Posts in Tips & Tricks

How to extract the unique values or data in a column with duplicate data

Suppose you have a spreadsheet at work and one of the columns contain a huge list of account numbers being exported from your company’s accounting system that contains a lot of duplicates. And you are tasked to extract the UNIQUE account numbers in this huge list. If the list is just a short one, like 50 rows or 100, you can easily use the Conditional Formatting that highlights all duplicates, then you can manually delete the highlighted duplicates until no marked cells are left. This can be done easily with… Read More

How to recover deleted contacts in Gmail

One of the problems that Gmail users like you are facing is when they find out that their contacts are missing. This normally happens when your Gmail account is hacked or compromised. The hacker could have deleted emails and contacts giving you the headache. To recover the deleted contacts, please do the following steps: Step 1: Go to this link and then sign in to your Gmail account: http://gmail.com Step 2: When signed in, click on the Gmail link right below the Google icon or logo Step 3: In the pull-down menu that shows… Read More

How to multitask in Yahoo Mail using email tabs

Since the upgrade of Yahoo Mail to its new interface or look-and-feel, emails only display in the main window. When you open other emails, the previously opened one will be replaced with the new one. This is not as productive if your work is dependent on some amount of emails. That is, if you receive and process hundreds of emails everyday, this behavior will badly affect your performance. You might end up buying an email program like MS Outlook 2013. Now, Yahoo Mail offers tab browsing of emails. That is,… Read More

How to extract text to the right of a character in Microsoft Excel cells?

Suppose you have a list of text data in Excel columns that you want to work with and you need to extract only a portion of the text following a specific pattern. This pattern can vary, like a specific character, a particular number of characters, or whatever your actual data is. It is the very first and important step that you can decipher the actual pattern of your data so that you can build the correct formula to manipulate the data. See for instance the sample column of data below:… Read More

How to Enable and Disable System Icons in the System Tray in Windows Computer

In the default Windows installation, basic functions and settings are already in place. Among these are the system icons located in the system tray or the items shown in the far right of the taskbar of Windows. When you install software programs in your computer, some of them automatically create their corresponding icon in the system tray. Over time, and as you install more of these programs, your system tray will be filled with various icons. To manage your system icons in your system tray, here are the steps: Step… Read More

How to Add and Configure Yahoo! Mail in Outlook 2010/2007

There is a big change in Yahoo Mail that came with the changes that Yahoo made with their interface in the past few months ago. These days, FREE Yahoo Mail users can now use POP and SMTP email clients to access their emails. This feature was previously available for paid version of Yahoo Mail only. Prepare Your Yahoo Mail Account for POP/SMTP Access Allow your Yahoo Mail account first to be accessed using a POP email software like MS Outlook 2007/2010/2013, Windows Live Mail, Thunderbird, etc. This is done by… Read More

How to Avoid Email Scam and Spam

The email population is getting bigger as many people are getting or subscribing to an email account or accounts everyday. Also, there are several email providers today that allows people to create an email account with them for free. Gmail, Yahoo Mail, Hotmail and AOL are among them. This is also the main reason why hackers and spammers are targeting emails since hundreds of millions of people are using emails. Therefore, with this great number of emails out there, the more email addresses that the hacker can scrape the web… Read More