Interpreting Technology Logo

Adrian Santangelo

Wireless (WPA/WPA2) vulnerability – what does it really mean?

Posted on by Adrian Santangelo

We had a number of concerned requests come into our office today regarding some recent news stories about a new wireless vulnerability. The news stories claim every wireless device is affected by this exploit and nothing is safe as the … Continue reading

Millions of phishing websites are created every month. Here’s what you should know.

Posted on by Adrian Santangelo

Webroot, our preferred antimalware vendor, released a comprehensive report covering the phishing trends of 2017. The full report is long and might be a dry read to many. Thankfully, ZDNet has written up a great summary. ARTICLE: 1.4 million phishing … Continue reading

A Parent’s Guide to Teen Safety (Mobile and Online)

Posted on by Adrian Santangelo

Welcome Anacortes Middle School parents! If you found this page through the emergency parent meeting at the Anacortes Middle School on Wed, March 27th 2016 where Adrian was brought in as an expert to assist parents with ensuring the safety … Continue reading

Accessing Remote Systems via Windows Remote Desktop

Posted on by Adrian Santangelo

I may use the following terms here and there, so let me start by defining them… RDP (Remote Desktop Protocol) – the act of accessing a Windows system remotely using integrated technology. RDC (Remote Desktop Client) – the software program … Continue reading

The evolution of the mobile computer

Posted on by Adrian Santangelo

In this column, I’m going to touch on a question I have received from multiple readers over the past few weeks: What is the difference between a laptop and a netbook? Though very similar, each holds its own place in … Continue reading

Malware, part 2: Protecting yourself from online threats

Posted on by Adrian Santangelo

It’s time to learn how to protect yourself from malware and other online threats. By following a few simple steps, you can help remain a step ahead and know how to react if something does get through your defenses. Install … Continue reading

Malware part 1: What are the threats?

Posted on by Adrian Santangelo

The online world is not all fun and games. As the use of personal computers has exploded over the last 15 years, online threats have been growing right along with it. You’ve probably heard some of the terms used to … Continue reading

When backups fail: Data recovery

Posted on by Adrian Santangelo

Continuing on the path begun in the last two columns, this week we’re going to discuss data recovery. Even with proper backup methods in place, data can be lost for a variety of reasons, including accidental deletion or loss between … Continue reading

A backup plan, part 2: What method will work for you?

Posted on by Adrian Santangelo

In last week’s column, I discussed the various forms of data storage. Branching off from that, we can now better understand various backup methods. I encourage you to refresh your memory by re-reading last week’s column. There will be information … Continue reading

A backup plan: What type of data storage works for you?

Posted on by Adrian Santangelo

Almost everyone who has some form of digital storage also has something they never want to lose. Unfortunately, recent statistics show 31 percent of computer users have lost all of their files due to events beyond their control. Don’t want … Continue reading