CAES Web Team
-
Adapted from the StackExchange Information Security forum. Q: Most of us know to be careful when clicking on links in our email. But every day we click on links that Google shows us. Why are links in an email considered more dangerous than links from search results? A: You can generally trust search results because…
-
What is DocuSign? DocuSign helps get a document electronically signed. It’s safe — everything is encrypted — and it’s easy to use. How do I get an account? Getting signatures on a document Step 1: Create an envelope Definition: An envelope is a document you need to get signed. Once you are logged in, click…
-
This document is intended for locations supported by CAES IT staff. Locations that are supported by county IT may have to gain approval for the installation of this software from their own IT group. You must have UGA ArchPass set up in order to use VPN software. ArchPass is required to access UGA leave balances,…
-
In case the need arises, here is OIT’s list of suggestions for business continuity in the event of a campus/county office closure. Please do these steps ahead of time so that you are ready if and when this happens. If you have problems or issues with any laptops, please let your OIT tech (or County…
-
This short guide will show you how to install UGA’s Cisco VPN client on a computer which has Trend Micro installed. Trend Micro is your computer’s antivirus and actively monitors your computer in order to keep it protected. This function perceives the VPN client as malicious when you attempt to install it with Trend Micro…
Posted in: Desktop Support -
In this guide, you will learn: 1) What Malware is and what it can do, 2) How to detect Malware, 3) How to remove PUP software, 4) How to remove Malware, 5) What to do when you have a severe Malware infection, and 6) How to reinstall your operating system.
-
This is an obvious guide on how to avoid malware. The reason I call it “obvious” is because the tips you see in here are very easy, low level, and you’ve probably heard of them before. When we talk about malware we are referring to a generic description of any unwanted items on your computer.…
-
Have you ever needed to sort a list by last name, but the names are in a Word file or other text-based document? If so, then you know how time consuming it can be to manually separate them into First Name and Last Name. Well, Excel to the rescue! Here’s how you can use Excel…
Posted in: Excel -
Have you ever needed to capture a picture of a window on your computer, or get a copy of a picture on the web that isn’t available for download, but you thought you didn’t have any software to do it? Well, you actually do have the software, and it’s available in Windows 7 and Windows…
Posted in: Desktop Support