2

Tech Blog

Friday, 25 March 2022 15:09

How to unlock a keyboard that’s locked

A locked keyboard is great if you don't want to accidentally hit the keys or to prevent kids and pets from making changes to your computer without your knowledge, but if you can't unlock it, that's a real problem that needs fixing. Fortunately, if your keyboard is unresponsive, there are a few things you can do to get it working again.

While you can use Presenter View to see your notes when presenting your PowerPoint slideshow, you may want to print a copy of your notes as well. You can print your presentation with a slide on each page and the corresponding notes at the bottom. According to Microsoft, there isn’t currently another option for printing slides with notes.

Thursday, 24 March 2022 14:32

How to share a video on Google Drive

Sharing videos via Google Drive is pretty simple, but you'll need to know how to do two things: Upload them to your Google Drive and then share them. In this guide, we'll go over exactly that, and we'll address a couple of common issues that may come up while uploading those videos.

Friday, 25 March 2022 14:15

How to resize an image in Photoshop

Photoshop is not just an application for professionals who require a powerful image editor. It’s also a versatile program that an average user who doesn’t have a deep understanding of editing digital images can benefit from in many ways. One of the most commonly used components of Photoshop is its resize tool.

Friday, 25 March 2022 13:26

How to add a column in Excel

Microsoft Excel is a powerful database management tool with all sorts of in-depth problem-solving functions and dynamic formatting. To make the most of it, though, you need to know the basics. Adding a column in Microsoft Excel is quick and easy. You can do it in just a few quick steps once you've learned how.

Google has sent out a necessary update for the Chrome web browser for the Mac to address a major security hole that was discovered on March 23. The bug, called  CVE-2022-1096, was documented in the Common Vulnerabilities and Exposures (CVE) system by Google developer Prudhvi Kumar Bomman, after an anonymous security researcher discovered a hole in Chrome’s V8 JavaScript engine that left it vulnerable to exploits.

We all regularly use the internet nowadays for a variety of different purposes. Whether it’s to keep in touch with friends and family, to work from home, or to conduct our banking and bill paying online, it’s important to be secure. One of the best ways to keep yourself secure and your activity private is to use a VPN.

Friday, 25 March 2022 12:20

What is email spoofing?

As phishing attempts grow more advanced, so do the efforts to imitate real organizations, which make it easier to trick unsuspecting recipients into divulging valuable information or assets. A common tactic here is spoofing an email, or making it look like it came from somewhere it didn’t.

Despite how important disaster recovery is, many businesses don’t have the right plan put in place because they don’t know where to begin. Check out these 9 straightforward steps to building a plan you can depend on.

You probably searching for SEO Tips and Tricks for business of yours. Search Engine Optimization (SEO) is truly an important part of marketing for any business. Businesses that rely solely or largely on online marketing must understand the concepts of SEO marketing in order to be successful.

IT Solutions and Support

We are an Information Technology Company driven by service excellence, simplicity, effectiveness, efficiency and timeliness.

We take care of the modern-day tool of business (Information Technology) to allow our clients to focus on their business goals and objectives.

Get In Touch

5 Babajide Close, Off Association Avenue, Ikotun, Lagos

+234 803 3233 193

+234 814 5636 831

info@tishritechnologies.com

https://www.tishritechnologies.com