Enable the Acrobat reader embed video icon in MS Word 2007

Enable the Acrobat reader embed video icon in MS Word 2007




Are you missing the Acrobat Reader Embed Video icon in Word 2007 insert menu? Previously I wrote a tutorial on how to embed video into Word 2007 and convert it to PDF. So many people responded on the website and on Youtube asking where their embed video icon was? “I have a full version of Adobe Acrobat and Word 2007, why can’t I see the embed video icon?” That’s what they were saying…Well I really had no idea because I had one and didn’t have a problem. Anyway it annoyed me that so many people had this problem so I search for an answer, which in the end, turned out to be an easy solution.

add video icon Word 2007
What you need to have a Embed Video icon in Word 2007?

1. You need Microsoft Word 2007 installed on your computer.
2. You also need a full version of Adobe acrobat reader. Not the free version.


How to enable the Acrobat Reader add video icon in Word 2007?

1. Open Word 2007 and go to the round office icon in the left top corner.

2. Open the menu and go to the bottom and choose Word Options. See the screen shot below.


word options 2007

3. Click on Add ins in the left bar.

4. Now you can see if your Adobe Acrobat reader is an active application or a disabled application.

5. If your Adobe is under the disabled application section move down to the manage section at the bottom of the window.

6. From the drop down menu choose disabled items.


Adobe acrobat add in

7. A small box will appear. Choose the application you want to enable by making it blue.

8. Then press the enable button.

9. Restart the program to see that the Adobe Acrobat add video icon is there now..

Watch this video tutorial to see how to get your Adobe Acrobat Embed video icon back in Word 2007:

YOUR CHILD HAVE A FACEBOOK PAGE

Here are steps you should take if you do let your child have a Facebook page:

1. The first thing you can do is get your kid’s user name and password so that you can log onto their profile at any time and see what messages and conversations they’ve been sending. If they are not happy with this, then don’t let them have an account.
2. Another tactic to approach when deciding what age is too young for Facebook is to install surveillance software on your computer. Much like a Fortune 500 company tracks every trade proposal their salespeople are sending in Fantasy Football, you can monitor every single keystroke with some relatively inexpensive software.
3. Do not let your child be friends with people out of their age group. For example my 13 year old daughter is friends with my 18 year old next door neighbour, nice boy and all, but is talking about things I would prefer my daughter not to see.
4. The child must personally know the people they are friends with. Not a friend they met online. We all know how easy it is to make a fake profile, and just be aware that anyone can do it!
5. If you’ve tried but eventually decided your little one is too young for Facebook, just block the site on your computer with an administrative password so that you’ll still be able to log on. Here’s how to Setup parental controls in Windows Seven and Vista.
6. And finally, the last step you can take to keep your kid off Facebook is to spend some time with them – even with all the latest advances in technology nothing will ever top a good game of catch or monopoly.

Too young for Facebook

COMPUTER SECURITY TIPS

Top Ten Computer Security Tips

Computer security is an essential part of getting (and keeping) your computer connected to the Iowa State network. With new security risks appearing every day, keeping your computer secure is a continuing process. Even new computers are not secure until they have anti-virus software in use, current security patches, and strong passwords. Following is a set of tips to help keep your computer secure and functioning properly.

Tip 1: Use anti-virus software and keep it up-to-date.

Anti-virus software protects you and your computer from viruses, a well-known security risk. With new viruses appearing daily, virus software quickly becomes useless if you don't update it.

Tip 2: Use an anti-spyware program.

Free tools are available for identifying and removing spyware, adware, and various other non-virus malware. These types of files are often installed by Trojan programs, some freeware and shareware applications programs (like file-sharing programs), or as "drive-by installations" from various websites. These programs invade your privacy and interfere with your work by transmitting your personal information to their creators, opening unwanted pop-up windows, and noticeably slowing your computer's performance.

Iowa State students can download the McAfee Anti-Spyware Enterprise software for Windows at no cost from http://www.it.iastate.edu/downloads/. (Use the Scout utility to install the software.) The university has licensed this package so students have convenient spyware protection and removal for their computers. The package works in conjunction with the McAfee anti-virus software, or can be installed as a standalone product with other anti-virus software.

Information on other free anti-spyware programs for Windows machines can be found at http://www.it.iastate.edu/faq/view.php?id=179. Currently, spyware is not a problem for Macintosh computers.


Tip 3: Keep your operating system and other software current.


Keep your operating system up-to-date as well as any programs used to access the Internet. When manufacturers find vulnerabilities that pose security risks, they create and distribute patches for the product. To make sure that your system is patched with the latest updates, check the information at:

* Windows XP: http://www.it.iastate.edu/faq/view.php?id=150
* Windows 2000: http://www.it.iastate.edu/faq/view.php?id=261
* Mac OS X: http://www.it.iastate.edu/faq/view.php?id=532

Tip 4. Do not download files from an unknown source.

Be careful of what you download and what you agree to when you click "yes" to prompts from installation or popup windows. Many programs do more than what they advertise. Many "web browser aids", such as gator.com and Bonzi Buddy, are actually spyware (i.e., programs that send information about your browsing habits back to their home server and cause popup windows). After collecting information on your browsing habits, the spyer then sells the information to companies that send you unwanted email. Also, be wary of downloaded programs that seem to do good things because they could actually be causing harm or opening up new security holes on your computer. A number of programs are designed to give other people access to your computer without your knowledge. Often anti-virus or anti-spyware software will be able to detect such programs; caution, however, is the best protection.


Tip 5: Use complex, hard-to-guess passwords and change them regularly.

Any security measures you take can be undermined by a password that is easy to guess or a computer account that does not have a password. Good passwords help keep your computer secure from external threats (such as hackers) and local threats (such as a nosy roommate or officemate).

* Never have an account without a password.
* We recommend using 15 or more characters whenever possible for your password (5 characters is a minimum).
* Use a mixture of character classes such as uppercase, lowercase, numbers, and symbols.
* Don't use a password that is a dictionary word, is part of your name, or is easily associated with you.
* Never use keyboard patterns such as "asdfg".
* Passphrases are a good technique for remembering a long password so you don't have to write it down (e.g., "Ihatestalebread!").
* Use different passwords for your important computer accounts. Although somewhat inconvenient, if one of your passwords is compromised, an attacker will not gain easy access to your other accounts.
* If you use your password in public places, such as a lab or a friend's room, you should change your password more often.

Before connecting your computer to the network, make sure you have a password set on all of your login accounts, including your administrative (a.k.a. admin) account. For instructions, follow the appropriate link:

* Windows XP: http://www.it.iastate.edu/faq/view.php?id=99
* Macintosh OS X: http://www.it.iastate.edu/faq/view.php?id=98



Tip 6. Do not open emails or attachments from unknown sources.

Email is one of the easiest ways to transmit computer viruses and Trojan programs, which can give other people access to your computer. If you don't recognize the email sender, don't open the attachment(s) with it. If you get an attachment from someone you know but weren't expecting one, don't open it until you ask the sender about it.


Tip 7. Use file sharing sparingly.



Windows computers that have Microsoft File Sharing enabled are frequently probed by hackers and viruses for weakness. We recommend that you share folders sparingly. When needed, turn on sharing for a specific purpose, specify a password, and remove sharing when it is not needed. Warning: By default, shared folders are set so anyone can read and write into the folder. Also, the installation of peer-to-peer file sharing programs can bring spyware onto your computer and open it up to some viruses. Most file sharing programs also default to opening shared folders for read and write access, allowing distribution of the folder contents.


Tip 8. Only run services that you need.


Each network service that is installed on your computer opens a network port that can be probed by hackers and viruses. Resist the temptation to experiment with network services that you are not likely to use. Commonly targeted services are IIS (Microsoft's Web server), ftp (file transfer protocol), telnet (remote login to a command prompt), Upnp (universal plug and play) and Microsoft File Sharing.


Tip 9: Use a firewall to protect your computer from Internet intruders.


Computers connected to the Internet should use a personal firewall to filter out unauthorized or potentially dangerous traffic from the Internet, while allowing good traffic to reach your computer. Firewall hardware and software is available at computer stores and is built in to some operating systems/updates, such as Windows XP Service Pack 2 (SP2). We recommend that you block all ports that you do not use. Note that some Iowa State software will not run from behind a firewall.


Tip 10. Back up your computer data regularly.


The failure of a computer hard drive or the mistaken deletion of a data file can be devastating to the individual and can mean the loss of many hours of work. Recovery from hardware or software malfunctions and user errors can be easier if regular backups are made. To guard against disasters, store backups in a separate location from your computer.

COMPUTER VIRUS

A small program that gets into your computer and disturbs the normal functions of the computer and destroys the important data stored in the computer is called computer virus. The computer virus cannot damage hardware, only data or software is corrupted. The computer file (data or program) to which a virus is attached is called infected file.

A program, which is infected by a virus, is known as infected program. When an infected program is loaded for execution, the virus automatically loaded into memory and attaches to all those programs that are in memory or loaded into memory.
Causes of Viruses

Following are the means through which viruses may be transferred from one computer to another.

(i) E-Mail

Now-a-days, most of the viruses spread due to receiving e-mail messages that contains viruses. When a user opens such an infected message, the virus is also loaded into the computer memory and attaches copies of it-self with many other program files loaded into the memory. This virus is also transferred to other computers when e-mail messages are sent from the infected computer to them.

(ii) Networks

Another way of spreading virus is by using Internet and other networks. For example, when you download some executable file or data on the Internet or from a shared disk on the Network, the infected files may be attached with the downloaded data that ultimately infects the computer.

(iii) Removable Storage Media

One important means of exchanging data is through the use of removable media like floppy disks, CDs and flash devices. So, when you copy the data from one computer to another by using a removable media, the infected files can be transferred to your computer.

(iv) Pirated Software

The virus can also infect your computer by using pirated software. The software, which is installed into your computer without license is referred to as pirated software. Some companies may intentionally attach some virus programs into their software. This program will only activate when it does not find some special file like license file on your computer.

STARTUP FOLDER FUN

Startup Folder Fun

While we’re on the topic of system startups, the Windows Startup folder is a fantastic place for fun. Create a text file with an amusing message and throw it in there so your cubicle mate will get a daily greeting — or, if you really want to get evil, add in the restart shortcut from above (not recommended unless you just want to get your ass kicked).

SCREEN CAPTURE OR PRINT SCREEN

Screen Capture or Print Screen


While many people are well familiar with "taking a screen-shot of your PC", some others might wonder what it is. On an Windows PC, the "Print Screen" feature can either capture the entire screen of your PC, or an individual window. This is a simple but very helpful tip. Once you know about it, you will find it very useful in many situations, i.e. when you need to show a tech-support person an error alert on your screen, or a sample screen of an application software...

The following instructions will show you how to capture a screen shot of your entire desktop or an individual window. On most standard keyboards, the print screen button is often identified as "Print Scrn".


To capture a screen shot of your entire desktop:

1. Hit "Print Screen" key on your keyboard (or "Print Scrn").
2. Open an image editor (i.e. Photoshop, Paintshop, or the Windows built-in "Paint").
3. Press Ctrl-V to paste the image and save the file as your favorite picture format (i.e. *.JPG).

To capture a screen shot of an individual window, a popup, or an error dialog:

1. Make sure the window or popup which you want to capture is active (on the very front of your screen).
2. Hold the "Alt" button and press "Print Screen" key on your keyboard (or "Print Scrn").
3. Open an image editor and press Ctrl-V to paste the image and save the file as your favorite picture format (i.e. *.JPG).