Users can securely download a file from any remote server with SSH by using the scp tool at the command line. Essentially this means you can have a file stored securely on a remote server and transfer it to local storage without having to expose that file to the outside world, because scp offers the … Read More
Want to record an iPhone call? Did you know there is a very easy way to record iPhone phone calls using nothing but your iPhone and a voicemail trick? I know you’re thinking what does recording an iPhone call have to do with voicemail, but it turns out that a simple trick allows you to … Read More
For Mac users who encrypt external hard drives and USB flash drives, there may come a time when you want to remove the password protection and decrypt the external device. Decrypting an external drive allows all data on the drive to be accessed without the password authentication, effectively turning off any protection on the target … Read More
The latest versions of iOS allow users to read and reply to Messages directly from the lock screen, without having to authenticate with a passcode or Touch ID on the device. This allows for iPhone and iPad users to quickly reply to inbound messages, but it can also lead to some potential privacy issues that … Read More
Spotlight, Safari, Siri, Maps, and other apps on the Mac use your location during searches to help suggest particular activity. For example, if you’re searching in Spotlight for “coffee” on the Mac, you may find that nearby coffee shops are displayed, allowing you to search local listings directly from Spotlight search in Mac OS. These … Read More
Gatekeeper in macOS Sierra is now stricter than ever, defaulting to only allow options for apps downloaded from either the App Store or the App Store and identified developers. Advanced Mac users may wish to allow a third option, which is the ability to open and allow apps downloaded from anywhere in macOS Sierra.
Many Mac applications and downloads arrive as a PKG package file, but have you ever wanted to open a PKG file to view exactly what is being installed and where it’s going from the source .pkg? Assuming you get a .pkg installer from a trusted source like Apple there is generally nothing to be concerned … Read More
As many users know, using Two-Factor authentication for an Apple ID provides an additional layer of security for your Apple and iCloud login by requiring a pin code to be entered from an approved device before the Apple ID can be accessed. But the two factor auth feature is really built for modern iOS versions, … Read More
Some users may benefit from enabling Two-Factor Authentication with Apple ID to further protect and secure their devices and data, but sometimes people decide two-factor auth is too much of a hassle and want to disable the feature.
An iPhone contains huge amounts of detailed personal information about the owner, including emails, contact lists, banking information, personal notes, pictures, and much more, all of which most users want to keep private and secure. Fortunately the iPhone makes having a secured device pretty user friendly, and even novice users can take a few fairly … Read More
Touch ID is an undeniably convenient feature of the iPhone and iPad, allowing quick access to the device simply by placing a registered finger on the Touch ID sensor, which reads the fingerprint to gain access. While Touch ID is useful, some users may later decide they want to disable the feature on their iPhone … Read More
This guide will walk through setting up two-factor authentication for an Apple ID. Two-factor authentication requires that whenever a user is logging in to an Apple ID from a new untrusted device, not only must the proper password be entered but a secondary security ID code must be entered as well, which is typically delivered … Read More