Skip to content
 Scroll To Top

1. Dealing with Popups

Enabling Pop-ups in Internet Explorer, Chrome, Firefox, and Safari

To allow pop-ups for specific websites please follow these steps:

Internet Explorer

Open Internet Explorer and click Internet Options on the Tools menu,
Click the Privacy tab, if the Pop-Up blocker is turned on,
Click settings and enter the website address you'd like allow pop-ups on.
Click close and then OK.

Google Chrome

Google Chrome prevents pop-ups from automatically appearing and cluttering your screen. Whenever the browser blocks pop-ups for a site, an icon appears on the top-right in the address bar. Click the icon, check 'Always allow pop-ups from <website address>'.

To see blocked pop-ups for a site, follow the steps listed below.

Type the following in to the address bar in Chrome: chrome://settings/contentExceptions#popups
Add the website address, then click done.

Firefox

Open Firefox and Type the following into the address bar: about:preferences#content
Click Exceptions
Enter the website address you wish to allow
Click 'Save Changes'

Safari

Safari only allows you to have the pop-up blocker turned on or off.

Open up your Safari Web browser,
Go to the Safari menu and choose Preferences,
Then security and uncheck the box next to 'Block pop-up windows',
Click the red button to close the preferences window.

2. Copy/Paste in Blackboard (video)

Please Note: This video has onscreen instructions but no sound.

COPY/PASTE IN BLACKBOARD

3. Dealing with Office 2010 Autosave

Don't Panic! Office 2010 has autosave turned on by default to run every 10 minutes. It is likely you can recover (at least) that version of your document.

Try these methods in this order and don't hesitate to call us at 796-6400 for assistance.

1. Restart Word to look for the recovered document

  1. End all Word related processes:
    1. Press Ctrl+Alt+Esc to open the Task Manager dialog box.
    2. On the Processes tab, click any instance of Winword.exe or Microsoft Word, and then click End Process. Repeat this step until you have quit all instances of Winword.exe and Word.
      Note If this is your first time using Task Manager in Windows 8.1 or Windows 8, click More details to see all processes.
    3. Close the Windows Task Manager dialog box.
  2. Restart Word and then see if the missing file is displayed in the Document Recovery task pane.  By default, Word searches for AutoRecover files each time it starts.
  3. Double click the AutoRecover files one by one. If you find the lost Word file, save it immediately

2. Search for AutoRecover files (2010)

If the Recovery pane does not open, manually search for AutoRecover files (.asd files). To do this, follow these step, as appropriate for the version of Word that you are running. 

  1. On the File menu, click Recent.
  2. Click Recover Unsaved Documents.
  3. If you find the Word document that you are looking for, double-click it to open it.
  4. Save it immediately.

3: Search for Word backup files

  1. Start Word 2010.
  2. Click the File menu, and then click Open.
  3. Locate the folder in which you last saved the missing file.
  4. In the Files of type list (All Word documents), click All Files. The backup file usually has the name "Backup of" followed by the name of the missing file.
  5. Click the backup file, and then click Open.

If you have other versions of Office all instructions can be found here: 

Reference: https://support.microsoft.com/en-us/kb/316951

4. My Firefox doesn't open PDFs

Older versions of Firefox experienced issues viewing PDF files. As such, a fix was put in place using the PDF Viewer Add-on. This was functional for Firefox version 19-35, though the browser itself was capable of viewing PDFs. In Firefox version 39, this add-on no longer functions, and prevents users from viewing PDFs at all, displaying a blank screen. To remedy this, the add-on must be disabled.

  • From the menu button in the upper right corner, select Add-ons.
  • Click Extensions from the left menu bar.
  • Navigate to PDF Viewer 1.0.277.1, by Mozilla Labs. The version number may be different, dependent on updates.
  • Click the Disable button to the right.

Once disabled, Firefox should revert to opening PDFs internally.  

5. Java Security Settings

Java is a fundamental piece of software needed for Blackboard Collaborate. Versions vary based on the operating system of your computer and the version of browser. The primary application in use by Blackboard Collaborate is an independent Launcher, which should not require Java to be installed on the computer. However, older versions of Blackboard Collaborate have required Java in the past, and it may be necessary to troubleshoot these older versions.

To update Java security settings to enable Webmeetings, go to the Java Control Panel (Start > Control Panel > Java for Windows users and Apple icon > System Preferences > Java icon for Mac users).  From the Java Control Panel, click Security tab > add the following to the Exception Site List
https://elive.uas.alaska.edu
https://*.uas.alaska.edu 
https://online.uas.alaska.edu

6. Preventing and Removing Malware

There are many types of malware (short for malicious software) scattered across the
internet. These can perform various actions, from pop-up advertisements to locking you
out of your computer. Most malware comes packaged with "free" applications from the
internet, so be careful what you download. Make sure you download programs from the
official source, not a file transfer site. Don't open files that you don't recognize,
especially if you don't know the source.


Some of the types of malware:
Adware: Short for advertising-supported software, this malware commonly displays
advertisements for the sponsor's content. This can include controlling what ads you see
on websites. Adware is often bundled with spyware.

Ransomware: This nasty piece of malware accesses your computer and prevents access to it
until you pay a sum on money to the creator. This can include encrypting your hard
drive, preventing you from accessing it through other means. Paying the attacker is no
guarantee of getting access to your files.

Rootkit: Designed to slip in unnoticed, rootkits are designed to allow access to your
machine without your knowledge. This is a stepping stone to installing further malware,
stealing information, or similar malicious activities. Rootkits are hard to detect,
usually by the trace of what they've already done.

Spyware: Another one that's designed to be hidden, spyware gathers data about the user
such as account information, login credentials, or even keyboard input. These are often
bundled with adware.

Trojan: Like the famed Trojan Horse, this malware looks like a normal file or program.
It can be an avenue for further malware, or unauthorized remote access. These are often
disguised as normal downloads, such as music or games.

Virus: A virus copies itself and spreads into other programs. They infect "clean"
programs, and are easily transmitted. Because they infect other programs, they have a
wide variety of effects.


If you believe your computer is infected, go to another computer and change all your
passwords. Various pieces of malware can track data submitted to websites or the keys
you press. Once your passwords are secure, run trusted security software on the
infected machine. Visit our Downloads page for trusted programs including
Malwarebytes, Ad Aware Free, and Symantec Anti-Virus.

If you are uncertain, contact the UAS IT Helpdesk for assistance and recommendations.

 

Can't find the answer?

Search the Helpdesk site.

Contact the Helpdesk

(Helpdesk)
907-796-6400

(Toll Free)
877-465-6400

(General Information)
907-796-6452

uas.helpdesk@alaska.edu

 

Content maintained by Helpdesk.