Thursday, 5 May 2022

How to Fix PowerPoint Files Thumbnail Preview not showing

In older versions of PowerPoint, I could get a thumbnail preview of the content of the pptx file, now that I am using 2019 all I see is an icon and have to open each one individually to glance at the content. The instructions to enable thumbnail previews on the Internet is outdated and do not apply to the newest version of PowerPoint.

Here’s how you create a thumbnail preview image for your PowerPoint file on Windows & macOS:

  1. Open your presentation in PowerPoint.


  2. Click File followed by Info to open what Microsoft calls the backstage.


  3. Over on the right-hand side, click the Properties heading then click Advanced Properties in the drop-down menu.


  4. Click the Summary tab in the window that opens.


  5. At the bottom of the window, tick the Save preview picture check box.


  6. Click OK and save your presentation.
Back in Windows File Explorer, or your desktop if that’s where your presentation is, press F5 to refresh the view and your preview thumbnail will magically appear. If you don’t see it, you may need to clear your Windows thumbnail cache. Here’s how to do that:
  • Click the Windows Start button and type cleanmgr followed by Enter (or click Disk clean-up when it appears).
  • Make sure the Thumbnails check box is ticked at the bottom of the list and then click OK followed by Delete Files.
  • Go back to Explorer (or your desktop) and press F5.

Saturday, 30 April 2022

What is cyber security, and why is it important?

Cyber security refers to protecting systems connected to the internet from threats in cyberspace. It involves protecting software, data, and hardware and helps prevent cybercriminals from gaining access to devices or networks.


Parts of cyber security

The best cyber security solution will be all-encompassing and include:

  • Application security
  • Cloud security
  • Data security
  • Endpoint security
  • Identity management
  • Infrastructure and database security
  • Mobile security
  • Network security
  • Operational security

It should also include disaster recovery or business continuity planning. Which outlines how the organization will recover from any cyber attacks in the future as well as preventative methods, such as educating employees.

The importance of cyber security

The importance of cyber security comes down to the desire to keep information, data, and devices private and safe. In today’s world, people store vast quantities of data on computers and other internet-connected devices. Much of which is sensitive, such as passwords or financial data.

If a cybercriminal was to gain access to this data, they could cause a range of problems. They could share sensitive information, use passwords to steal funds, or even change data so that it benefits them in some way.

Companies need cyber security to keep their data, finances, and intellectual property safe. Individuals need it for similar reasons, although the intellectual property is less of a factor, and there is a higher risk of losing important files, such as family photos. In the case of public services or governmental organizations, cyber security helps ensure that the community can continue to rely on its services. For example, if a cyber attack targeted a power plant, it could cause a city-wide blackout. If it targeted a bank, it could steal from hundreds of thousands of people.

Saturday, 9 April 2022

What Happens If You Never Activate Windows 10


When it comes to functionality,

  1. The major inconvenience is that you’ll see the “activate Windows watermark” at the lower right corner of your screen.
  2. You won't be able to personalize the desktop background, window title bar, taskbar, and Start color, change the theme, customize Start, taskbar, and lock screen.
  3. you can’t get hands-on on a few Windows features that are only available after the activation. Such as dark system mode, Focus assist, Windows Hello, Windows Defender, and security.
  4. You will also notice a link appearing in your Settings app which will say: “Windows is not activated. Activate windows now.” That link and the watermark in your desktop area will remain until you activate your Windows 10 with a genuine license key.
  5. You can’t update your system. (if it is a cracked one then after updating it will always going to ask license key.)
  6. Microsoft will occasionally send you reminders to do the product activation. So, there may be some pop-ups when you are working or playing games that might cause inconvenience.
  7. However, you can set a new desktop background from File Explorer without activating Windows 10.

NOTE: Apart from those mentioned issues, you will not face any significant difficulties. For those who use their unactivated copy of Windows within 30 days of installation, their operating system will keep on working.

Monday, 21 March 2022

Saturday, 12 March 2022

What is Burp Suite? All About it, Tools can be use || Your Purpose || Professionals Think

What is Burp Suite for?

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's attack surface to finding and exploiting security vulnerabilities.

What tools can be used as an alternative to Burp Suite:

Many people use ZAP by OWASP, Why?

  • Because it is free and is continuous updated by the community.
  • You get to achieve almost the same results as you do with Burp Suite. The only difference is that you don't have to pay money.
  • The GUI is nice and easy to use.
  • A lot of features and plugins.

Explore it as your purpose:

  • Proxy Server
  • An Intercepter
  • First Hacking Tool
  • Http/Https Request Manipulator
  • Decoder
  • Mobile Traffic Logger
  • Web Scanner
  • Website Crawler And Many More...

What do cyber security professionals think of burp suite?

A swiss army knife. I’m not even approaching the web/API security assessment until I have a Burp setup enabling me to inspect the proxied traffic in a lovely presented graphical interface :)

But on a more serious note, whether it’s OWASP ZAP, Charles proxy, fiddler, MITM proxy, everything will do, including a simple telnet/OpenSSL client to connect to the web resources. But life’s meant to be made more convenient, not harder - so a vast majority of us love our customized setup of Burp with all the plugins, configurations, key shortcuts, and whatnot.

Highly recommended, great APIs, great community around the tool, and fantastic company (Portswigger) who really do care about the experience their product is providing to the end-user.