Protecting your Data Resources – Stop 3 Lesson 3 – Restoring a Windows Backup
By Jim Segers, IT Coordinator – Extension AgriLife Information Technology In the last Protecting you Data Resources blog we made a first backup using the built-in Windows Backup utility. But making the...
View ArticleHow to Repair your Outlook Database
by Pete Flores, Regional Information Technology Specialist – South Texas Outlook stores our mail, contact folders, calendars and to do list in a data base. If you interested the database is called an...
View ArticleCreate Forms Using the Developer Tab in MS Word 2010
by Pete Flores, Regional Information Technology Specialist – South Texas Many times we send out MS Word 2010 documents and ask folks to complete the form and e-mail it back to the sender. With MS...
View ArticleWordPress and the County Web Page
By Greg Thomas – Agrilife Regional IT Specialist — This series teaches the processes of updating your county web page from the old TECO format to a newer version available with WordPress. Eight...
View ArticleHow To Create a PDF file of your Outlook 2010 e-mail, using Adobe...
by Pete Flores, Regional Information Technology Specialist – South Texas — With Adobe Professional 10 and MS office 2010, you can create pdf files of the e-mail you would like to retain. The...
View ArticleDon’t Get Labeled as Spam!
By Jay Carper, AgriLife Exchange Admnistrator If your email recipients mark your message as spam or if it looks like spam to an email server your message won’t get through. Even worse, our entire...
View ArticleSecurely erasing a Hard Drive
by Greg Thomas, Southeast Texas Regional Extension Specialist When we decommission a computer it is a good practice to securely erase all programs and data. We want to get rid of the computer...
View ArticleAbout Removing Old Computer Equipment
By Greg Thomas, Southeast Regional IT Computer Specialist Unused computers are a liability to your office. Keeping them around is asking for more work and possible trouble. With very little effort you...
View ArticleThe Dreaded “Your Mailbox is almost Full” message!!
by Aimee Sandifeer, Northeast Region AgriLife IT Specialist Is your Outlook giving you grief! Do you see this message: Your mailbox is almost full. 924MB 1024MB Please reduce your mailbox size. Delete...
View ArticleIT Tuesday Webinars
IT Tuesday Webinar Series – 2015 Our IT Tuesday sessions are designed with your time mind. We start @ 9:30 and stay within an hour. In addition to instruction we include live demonstrations and often...
View ArticleDelay Delivery in Outlook – Save your Bacon!
If you have ever clicked send in Outlook, then immediately thought – OPPS, I WISH I HAD THAT ONE BACK – read on. There is a Recall feature in Outlook but the way email systems work its ability to get...
View ArticleMozilla Firefox Plugin Checker
Article contributed by Dr. Aimee Sandifeer, Northeast Regional IT Specialist According to Mozilla, keeping your plugins current can help Firefox run more safely and smoothly. What do I need to know...
View ArticleArticle 1
ADOBE FLASH https://technet.microsoft.com/en-us/library/security/ms17-003.aspx This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows...
View ArticleArticle 0
MS WORD 2016 https://technet.microsoft.com/library/security/ms17-002#ID0EUG If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An...
View ArticlePlus Addressing- Adding Something Extra to your Emails
About Plus Addressing, also known as sub-addressing, allows you to create a disposable email address that you can use to receive particular emails. It can make sorting messages using Rules in your...
View ArticleSoftware End of Life
What is End of Life? All software has a lifecycle. It begins when the software is released, continues through the support phase, and ends with the software no longer supported. End of Life (EOL)...
View ArticlePig Butchering Crypto Scam
What is it? The pig butchering scam refers to cases when scammers use fake profiles and infiltrate dating apps and social media in order to target and lure victims into investing in elaborate crypto...
View ArticleCan you do me a favor?
Have you recently received an email from your “boss” with this in the subject line or body? A text from your “regional director” asking you “to do something important real quick?” Did the sender ask...
View ArticleDallas Center Outage
The Dallas Research and Extension Center is currently experiencing a power outage due to blown transformers. We do not currently have an ETR. We will post updates here. Update: The Dallas Center’s...
View ArticlePhantom Personal Devices
October is National Cybersecurity Awareness Month, and AIT wants to ensure you are aware of all the spooky parts of the cyber world! We will post a new topic every Friday in October, so come back...
View Article
More Pages to Explore .....