Take Control of Securing Your Mac, 3rd Edition

Take Control of Securing Your Mac, 3rd Edition

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2023-10-05

Total Pages: 179

ISBN-13: 1990783341

DOWNLOAD EBOOK

Keep your Mac safe from intruders, malware, and more! Version 3.0, updated October 05, 2023 Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, email, or other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more. Focuses on Sonoma; also covers Ventura and Monterey.n The digital world has never seemed more riddled with danger, even as Apple has done a fairly remarkable job across decades at keeping our Macs safe. But the best foot forward with security is staying abreast of past risks and anticipating future ones. Take Control of Securing Your Mac gives you all the insight and directions you need to ensure your Mac is safe from external intrusion, including the data you secure and sync with iCloud, now so tightly integrated with macOS features and security. In recent years, Apple has enhanced their focus on protecting you against attacks that require physical access to your computer or malware that provides deep remote exploitation. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! But also get the rundown on encrypted startup volumes, FileVault’s login protection process, Lockdown Mode to deter direct network and phishing attacks, and passkeys and hardware secure keys for the highest level of Apple ID and website login. Security and privacy are tightly related, and Take Control of Securing Your Mac helps you understand how macOS has increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. In Sonoma, that includes fitness and motion data captured from an iPhone, iPad, or Apple Watch. Apple has also enhanced alerts in the menu bar when any software uses a mic or camera, or can view what’s happening on your screen—even for the most benign reasons. Here’s what this book has to offer: • Master a Mac’s privacy settings • Calculate your level of risk and your tolerance for it • Learn why you’re asked to give permission for apps to access folders and personal data • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the last few years in macOS • Prepare against a failure or error that might lock you out of your Mac • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys


Take Control of Scrivener 3

Take Control of Scrivener 3

Author: Kirk McElhearn

Publisher: alt concepts

Published: 2021-06-04

Total Pages: 147

ISBN-13: 1947282026

DOWNLOAD EBOOK

Create and organize writing projects with ease using Scrivener 3! Version 1.1.1, updated June 4, 2021 Compose a masterpiece with Literature & Latte's Scrivener. Whether you're writing science fiction, a historical novel, or a zombie travelogue, learn how Scrivener's powerful tools can take your work to the next level. Kirk McElhearn shows you how to collect notes, organize your work, arrange and rearrange sections, and more. Covers Mac, Windows, and iOS/iPadOS versions! Scrivener is a powerful tool for managing long-form writing projects—like novels and screenplays—and Take Control of Scrivener 3 gives you all the details you need to know to harness its potential. In this book, best-selling author Kirk McElhearn walks you through setting up, organizing, writing, formatting, revising, and compiling a Scrivener project, whether you’re working on a Mac, a Windows PC, or in iOS/iPadOS. Using this extensive guide, you’ll be able to: • Meet Scrivener: Learn about the Scrivener philosophy and its basic layout • Start your project: Pick a template and add existing materials to your project • Brainstorm and organize: Discover three different ways to work with your material using the Binder, Corkboard, and Outliner. • Set up your writing environment and avoid distractions: Choose default fonts and colors, opt for Script Mode if you’re writing a script or screenplay, and simplify your workspace by hiding interface elements or by using Composition Mode or Full Screen Mode. • Make the most of key features: Learn how to work with styles; use annotations and comments; add footnotes and endnotes; view more than one file at once; use collections to view selected items from the Binder; store bookmarks and project notes; and share and synchronize your project with others. • Go further with Scrivener: Get the details on special features like Scrivenings View (write in sections, but view as a single document) and Snapshots (allows you to make and view periodic backups of your text). • Revise and edit your work: Learn how to find and replace text, and work with revisions. • Use Scrivener in iOS and iPadOS: Sync your projects to iOS/iPadOS and work on an iPhone or iPad. • Print and export: Understand the process of preparing your project to be printed, and what’s involved in compiling it so that it can be exported in a different format. Kirk also highlights the many changes to Scrivener since the last version (see the What's New section below), including updates to the interface, styles, outlining and metadata capabilities, and improved searching and writing features. In addition, he explains brand-new features in Scrivener 3, including Bookmarks (lets you store references to other sections of your project), Linguistic Focus (Mac only—highlights specific elements such as dialog, adverbs, or adjectives), Section types (such as Chapter Text and Scene), and Copyholders (allows you to view three or four documents at once).


Take Control of Your Passwords, 2nd Edition

Take Control of Your Passwords, 2nd Edition

Author: Joe Kissell

Publisher:

Published: 2016

Total Pages: 149

ISBN-13:

DOWNLOAD EBOOK

Overcome password frustration with Joe Kissell's expert advice! Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if a company's password file is stolen and hacked. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "what is your pet's favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on those that work in OS X, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can't help. The book closes with an appendix on helping a relative set up a reasonable password strategy for those whose relatives have distressing password strategies, and an extended explanation of password entropy for those who want to consider the math behind passwords. Teach This Book! Once you're satisfied with your password strategy, you may want to help others improve theirs with one-on-one training or a group presentation. To help you, this book includes links to a downloadable one-page PDF handout and to a PDF-based slide deck about passwords. "Awesome. You did an amazing job breaking it down. This should be mandatory reading." -Rich Mogull, CEO at Securosis This book helps you overcome frustrations that arise when attempting to design a strategy for dealing with the following password problems: 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. It is not safe to use the same password everywhere, even if it's a great password. A password is not immune to automated cracking because there's a delay between login attempts. Even if you're an ordinary person without valuable data, your account may still be hacked, causing you problems. You cannot manually devise "random" passwords that will defeat potential attackers. Just because a password doesn't appear in a dictionary, that doe...


Take Control of Your Passwords, 4th Edition

Take Control of Your Passwords, 4th Edition

Author: Joe Kissell

Publisher: alt concepts

Published: 2024-03-21

Total Pages: 108

ISBN-13: 1990783309

DOWNLOAD EBOOK

Overcome password frustration with Joe Kissell's expert advice! Version 4.1.1, updated March 21, 2024 Password overload has driven many of us to take dangerous shortcuts. If you think ZombieCat12 is a secure password, that you can safely reuse a password, or that no one would try to steal your password, think again! Overcome password frustration with expert advice from Joe Kissell! Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet’s favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes nine different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can’t help. New in the Fourth Edition is complete coverage of passkeys, which offer a way to log in without passwords and are rapidly gaining popularity—but also come with a new set of challenges and complications. The book also now says more about passcodes for mobile devices. An appendix shows you how to help a friend or relative set up a reasonable password strategy if they're unable or unwilling to follow the recommended security steps, and an extended explanation of password entropy is provided for those who want to consider the math behind passwords. This book shows you exactly why: • 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. • You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. • It is not safe to use the same password everywhere, even if it’s a great password. • A password is not immune to automated cracking because there’s a delay between login attempts. • Even if you’re an ordinary person without valuable data, your account may still be hacked, causing you problems. • You cannot manually devise “random” passwords that will defeat potential attackers. • Just because a password doesn’t appear in a dictionary, that does not necessarily mean that it’s adequate. • It is not a smart idea to change your passwords every month. • Truthfully answering security questions like “What is your mother’s maiden name?” does not keep your data more secure. • Adding a character to a 10-character password does not make it 10% stronger. • Easy-to-remember passwords like “correct horse battery staple” will not solve all your password problems. • All password managers are not pretty much the same. • Passkeys are beginning to make inroads, and may one day replace most—but not all!—of your passwords. • Your passwords will not be safest if you never write them down and keep them only in your head. But don’t worry, the book also teaches you a straightforward strategy for handling your passwords that will keep your data safe without driving you batty.


Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2022-11-21

Total Pages: 110

ISBN-13: 1990783236

DOWNLOAD EBOOK

Get more from your Wi-Fi network Version 1.4, updated November 21, 2022 Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.n Perhaps you already have a Wi-Fi network running in your home and office, but you’re dissatisfied with it. Or maybe you’re setting up a new house, apartment, business, or school room with Wi-Fi and need to know the basics about what to get and how to configure it. In either case, this book is for you. After over 16 years of writing regularly about Wi-Fi and answering reader questions, author Glenn Fleishman finds that the same issues still crop up: • How do I spend the least money to the best effect? • What’s the best place to put my Wi-Fi gateways? • How can I get both high throughput (speed) on my network and solid coverage across everywhere I want to use Wi-Fi? • What can I do to secure my network against outsiders near my house and elsewhere on the internet? • How do I add networked hard drives and printers? • Interference is slowing my network; what can I do to reduce it? • What’s the best way to extend my network to a garage, yard, or nearby building? This book answers those questions in depth, as well as many others related to Wi-Fi, including how to set up a personal or mobile hotspot with all major operating systems, how to access computers on your network remotely, and why you should use a VPN (virtual private network). If you have any question about overhauling your network, setting up a new one, or just finally figuring out something that’s never worked, this book has the answer. Covers macOS, Windows, iOS, Android, and Chrome OS.


Practical UNIX and Internet Security

Practical UNIX and Internet Security

Author: Simson Garfinkel

Publisher: "O'Reilly Media, Inc."

Published: 2003-02-21

Total Pages: 989

ISBN-13: 1449310125

DOWNLOAD EBOOK

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.


Take Control of Your Passwords

Take Control of Your Passwords

Author: Joe Kissell

Publisher:

Published: 2018

Total Pages: 0

ISBN-13: 9781947282186

DOWNLOAD EBOOK

Overcome password frustration! Updated April 11, 2019 Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet's favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can't help. The book closes with an appendix on helping a relative set up a reasonable password strategy for those whose relatives have distressing password strategies, and an extended explanation of password entropy for those who want to consider the math behind passwords. This book shows you exactly why: 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. It is not safe to use the same password everywhere, even if it's a great password. A password is not immune to automated cracking because theres a delay between login attempts. Even if youre an ordinary person without valuable data, your account may still be hacked, causing you problems. You cannot manually devise random passwords that will defeat potential attackers. Just because a password doesn't appear in a dictionary, that does not necessarily mean that it's adequate. It is not a smart idea to change your passwords every month. Truthfully answering security questions like "What is your mother's maiden name?" does not keep your data more secure. Adding a character to a 10-character password does not make it 10% stronger. Easy-to-remember passwords like "correct horse battery staple" will not solve all your password problems. All password managers are not pretty much the same. Your passwords will not be safest if you never write them down and keep them ...


Take Control of the Mac Command Line with Terminal, 3rd Edition

Take Control of the Mac Command Line with Terminal, 3rd Edition

Author: Joe Kissell

Publisher: alt concepts

Published: 2024-02-12

Total Pages: 143

ISBN-13: 1990783031

DOWNLOAD EBOOK

Learn how to unleash your inner Unix geek! Version 3.3, updated February 12, 2024 This book introduces you to the Mac’s command line environment, teaching you how to use the Terminal utility to accomplish useful, interesting tasks that are either difficult or impossible to do in the graphical interface.n If you've ever thought you should learn to use the Unix command line that underlies macOS, or felt at sea when typing commands into Terminal, Joe Kissell is here to help! With this book, you'll become comfortable working on the Mac's command line, starting with the fundamentals and adding more advanced topics as your knowledge increases. Now includes complete coverage of Monterey, Big Sur, Catalina, and zsh! Joe includes 67 real-life "recipes" for tasks that are best done from the command line, as well as directions for working with permissions, carrying out grep-based searches, creating shell scripts, and installing Unix software. The book begins by teaching you these core concepts: • The differences among Unix, a command line, a shell, and Terminal • Exactly how commands, arguments, and flags work • The basics of Terminal's interface and how to customize it Next, it's on to the command line, where you'll learn: • How to navigate your Mac's directory structure • Basic file management: creating, copying, moving, renaming, opening, viewing, and deleting files • Creating symbolic links • The types of command-line programs • How to start and stop a command-line program • How to edit a text file in nano • How to customize your prompt and other shell defaults • The importance of your PATH and how to change it, if you need to • How to get help (Joe goes way beyond telling you to read the man pages) You'll extend your skills as you discover how to: • Create basic shell scripts to automate repetitive tasks. • Make shell scripts that have variables, user input, conditional statements, loops, and math. • See which programs are running and what system resources they're consuming. • Quit programs that refuse to quit normally. • Enable the command line to interact with the Finder. • Control another Mac via its command line with ssh. • Understand and change an item's permissions, owner, and group. • Run commands as the root user using sudo. • Handle output with pipe (|) or redirect (> or <). • Use grep to search for text patterns in files and filter output. • Install new command-line software from scratch or with a package manager. • Use handy shortcuts in the Terminal app itself and in zsh. Questions answered include: • What changed on the command line in recent versions of macOS? • What are the differences between the zsh shell and the bash shell? • Which shell am I using, and how can I change my default shell? • How do I quickly figure out the path to an item on my Mac? • How can I customize my Terminal window so I can see man pages behind it? • How can I make a shortcut to avoid retyping the same long command? • Is there a trick for entering a long path quickly? • What should I say when someone asks if I know how to use vi? • How do I change my prompt to suit my mood or needs? • What is Command Line Tools for Xcode? • When it comes to package managers, which one should I use? Finally, to help you put it all together, the book showcases 67 real-world "recipes" that combine commands to perform useful tasks, such as listing users who've logged in recently, manipulating graphics, using a separate FileVault password, creating and editing user accounts, figuring out why a disk won't eject, copying the source code of a webpage, determining which apps have open connections to the internet, flushing the DNS cache, finding out why a Mac won't sleep, sending an SMS message, and deleting stubborn items from the Trash.