Thursday, May 15, 2008

Login Without Registration



Go to

-http://bugmenot.com/


and type the URL of the website you want to log into.Examples:-http://www.nytimes.com/, -http://www.winnetmag.com/etcetera.


Another (and better) way is changing the user agent of your browser to:Googlebot/2.1+
-http://www.googlebot.com/bot.html


This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from
-http://www.chrispederick.com/work/firefox/useragentswitcher/and add the Googlebot user agent.

Friday, May 9, 2008

Strong Password



The passwords are the keys we use to access personal information that we've stored on our computer and in our online accounts.


What makes a strong password?


To an attacker, a strong password should appear to be a random string of characters. The following criteria can help our passwords do so:


Make it lengthy


Each character that we add to our password increases the protection that it provides many times over.


The passwords should be 8 or more characters in length; 14 characters or longer is ideal.


Many systems also support use of the space bar in passwords, so we can create a phrase made of many words (a "pass phrase"). A pass phrase is often easier to remember than a simple password, as well as longer and harder to guess.


Combine letters, numbers, and symbols:


The greater variety of characters that we have in our password, the harder it is to guess. Other important specifics include:
Use words and phrases that are easy for US to remember, but difficult for others to guess.

The easiest way to remember our passwords and pass phrases is to write them down.
Contrary to popular belief, there is nothing wrong with writing passwords down, but they need to be adequately protected in order to remain secure and effective.


In general, passwords written on a piece of paper are more difficult to compromise across the Internet than a password manager, Web site, or other software-based storage tool, such as password managers.


E.g.: Phrase Creates this password
Jack and Jill went up the hill to fetch a pail of water = J&Jwuth2fapow
I spent too much at the fair last night = Is2matfln
I like Cars = IL1k3c@rs

Network Commands



Net:
Displays various properties like Accounts, Statistics, etc.

Syntax:
net [parameter]

Net Start:
Starts a service. Used without parameters, net start displays a list of services that are currently operating.

Syntax:
net start [service name]

Net Stop:
Stops a service.

Syntax:

net stop [service name]

NbtStat:
Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. Nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help.

Syntax:
nbtstat [parameters]

NetStat:
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.

Syntax:

netstat [parameters]

TraceRt:
Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values. The path displayed is the list of near-side router interfaces of the routers in the path between a source host and a destination. The near-side interface is the interface of the router that is closest to the sending host in the path. Used without parameters, tracert displays help.

Syntax:

tracert [parameters]

IPConfig:
Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Syntax:
ipconfig [parameters]

ARP:
Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer. Used without parameters, arp displays help.

Syntax:

arp [parameters]

NsLookUp:
Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line tool is available only if you have installed the TCP/IP protocol.

Syntax:
nslookup [parameters]

Finger:
Displays information about a user or users on a specified remote computer (typically a computer running UNIX) that is running the Finger service or daemon. The remote computer specifies the format and output of the user information display. Used without parameters, finger displays help.

Syntax:
finger [parameters]

Ping:
Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times. Ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays help.

Syntax:
ping [parameters]

FTP:
Transfers files to and from a computer running a File Transfer Protocol (FTP) server service such as Internet Information Services. Ftp can be used interactively or in batch mode by processing ASCII text files.

Syntax:
ftp [parameters]

HostName:
Displays the host name portion of the full computer name of the computer.

Syntax:

hostname

RCP:
Copies files between a Windows XP computer and a system running rshd, the remote shell service (daemon). Windows XP and Windows 2000 do not provide rshd service. Used without parameters, rcp displays help.

Syntax:
rcp [parameters]

REXEC:
Runs commands on remote computers running the Rexec service (daemon). The rexec command authenticates the user name on the remote computer before executing the specified command. Windows XP and Windows 2000 do not provide the Rexec service. Used without parameters, rexec displays help.

Syntax:
rexec [parameters]

Route:
Displays and modifies the entries in the local IP routing table. Used without parameters, route displays help.

Syntax:
route [parameters]

LPQ:
Displays the status of a print queue on a computer running Line Printer Daemon (LPD). Used without parameters, lpq displays command-line help for the lpq command.

Syntax:
lpq [parameters]

RSH:
Runs commands on remote computers running the RSH service or daemon. Windows XP and Windows 2000 do not provide an RSH service. An RSH service called Rshsvc.exe is provided with the Windows 2000 Server Resource Kit. Used without parameters, rsh displays help.

Syntax:
rsh [parameters]

LPR:
Sends a file to a computer running Line Printer Daemon (LPD) in preparation for printing. Used without parameters, lpr displays command-line help for the lpr command.

Syntax:
lpr [parameters]

TFTP:
Transfers files to and from a remote computer, typically a computer running UNIX, that is running the Trivial File Transfer Protocol (TFTP) service or daemon. Used without parameters, tftp displays help

Syntax:
tftp [parameters]

TELNET (CLIENT):
The telnet commands allow you to communicate with a remote computer that is using the Telnet protocol. You can run telnet without parameters in order to enter the telnet context, indicated by the Telnet prompt (telnet>). From the Telnet prompt, use the following commands to manage a computer running Telnet Client.

Syntax:
telnet [parameter]

TELNET (ADMINISTRATOR):
The telnet administrative commands.

Syntax:
tlntadmn [parameter]

Malware Codes Glossary



ActiveX:


It's a type of Browser Plug-in. ActiveX is a set of technologies from Microsoft that enables interactive content for the World Wide Web. As ActiveX security settings in Internet Explorer can allow web pages to automatically and secretly install ActiveX controls, they can be a significant security threat. ActiveX controls can access files on your hard drive.


Adware:


A type of Advertising Display Software that delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions, and therefore may also be categorized as Tracking Technologies. Some consumers may want to remove Adware if they object to such tracking, do not wish to see the advertising caused by the program, or are frustrated by its effects on system performance.
On the other hand, some users may wish to keep particular adware programs if their presence subsidizes the cost of a desired product or service or if they provide advertising that is useful or desired, such as ads that are competitive or complementary to what the user is looking at or searching for.


Alternate Data Stream:


An extension to Microsoft's Windows NT File System (NTFS) that provides compatibility with files created using Apple's Hierarchical File System (HFS). Applications must write special code if they want to access and manipulate data stored in an alternate stream. Some applications use these streams to evade detection.


Backdoor:


Backdoors are remote administration utilities that open infected machines to external control via the Internet or a local network.


Bluetooth-Worm:


A type of Worm that uses Bluetooth technology as its spreading vector. Bluetooth is a wireless communications technology. See also Worm.


Botnet: Botnet is a term formed from two words â€" Robot and Network. A Bot, sometimes referred to as Zombie, is a computer that has been infected with malware that allows a remote malicious user access to the computer. With that remote access, the malicious user can control and harness the power of all such Bots into a powerful network used for criminal activity. Botnets have been used for sending spam remotely, installing more malware without consent, and other illicit purposes.


Browser Helper Object (BHO):


A Browser Helper Object (BHO) is a program that runs automatically every time that the Internet Explorer browser is launched. It is meant to extend the functionality of the browser, but it can also track how you use the Internet. Toolbars are a common form of BHO.


Browser Plug-in:


A software component that interacts with a Web browser to provide capabilities or perform functions not otherwise included in the browser. Typical examples are plug-ins to display specific graphic formats, to play multimedia files or to add toolbars which include search or antiphishing services. Plug-ins can also perform potentially unwanted behaviors such as redirecting search results or monitoring user browsing behavior, connections history, or installing other unwanted software like nuisance or harmful adware.


Types of Browser plug-ins include:


  • ActiveX Controls: Microsoft Internet Explorer
  • Browser Helper Object (BHOs): Microsoft Internet Explorer
  • Mozilla Firefox Extensions: Mozilla Firefox


Cookie:


A piece of data that a Web site or a third party that was commissioned or approved by the website â€" saves on users' computers' hard drives and retrieves when the users revisit that Web site. Some cookies may use a unique identifier that links to information such as logon or registration data, online "shopping cart" selections, user preferences, Web sites a user has visited, et cetera. See also Tracking Cookies.


Data Miner:


A Data Miner is a program that can collect information on how you browse and use websites. The collected information can include data gathered from forms you fill and submit. Usually data miners work without your knowledge.


Dialer:


A Dialer is a program which tries to connect to an expensive pay-per-minute phone number using the computer's modem. Most malicious dialers work without your awareness or permission.


Distributed Denial-of-Service (DDoS):


Attack A means of burdening or effectively shutting down a remote system by bombarding it with traffic from many other computers. DDoS attacks are often launched using the compromised systems of Internet users, often using botnets. An attacker will exploit a vulnerability in one computer system and make it the DDoS master using Remote Control Software. Later, the intruder will use the master system to identify and manage zombies that can perform the attack. Email-Worm A type of Worm that uses E-mail as its spreading vector.
See also Worm.


HackTool:


A utility designed to penetrate remote computers.


Hoax:


A Hoax is a type of chain letter that contains false information, often spreading a false virus warning. Do note that we generally only focus on virus-related hoaxes. We can not evaluate whether non-computer related folklore stories are urban legends or true stories


Hosts File:


The Hosts File is a lot like an address book. When you type an address into your web browser, the address is translated into a numeric IP address. If the address can be found from the Hosts file, your computer will use it. If not, your computer will connect to the DNS service of your Internet Service Provider. Some malware can edit your Hosts file to hijack and redirect a web connection to a completely different site on the Internet/World Wide Web.


IM-Worm:


A type of Worm that uses Instant Messaging (IM) software as its spreading vector. MSN Messenger, AOL Instant Messenger (AIM), and Yahoo Messenger are examples of IM applications. See also Worm.


Intended:


When malware is typed as Intended, it is software that contains bugs or other problems that prevent it from functioning as the author intended. It would have been malware, and future versions still might be, but the current version is defective.


IRC-Worm:


A type of Worm that uses Internet Relay Chat (IRC) as its spreading vector. IRC is a form of real-time Internet chat. It is mainly designed for group communication in discussion forums known as channels. See also Worm.


Joke:


A Joke is a program with annoying or funny functionality, but it is not destructive.


Macro:


Malware that is encoded as a macro embedded in a document.


Malware:


Malware is a common name for all kinds of unwanted software such as viruses, worms, trojans and jokes.


Monitor:


A Monitoring Tool can monitor and record all computer activities, including each keystroke you type on the keyboard.


Multipartite Virus:


A Multipartite Virus is a virus composed of several parts. Every part of a multipartite virus needs to be cleaned away, to give assurance of non-infection.


Net-Worm:


A Network Worm is a program that can replicate itself by sending copies in e-mail messages or over a network.


On-Access Scanner:


Real-time scanner, a background process that provides a constant guard against viruses.


On-Demand Scanner:


An On-Demand Scanner is a virus scanner which is started manually.


P2P-Worm:


A type of Worm that uses Peer-to-peer networking software as its spreading vector. See also Worm.


Pharming:


Pharming (pronounced farming) is a scam technique that is similar to phishing. It is an attempt to steal personal information using false web sites. Pharming attacks seed false information on Internet DNS servers that provide location information. The result is that individuals are directed to web sites to seem to be genuine, but are actually false.


Phishing:


In a computing context, Phishing is an impersonation of a corporation or other trusted institution. The goal of the impersonation is to extract passwords or other sensitive information from the victim. It is a form of criminal activity that utilizes social engineering techniques. Phishing is typically done using e-mail or an instant messaging program. The attempt of the message is to appear to be from an authentic source so that victim will either directly respond, or will open a URL link to a fake web site run by the criminals. Phishing (pronounced fishing) is a scam technique using e-mail that links to false, but genuine looking web sites, most often of Banks, that attempt to steal personal information. The spam bait is used with the odds that it will be ignored by most, because it will be out of context, but with the hope that some will be hooked.


Polymorphic Virus:


A Polymorphic Virus is a virus which changes itself (mutates) as it passes through host files, making disinfection a serious challenge.


Real-Time Scanner:


A Real-Time Scanner is a scanner that operates in the background, allowing a user to continue working at normal speed, with no significant slowing.


Replication Mechanism:


Replication Mechanisms are a mandatory part of every virus and worm. If it doesn't have a replication mechanism, it's by definition not a virus or worm.


Riskware:


Riskware is software that can pose a security risk that is not malicious by its nature. Such software has usefulness that can assist a knowledgeable user, but can also be bundled and used by malicious software. Examples include: FTP servers, IRC clients, Network Sniffers, overeager DRM software, and Remote Administration. Additionally, this category includes software that cannot be included in other malware categories. Some software is not malicious, but does not provide the functionality claimed. If the functionality of software is suspect, it may be added to the riskware category.


Rogue:


A suspect antispyware application that engages in doubious practices such as false positives. Illegal advertisements are sometimes used and trojans are sometimes installed to provide an infection to "clean". Rogue antispyware is often not malicious itself, but it does not provide the functionality claimed. Also known as Scareware.


Rootkit:


Rootkits are a technique that allows malware to hide from computer operating systems and from computer users. Rootkit techniques create stealth programs that run at a "lower" level than the user can see with normal software utilities. Malware attempts to use this method to avoid detection by security software.


Spyware:


Spyware is software that performs actions such as creating unsolicited pop-ups, hijacks home/search pages, or redirects browsing results. The term Spyware has been used in two ways: In its narrow sense, Spyware is a term for Tracking Software deployed without adequate notice, consent, or control for the user. In its broader sense, Spyware is used as a synonym for Spyware (narrow) and Other Potentially Unwanted Technologies.


Stealth Virus:


A Stealth Virus is a virus that hides itself by intercepting disk access requests. When an antivirus program tries to read files or boot sectors to find the virus, the stealth virus feeds the antivirus program a clean image of file or boot sector.


Time Bomb:


A Time Bomb is a destructive action triggered at some specific date or time.


Toolbar:


Toolbars are add-on applications for Web browser software. They provide additional functionality that is often not included within the browser. Toolbar software can be used for Tracking users' online behavior.


Tracking Cookies:


Tracking Cookies track your web browsing habits. They can collect information about pages and advertisements you have seen or any other activity during browsing. Different websites can share tracking cookies, and each website with the same tracking cookie can read the information and write new information into it. A Tracking Cookie is any cookie used for tracking users' surfing habits. Tracking Cookies are a form of Tracking Technology. They are typically used by advertisers wishing to analyze and manage advertising data, but they may be used to profile and track user activity more closely. However, tracking cookies are simply a text file, and far more limited in capability than executable software installed on users' computers. While installed software can potentially record any data or activity on a computer, cookies are simply a record of visits or activity with a single Website or its affiliated sites. See also Cookie.


Trackware:


A software that monitors user behavior, or gathers information about the user, sometimes including personally identifiable or other sensitive information.


Trojan:


A Trojan or Trojan House is a software application with hidden destructive functionality. It is a program that appears to do one thing but actually does another.


Trojan-Downloader:


Downloads and installs new malware or adware on the targeted computer.


Trojan-Dropper:


Used to install other malware on a computer without the computer user's knowledge.


Trojan-Proxy:


These Trojans function as a proxy server and provide anonymous access to the Internet from infected machines.


Trojan-PSW:


This type of Trojan is designed to steal passwords.


Trojan-Spy:


A type of Trojan that includes a variety of spy programs and keyloggers.


Virus:


As you know, a Virus is a computer program that replicates by attaching itself to another object and/or program.


Vulnerability:


Vulnerabilities open security holes that can allow other applications to connect to the computer system without your authorization or knowledge.


W32:


W32 is a Platform designator for 32-bit versions of Microsoft Windows. 32-bit refers to the chip architecture that the version of Windows is designed for.


Worm:


A Worm is a computer program that replicates independently by sending itself to other systems.
Worms are "network viruses", primarily replicating on networks. Usually a worm will execute itself automatically on a remote machine without any extra help from a user. However, there are worms, such as mass-mailer worms, that will not always automatically execute themselves without the help of a user. Multiple vectors of spreading result in malware being typed as "Worm". A single vector of spreading will result in a more specific type. Examples: "Net-Worm", "IM-Worm", or "Bluetooth-Worm".


Zombie:


See 'Botnet'.

MS Excel Shortcuts





  • Apply the outline border to the selected cells. [ Ctrl-Shift-& ]
  • Apply the Date format with the day, month, and year.[ Ctrl-Shift-# ]
  • Apply the Time format with the hour and minute, and AM or PM. [ Ctrl-Shift-@ ]
  • Enter the current time. [ Ctrl-Shift-: ]
  • Enter the current date. [ Ctrl-; ]
  • Hide the selected rows. [ Ctrl-9 ]
  • Hide the selected columns. [ Ctrl-0 ]
  • Alternate between displaying cell values and displaying formulas in the worksheet.[ Ctrl-` ]
  • Display the Find and Replace dialog box, with the Replace tab selected. [ Ctrl-H ]
  • Display the Insert Hyperlink dialog box for new hyperlink. [ Ctrl-K ]
  • Display the Print Preview window. [ Ctrl-F2 ]
  • Switch to the next workbook window. [ Ctrl-F6 ]
  • Display the Macro dialog box to create, run, edit, or delete a macro. [ Alt-F8 ]

Photoshop Shortcut Keys



Main Toolbar:

· m Marquee Tool Move Tool v
· l Lasso Tool Magic Wand Tool w
· j Airbrush Tool Paintbrush Tool b
· s Rubber Stamp Tool History Brush Tool y
· e Eraser Tool Pencil Tool n
· r Blur Tool Dodge Tool o
· p Pen Tool Type Tool t
· u Measure Tool Linear Gradient Tool g
· k Paint Bucket Tool Eyedropper Tool i
· h Hand Tool Zoom Tool z
· d Default foreground and background colors.
· x Switches between foreground and background colors.
· q Switches between standard mode or quick mask mode.
· f Switches between screen modes.
· TAB Hides/Unhides open tools.

File Menu:

· CTRL + N New
· CTRL + O Open
· CTRL + ALT + O Open As
· CTRL + W Close
· CTRL + S Save
· CTRL + SHIFT + S Save As
· CTRL + ALT + S Save a Copy
· CTRL + SHIFT + P Page Setup
· CTRL + P Print
· CTRL + K Preferences > General

Edit Menu:

· CTRL + Z Undo
· CTRL + X Cut
· CTRL + C Copy
· CTRL + SHIFT + C Copy Merged
· CTRL + V Paste
· CTRL + SHIFT + V Paste Into
· CTRL + T Free Transform
· CTRL + SHIFT + T Transform > Again

Image Menu:

· CTRL + L Adjust > Levels
· CTRL + SHIFT + L Adjust > Auto Levels
· CTRL + ALT + SHIFT + L Adjust > Auto Contrast
· CTRL + M Adjust > Curves
· CTRL + B Adjust > Color Balance
· CTRL + U Adjust > Hue/Saturation
· CTRL + SHIFT + U Adjust > Desaturate
· CTRL + I Adjust > Invert
· CTRL + ALT + X Extract

Layer Menu:

· CTRL + SHIFT + N New > Layer
· CTRL + J New > Layer Via Copy
· CTRL + SHIFT + J New > Layer Via Cut
· CTRL + G Group with Previous
· CTRL + SHIFT + G Ungroup
· CTRL + SHIFT + ] Arrange > Bring to Front
· CTRL + ] Arrange > Bring Forward
· CTRL + [ Arrange > Send Backward
· CTRL + SHIFT + [ Arrange > Send to Back
· CTRL + E Merge Down
· CTRL + SHIFT + E Merge Visible

Select Menu:

· CTRL + A All
· CTRL + D Deselect
· CTRL + SHIFT + D Reselect
· CTRL + SHIFT + I Inverse
· CTRL + ALT + D Feather

Filter Menu:

· CTRL + F Last Filter
· CTRL + SHIFT + F Fade

View Menu:

· CTRL + Y Preview > CMYK
· CTRL + SHIFT + Y Gamut Warning
· CTRL + + Zoom In
· CTRL + - Zoom Out
· CTRL + 0 Fit on Screen
· CTRL + SHIFT + 0 Actual Pixels
· CTRL + H Hide Edges
· CTRL + SHIFT + H Hide Path
· CTRL + R Show Rulers
· CTRL + ; Hide Guides
· CTRL + SHIFT + ; Snap To Guides
· CTRL + ALT + ; Lock Guides
· CTRL + " Show Grid
· CTRL + SHIFT + " Snap To Grid

Help Menu:

· F1 Contents

Other Shortcuts:

· Page Up/Down Move view up/down 1 screen.
· SHIFT + Page Up/Down Nudge view up/down.
· CTRL + Page Up/Down Move view left/right 1 screen.
· CTRL + SHIFT + Page Up/Down Nudge screen left/right.
· CTRL + SHIFT + Z Previous History entry.
· CTRL + ALT + Z Next History entry.
· SHIFT + - Previous blending mode.
· SHIFT + + Next blending mode

MS Word Shortcuts




1
Ctrl + Shift + A
AllCaps
Makes the selection all capitals (toggle)

2
Alt + Ctrl + 1
ApplyHeading1
Applies Heading 1 style to the selected text

3
Alt + Ctrl + 2
ApplyHeading2
Applies Heading 2 style to the selected text


4
Alt + Ctrl + 3
ApplyHeading3
Applies Heading 3 style to the selected text


5
Ctrl + Shift + L
ApplyListBullet
Applies List Bullet style to the selected text



6
Alt + F10
AppMaximize
Enlarges the application window to full size


7
Alt + F5
AppRestore
Restores the application window to normal size


8
Ctrl+B
Bold
Makes the selection bold (toggle)


9
Ctrl + PgDn
BrowseNext
Jump to the next browse object


10
Ctrl + PgUp
BrowsePrev
Jump to the previous browse object


11
Alt + Ctrl + Home
BrowseSel
Select the next/prev browse object

12
Esc
Cancel
Terminates an action

13
Ctrl+E
CenterPara
Centers the paragraph between the indents

14
Shift+F3
ChangeCase
Changes the case of the letters in the selection

15
Left arrow
CharLeft
Moves the insertion point to the left one character



16
Shift + Left arrow
CharLeftExtend
Extends the selection to the left one character

17
Rt arrow
CharRight
Moves the insertion point to the right one character

18
Shift + Rt arrow
CharRightExtend
Extends the selection to the right one character

19
Alt + Shift + C
ClosePane
Closes the active window pane (if you are in Normal View and have, for example, the Footnote pane open)

20
Alt+Drag (or press Ctrl + Shift + F8 and drag, but Alt + Drag is far easier!)
ColumnSelect
Selects a columnar block of text



21
Ctrl +Shift+C
CopyFormat
Copies the formatting of the selection

22
Shift + F2
CopyText
Makes a copy of the selection without using the clipboard (press Return to paste)

23
Alt + F3
CreateAutoText
Adds an AutoText entry to the active template

24
Ctrl+ Backspace
DeleteBackWord
Deletes the previous word without putting it on the Clipboard

25
Ctrl + Del
DeleteWord
Deletes the next word without putting it on the Clipboard



26
Ctrl+W, Ctrl+F4
DocClose
Prompts to save the document and then closes the active window. (But doesn't intercept the menu command)

27
Ctrl + F10
DocMaximize
Enlarges the active window to full size

28
Ctrl + F7
DocMove
Changes the position of the active window

29
Ctrl + F5
DocRestore
Restores the window to normal size

30
Ctrl + F8
DocSize
Changes the size of the active window


31
Alt + Ctrl + S
DocSplit
Splits the active window horizontally and then adjusts the split

32
Alt + Shift + F9
DoFieldClick
Executes the action associated with macrobutton fields

33
Ctrl + Shift + D
DoubleUnderline
Double underlines the selection (toggle)

34
Alt R, G
DrawGroup
Groups the selected drawing objects

35
Alt R, I
DrawSnapToGrid
Sets up a grid for aligning drawing objects



36
Alt R, U
DrawUngroup
Ungroups the selected group of drawing objects

37
Ctrl+Shift+F5 (Or: Alt I, K)
EditBookmark
Brings up the bookmark dialog

38
Del
EditClear
Performs a forward delete or removes the selection without putting it on the Clipboard

39
Ctrl+C
EditCopy
Copies the selection and puts it on the Clipboard

40
Ctrl+X
EditCut
Cuts the selection and puts it on the Clipboard



41
Ctrl+F
EditFind
Finds the specified text or the specified formatting

42
F5, Ctrl+G
EditGoTo
Jumps to a specified place in the active document

43
Alt E, K
EditLinks
Allows links to be viewed, updated, opened, or removed

44
Ctrl+V
EditPaste
Inserts the Clipboard contents at the insertion point

45
Alt E, S
EditPasteSpecial
Inserts the Clipboard contents as a linked object, embedded object, or other format

46
Alt + Shift + Backspc
EditRedo
Redoes the last action that was undone

47
F4
EditRedoOrRepeat
Repeats the last command, or redoes the last action that was undone (unfortunately, doesn't work for as many commands in Word 2000 as in Word 97 and below, but this is still one of Word's most useful shortcuts, if not the most useful)

48
Ctrl+H
EditReplace
Finds the specified text or the specified formatting and replaces it

49
Ctrl+A
EditSelectAll
Selects the entire document

50
Ctrl+Z
EditUndo
Reverses the last action



51
Alt + PageDn (to select to end of column, use Alt + Shift + PgDn)
EndOfColumn
Moves to the last cell in the current table column

52
Ctrl+Shift+End
EndOfDocExtend
Extends the selection to the end of the last line of the document

53
Ctrl+End
EndOfDocument
Moves the insertion point to the end of the last line of the document

54
End
EndOfLine
Moves the insertion point to the end of the current line

55
Shift+End
EndOfLineExtend
Extends the selection to the end of the current line



56
Alt+End
EndOfRow
Moves to the last cell in the current row

57
Alt + Ctrl + PgDn
EndOfWindow
Moves the insertion point to the end of the last visible line on the screen

58
Shift + Alt + Ctrl + PgDn
EndOfWindowExtend
Extends the selection to the end of the last visible line on the screen

59
F8 (press Esc to turn off)
ExtendSelection
Turns on extend selection mode and then expands the selection with the direction keys

60
Alt + F4 (<9>)
FileCloseOrExit
Closes the current document, or if no documents are open, quits Word. Horrible command, as it makes it a long winded business to quit Word. But there's a simple solution - assign Alt+F4 to FileExit instead.


61
Alt + F4 (Word 97)
FileExit
Quits Microsoft Word and prompts to save the documents (does intercept the menu item, but not the keyboard shortcut, or the x button. An AutoExit macro is usually a better way of intercepting this).

62
NOT Ctrl+N!!
FileNew
Creates a new document or template (brings up the dialog). Note that: Word pretends that Ctrl+N is assigned to FileNew but it isn't, it's assigned to FileNewDefault You can fix this in Word 2000 by assigning Ctrl+N to the FileNewDialog command. In Word 97 the only way to fix it is to create a macro called FileNew (to do this, press Alt + F8, type "FileNew" without the quotes and Click "Create". The macro will automatically contain the code needed to make it work).

63
Ctrl+N
FileNewDefault
Creates a new document based on the Normal template.

64
Ctrl+O
FileOpen
Opens an existing document or template

65
Alt F, U
FilePageSetup
Changes the page setup of the selected sections


66
Ctrl + P
FilePrint
Prints the active document (brings up the dialog)

67
Ctrl+F2
FilePrintPreview
Displays full pages as they will be printed

68
Alt F, I
FileProperties
Shows the properties of the active document

69
Ctrl+S
FileSave
FileSave

70
Alt F, A (or F12)
FileSaveAs
Saves a copy of the document in a separate file (brings up the dialog)



71
Ctrl+Shift+F
Font
Activates the Fonts listbox on the formatting toolbar

72
Ctrl+Shift+P
FontSizeSelect
Activates the Font Size drop-down on the formatting toolbar

73
Alt + Ctrl + K
FormatAutoFormat
Automatically formats a document (or sometimes, automatically screws it up)

74
Alt O, B
FormatBordersAndSha ding
Changes the borders and shading of the selected paragraphs, table cells, and pictures

75
Alt O, E
FormatChangeCase
Changes the case of the letters in the selection



76
Alt O, C
FormatColumns
Changes the column format of the selected sections (brings up the dialog)

77
Alt O, D
FormatDropCap
Formats the first character of current paragraph as a dropped capital (must select it first)

78
Ctrl+D
FormatFont
Brings up the Format + Font dialog

79
Alt + Shift + R
FormatHeaderFooterL ink
Links the current header/footer to the previous section (but does not intercept the button on the Header Footer toolbar)

80
Alt O, P
FormatParagraph
Brings up the Format Paragraph dialog



81
Alt O, S
FormatStyle
Applies, creates, or modifies styles

82
Alt O, T
FormatTabs
Brings up the Format Tabs dialog

83
Shift + F5
GoBack
Returns to the previous insertion point (goes back to up to 3 points, then returns to where you started; this is one of the most useful shortcuts of them all. Also useful when opening a document, if you want to g straight to where you were last editing it)

84
Ctrl + >
GrowFont
Increases the font size of the selection

85
Ctrl + ]
GrowFontOnePoint
Increases the font size of the selection by one point



86
Ctrl + T (or drag the ruler)
HangingIndent
Increases the hanging indent

87
F1
Help
Microsoft Word Help

88
Shift + F1
HelpTool
Lets you get help on a command or screen region or examine text properties

89
Ctrl + Shift + H
Hidden
Makes the selection hidden text (toggle)

90
Click on it
HyperlinkOpen
Connect to a hyperlink's address



91
Ctrl + M (or drag the ruler)
Indent
Moves the left indent to the next tab stop

92
Alt + Ctrl + M (or Alt I, M)
InsertAnnotation
Inserts a comment

93
F3
InsertAutoText
Replaces the name of the AutoText entry with its contents

94
Alt I, B
InsertBreak
Ends a page, column, or section at the insertion point

95
Alt I, C
InsertCaption
Inserts a caption above or below a selected object



96
Ctrl + Shift + Return
InsertColumnBreak
Inserts a column break at the insertion point

97
Alt + Shift + D
InsertDateField
Inserts a date field

98
Alt + Ctrl + D
InsertEndnoteNow
Inserts an endnote reference at the insertion point without displaying the dialog

99
Alt I, F
InsertField
Inserts a field in the active document

100
Ctrl+F9
InsertFieldChars
Inserts an empty field with the enclosing field characters



101
Alt I, L
InsertFile
Inserts the text of another file into the active document

102
Alt I, N
InsertFootnote
Inserts a footnote or endnote reference at the insertion point

103
Alt + Ctrl + F
InsertFootnoteNow
Inserts a footnote reference at the insertion point without displaying the dialog

104
Ctrl + K
InsertHyperlink
Insert Hyperlink

105
Alt I, D
InsertIndexAndTable s
Inserts an index or a table of contents, figures, or authorities into the document



106
Alt + Ctrl + L
InsertListNumField
Inserts a ListNum Field

107
Alt + Shift + F
InsertMergeField
Brings up a dialog to insert a mail merge field at the insertion point. (It does not intercept the button on the Mail merge. toolbar)

108
Ctrl + Return
InsertPageBreak
Inserts a page break at the insertion point

109
Alt + Shift + P
InsertPageField
Inserts a page number field

110
Ctrl + Shift + F3
InsertSpike
Empties the spike AutoText entry and inserts all of its contents into the document



111
Alt + Shift + T
InsertTimeField
Inserts a time field

112
Ctrl + I
Italic
Makes the selection italic (toggle)

113
Ctrl + J
JustifyPara
Aligns the paragraph at both the left and the right indent

114
Ctrl + L
LeftPara
Aligns the paragraph at the left indent

115
Down arrow
LineDown
Moves the insertion point down one line



116
Shift + down arrow
LineDownExtend
Extends the selection down one line

117
Up arrow
LineUp
Moves the insertion point up one line

118
Shift + up arrow
LineUpExtend
Extends the selection up one line

119
Ctrl + F11
LockFields
Locks the selected fields to prevent updating

120
Alt + Shift + K
MailMergeCheck
Checks for errors in a mail merge



121
Alt+Shift+E
MailMergeEditDataSo urce
Lets you edit a mail merge data source

122
Alt + Shift + N
MailMergeToDoc
Collects the results of the mail merge in a document

123
Alt Shift + M
MailMergeToPrinter
Sends the results of the mail merge to the printer

124
Alt + Shift + I
MarkCitation
Marks the text you want to include in the table of authorities

125
Alt + Shift + X
MarkIndexEntry
Marks the text you want to include in the index



126
Alt + Shift + O
MarkTableOfContents Entry
Inserts a TC field (but it is far better to use Heading Styles to generate your Table of Contents instead)

127
Alt or F10
MenuMode
Makes the menu bar active

128
Alt + Shift + F11
MicrosoftScriptEdit or
Starts or switches to Microsoft Development Environment application, allowing you to view the HTML/XML source code that would be behind the document if it were in ..htm format (or that is behind it if it already is in .htm format).

129
Alt + Ctrl + F1
MicrosoftSystemInfo
Execute the Microsoft System Info application

130
F2
MoveText
Moves the selection to a specified location without using the clipboard (press Return to execute the more)



131
Tab
NextCell
Moves to the next table cell

132
F11
NextField
Moves to the next field

133
Alt + F7
NextMisspelling
Find next spelling error

134
Alt + down arrow
NextObject
Moves to the next object on the page

135
Ctrl + F6
NextWindow
Switches to the next document window, equivalent to selecting a document from the Window menu.



136
Ctrl+Shift+N
NormalStyle
Applies the Normal style

137
Ctrl + 0
OpenOrCloseUpPara
Sets or removes extra spacing above the selected paragraph

138
F6
OtherPane
Switches to another window pane in Normal View (for instance, if you have if you have a Footnotes pane open in Normal view and want to switch to the main document and back without closing the pane).

139
Alt + _
OutlineCollapse
Collapses an Outline in Outline View by one level

140
Alt+Shift+rt arrow
OutlineDemote
Demotes the selected paragraphs one heading level



141
Alt + +
OutlineExpand
Expands an Outline in Outline View by one level

142
Alt+Shift+down arrow
OutlineMoveDown
Moves the selection below the next item in the outline

143
Alt+Shift+up arrow
OutlineMoveUp
Moves the selection above the previous item in the outline

144
Alt+Shift+left arrow
OutlinePromote
Promotes the selected paragraphs one heading level

145
Alt + Shift + L
OutlineShowFirstLin e
Toggles between showing the first line of each paragraph only or showing all of the body text in the outline



146
Ins
Overtype
Toggles the typing mode between replacing and inserting

147
PgDn
PageDown
Moves the insertion point and document display to the next screen of text

148
Shift+ PgDn
PageDownExtend
Extends the selection and changes the document display to the next screen of text

149
PgUp
PageUp
Moves the insertion point and document display to the previous screen of text

150
Shift + PgUp
PageUpExtend
Extends the selection and changes the document display to the previous screen of text



151
Ctrl + down arrow
ParaDown
Moves the insertion point to the beginning of the next paragraph

152
Shift + Ctrl + down arrow
ParaDownExtend
Extends the selection to the beginning of the next paragraph

153
Ctrl + up arrow
ParaUp
Moves the insertion point to the beginning of the previous paragraph

154
Shift + Ctrl + up arrow
ParaUpExtend
Extends the selection to the beginning of the previous paragraph

155
Ctrl+Shift+V
PasteFormat
Applies the previously copied formatting to selection



156
Shift + Tab
PrevCell
Moves to the previous table cell

157
Shift + F11
PrevField
Moves to the previous field

158
Alt + up arrow
PrevObject
Moves to the previous object on the page

159
Ctrl + Shift + F6
PrevWindow
Switches back to the previous document window

160
Sfift+F4
RepeatFind
Repeats Go To or Find to find the next occurrence



161
Ctrl+Spacebar
ResetChar
Makes the selection the default character format of the applied style

162
Ctrl+Q
ResetPara
Makes the selection the default paragraph format of the applied style

163
Ctrl +R
RightPara
Aligns the paragraph at the right indent

164
Ctrl + *
ShowAll
Shows/hides all nonprinting characters

165
Alt + Shift + A
ShowAllHeadings
Displays all of the heading levels and the body text in Outline View