecutable files or the system areas of hard and floppy disks and thenmaking copies of itself. Viruses usually operate without the knowledge ordesire of the computer user. 2. What kind of files can spread viruses? Viruses have the potential to infect any type of executable code, not justthe files that are commonly called 'program files'. For example, someviruses infect executable code in the boot sector of floppy disks or insystem areas of hard drives. Another type of virus, known as a 'macro'virus, can infect word processing and spreadsheet documents that usemacros. And it's possible for HTML documents containing JavaScript or othertypes of executable code to spread viruses or other malicious code. Since virus code must be executed to have any effect, files that thecomputer treats as pure data are safe. This includes graphics and soundfiles such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txtfiles. For example, just viewing picture files won't infect your computerwith a virus. The virus code has to be in a form, such as an .exe programfile or a Word .doc file, that the computer will actually try to execute. 3. How do viruses spread? When you execute program code that's infected by a virus, the virus codewill also run and try to infect other programs, either on the same computeror on other computers connected to it over a network . And the newlyinfected programs will try to infect yet more programs. When you share a copy of an infected file with other computer users,running the file may also infect their computers; and files from thosecomputers may spread the infection to yet more computers. If your computer is infected with a boot sector virus, the virus tries towrite copies of itself to the system areas of floppy disks and hard disks.Then the infected floppy disks may infect other computers that boot fromthem, and the virus copy on the hard disk will try to infect still morefloppies. Some viruses, known as 'multipartite' viruses, can spread both by infectingfiles and by infecting the boot areas of floppy disks. 4. What do viruses do to computers? Viruses are software programs, and they can do the same things as any otherprograms running on a computer. The actual effect of any particular virusdepends on how it was programmed by the person who wrote the virus. Some viruses are deliberately designed to damage files or otherwiseinterfere with your computer's operation, while others don't do anything buttry to spread themselves around. But even the ones that just spreadthemselves are harmful, since they damage files and may cause other problemsin the process of spreading. Note that viruses can't do any damage to hardware: they won't melt down yourCPU, burn out your hard drive, cause your monitor to explode, etc. Warningsabout viruses that will physically destroy your computer are usually hoaxes,not legitimate virus warnings. 5. What is a Trojan horse program? A type of program that is often confused with viruses is a 'Trojan horse'program. This is not a virus, but simply a program (often harmful) thatpretends to be something else. For example, you might download what you think is a new game; but when yourun it, it deletes files on your hard drive. Or the third time you startthe game, the program E-mails your saved passwords to another person. Note: simply downloading a file to your computer won't activate a virus orTrojan horse; you have to execute the code in the file to trigger it. Thiscould mean running a program file, or opening a Word/Excel document in aprogram (such as Word or Excel) that can execute any macros in the document. 6. What's the story on viruses and E-mail? You can't get a virus just by reading a plain-text E-mail message or Usenetpost. What you have to watch out for are encoded messages containingembedded executable code (i.e., JavaScript in an HTML message) or messagesthat include an executable file attachment (i.e., an encoded program file ora Word document containing macros). In order to activate a virus or Trojan horse program, your computer has toexecute some type of code. This could be a program attached to an E-mail, aWord document you downloaded from the Internet, or something received on afloppy disk. There's no special hazard in files attached to Usenet posts orE-mail messages: they're no more dangerous than any other file. 7. What can I do to reduce the chance of getting viruses from E-mail? Treat any file attachments that might contain executable code as carefullyas you would any other new files: save the attachment to disk and then checkit with an up-to-date virus scanner before opening the file. If your E-mail or news software has the ability to automatically executeJavaScript, Word macros, or other executable code contained in or attachedto a message, I strongly recommend that you disable this feature. My personal feeling is that if an executable file shows up unexpectedlyattached to an E-mail, you should delete it unless you can positivelyverify what it is, who it came from, and why it was sent to you. The recent outbreak of the Melissa virus was a vivid demonstration of theneed to be extremely careful when you receive E-mail with attached files ordocuments. Just because an E-mail appears to come from someone you trust,this does NOT mean the file is safe or that the supposed sender had anythingto do with it. -------------------------------------------------------------------------- Some general tips on avoiding virus infections: 1. Install anti-virus software from a well-known, reputable company,UPDATE it regularly, and USE it regularly. New viruses come out every single day; an a-v program that hasn't beenupdated for several months will not provide much protection against currentviruses. 2. In addition to scanning for viruses on a regular basis, install an 'onaccess' scanner (included in most good a-v software packages) and configureit to start automatically each time you boot your system. This will protectyour system by checking for viruses each time your computer accesses anexecutable file. 3. Virus scan any new programs or other files that may contain executablecode before you run or open them, no matter where they come from. Therehave been cases of commercially distributed floppy disks and CD-ROMsspreading virus infections. 4. Anti-virus programs aren't very good at detecting Trojan horseprograms, so be extremely careful about opening binary files and Word/Exceldocuments from unknown or 'dubious' sources. This includes posts in binarynewsgroups, downloads from web/ftp sites that aren't well-known or don'thave a good reputation, and executable files unexpectedly received asattachments to E-mail or during an on-line chat session. 5. If your E-mail or news software has the ability to automatically executeJavaScript, Word macros, or other executable code contained in or attachedto a message, I strongly recommend that you disable this feature. 6. Be _extremely_ careful about accepting programs or other files duringon-line chat sessions: this seems to be one of the more common means thatpeople wind up with virus or Trojan horse problems. And if any other familymembers (especially younger ones) use the computer, make sure they know notto accept any files while using chat. 7. Do regular backups. Some viruses and Trojan horse programs will erase orcorrupt files on your hard drive, and a recent backup may be the only way torecover your data. Ideally, you should back up your entire system on a regular basis. If thisisn't practical, at least backup files that you can't afford to lose or thatwould be difficult to replace: documents, bookmark files, address books,important E-mail, etc. -------------------------------------------------------------------------- Dealing with virus infections: First, keep in mind "Nick's First Law of Computer Virus Complaints": "Just because your computer is acting strangely or one of your programs doesn't work right, this does NOT mean that your computer has a virus." 1. If you haven't used a good, up-to-date anti-virus program on yourcomputer, do that first. Many problems blamed on viruses are actuallycaused by software configuration errors or other problems that have nothingto do with a virus. 2. If you do get infected by a virus, follow the directions in youranti-virus program for cleaning it. If you have backup copies of theinfected files, use those to restore the files. Check the files you restoreto make sure your backups weren't infected. 3. For assistance, check the web site and support services for youranti-virus software. 4. The "[alt.comp.virus] FAQ Part 1/4" (see below) includes an excellentsection on initial steps for dealing with a suspected virus infection. 5. For discussions about viruses and help dealing with them, visit or ; please check the newsgroup FAQs before posting. Keep in mind that posters in c.v and in a.c.v, like postersin any newsgroup, have a wide range of technical expertise and motivations. Note: in general, drastic measures such as formatting your hard drive orusing FDISK should be avoided. They are frequently useless at cleaning avirus infection, and may do more harm than good unless you're veryknowledgeable about the effects of the particular virus you're dealing with. -------------------------------------------------------------------------- What is the best anti-virus software available? Posters in the alt.comp.virus newsgroup have been discussing that for yearsand still haven't reached a consensus. :-) The following web sites have sections with reviews of various a-v programs: <http://www.zdnet.com/pcmag/features/utilities98/antivirus/index.html><http://www.uta.fi/laitokset/virus/><http://agn-www.informatik.uni-hamburg.de/vtc/naveng.htm> -------------------------------------------------------------------------- Sources of additional information: For more information, and advice on avoiding and dealing with virusinfections, see the FAQs for and : "VIRUS-L/comp.virus Frequently Asked Questions (FAQ)" "[alt.comp.virus] FAQ" (currently parts 1 to 4) "ALT.COMP.VIRUS MINI-FAQ - READ BEFORE POSTING" "Viruses and the Mac FAQ" You can find the FAQs in the above newsgroups, in , or in the Usenet FAQ archive at <http://www.faqs.org/faqs/computer-virus>. Another source of information is the data on the web sites of anti-virussoftware companies. You can find many anti-virus software companies listedin the Virus Protection section of the Yahoo directory, at<http://www.yahoo.com/Business_and_Economy/Companies/Computers/Software/System_Utilities/Utilities/Virus_Protection/>. Links to a variety of pages with virus-related information can be found inthe Virus section of Yahoo, at<http://www.yahoo.com/Computers_and_Internet/Security_and_Encryption/Viruses/>. A useful site for Macintosh virus information is <http://www.macvirus.com/>. The newsgroups and are available for information, assistance, and discussions of all aspects of computer viruses.Please check the FAQs before posting. For information about some of the virus hoaxes and bogus warnings that youmay run into on-line, see my 'Scams and Hoaxes FAQ', available at<http://www.faqs.org/faqs/net-abuse-faq/scams/> or in the newsgroup.