Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip of the Week: Sign a PDF in Windows

Tip of the Week: Sign a PDF in Windows

PDFs have been around for a while and they have become an extremely useful file format for business. One of the best features of the PDF is that it is useful for securing signatures so that contracts can be handled over the Internet. Today, we’ll go over how you go about signing a PDF in Windows.

The tip we are going to provide assumes that you will be using Adobe Reader for Windows as it is the most common option people use to secure signatures. 

To get started, you will want to open the document that needs a signature in Adobe Reader and select the Sign option from the toolbar, or in the View menu dropdown. This will open the Fill & Sign panel, where you should click Place Signature. A new window will open, giving you four different options as to how to add your signature:

  • Type my signature
  • Use my webcam
  • Draw my signature
  • Use an image

Let’s briefly discuss the processes for these options.

Type My Signature

The Type my signature option is probably the easiest to use. All you have to do is type your name into the provided box and a signature will be generated for you in the Review Your Signature box. You will then have the option to change between four styles by using the Change Signature Style button below the generated sample.

Once the signature is acceptable, you’ll just add it to your document by clicking Accept. You’ll need to place it and resize it to fit your document. Save it and then you can send it out via fax or email if you need to secure other signatures. 

Use My Webcam

Using your webcam is a little more complex. First, select Place Signature and then Use a webcam in the drop-down that appears.

You will then be told to sign your name in black ink on white paper, which you will then use your webcam to scan in. To start you will press Start Webcam, and then take your physical signature and align it to the blue line that Adobe Reader provides. A preview will appear, which if everything is satisfactory, you should Accept. You will then be prompted to move the signature to the applicable place on the PDF.

Draw My Signature

This option requires additional hardware to work if you are working from a desktop, but if you have a touchscreen or a stylus, you should be good to go.

After selecting Place Signature, choose Draw my signature from the drop down menu and follow the instructions on the screen. If you mess up, the Clear Signature option gives you another chance. Once you’ve created your signature, clicking Accept will insert it.

Use an Image

The last option gives you the ability to place an image as your signature. If you have a scanned signature saved on your computer, you can drop it into the document to sign it. You’ll select Use an image from the dropdown menu and you’ll be given the ability to Browse… your files to find the appropriate one. Once you resize it to fit, choose Accept, and save your file.

We hope that this article has helped you with all your PDF signature needs in Windows. For more great tips and tricks return to our blog regularly. 

Five Cool Technologies You Can Give for Secret San...
A Field Guide to Phishing Attacks
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Internet Software Efficiency Email Managed IT Services Business Mobile Device Google Collaboration Phishing Small Business Malware Outsourced IT Innovation User Tips Hackers Cloud Computing Cybersecurity Business Management Hardware Tech Term Upgrade Smartphone Communication Managed Service Mobile Devices Microsoft Android Computer Business Continuity Windows 10 Workplace Tips Covid-19 Smartphones VoIp Backup Quick Tips Disaster Recovery Ransomware Paperless Office Managed Service Provider Network Encryption Remote Work Communications Users Office 365 Server Business Technology Saving Money Passwords Browser Data Management Wi-Fi BDR Social Media Internet of Things Help Desk Remote Monitoring Managed IT Artificial Intelligence Vulnerability Windows 7 Save Money Healthcare Holiday Government Compliance Document Management Automation Facebook Scam Applications Blockchain Managed IT services Microsoft Office Windows Chrome Data Security Miscellaneous Laptops Bandwidth Antivirus Mobile Office Two-factor Authentication Wireless Redundancy Health Remote Information Virtualization Employer-Employee Relationship Tip of the week Processor Office Vendor Management Gadgets Analytics Avoiding Downtime Project Management Data Loss IoT Apps Regulations Information Technology BYOD Maintenance OneDrive Managed Services Hard Drive Training VPN RMM Networking Storage Proactive Router Infrastructure Meetings Software as a Service Net Neutrality Mobility Files Access Control Virtual Private Network Machine Learning Website IT Management Company Culture Employee-Employer Relationship Customer Relationship Management Network Management WiFi Payment Cards Mobile Security Consultation Display Managed Services Provider Flexibility Unified Communications Alert Remote Workers Management Holidays Co-Managed IT Professional Services File Sharing Time Management The Internet of Things Spam Gmail Risk Management Cooperation Vendor Search Money Unified Threat Management HIPAA Utility Computing Bring Your Own Device Monitoring Remote Worker Password Remote Computing Remote Monitoring and Management Tablet Financial Internet Exlporer Operating System Dark Web Augmented Reality Server Management Data Storage Smart Technology Recycling Employees Computing Word Electronic Health Records File Management Instant Messaging Assessment Social Network Consulting Downtime Patch Management Data Breach Address Solid State Drives Migration eWaste Fleet Tracking Zero-Day Threat Comparison Licensing Computers Voice over Internet Protocol Projects Cookies Cables Cyberattacks Social Value of Managed Services Customer Service Technology Tips Windows Server 2008 Gifts PowerPoint Vulnerabilities Mobile Device Management Data Warehousing SaaS Favorites Legislation Content Filtering Cybercrime Cyber security Managing Stress Distributed Denial of Service Techology Shadow IT Teamwork Security Cameras Touchscreen Hacking Options Telephone Chatbots Asset Tracking Backup and Disaster Recovery Specifications Return on Investment Nanotechnology Wires Read Only Outsource IT Mirgation MSP Finance Digital Payment Hotspot Hacker Mobile Computing Point of Sale Tech Terms Operations Technology Laws Wearable Technology Star Wars Conferencing Emergency Multi-Factor Security Database Management Enterprise Content Management Managed IT Service Heating/Cooling Outlook Disaster Resistance Outsourcing Shared resources Going Green Printing Trending Printer Peripheral 5G Mobile VoIP Identity Theft Enterprise Resource Planning Human Error Black Friday IT Settings Personal Information App Unified Threat Management Laptop Manufacturing Cache Authentication Mouse Language Optimization Virtual Assistant Bitcoin Geography E-Commerce Theft Statistics Batteries Banking GDPR Social Networking Electronic Medical Records Break Fix Servers Shortcut Proactive IT Video Conferencing Permissions PCI DSS Wireless Internet Big Data Identity OneNote Permission Cyber Monday Staff Business Telephone Transportation Active Directory Screen Reader Remote Working Smart Devices Authorization Computing Infrastructure Recovery Lenovo Virtual Machines Wasting Time Current Events Modem High-Speed Internet Features Microsoft Excel Bluetooth CIO applications Tech Support Politics Samsung Reviews G Suite IT Consulting Biometric Smart Tech Private Cloud Google Calendar Fraud SharePoint Employer/Employee Relationships Apple Mobile How To Test IT Assessment Windows Server Mail Merge User Error Budget Hard Disk Drives Sensors WPA3 Alerts Superfish Credit Cards Database Development Procurement IT Technicians Cost Management Travel End of Support Notes Motherboard Chromebook Virtual Reality Websites Gamification Connectivity Bookmarks ROI Downloads CRM Proactive Maintenance Solid State Drive Firewall Digitize User Management Daniel Stevens Twitter Printers CES Marketing Education CEO Regulation Students

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...