Take Control of Securing Your Apple Devices

Take Control of Securing Your Apple Devices

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-09-30

Total Pages: 137

ISBN-13: 1990783600

DOWNLOAD EBOOK

Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. Glenn Fleishman guides you through protecting yourself from phishing, email, and other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more.n The digital world is riddled with danger, even as Apple has done a fairly remarkable job at keeping our Macs, iPhones, and iPads safe. But the best security strategy is staying abreast of past risks and anticipating future ones. This book gives you all the insight and directions you need to ensure your Apple devices and their data are safe. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! Also get the rundown on Lockdown Mode to deter direct network and phishing attacks, passkeys and hardware secure keys for the highest level of security for Apple Account and website logins, and Mac-specific features such as encrypted startup volumes and FileVault’s login protection process. Security and privacy are tightly related, and this book helps you understand how macOS, iOS, and iPadOS have increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here’s what this book has to offer: • Master the privacy settings on your Mac, iPhone, and iPad • Calculate your level of risk and your tolerance for it • Use Apple’s Stolen Device Protection feature for iPhone that deflects thieves who extract your passcode through coercion or misdirection. • Learn why you’re asked to give permission for apps to access folders and personal data on your Mac • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the past few years • Prepare against a failure or error that might lock you out of your device • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection for Mac, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys


Take Control of FaceTime and Messages, 3rd Edition

Take Control of FaceTime and Messages, 3rd Edition

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-10-15

Total Pages: 198

ISBN-13: 1990783619

DOWNLOAD EBOOK

Master Apple's video, audio, and text messaging tools! Version 3.0, updated October 15, 2024 Dig into FaceTime, Messages, and Phone from the basics through the most advanced and interesting features available, including screen sharing, group calls, and sending rich messages in Take Control of FaceTime and Messages. This comprehensive book will answer every question and reveal useful features you never knew existed.n FaceTime, Messages, and Phone form the core of video, texting, and calling tools for Apple devices. In this book, Glenn Fleishman lays out your options to best understand, use, and customize these apps. Start by mastering (or reviewing) the basics of each app, then move into group calls and texts, using rich media, maintaining your privacy, and adding whimsy to conversations. Covers iOS, iPadOS, macOS, tvOS, and watchOS. The book covers all three apps (and the many ways in which they interact) extensively, showing you: • What's new in the FaceTime, Messages, and Phone apps (updated for macOS Sequoia 15.1, iOS 18.1, iPadOS 18.1, watchOS 11.1, and tvOS 18.1) • How to master the basics of the FaceTime, Messages, and Phone apps • Essential settings and preferences for these apps • Ways to share your screen (or let someone share theirs with you) in both FaceTime and Messages, and when to use which • How to have fun and get creative with Message Effects, Camera Effects, stickers, and hashtag images • How Apple secures live audio, video, and texting • Strategies and tools to identify and block unwanted phone calls and messages • How to use Apple Intelligence features in the Messages and Phone apps You’ll learn about FaceTime capabilities such as: • How to use FaceTime for audio or video calls with one person or a group of up to 32 people • Why you might want to use a FaceTime Link, and how it can extend FaceTime to Windows and Android users • How to work with audio input and output devices in FaceTime • How to use enhanced audio (Mic Mode) and video (Portrait Mode) effects in FaceTime calls on supported devices • How to place and receive FaceTime calls on an Apple TV using Continuity Camera • How to use SharePlay, which lets parties carry on a FaceTime conversation while enjoying synchronized video, audio, or screen sharing • How to use gestures to create animated video effects • How to replace your background in video calls Find out things you never knew about Messages, including: • Why some conversations in Messages use iMessage (blue bubbles for individuals, gray bubbles for businesses) while others use SMS/MMS/RCS (green bubbles), and the differences between them • All about advanced Messages features, such as nested replies and person-to-person Apple Pay • Why Messages isn’t just for text, but also for audio messages, Digital Touch effects, animations, and more • How to use satellite features to send and receive iMessages when you're outside cellular range • Simple ways to create events and reminders from Messages conversations • What to do when group chats get out of control—managing notifications, using mentions, and understanding the differences between SMS and MMS chats • How to view transcriptions of audio messages Make better use of the Phone app: • How to make phone calls (including emergency calls) from your iPhone, iPad, Mac, or Apple Watch • What the “verified” label on incoming phone calls means • How to use Live Voicemail to see the message a caller is leaving in real time


Take Control of iCloud, 9th Edition

Take Control of iCloud, 9th Edition

Author: Joe Kissell

Publisher: alt concepts

Published: 2024-01-16

Total Pages: 175

ISBN-13: 1990783252

DOWNLOAD EBOOK

Understand iCloud’s capabilities and limitations, and put its key features to good use! Version 9.1, updated January 16, 2024 Apple’s iCloud service is highly useful, but it can also create headaches for the average user. In this book, Joe Kissell explains how to avoid frustrations and make iCloud work for you across all your devices. iCloud is a simple idea in theory—access to all your data on all your devices, via the cloud—that can become complicated when put into practice. Instead of wasting time fiddling with iCloud, when there are many other more important things to be done with the information it contains, learn how to minimize frustrations with Take Control of iCloud, Ninth Edition! Whether you want a quick tip or a deep dive into the inner workings of iCloud, you’ll find what you need in this best-selling book by Apple expert Joe Kissell. Start by learning what iCloud can do, how it differs from other cloud services, and how best to set it up on Macs, iOS and iPadOS devices, Apple TVs, and Windows PCs. Then, move on to finding out the key aspects—and hidden gotchas—of iCloud’s core features, including: • iCloud+, Apple's paid membership tiers with extra features • Photo features: iCloud Photos, iCloud Photo Sharing, and iCloud Shared Photo Library • Family Sharing • iTunes Match and iCloud Music Library • iCloud Drive • Mail and Mail Drop • Contacts, Calendars, Reminders, and Notes • iCloud Keychain • the iCloud website • Location features: Find My Device, Find My Item, Find My People, and the Find My app • Two-factor authentication • Activation lock • Backing up and recovering data • Managing your privacy and security (including the use of Advanced Data Protection) This edition not only covers the changes to iCloud in macOS 14 Sonoma, iOS 178, and iPadOS 17 but also includes details about recent changes to iCloud that span operating systems, including the iCloud website. It also continues to cover macOS 10.15 Catalina, macOS 11 Big Sur, macOS 12 Monterey, macOS 13 Ventura and iOS 16/iPadOS 16, but drops coverage of earlier operating system versions.


Take Control of Find My and AirTags, 3rd Edition

Take Control of Find My and AirTags, 3rd Edition

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-09-20

Total Pages: 114

ISBN-13: 1990783570

DOWNLOAD EBOOK

Track your stuff, find your friends, and safely share your location Version 3.0, updated September 20, 2024 Take Control of Find My and AirTags takes you inside Apple’s Find My ecosystem, a robust, privacy-protecting way to track your things, share your location (and see others’ with their permission), and aid in recovery lost and stolen devices. Find My lets you and someone else arrange to meet and see your live, updated ETA; figure out where you left your iPad (was it on a flight?!), and know that your bicycle remains firmly in place where you locked it.n Find My lost the “iPhone” moniker long ago, as the app and system of location tracking hardware, software, and infrastructure became “Find My Everything.” The current ecosystem encompasses people, Apple devices (iPhone, iPad, Mac, and Apple Watch), Apple and Beats audio hardware, and low-power, long-life trackers. Apps can be used in iOS, iPadOS, macOS, and watchOS, and on iCloud.com. Take Control of Find My and AirTags takes you through the many parts of Find My so you can configure and refine how you and your stuff is tracked and shared. The book looks at three different kinds of tracking: • People: Learn how to share your location safely, follow others who let you, and send and receive notifications about arrivals and departures. (Also, prevent being tracked when you don’t want to be.) • Devices: See the whereabouts of your and Family Sharing group members’ devices and audio hardware. Get to know the ins and outs of enabling Find My and taking remote actions, from playing a sound to wiping your data from a device. • Items: Find out how AirTags make use of the crowdsourced network of other people’s Apple devices to help you find a lost or forgotten purse, backpack, or even car, and about third-party devices licensing the technology from Apple. Learn how to share your items with up to five other people. Also get to know the dangers of people using Find My tech for stalking. The book explains how to identify the risk, deter unwanted tracking from happening, block it if you find it—and report it to law enforcement or get other help. This edition includes detailed information about the Apple and Google industry initiative for Android, iOS, and iPadOS that lets Android, iPhone, and iPad users get notified about unknown trackers on either Apple or Google’s tracking systems that are traveling with them. The book also digs into how Family Sharing interacts with personal and device location sharing and finding, and how to help other people find their lost stuff if they don’t have one of their own Apple devices handy. The book focuses on the latest Apple operating systems: iOS 18/iPadOS 18, macOS 15 Sequoia, and watchOS 11. However, it looks back as far as iOS 16/iPadOS 16 and macOS 14 Monterey for nearly every feature—and sometimes back even years before those releases—so you can best use your mix of Apple devices of all vintages. Here’s more of what you can find in this book: • Start sharing AirTags and other items with up to five other people. • Find out the difference between device-based Find My tracking and the Find My network. • Figure out if your Apple or Beats audio hardware can be tracked just over Bluetooth nearby or via the Find My Network. • Lost a single earbud? Apple may have you covered by playing a sound out of it or providing nearly pinpoint tracking. • Experience the joy of playing a sound over the internet or nearby to help find a missing device or item. • See the place in Apple’s ecosystem for third-party Find My tracking from nearly a dozen companies that make bike, bag, and general stuff trackers, some with extra alarms. • Spot Google and Apple trackers following you that aren’t yours and aren’t shared Apple Find My items. • Control and monitor the way you let others track your whereabouts. • Get to know presence, the way you define which of your devices indicates where you are to other people. • Learn about the capability to track an iPhone or iPad even after it’s been erased! • See how Messages simplifies and improves location sharing and maps. • Dig into Apple’s efforts to prevent Find My from being used for stalking and unwanted tracking, including audio alerts and other behavior. • Discover buried controls for configuring exactly how Find My updates your device’s location, including when power runs low. • Develop an understanding of your Apple Watch’s three distinct Find My to use them effectively on the go. • Understand Activation Lock, which protects devices from being reused even if someone has erased them, and Find My Lock, which keeps Find My items from being reset and taken over. • Help family members find lost and stolen gear through Find My’s Family Sharing support.


Take Control of Your Apple Account

Take Control of Your Apple Account

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-09-20

Total Pages: 117

ISBN-13: 1990783589

DOWNLOAD EBOOK

Prevent (or solve) problems with your Apple Account! Version 1.0, published September 20, 2024 The center of the Apple world is your Apple Account. This little identifier ties up your access to iCloud; to purchased and streaming music, TV, and movies; and to all your devices. While an Apple Account is essential, Apple has made it difficult to navigate the many features associated with it—and particularly to troubleshoot and resolve problems that crop up. This book answers dozens of questions and guides you through solutions. It also explains how to use security, recovery, and other features tied to your Apple Account. Everything Apple relies on your Apple Account. It’s a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple Account, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple Account protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone, iPad, Mac, or Apple Watch; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple Account, you could be in for a world of hurt. Unfortunately, things go wrong with Apple Accounts all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld’s “Mac 911” column, is ready to help with expert advice on how to manage your Apple Account—including how to prevent, solve, or work around most common problems! This book is fully up to date with all the changes released by Apple in 2024 connected to your Apple Account—including the change of name from Apple ID to Apple Account—as well as for iOS 18, iPadOS 18, macOS 15 Sequoia, watchOS 11, tvOS 18, and other Apple products and services. In this book, Glenn answers questions like: • What all is my Apple Account used for? • How does my iCloud account relate to my Apple Account? • What’s two-factor authentication and how do I manage it—and not get locked out of my account? • Should I invest in hardware security keys to up the protection of my Apple Account account? • Are there other mechanisms I can use to ensure that I can recover an Apple Account in the event of a problem? (Spoiler: yes!) • What should I do if I have two or more Apple Accounts or iCloud accounts? • Will I lose access to all my Apple media purchases if I move to another country? • Can I share an Apple Account with someone else? • What does an Apple One subscription offer and how does it interact with Family Sharing and iCloud+ storage tiers? • Is there an explanation for how code-based and hardware-based second factors protect my account and how they differ from passkeys? (Yes!) • What exactly should I do if I think someone is hacking my Apple Account account? • How can I recover a forgotten Apple Account password? • What happens if I’m assaulted or drugged and someone gains access to my iPhone passcode and resets my Apple Account? (Sadly, a too real, if uncommon, problem.) • What steps should I take if Apple locks me out of my account? • If I lose access to an email address associated with my Apple Account, what can I do? • What Apple Account changes in recent versions of iOS, iPadOS, and macOS do I need to know about? • How can I use Family Sharing to share data and purchases within my family? • What types of subscriptions can I manage with my Apple Account, and how? • Which payment methods can I associate with my Apple Account, and how do I manage them? And that’s just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this comprehensive book. Read it before you encounter Apple Account problems to minimize your risk, and if you’ve already encountered a problem, read it to find the best path to a rapid solution.


Take Control of Calendar and Reminders, 5th Edition

Take Control of Calendar and Reminders, 5th Edition

Author: Scholle McFarland

Publisher: alt concepts

Published: 2023-11-16

Total Pages: 146

ISBN-13: 1990783430

DOWNLOAD EBOOK

Manage your schedule more effectively using Calendar and Reminders! Version 5.0, updated November 16, 2023 Learn how to unlock the full potential of Apple’s Calendar and Reminders! This book helps you get the most out of these two apps, showing you how to customize them, sync data across devices, and share meeting invitations and reminder lists. You’ll also learn how to use Siri as a shortcut and how to fix common problems.n In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple’s Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends. This book was originally written by veteran Mac journalist and editor Scholle McFarland, and the fifth edition was revised by Glenn Fleishman, with complete coverage of macOS 14 Sonoma, macOS 13 Ventura, iOS 17/iPadOS 17, iOS 16/iPadOS 16, and watchOS 10 (and considerably more information about using these apps on an iPhone or iPad than in previous editions). Scholle and Glenn guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that Calendar lets you set an alert that factors in public transportation schedules and time to get to your starting point, so you can leave early enough to catch the train, bus, tram, or ferry you need—and any connections—and arrive at your event on time? Or that Reminders can prompt you to do something not only at a certain time, but also once you’ve reached a specific destination, like the grocery store? If you’ve never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you’ve already been using Calendar and Reminders, you’ll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities. Learn how to get the best out of Calendar and Reminders, including how to: • Customize Calendar to your liking, from setting time zones, to color coding specific calendars • Create events, making them repeat at regular intervals or on certain dates • Set up notifications and alerts, so you never miss an event • Invite people to events, or share your calendar with them • Create, manage, and share lists in Reminders, including powerful new smart lists • Organize reminder lists into categories and optionally view them in columns • Designate a list as a grocery list, so that items auto-sort into supermarket departments • Set alarms in Reminders at a certain time or a certain place • Tag entries for better searching and organizing in Reminders • Use Siri to save time when creating events or reminders • Easily check events and reminders on your Mac, iPhone, iPad, Apple Watch, or HomePod • Troubleshoot common problems in Calendar and Reminders • Share calendars and reminders using iCloud Family Sharing, and assign reminders to a specific person • Sort reminders on your Mac • Print a calendar (to paper or PDF) • Embed video links in Calendar events for quick launching


Enterprise Mac Security: Mac OS X

Enterprise Mac Security: Mac OS X

Author: CHARLES EDGE

Publisher: Apress

Published: 2015-12-30

Total Pages: 522

ISBN-13: 1484217128

DOWNLOAD EBOOK

Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new 10.11 operating system. A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be have been true in certain cases, security on the Mac has always still been a crucial issue. With the release of OS X 10.11, the operating system is taking large strides in getting even more secure. Even still, when sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats, whether these have been exploited or not. This book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security. What You Will Learn The newest security techniques on Mac OS X from the best and brightest Security details of Mac OS X for the desktop and server, and how to secure these systems The details of Mac forensics and Mac hacking How to tackle Apple wireless security Who This Book Is For This book is for new users, switchers, power users, and administrators that need to make sure their Mac systems are secure.


Take Control of Home Security Cameras

Take Control of Home Security Cameras

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2023-04-28

Total Pages: 102

ISBN-13: 1778043968

DOWNLOAD EBOOK

Make your home safer! Version 1.4.1, updated April 28, 2023 Are you thinking about installing a home security camera—or several? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. Or do you own an existing system and want to swap out parts, expand it, or upgrade it? You’ll learn options for cameras you own and what interoperates. The book explains the role of Apple’s HomeKit Secure Video, and how to make its highest-level security work for you. In Take Control of Home Security Cameras, networking and security expert Glenn Fleishman shows you how to make smart choices about buying and configuring cameras that take into account technical details, video quality, system integration, your own privacy and that of others, and internet security. As you read this book, you'll: • Figure out which features are right for you • Configure your system securely to ensure that you and people you authorize are the only ones with access to live and stored video • Understand the different kinds of cloud-based storage of video, and which you might be comfortable with • Learn about Apple HomeKit Secure Video, an option available for the Apple ecosystem that lets you access video and control cameras from several manufacturers in a highly secure way from your iPhone, iPad, or Mac, including Logitech’s Circle View • Get to know features found in home security cameras, and how they affect the quality and nature of video you capture • Set your system so that alerts only appear for the kinds of motion, sound, or other triggers that meet your threshold • Avoid becoming part of the surveillance state—or opt into a limited and controlled part of it with a fuller understanding of what that means • Learn about the legal aspects and limits of recording audio and video, and how they might (or might not) help catch criminals


Keep Safe Using Mobile Tech

Keep Safe Using Mobile Tech

Author: Glenn Fleishman

Publisher: alt concepts

Published: 2024-07-30

Total Pages: 122

ISBN-13: 1990783538

DOWNLOAD EBOOK

Leverage your smartphone and smartwatch for improved personal safety! Version 1.0, updated July 30, 2024 The digital and “real” worlds can both be scary places. The smartphone (and often smartwatch) you already carry with you can help reduce risks, deter theft, and mitigate violence. This book teaches you to secure your hardware, block abuse, automatically call emergency services, connect with others to ensure you arrive where and when you intended, detect stalking by compact trackers, and keep your ecosystem accounts from Apple, Google, and Microsoft secure.n You don’t have to be reminded of the virtual and physical risks you face every day. Some of us are targeted more than others. Modern digital features built into mobile operating systems (and some computer operating systems) can help reduce our anxiety by putting more power in our hands to deter, deflect, block, and respond to abuse, threats, and emergencies. Keep Safe Using Mobile Tech looks at both digital threats, like online abuse and account hijacking, and ones in the physical world, like being stalked through Bluetooth trackers, facing domestic violence, or being in a car crash. The book principally covers the iPhone, Apple Watch, and Android devices, but doesn’t ignore Wear OS watches, the iPad, and computers running macOS or Windows. This book explores many techniques to help: • Learn how to harden your Apple ID/Apple Account, Google Account, and Microsoft Account beyond just a password or a text-message token. • Discover blocking tools in operating systems and third-party apps that can prevent abusive, fraudulent, and phishing messages and calls from reaching you. • Block seeing unwanted sensitive images on your iPhone, iPad, Mac, or Apple Watch—and help your kids receive advice on how not to send them. • Turn on tracking on your devices, and use it to recover or erase stolen hardware. • Keep your cloud-archived messages from leaking to attackers. • Lock down your devices to keep thieves and other personal invaders from accessing them. • Prepare for emergencies by setting up medical information on your mobile devices. • Let a supported smartphone or smartwatch recognize when you’re in a car crash or have taken a hard fall and call emergency services for you (and text your emergency contacts) if you can’t respond. • Keep track of heart anomalies through smartwatch alerts and tests. • Tell others where or when you expect to check in with them again, and let your smartphone alert them if you don’t. • Deter stalking from tiny Bluetooth trackers. • Protect your devices and accounts against access from domestic assailants. • Block thieves who steal your phone—potentially threatening you or attacking you in person—from gaining access to the rest of your digital life.