Skip to content
 Scroll To Top

Enabling Pop-ups in Internet Explorer, Chrome, Firefox, and Safari

To allow pop-ups for specific websites please follow these steps:

In the examples for UAS Courses below, you'll want to add "" and "".

Internet Explorer

  1. Open Internet Explorer and click Internet Options on the Tools menu,
  2. Click the Privacy tab, if the Pop-Up blocker is turned on,
  3. Click settings and enter the website address you'd like allow pop-ups on.
  4. Click close and then OK.

Google Chrome

Google Chrome prevents pop-ups from automatically appearing and cluttering your screen. Whenever the browser blocks pop-ups for a site, an icon appears on the top-right in the address bar. Click the icon, check 'Always allow pop-ups from <website address>'. To see blocked pop-ups for a site, follow the steps listed below.

  1. Type the following in to the address bar in Chrome: chrome://settings/contentExceptions#popups
  2. Add the website address, then click done.


  1. Open Firefox and Type the following into the address bar: about:preferences#content
  2. Click Exceptions
  3. Enter the website address you wish to allow
  4. Click 'Save Changes'


Safari only allows you to have the pop-up blocker turned on or off.

  1. Open up your Safari Web browser,
  2. Go to the Safari menu and choose Preferences,
  3. Then security and uncheck the box next to 'Block pop-up windows',
  4. Click the red button to close the preferences window.

Don't Panic! Office 2010 has autosave turned on by default to run every 10 minutes. It is likely you can recover (at least) that version of your document.

Try these methods in this order and don't hesitate to call us at 796-6400 for assistance.

1. Restart Word to look for the recovered document

    1. End all Word related processes:
      1. Press Ctrl+Alt+Esc to open the Task Manager dialog box.
      2. On the Processes tab, click any instance of Winword.exe or Microsoft Word, and then click End Process. Repeat this step until you have quit all instances of Winword.exe and Word.
      3. Note If this is your first time using Task Manager in Windows 8.1 or Windows 8, click More details to see all processes.
      4. Close the Windows Task Manager dialog box.
    2. Restart Word and then see if the missing file is displayed in the Document Recovery task pane.  By default, Word searches for AutoRecover files each time it starts.
    3. Double click the AutoRecover files one by one. If you find the lost Word file, save it immediately

2. Search for AutoRecover files (2010)

If the Recovery pane does not open, manually search for AutoRecover files (.asd files). To do this, follow these step, as appropriate for the version of Word that you are running. 

    1. On the File menu, click Recent.
    2. Click Recover Unsaved Documents.
    3. If you find the Word document that you are looking for, double-click it to open it.
    4. Save it immediately.

3: Search for Word backup files

    1. Start Word 2010.
    2. Click the File menu, and then click Open.
    3. Locate the folder in which you last saved the missing file.
    4. In the Files of type list (All Word documents), click All Files. The backup file usually has the name "Backup of" followed by the name of the missing file.
    5. Click the backup file, and then click Open.

If you have other versions of Office all instructions can be found here: 


Older versions of Firefox experienced issues viewing PDF files. As such, a fix was put in place using the PDF Viewer Add-on. This was functional for Firefox version 19-35, though the browser itself was capable of viewing PDFs. In Firefox version 39, this add-on no longer functions, and prevents users from viewing PDFs at all, displaying a blank screen. To remedy this, the add-on must be disabled.

  • From the menu button in the upper right corner, select Add-ons.
  • Click Extensions from the left menu bar.
  • Navigate to PDF Viewer, by Mozilla Labs. The version number may be different, dependent on updates.
  • Click the Disable button to the right.

Once disabled, Firefox should revert to opening PDFs internally.  

Java is a fundamental piece of software needed for Blackboard Collaborate. Versions vary based on the operating system of your computer and the version of browser. The primary application in use by Blackboard Collaborate is an independent Launcher, which should not require Java to be installed on the computer. However, older versions of Blackboard Collaborate have required Java in the past, and it may be necessary to troubleshoot these older versions.

To update Java security settings to enable Webmeetings, go to the Java Control Panel (Start > Control Panel > Java for Windows users and Apple icon > System Preferences > Java icon for Mac users).  From the Java Control Panel, click Security tab > add the following to the Exception Site List https://*

There are many types of malware (short for malicious software) scattered across the internet. These can perform various actions, from pop-up advertisements to locking you out of your computer. Most malware comes packaged with "free" applications from the internet, so be careful what you download. Make sure you download programs from the official source, not a file transfer site. Don't open files that you don't recognize, especially if you don't know the source.

Some of the types of malware:

Adware: Short for advertising-supported software, this malware commonly displays advertisements for the sponsor's content. This can include controlling what ads you see on websites. Adware is often bundled with spyware.

Ransomware: This nasty piece of malware accesses your computer and prevents access to it until you pay a sum on money to the creator. This can include encrypting your hard drive, preventing you from accessing it through other means. Paying the attacker is no guarantee of getting access to your files.

Rootkit: Designed to slip in unnoticed, rootkits are designed to allow access to your machine without your knowledge. This is a stepping stone to installing further malware, stealing information, or similar malicious activities. Rootkits are hard to detect, usually by the trace of what they've already done.

Spyware: Another one that's designed to be hidden, spyware gathers data about the user such as account information, login credentials, or even keyboard input. These are often bundled with adware.

Trojan: Like the famed Trojan Horse, this malware looks like a normal file or program. It can be an avenue for further malware, or unauthorized remote access. These are often disguised as normal downloads, such as music or games.

Virus: A virus copies itself and spreads into other programs. They infect "clean" programs, and are easily transmitted. Because they infect other programs, they have a wide variety of effects.

If you believe your computer is infected, go to another computer and change all your passwords. Various pieces of malware can track data submitted to websites or the keys you press. Once your passwords are secure, run trusted security software on the infected machine. Visit our Downloads page for trusted programs including Malwarebytes, Ad Aware Free, and Symantec Anti-Virus.

If you are uncertain, contact the UAS IT Helpdesk for assistance and recommendations.

Google Hangouts is web-based software that can be used to hold video calls, phone calls, and you can even instant message other users. Because everyone in the UA system has a Google Email, everyone has access to use Google Hangouts!

Google Hangouts also has an app available for Android, iOS, and Chrome systems.

In Chrome, you can get an extension for Hangouts so that when you receive a message it will pop up on your computer. Check the Chrome store to get the extension.


Can't find the answer?

Search the Helpdesk site.

Contact the Helpdesk


(Toll Free)

(General Information)


Content maintained by Helpdesk.