What to do with Frayed Lightning Cables?

How many iPhone and iPad owners wind up having a frayed USB lightning adapter with wires visible or protruding from the cable? One of my own Lightning cables ended up a frayed disaster after less than a year of being always plugged into a MacBook, and only used on a desk – not exactly demanding usage conditions – and I run into many others who have similar issues with Apple USB adapters for iOS devices. So, what should users do about the frayed cables?


Apple has released the second version of the OS X Yosemite Public Beta. Mac users who opted in to participate in the public beta program for Yosemite are recommended to install the update. Alongside Public Beta 2 is also a new beta version of the redesigned iTunes 12. Both updates focus on bug fixes and feature refinements as the next version of OS X marches closer towards a public release in the Fall.





Though most email services nowadays support the “Sent” outbox, where you can easily find all emails that you’ve sent out from an iPhone (or elsewhere with that email account), not all mail providers do. This is particularly true for POP3 accounts where the email will be downloaded once from the server then deleted from the server, only to be stored on your local device, whether that’s an iPhone or a computer. For situations like this but when you’d still like to maintain an easy record of all emails you’ve sent from an iPhone or iPad, you can enable an option in iOS Mail app called “Always BCC Self”. As the name implies, when this setting is turned on, any mail sent from your iOS device will BCC (Blind Carbon Copy) to yourself, providing an alternative method of record keeping for sent emails.

Have you ever wanted to share an iPhone picture with someone, but you’re concerned about them flipping through your camera roll and finding other photos you’d rather not share? If you want to limit that you have a few options available, but because the iPhone doesn’t have a specific ability to lock onto a single picture, you’ll have to rely on a trick or two to limit the photo access instead.
The user path is the series of directories that command line programs are searched in order to run. For example, if you type ‘iostat’ into the terminal, then iostat will be run from /usr/sbin because “/usr/sbin” is part of your $PATH. Accordingly, users who frequently use the command line may need to adjust or add new paths to their terminal so that commands can execute properly. 

