We had a number of concerned requests come into our office today regarding some recent news stories about a new wireless vulnerability. The news stories claim every wireless device is affected by this exploit and nothing is safe as the … Continue reading
Webroot, our preferred antimalware vendor, released a comprehensive report covering the phishing trends of 2017. The full report is long and might be a dry read to many. Thankfully, ZDNet has written up a great summary. ARTICLE: 1.4 million phishing … Continue reading
Welcome Anacortes Middle School parents! If you found this page through the emergency parent meeting at the Anacortes Middle School on Wed, March 27th 2016 where Adrian was brought in as an expert to assist parents with ensuring the safety … Continue reading
I may use the following terms here and there, so let me start by defining them… RDP (Remote Desktop Protocol) – the act of accessing a Windows system remotely using integrated technology. RDC (Remote Desktop Client) – the software program … Continue reading
In this column, I’m going to touch on a question I have received from multiple readers over the past few weeks: What is the difference between a laptop and a netbook? Though very similar, each holds its own place in … Continue reading
It’s time to learn how to protect yourself from malware and other online threats. By following a few simple steps, you can help remain a step ahead and know how to react if something does get through your defenses. Install … Continue reading
The online world is not all fun and games. As the use of personal computers has exploded over the last 15 years, online threats have been growing right along with it. You’ve probably heard some of the terms used to … Continue reading
Continuing on the path begun in the last two columns, this week we’re going to discuss data recovery. Even with proper backup methods in place, data can be lost for a variety of reasons, including accidental deletion or loss between … Continue reading
In last week’s column, I discussed the various forms of data storage. Branching off from that, we can now better understand various backup methods. I encourage you to refresh your memory by re-reading last week’s column. There will be information … Continue reading
Almost everyone who has some form of digital storage also has something they never want to lose. Unfortunately, recent statistics show 31 percent of computer users have lost all of their files due to events beyond their control. Don’t want … Continue reading