Sap Gui Interface Tips & Tricks

Some nice interface features you may enable in SAP GUI :

Tips & Tricks
Titlebar Menu Use the Titlebar menu to create a New SAP session or stop a troublesome transaction.  This menu is visible by clicking the small icon in the upper-left corner of the SAP window.  It looks like a square with an inset trapezoid.SNAG-001The “Create Session” will open a new window.
The “Stop Transaction” can be used to close a non-responding SAP window.
Transaction codes in the Easy Access Menu You can easily add transaction codes to your SAP Easy Access menu.

  1. In the screenshot below, you can see the Sales Order “Create” transaction:
  2. Navigate to the Extras -> Settings menu:
  3. Select the “Display Technical Names” box and click the Checkmark:
  4. Now you see the transaction codes alongside the description:
View List Keys SAP transactions have many dropdown boxes.  Many users find it quicker to select options by typing in the Key of the code they’re trying to select.SNAG-006For example, by default the SD ‘Billing Block’ dropdown (VA01) only shows the description of each block:To display the keys within SAP dropdowns:
(Note:  Screens may vary depending on SAP GUI Version.)

  1. From any SAP screen, expand the ‘Customize Local Layout’ button and select ‘Options…’:
  2. Navigate to the Interaction Design à Visualization & Interaction node in the menu tree:
  3. Select the “Show keys within dropdown lists” and then “Sort by keys within dropdown lists…” options in the ‘Controls’ section:
  4. Click “Ok” to accept the changes.
  5. Now you can see the same list with the keys visible:
View a summary of all open sessions If you routinely work in multiple systems with multiple sessions, it can sometimes be difficult to find the right SAP window.  However, you can see a summary of all open SAP windows sorted by System by right-clicking on the SAP icon in the Windows task bar.  In the example below, you can easily identify the four sessions open for ERD and the two for ERQ.  Details include the System, client, Transaction name and user ID.

Comment below what your Tip or Trick is.


3 easy ways to make Touch ID more accurate

3 Easy Ways to Make Touch ID More Accurate on iOS

Have you ever attempted to use Touch ID on your iOS device, only to have it not recognize your fingerprint? It can be annoying, but you’re not defenseless! Here are 3 quick and easy things you can do to make Touch ID better at reading your fingerprint each time you want to unlock your phone.

Separate Entries per Finger

This one is real easy to do. Just take the finger you want to use to unlock your device, and create a second entry for it. Follow the process again, taking special care to hit different parts of your finger than you did the first time.

This way, when you scan that finger, the phone will have two different fingerprint scans to pull from, thus increasing the chance that it gets it right.

Take a Damp Scan

If you use your phone at the gym, you’ve no doubt experienced an issue with unlocking your phone while your finger is sweaty. To fix the problem, create a fingerprint scan while your finger is damp.


Don’t soak your finger in a bathtub before you scan it and say that Dave from MakeUseOf told you to slather a wet finger all over your phone. Just a tiny bit of moisture to simulate how wet your finger would be during a workout will do the job.

Scan Your Cold Finger

Some users have reported issues with their device reading their fingerprint when it’s cold. If this happens to you, make your finger cold (stick it on some ice, hold a cold drink, go outside in the cold, etc.), and then create a scan.

This will help the phone get the feel for your finger when it isn’t at your normal body temperature.

How to enable Google Prompt 2fa


How to Set Up Google Prompt

Here’s how you can enable Google Prompt for your Google accounts:

Before enabling Google Prompt, first enable two-step verification for your Google account and you have already enabled two-step verification, you can skip this part.

  • Go to and sign in to your Google account.
  • Select ‘Signing in to Google,’ using 2-Step Verification.
  • Click on ‘Get started’ and enter your password once again.
  • Now provide your phone number you want to use for authenticating, and choose either an SMS or phone call for verification, and click on ‘Try it.’
  • Enter the 6-digit code from the SMS or phone call and select ‘Next.’
  • For setting up two-step verification, click ‘Turn ON.’

Now, once you have enabled two-step verification, follow these simple steps that will just take a few second. All you need is an Android or iOS device nearby.

  • Under ‘Set up alternative second step,’ click on the Google prompt option
  • Add phone and click Get started.

Then just follow the on-screen instructions and you’re all set to go.

If you have an iPhone, you are required to download the Google Search app first and sign in before using Google Prompt. But, if you are an Android user, just update your Google Play Service.

Two-step verification has become so easier to use, so what are you now waiting for?

How to troubleshoot performance issues

You have your new Windows 7 system up and running, but suddenly you realize some things are not running as smoothly as they once did. Today we take look at using the hidden but useful advanced system tools in Windows 7 to troubleshoot a problem.

Advanced System Tools

There is a very handy collection of system utilities that are included in Windows 7 and Vista that can help you troubleshoot problems that may arise. For some reason Microsoft felt the need to bury them in the OS so they’re not immediately apparent to most users. Here we take a look at accessing the diagnostic tools and briefly cover some of what’s included.

click through to Control Panel \ All Control Panel Items \ Performance Information and Tools \ Advanced Tools…see what I mean by buried?

What’s Included

It opens up a list of different tools you can use to monitor different aspects of the system performance. From here you can do several things like defrag the hard drive, check Event Viewer, and even re-rate the Experience Index score.


Notice there is a column for Performance issues you can click on to get additional details on how to correct the problem. In this example it shows a driver interfering with Sleep mode and that changing visual settings will improve performance.


In additional details it tells us turning off the Aero feature will improve performance. I find it odd that MS would alert you to turn off Aero as it’s a hyped feature to the interface since XP. At least they’re honest in telling you Aero can slow performance, especially with under powered video cards.


Even Viewer is a great tool used by administrators that records event errors that happen “behind the scenes” so to speak. The information in these logs are meant for admins and advanced users to help determine why certain errors are occurring. Most users won’t need to worry about this section, but you may need to access it while receiving tech support.


Resource Monitor is like the Task Manager on steroids…it’s a great tool to monitor what apps and services are using up your system’s memory, processor, disk usage, and network activity. If you find a service or program that is frozen or taking up too many resources you can close it out.


A very handy tool that is not well known about is the ability to generate a system health report.


Wait while an analysis takes place and the information is collected…


The report takes about a minute to create and then you can go through a very detailed analysis of virtually every aspect of your system.


You can also export the report to HTML format so you can share or save the report for future comparisons and troubleshooting.


If you’re experiencing problems with your Windows 7 machine, using the included advanced system tools can help a lot, without the need for installing 3rd party utilities.

WatsApp: How to use bold,Italic and Strikethrough text

1. Bold

To write in bold text, all you have to do is add an asterisk to either side of the chosen word. For example *bold*

2. Italics

This formatting option also follows a similar rule. Simply insert an underscore before and after your desired sentence or word.  For example _Italics_

3. Strikethrough

If you’ve sent your message too fast or want to show a change of mind,a  squiggly dash is your best bet. For example ~strikethrough~

How does Hypertreading work ?

This very well explained in the next video :



How to have chrome like tabs to windows explorer

Windows: Tab management in Chrome is great, and if you wish Windows Explorer had tabs that look and work like Google Chrome, Clover is the app for you.
Once installed, Windows Explorer will have tabs that work almost exactly like the ones in Chrome work. Ctrl+T opens a new tab, Ctrl+W closes it, even middle-clicking to close a tab works. There’s even a new tab box to click for a fresh explorer tab—just like in Chrome. If you right-click on a tab, you even get the same contextual menu options, including the option to re-open a closed tab, duplicate an existing tab, or pin a tab to the back of the list.

Clover is completely free, and supports Windows 7 and higher (including the Windows 10 .) We tested the app in Windows 7 and it works great. The tabbed interface is snappy and fast, and the tabbed interface compliments the stock explorer UI. The developer’s site is in Chinese, but he has an English page on his site (linked below.) To download the app, hit this Google Translate link for the front page and click “Download” (you may have to leave Google Translate to start the download.) update: Softpedia has a mirror of the app if you can’t get to Ejie’s site.


Clover – Wings for Your Windows Explorer!

How to stream from VLC to Chromecast

Since February of 2015, VLC has promised to add support for Chromecast but the feature has yet to be implemented. The stable version of VLC still doesn’t support casting to the Chromecast but support for it has been spotted in the nightly builds of  VLC 3.0. The release date for a stable build of version 3.0 hasn’t been given yet and for all we know it might not drop until the end of this year (or even early next year) but VLC is indeed adding support for the Chromecast just as it promised. If you aren’t too bothered with bugs, you can download the nightly build yourself and use it to cast to your Chromecast. Fair warning: it’s very buggy.

Install VLC 3.0 nightly build from the links at the end of the post. We’ve linked to both the 32-bit and 64-bit versions. These builds are only available for Windows so macOS users are going to have to wait longer.

Make sure you’re Chromecast is running properly and that your Windows desktop and the Chromecast are on the same network. Open a media file, preferably an MP4 or MKV file and not an AVI file which the app isn’t playing nice with at all at present. Right-click inside the playback frame and select Tools>Render Output from the context menu. Alternatively, just hit Ctrl+Shift+R.


This will open the Render Options window and your Chromecast will be duly listed here. Select it and click ‘Ok’.


VLC 3.0 is buggy and the team is hard at work fixing bugs so while it’s entirely possible you never manage to cast to your Chromecast with the current build, you might be able to do so with future nightly builds. We had to make numerous attempts ourselves to get it to cast to the device in question.

VLC adding support for Chromecast is huge not only because the app is one of the most popular media players today but also because it plays just about every media format there is which means a lot to Chromecast users who often have to find an app that can convert a file into a playable format for the Chromecast.

Download VLC 3.0 32-bit Nightly Build

Download VLC 3.0 64-bit Nightly Build

A way to stop Cryptolocker

____ Install File Server Resource Manager ____

2003R2: Control Panel > Add or Remove Programs > Add/Remove Windows Components
> Windows Components Wizard > Management and Monitoring Tools > Details > File Server Resource Manager

2008(R2): Server Manager > Roles > Add Roles > Add Roles Wizard > Server Roles
> File Services > Role Services > File Server Resource Manager

2012(R2): Server Manager > Manage > Add Roles and Features > Add Roles and Features Wizard > Server Roles
> File and Storage Services > File and iSCSI Services > File Server Resource Manager

____ Server-side protection from further encryption ____

1) Open File Server Resource Manager (Start > Run > fsrm.msc)

2) File Screening Management > File Groups > Create File Group…
File group name: 1-PreventCrypto
Files to include:

Note: After creating the file group, update the entire list easily by running “C:\Windows\1-PreventCrypto-FileGroupUpdate.bat”
See comments within the batch file for usage help.

Note: You can automatically update your file group with the one provided by this website by running “C:\FSRMUPDT\get-fsrmupdt.bat” as a daily scheduled task.
See comments within the batch file for usage help.

*want your files back.*
how to decrypt*.*
*decrypt my file*.*

FAQ: Why is this list smaller than others offered on the web?
A: Only files known to reach network shares are added here since that’s all FSRM will see. Files dropped/left locally on the infected machine are not added to this list.

3) File Screening Management > File Screen Templates > Create File Screen Template…

Settings tab
Template name: 1-PreventCrypto
Screening type: Passive screening
File groups: Check “1-PreventCrypto”

E-mail Message tab
Subject: Unauthorized file from the [Violated File Group] file group detected
User [Source Io Owner]
Saved [Source File Path] to [File Screen Path]
On server: [Server]
This file is in the [Violated File Group] file group in FSRM, which generated this alert.
A batch was run to remove all server shares until corrective action is taken.

Event Log tab
Check “Send warning to event log”

Command tab
Check “Run this command or script”
Browse… C:\Windows\1-PreventCrypto.bat
NOTE: you must edit this .bat to include the names of all your shares
Select radio button: “Local System”

4) File Screening Management > File Screens > Create File Screen…
File screen path: C:\ (or just the drive/folder containing shares)
Select radio button: “Derive properties from this file screen template (recommended)”
Select from dropdown: “1-PreventCrypto”

5) File Server Resource Manager (Local) > right-click: Configure options…
Email Notifications tab
Set SMTP server name (use a SMTP relay if you don’t have a mail server on-site)
Set Default administrator (see how to)
Notification Limits tab
Set all to 2 minutes

How to avoid Phishing in Gmail

How to Avoid Phishing  in Gmail With this Trick

How to Avoid Phishing Emails in Gmail With One Trick

There are a lot of tips out there for how to avoid phishing emails. With a combination of vigilance and third-party tools, you can avoid scams, but if you’re a Gmail user, there’s one simple setting that will help you avoid phishing emails.

One of the many great, overlooked features Gmail features is the ability to label messages coming from authenticated recipients that are often the target of phishing scams. Here’s how to get that feature.

Click on the settings button in the top right-hand corner.


The next step is to navigate to the “Labs” tab, where you can enable a wide variety of settings for your Gmail account. One of the first options under “Available Labs” is “Authentication icon for verified senders”.


After enabling it, you will see a little key symbol next to authenticated emails.


You can also take a closer look at emails you receive that aren’t automatically labeled as authenticated. In Gmail, open up the message and click the little arrow right beneath the sender’s email address. Look at the “mailed-by” or “signed-by” field to make sure it came from the domain associated with the sender.


If you see a question mark next to the sender’s name, proceed with caution with this message.

Google also provides instructions for what to do if you’re using an email client. After you open the message, check the message header. In Apple Mail, for example, you can find this by going to View > Message > Default Headers.

This will display the “Authentication-Results” at the very top of the paragraph. If you find spf=pass or dkim=pass, you’ll know the message is authenticated.