Advertisement

Security

  • Security
    How to Stay Safe and Secure OnlineIcon
    30 shares
    The Internet has changed the way we live for the better and a wealth of information or a listening ear is never more than a click away. In this tutorial, I’ll show you some differences between a secure and unsecured website connection to help you stay safe when surfing the web.Read More…
  • Security
    The Tuts+ Guide to KeePassKeypass hackgo
    13 shares
    Managing your passwords across all your platforms doesn't have to be difficult. This tutorial will take you through everything you need to manage your passwords in any platform with the versatile KeePass.Read More…
  • Email
    Beginner's Guide to Disposable Email AddressesPrivate email
    18 shares
    Need to fill in an email address but don't want to give out your real email? Use a disposable email address to solve the problem!Read More…
  • Security
    How to Child-Proof the Web on a MacPreview
    17 shares
    For parents, the internet's open nature can be scary. In addition to objectionable material which children might seek out on their own, in many cases they might stumble upon it entirely by accident. In this tutorial, I'll show you how to prevent both by using the parental controls built into every new Mac. Read More…
  • Security
    How and Why to Use a Firmware PasswordFirmware
    19 shares
    OS X has multiple levels of security, and the firmware password is one of the least used. In this tutorial, I’ll explain why the firmware password is a valuable security measure and how to configure it on your computer.Read More…
  • Security
    Extreme Security With TrueCryptTruecryptpreview
    20 shares
    In this tutorial I'll show you how to use TrueCrypt to store files on your Mac as securely and secretly as possible. I’ll also show you how to use nested TrueCrypt volumes to keep your secrets safe–even if you are subjected to extortion or torture.Read More…
  • Security
    Understanding Password SecurityPassword icon
    36 shares
    You'll be familiar with being told to use capitals, numbers and special characters in our long and complicated passwords but if you don't understand why, you're still going to end up with easy to crack security. Read More…
  • OS X
    The System Preferences You Should Be UsingSp icon preview
    21 shares
    A good look at the system preferences panes you probably aren't using, but should be. Especially if you value your privacy or security.Read More…
  • Security
    How to Set Up and Use Password Protected Vaults on a MacPassworddisk2x
    41 shares
    Everyone has some files that they don't want other people to see. They may be important business documents, tax returns, health information or anything else someone would want kept secret. While it's all well and good to have a password on your Mac, if someone gets past that password (and there are ways), or comes across your Mac while it is logged in, they have access to all your files. For that reason, it is worth having a second line of defence; by having your most important files locked away securely except when they are actively in use, you can keep them as safe as possible. In this tutorial I will show you three methods for doing so; making your own solution with Apple's Disc Utility, using the open source TrueCrypt and using AgileBits' Knox.Read More…
  • Security
    How to Perform a Password Security AuditPassaudit400
    21 shares
    With password breaches, like Adobe's recent loss of up to 130 million passwords, becoming all too common, now is a very good time to conduct an audit of your password security. In this tutorial I'll show you how to use 1Password or LastPass to analyse how secure your passwords, and where necessary, create new, secure ones.Read More…
  • Security
    Encrypting Email With GPGToolsGpg tools encrypting email retina
    34 shares
    Email security, asymmetric encryption, keys…all confusing and complicated subjects to the uninitiated. However, there are some tools that help make the job of keeping your email secure much easier, especially on a Mac. In this tutorial, I'll show you how you can keep your email secure from prying eyes by using GPGTools to create your own keys and encrypt your email.Read More…
  • Security
    How and Why You Should Customise Your Mac's Login ScreenApple400
    2 shares
    If your choice of Mac is one of the MacBooks Air, or Pro, then it is likely that you enjoy using your Mac for its portability … even if that portability is just so that you can work around your home or office. The disadvantage of that portability is that it opens up the chance of loss, when you are out and about. Combined with the desirability and high resale values, your Mac is also a prime target for thieves. In this tutorial I will show you how to create a customised message, on the login screen, that may help reunite you with a lost or stolen Mac.Read More…
Advertisement
Apps
Advertisement