CAES Web Team

  • In this guide, you will learn: 1) What Malware is and what it can do, 2) How to detect Malware, 3) How to remove PUP software, 4) How to remove Malware, 5) What to do when you have a severe Malware infection, and 6) How to reinstall your operating system.

    Posted in: , ,
  • An Obvious Guide to Avoiding Malware

    This is an obvious guide on how to avoid malware. The reason I call it “obvious” is because the tips you see in here are very easy, low level, and you’ve probably heard of them before. When we talk about malware we are referring to a generic description of any unwanted items on your computer.…

    Posted in: ,
  • AEM: Uploading Image and Document Files

    Carefully selected and edited images can add a lot to the visual interest of a web page and creating and linking to PDF files is a great way to share your county-specific information with visitors.  Here’s how to get these files uploaded to AEM so you can find them in the Content Finder!

    Posted in:
  • AEM – Anchors and Jump Links

    If you have several sections of content within a single Rich Text box and would like to provide some quick page navigation for your visitors, create section anchors and then jump links to those anchors. Here’s how.

    Posted in:
  • Sort Text-Based List by Last Name using Excel

    Separate and Sort by Last Name

    Have you ever needed to sort a list by last name, but the names are in a Word file or other text-based document?  If so, then you know how time consuming it can be to manually separate them into First Name and Last Name.  Well, Excel to the rescue! Here’s how you can use Excel…

    Posted in:
  • Have you ever needed to capture a picture of a window on your computer, or get a copy of a picture on the web that isn’t available for download, but you thought you didn’t have any software to do it?  Well, you actually do have the software, and it’s available in Windows 7 and Windows…

    Posted in:
  • Does this email smell phishy to you?

    Merriam-Webster defines “phishing” as “a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly.” So, basically, there are bad guys out there fishing for your personal and professional data.  It’s up to you not to get hooked. How do you identify a phishing email? There…

    Posted in: , ,