Sunday, January 11, 2015

What is Wireless Security ?

Dr. Soper discusses security for wireless networks. Topics covered include

  • wireless network concepts, 
  • wireless communication,
  • The 802.11 protocol suite,
  • wireless data frames, 
  • management frames, 
  • wireless network vulnerabilities, 
  • MAC spoofing, 
  • wired equivalent privacy (WEP),
  • Wi-Fi protected access (WPA and WPA2), 
  • methods of attacking wireless networks.

Tuesday, January 6, 2015

How to Compare Two Email Lists in Excel?

Compare Two Email Lists. Is Email in List? Is email NOT in List? Compare 2 E-mail Lists. Is E-mail in List? Is e-mail NOT in List?

See how to compare two e-mail lists where one list has extra semi-colons:

1. (00:28 min) Find and Replace feature to remove semi-colons (Ctrl + H).

2. (01:32 min) Is in List: MATCH and ISNUMBER functions.

3. (03:20 min) Is NOT in List: MATCH and ISNA functions.

Excel 2013: Power Query: Merge Tables Into One in PowerPivot or Excel Table

See how to import three tables from three different source files (Access database, Excel File, Text File) and merge them into one table using Power Query. Merge tables into the PowerPivot Data Model or an Excel Table

1. (01:38 minute mark) Import Access File. Remove column, Format Data Type as Date
2. (02:33 minute mark) Import Excel File
3. (03:05 minute mark) Import Text File
4. (03:28 minute mark) Append Table: merge Three Tables
5. (04:12 minute mark) Load to Data Model or Excel Table

Microsoft Excel :Compare 2 Lists and Extract Record

See how to Compare Two Lists and Extract Records with Excel Advanced Filter:

1. Extract items in list 2 that are NOT in List 1 using Advanced Filter and Logical Formula in Criteria Area with ISNA and MATCH functions.

2. Extract items that are in both list using Advanced Filter and Logical Formula in Criteria Area with ISNUMBER and MATCH functions.