Copyright Goodheart-Willcox Co., Inc. 44 Principles of Cybersecurity Quick Look 2.2.1 Continued 4. Click in the Description: text box, and enter A macro to insert my name, as shown. 5. Click the Keyboard button in the dialog box. The Customize Keyboard dialog box is displayed. This is used to assign the macro to a keyboard shortcut. 6. Click in the Press new shortcut key: text box, and then press the [Alt] and [N] keys on the keyboard at the same time. Look near the bottom of the dialog box, and verify the Currently assigned to: label reads [unassigned]. If this key combination is currently assigned to a command, choose a different key combination. 7. Click the Assign button in the dialog box to set the keyboard shortcut for the macro, and then click the Close button. The dialog box closes, and you are now in record mode. Anything you do in Word will be included as an action in the macro. 8. To the document, add your name, press the [Enter] key, and add your class and section. 9. Click the arrow below the Macros button on the ribbon, and click Stop Recording in the drop-down menu. The macro is now complete and ready for use. You can also view the computer code that was created. 10. Click View Macros Macros on the ribbon. The Macros dialog box is displayed. Any existing macros will be listed in this dialog box. 11. Select the macro named with your name, and click the Edit button in the dialog box. The Microsoft Visual Basic editor is opened, and the code for the macro is displayed in a window, as shown. There are many ways a hacker could edit this code to insert malicious actions. Enter your name Enter a description of what the macro does Click to assign the macro to a keyboard shortcut Code for recorded actions Macro name