Though Mac users don’t usually have to worry excessively about “camfecting” malware and spyware, some security conscious users may find it nice to know if a process or application is attempting to access their computers web camera or microphone. With the help of a free third party security utility called Oversight, you can have your … Read More
Users can securely download a file from any remote server with SSH by using the scp tool at the command line. Essentially this means you can have a file stored securely on a remote server and transfer it to local storage without having to expose that file to the outside world, because scp offers the … Read More
For Mac users who encrypt external hard drives and USB flash drives, there may come a time when you want to remove the password protection and decrypt the external device. Decrypting an external drive allows all data on the drive to be accessed without the password authentication, effectively turning off any protection on the target … Read More
Gatekeeper in macOS Sierra is now stricter than ever, defaulting to only allow options for apps downloaded from either the App Store or the App Store and identified developers. Advanced Mac users may wish to allow a third option, which is the ability to open and allow apps downloaded from anywhere in macOS Sierra.
Many Mac applications and downloads arrive as a PKG package file, but have you ever wanted to open a PKG file to view exactly what is being installed and where it’s going from the source .pkg? Assuming you get a .pkg installer from a trusted source like Apple there is generally nothing to be concerned … Read More
Some users may benefit from enabling Two-Factor Authentication with Apple ID to further protect and secure their devices and data, but sometimes people decide two-factor auth is too much of a hassle and want to disable the feature.
An iPhone contains huge amounts of detailed personal information about the owner, including emails, contact lists, banking information, personal notes, pictures, and much more, all of which most users want to keep private and secure. Fortunately the iPhone makes having a secured device pretty user friendly, and even novice users can take a few fairly … Read More
Touch ID is an undeniably convenient feature of the iPhone and iPad, allowing quick access to the device simply by placing a registered finger on the Touch ID sensor, which reads the fingerprint to gain access. While Touch ID is useful, some users may later decide they want to disable the feature on their iPhone … Read More
This guide will walk through setting up two-factor authentication for an Apple ID. Two-factor authentication requires that whenever a user is logging in to an Apple ID from a new untrusted device, not only must the proper password be entered but a secondary security ID code must be entered as well, which is typically delivered … Read More
Assuming you use FileVault or don’t have automatic login enabled on a Mac, anytime the computer is rebooted you will be presented with a login and password screen. For users who change their passwords often, or who are just on the forgetful side of things, a helpful trick can be to display password hints at … Read More
While enabling and using FileVault disk encryption is highly recommended for security-conscious Mac users with modern hardware and SSD volumes, some users may decide they do not need to use FileVault for a variety of reasons, or perhaps they just want to disable it for another purpose. That’s what we’re going to demonstrate here, disabling … Read More
Advanced users who spend a fair amount of time in the command line may wish to adjust their sudo password expiration to be more secure (or less secure, by extending the password grace period timeout). Typically this means removing any password timeout so that the default five minute password cache is abandoned, thus requiring the … Read More