New iterative calculation settings and more in Google Sheets

To prevent the errors that sometimes plague complex calculations, today we’re launching a new setting in Google Sheets on the web (File > Spreadsheet settings > Calculation > Iterative calculation) that allows you to set the maximum number of times a calculation with a circular reference can take place. In addition, you can specify a “convergence threshold,” and when results from successive calculations differ by less than that threshold value, the calculations will stop (even if the maximum number of calculations has yet to be reached).
iterative-calc-settings- Google Sheets
Over the course of the week, we’ll make additional improvements to your Sheets experience on the web and Android devices. First, we’ll update the Sheets Android app UI to make it easier for users with right-to-left language settings to read and navigate. Second, we’ll make it possible to search the menus in Sheets on the web, much like you can in Google Docs and Slides.
menu-search-1- google sheets


Search the menus while in Compact Controls mode

For more details on these features, please visit the Help Center.

Launch Details
Release track:

  • Launching to Rapid release, with Scheduled release coming on January 9th, 2017
    • Iterative calculation setting
  • Launching to both Rapid release and Scheduled release
    • Right-to-left language improvements
    • Menu search

Available to all G Suite editions

Rollout pace:
Gradual rollout (potentially longer than 3 days for feature visibility)

All end users

Change management suggested/FYI


Reference by


SSL Product Comparison

Ransoc – An unusual ransomware that threatens to expose your personal information

Mostly a ransomware encrypts your files and demands money in exchange for a key that can decrypt the data. And the payment is demanded in Bitcoins. Ransoc is different in the way it works and the medium it uses for the payment.

How does Ransoc work?
Once your computer is infected by Ransoc, it gathers your personal information from your Skype and social media profiles and scans your system for Torrent files and other sensitive information. It then displays a ransom note. Interestingly, the ransom note is customized for a particular user and has their social media details including their profile picture. The ransom note threatens the victim with a fake legal proceeding and also that the ‘sensitive’ information found on their computer will be made public if the ransom is not paid.

Now, two important points to note here:

  1. Ransoc, unlike other ransomware, does not encrypt any files on the infected computer.
  2. Reportedly, the ransom note is displayed only in a case where the ‘sensitive’ information found by the ransomware includes child pornography or illegally downloaded Torrent media files.

So basically, the creators of this ransomware are targeting the victim’s fear of facing legal complications and losing their reputation instead of their data.

Further, where all ransomware creators use Bitcoin to remain hidden from law enforcement, Ransoc asks its victims to pay via credit card; this kind of payment approach has been unheard of in ransomware attacks till now.

How Quick Heal helps?

Quick Heal’s Virus Protection proactively detects the ransomware as “Ransomware.TorLocker.PB5” and prevents it from performing any activity on your computer.

Quick heal Total Security Detected Ransomeware

How to stay safe from ransomware attacks

  • Never click on links or download attachments that arrive in emails from unwanted, unknown or unexpected sources.
  • Apply all recommended security updates (patches) to your Operating System, and programs like Adobe, Java, web browsers, etc.
  • Take regular backups of your files. Remember to disconnect the Internet when you are backing up on a hard drive. Unplug the drive before you go online again.
  • Avoid using outdated browser plugins or plugins that you do not use anymore.
  • Invest in an antivirus software that comes with several layers of security such as Web Security that blocks infected websites, Email Security that blocks infected emails, Phishing Protection that blocks fake websites, etc.
  • Always keep your antivirus software up-to-date to stay safe against new threats.

Reference by Quickheal



How to setup Google Sync on your iPhone or iPad

How to set up Google Sync on your iPhone or iPad

The Google Sync setup is nearly identical to Exchange: You just need to have a paid Google account and enter the following settings.

  1. Launch the Settings app from your Home screen.
  2. Tap Calendar.
  3. Tap Accounts.
  4. Tap Add Account.
  5. Tap Exchange.
  6. Enter your Gmail or Google Account email and password (the description field will automatically update as your email address).
  7. Tap on Next.
  8. Enter as the Server.
  9. Leave the Domain field blank.
  10. Enter your full Gmail or Google Account email address as the Username. (Yup, just like above.)
  11. Tap on Next.
  12. Tap the switches next to each service’s account that you’d like to sync with your phone. If you have existing calendars, contacts, or mail on your iPhone, you’ll be asked to either keep them on your phone or delete them. Tap the option you want.
  13. Tap on Save.

google sync calendar-ios-10-set-up-exchange-google-screens-03



Google Drive sharing notification improvements to support Gmail smart hosting

Some small but important changes are coming to the way that Google Drive sends notification emails. Your users will not see any visible changes, but if you use Gmail’s advanced smart hosting features, then you may notice a difference in the way new emails are archived or filtered by your mail solutions.

What’s changing:

  • Google Drive will no longer store a ‘courtesy copy’ in the mailbox of the sender. Gmail’s comprehensive mail storage feature will now place a copy of Drive sharing notification emails in the sender’s Sent folder.
  • If you use smart hosting (through an outbound mail server), you can now capture and deliver these emails through your preferred mail gateway.
  • If you previously relied on outbound gateway settings to route Drive notifications, you can now use content compliance rulesor sending routing rules to route these messages, making it consistent with other mail routing features.

What’s not changing:

  • The “from” field is not changing. It will continue to be the sender when the recipient is a group, or drive-shares-noreply@google.comin all other cases, as it is today.
  • The message header fields are not changing. The envelope sender will still be [string], not the actual account of the sender.
  • Request access notifications will not behave differently.

These changes will roll out to G Suite customers over a few days, starting on November 28, 2016.

Launch Details
Release track:
Launching to both Rapid and Scheduled release

Available to all G Suite editions

Reference by

45 Killer Security Tips to Follow on Computer Security Day

30th November is observed as Computer Security Day all over the world.On this important day, we have lined out an exhaustive list of some of the best security tips on how to keep your digital lives safe, secure, and hackproof. So, let’s get cracking!

  • While revealing any personal or financial information on the Internet, ensure that the website’s URL begins with ‘https’ and is accompanied by a padlock symbol. These two elements indicate that you are on a secure website and that your information is safe.
  • While using free, unsecured WiFi networks or public cyber cafes, never shop or bank online, or login into online accounts.
  • Always go for long, unique, and hard-to-guess passwords. Keep different passwords for different online accounts.
  • Use Secure Browsing for your Facebook account.
  • Don’t bother selecting options that say ‘Keep me logged in’ or ‘Remember me’ on websites, especially when you are on public computers.
  • Prefer keeping a secondary email address for using it on websites that require you to share certain personal information. Also,  use your primary email address to stay in touch with people you know or are acquainted with.
  • Avoid using your official email address for social media sites or any other websites other than that of your organization.
  • For sites related to social media, music downloads, file sharing, etc., use an email address that you do not use for important communications such as those related to your bank, income tax, medical appointments, and the like.
  • Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
  • While choosing a password, ensure that you are not using any kind of personal information such as your name, date of birth, address, pet’s name, street name and so on.
  • While using the Internet in a public place like restaurants, shopping malls, airports, etc., ensure that no one’s snooping on you from behind your back.
  • If you receive any emails that ask you for your personal or banking information, delete them straightaway. Exercise caution against links or attachments in unexpected or unsolicited emails. It is wise to verify any such communication with the sender first, before responding to them.
  • If there is any online account of yours which you are not using for a long time, have it removed or deactivated.
  • It is wise not to make your photos or videos public on the Internet. Keep them visible only to people you know personally.
  • Never respond to pop-up advertisements that may come up on your screen, no matter how inviting or genuine they may look. The safest way to close such pop-ups is from the task manager; press Alt+Ctrl+Delete.
  • Before downloading and installing any kind of free software, do a quick research on the software and the website hosting it. Reading user reviews about the same is also important.
  • Do not visit websites that you are not fully aware of or those that can be accessed from emails or mobile messages.
  • If you have downloaded a file online, ensure that you check its extension before clicking on it. Files with multiple extensions can be bad news for your computer.
  • Make it a point to log out once you are done. This is more essential when you are using a system in a cyber café.
  • Avoid responding to or clicking on social media posts that claim to show unusual content such as shocking videos or unseen events, etc. Always verify such news from genuine news websites.
  • It is advisable to access your bank’s website by typing its URL in the address bar. Never access the same from an email or SMS.
  • Secure your wireless network at home by changing its default password and using WPA2 encryption.
  • Always keep your computer’s operating system and other programs up-to-date and patched. It is advisable to keep Automatic Updates to ON.
  • If you can’t avoid using an unsecured WiFi connection for checking your emails or doing an online transaction, consider using a VPN (Virtual Private Network). This will ensure that your private details do not get snooped on by anyone.
  • Never download software/applications that come as attachments in emails, even if the emails look like that have been sent from a trusted source.
  • For online shopping, trust well-known and reputed websites that have been in the market for quite some time.
  • If you are installing any browser plugin, ensure that it is trusted and is a current one.
  • Protect your computer with a security software that offers multilayered protection from viruses, spyware, Trojans, malware, and online banking threats.
  • Increase your knowledge about cyber threats and cyber security; share the same with friends, family and acquaintances.
  • Always trust your instinct. If you think an online offer, or an email sounds too good to be true or suspicious, assume that it is.
  • If you are buying from an online website for the first time, it is advisable to choose the Cash On Delivery option, instead of making an upfront payment.
  • Ensure that you change your online banking passwords every 6 months, and never share them with anyone.
  • Avoid the option of saving your credit/debit card information on websites.
  • Any kind of financial details should not be shared on phone or email, even if the caller/sender seems genuine or appear to belong from a reputed organization.
  • Avoid downloading software from unverified publishers. Your system will always prompt you the information whether the publisher is verified or not before the software gets installed.
  • Always lock your computer and smartphone when not in use. Do not leave it unattended, especially in public places.
  • Create passwords that have a mix of uppercase and lowercase letters, numbers, and special characters. Also ensure that your password is at least 8 characters long.
  • Accept friend requests, on social media and other online platforms, only from people you know and are acquainted with.
  • Protect your smartphone and other mobile devices with a screen lock such as PIN or PASSWORD. Turn the automatic screen lock function ON.
  • Avoid rooting or jailbreaking your device; this makes your device more vulnerable to malware and attackers.
  • Install apps only from trusted and official sources like App Store, Google Play Store, etc.
  • Turn OFF Wi-Fi, Location Services, and Bluetooth when not in use.
  • Avoid sending or saving overly sensitive information like passwords, user IDs, banking information, etc., on your mobile device.
  • Avoid installing mobile apps that ask for unnecessary or more-than-required permissions.
  • Protect your mobile device with a reliable mobile security app that can automatically prevent installation of malicious apps, block infected or malicious websites and offers features such as anti-malware, anti-theft, location tracking, secure data backup, call & SMS blocking, etc.


Reference by Quick Heal

Installation Instructions for SSL certificate in Microsoft IIS 8.0 and 8.5

This document provides two options installing SSL certificate for Microsoft IIS 8.0 or 8.5.

  • Thawte SSL Assistant certificate installation
  • Manual SSL certificate installation
Option 1:  Thawte SSL Assistant Certificate Installation
  1. Download your certificate from the unique secure link we provide your technical contact via order fulfillment email.
  2. The ZIP file you download contain the SSL and Intermediate CA certificate in PKCS#7 file (i.e. ssl_certificate.p7b).
  3. Unzip the download file onto the server where you will install the certificate.
  4. Follow instructions in the getting_started.txt file.

Option 2: Install Your SSL Certificate Manually

  1. Download your certificate from the unique secure link we provide your technical contact via email.
  2. The ZIP file you download contain the SSL and Intermediate CA certificate in PKCS#7 file (i.e. ssl_certificate.p7b).
  3. Unzip the files onto the server where you will install the certificate.
  4. In Windows, click Start > Administrative Tools > Internet Information Services (IIS) Manager
  5. From the left menu, click the corresponding server name
  6. In the Features pane (middle pane), under Security, double-click Server Certificates
  7. From the Actions pane (right pane), select Complete Certificate RequestProvide the location of the certificate file and a friendly nameNote: The Friendly Name is a reference name for quick identification of the certificate for the Administrator.
  8. Be sure that the Personal store is selected, then click OK

Installation Instructions for Microsoft IIS 8.0 and 8.5

If you are unable to use these instructions for your server, Thawte recommends that you contact either the vendor of your software or an organization that supports Microsoft server.

Binding SSL certificate to the web site

  1. From the Connections column on the left, expand the Sites folder
  2. Select the appropriate web site.
  3. From the Actions pane on the right, click on Bindings
    Installation Instructions for Microsoft IIS
  4. In the Site Bindings window, If there is no existing https binding, choose Add and change Type from HTTP to HTTPS.
    Note: If there is an https binding, select it and click Edit
    Installation Instructions for Microsoft IIS
  5. From the SSL Certificate drop down, select the friendly name for the SSL certificate that was used during installation.
    Installation Instructions for Microsoft IIS
  6. Click OK

Additional notes:

If you do not specify an IP address when installing the SSL Certificate, the same ID will be used for all virtual servers created on the system. If hosting multiple sites on a single server, you can specify that the ID only be used for a particular server IP address.

Verify certificate installation

To verify if your certificate is installed correctly, use the Thawte Installation Checker


For more information, see Microsoft Support website.

Reference by thawte

Five new ways to reach your goals faster with G Suite

One of the core promises of Google Docs is to help you and your team go from collecting ideas to achieving your goals as quickly and easily as possible. That’s why last month we launched Explore in Docs, Sheets and Slides — with machine intelligence built right in — to help your team create amazing presentations, spreadsheets and documents in a fraction of the time it used to take.

Today, we’re introducing five new time-saving features designed to speed up and simplify the way you work, so you can focus on bringing your team’s ideas to life.

1. Spend less time figuring out who owns what with Action Items

According to research by the McKinsey Global Institute, employees spend about 20 percent of their work week — nearly an entire day — searching for details internally and tracking down colleagues for answers. This can be especially true when a document is full of ideas, requests and comments, making it difficult to get a clear sense of who’s responsible for what.

To help keep your projects moving, when you type phrases like “Ryan to follow up on the keynote script,” or “Andrea to schedule a weekly check in” on desktop, Docs will intelligently suggest an Action Item to assign to the right person, thanks to Natural Language Processing (NLP).


You can also manually assign an Action Item to someone in the Docs, Sheets and Slides desktop and mobile apps by mentioning their name in a comment and checking the new Action Item box. The assignee will get an email notification and see the Action Item(s) clearly highlighted with a blue bar when they open the file.


2. Spend less time searching for the files that need attention

Once Action Items have been assigned, it’s easy for team members to identify documents, spreadsheets and presentations that need their attention. The next time they visit Docs, Sheets, Slides (or Drive) from their laptops or mobile apps, they’ll see a badge on any files with Action Items assigned to them, plus any unresolved suggestions that others have made to their files.




3. Spend less time building questions with smarter Forms

Since its launch in 2008, more than a billion questions have been asked in Forms, allowing us to identify common patterns, like question types and the response options that usually go with them. With the help of neural networks, we can now predict the type of question you’re asking and suggest potential responses for you to choose from, giving you back about 25 percent of the time you used to spend creating a Form.

Let’s say you’re planning an all-day event at the office and need to know which day works best for your team. When you type “What days are you available next week?” Forms will intelligently determine that “Checkbox” is the ideal question type, and generate related response options that you can add one by one or all together.




Also debuting today is a top-requested feature from our business and education customers — the new “File upload” question type. Your respondents can now upload files from their computer or Drive — all of which are neatly collected for you in a new Drive folder. Note: This feature is only available for G Suite customers in Forms shared within their organization.




4. Spend less time typing with a set of new voice commands

Last year, we launched Voice typing in Docs on the web to help you capture ideas, big and small, without lifting a finger. Today, we’re adding more ways to format and customize content with commands for changing text color, deleting words, inserting links and comments, plus a number of other ways to format, hands-free.

5. Spend less time switching between apps to get things done

We want you to be as productive and collaborative as possible, regardless of the tools you choose to work with, so we’ve partnered with Slack to make it even easier to work with Google Docs files. With a click of the “+” button in Slack, you can bring files from Drive directly into a conversation with your team, or create new Docs, Sheets and Slides files right from Slack. You can check out more details on Slack’s blog.


With the introduction of Explore, and more and more updates to products that build in machine intelligence, taking back time spent on mundane, repetitive tasks will only get easier with G Suite. Now, you can focus your energy on creative and strategic work, not busy work.

Launch Details
Release track:

  • Launching to both Rapid release and Scheduled release
    • Assigned action items
    • Priority badges
    • Voice typing improvements
    • Slack integration
  • Launching to Rapid release, with Scheduled release coming on November 2nd, 2016
    • Suggested action items
    • Suggested response options in Forms
  • Launching to Rapid release, with Scheduled release coming on November 9th, 2016
    • File uploads in Forms

Available to all G Suite editions

Rollout pace:
Gradual rollout (potentially longer than 3 days for feature visibility)

All end users

Reference by Google


How To Set Up Office 365 On An IPhone

Following are the steps on how to set up office 365 on an iphone


1. Click on Settings



2. Click on Mail, Contacts, Calendars


3. Click on Add Account


4. Click on Exchange


5. Enter your email address and password then click on next


6. (Optional) – If this screens pops up enter in the server field


7. Choose what you would like synced with Office 365 and your iPhone and then click on save