Podcasts about FileVault

  • 51PODCASTS
  • 76EPISODES
  • 51mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Feb 5, 2025LATEST
FileVault

POPULARITY

20172018201920202021202220232024


Best podcasts about FileVault

Latest podcast episodes about FileVault

Oh Fork It
La Silla Con Estribo

Oh Fork It

Play Episode Listen Later Feb 5, 2025 87:56


Episodio 304. Cumpleaños, bautizos y fiestas: Yo no tengo la edad para hacer eso. Chinos por favor, pónganse a trabajar… Yo quiero invitaciones como las de antes para usarlas de pote. Eventualmente en marzo, esos chinos me las enviarán. Sandisk se acaba de unir al grupo.

Engineering Kiosk
#161 Sichere Daten trotz physischem Zugriff: Disk Encryption und Integritätsschutz von Laptops bis IoT-Devices mit David Gstir von sigma star

Engineering Kiosk

Play Episode Listen Later Dec 10, 2024 68:40


Wie funktioniert eigentlich die Verschlüsselung unserer Daten und Festplatten bzw. Storages?Viele Elemente deines Lebens spielen sich inzwischen digital ab. Deine Daten werden also immer wichtiger und somit auch sensibler. Niemand möchte, dass die eigenen Daten in falsche Hände geraten. Die eigenen Daten zu verschlüsseln ist da ein wichtiges Mittel zum Schutz dieser.Doch, wie funktioniert das ganze eigentlich, wenn man seine Laptop-Festplatte verschlüsselt? Wird jedes File einzeln verschlüsselt oder die Festplatte als Ganzes? Welche Algorithmen kommen da zum Einsatz? Wo wird eigentlich das Passwort bzw. der Verschlüsselungskey abgelegt? Wie kann ich die Integrität der Daten sicherstellen? Was ist eine Trust Zone? Was sind Evil-Maid- und Cold-Boot-Attacken? Und entschlüssel ich die Daten meines Storage-Devices eigentlich, wenn gar keine Tastatur zur Verfügung steht? Wie es z.B. bei IoT-Geräten der Fall ist?Das alles besprechen wir mit unserem Gast David Gstir.Bonus: Nerds in den Bergen.Unsere aktuellen Werbepartner findest du auf https://engineeringkiosk.dev/partnersDas schnelle Feedback zur Episode:

Sospechosos Habituales
LM0935 - La seguridad de FileVault frente a GoFetch

Sospechosos Habituales

Play Episode Listen Later Apr 4, 2024 13:32


"Donde se cuenta lo que en él se verá", entre otros salseos pajeriles más o menos interesantes del que esto suscribe, para goce y deleite del oidor. --- Podcast asociado a la red de SOSPECHOSOS HABITUALES.

Leña al mono que es de goma
LM0935 - La seguridad de FileVault frente a GoFetch

Leña al mono que es de goma

Play Episode Listen Later Apr 4, 2024 13:32


"Donde se cuenta lo que en él se verá", entre otros salseos pajeriles más o menos interesantes del que esto suscribe, para goce y deleite del oidor. --- Podcast asociado a la red de SOSPECHOSOS HABITUALES.

Agnosys - Utilisateurs avancés
4225 – Effectuer une rotation de la clé de secours FileVault via le Terminal

Agnosys - Utilisateurs avancés

Play Episode Listen Later Mar 27, 2024 8:04


Découvrez dans cet épisode comment changer de clé de secours FileVault depuis le Terminal dans macOS Ventura et plus.

LaunchPad Jamf Admin Podcast
Escrow Buddy: A tool for escrowing missing FileVault recovery keys

LaunchPad Jamf Admin Podcast

Play Episode Listen Later Jan 5, 2024 48:21


Learn how Escrow Buddy can help you ensure your MDM has valid FileVault personal recovery keys for all your organization's Macs.   ---------------------------------   Escrow Buddy is a brand-new open-source tool for Mac IT and security administrators who escrow FileVault personal recovery keys to their MDM. For Macs that do not have a valid recovery key in escrow, Escrow Buddy securely and transparently generates a new key during the standard macOS login process and triggers its escrow. In this session, Elliot Jordan will cover the reasons FileVault recovery keys might be missing from your MDM, share context on the pitfalls of existing password-prompt workflows aimed at solving the problem, and explain why Escrow Buddy offers a more evolved and scalable solution for modern Mac admins.   ---------------------------------   Launchpad Podcast is hosted by Rocketman Tech where we discuss recent news, updates and happenings in the Jamf and Apple world. Always relevant and always casual, we'll have a Keynote speaker, discuss current LaunchPad events, and invite group discussion, questions and topic requests throughout the ~1 hour meeting.

Mac Admins Podcast
Episode 328: Elliot Jordan and Escrow Buddy

Mac Admins Podcast

Play Episode Listen Later Aug 14, 2023 62:16


Today's guest is Elliot Jordan, Senior Client Systems Engineer at Netflix, here to talk Escrow Buddy, Recipe Robot, AutoPkgr, and about all the fun projects he's been involved in over the years! Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Elliot Jordan Transcript: Click here to read the transcript Links: Mike Solin's Post on Focus Modes: https://mikesolin.com/2023/08/05/finding-balance-while-working-remotely/ Crypt: https://github.com/grahamgilbert/crypt Escrow Buddy: https://github.com/macadmins/escrow-buddy/ Stop prompting users for passwords when re-escrowing FileVault keys: https://www.elliotjordan.com/posts/filevault-reissue/  MAOS panel: https://www.youtube.com/watch?v=REyEYsgz5MI Recipe Robot: https://github.com/homebysix/recipe-robot  Stethoscope: https://netflixtechblog.com/introducing-netflix-stethoscope-5f3c392368e3 Extraordinary Attorney Woo: https://www.netflix.com/title/81518991 Mr. Robot: https://www.imdb.com/title/tt4158110/ Utopia (AU): https://en.wikipedia.org/wiki/Utopia_(Australian_TV_series) The Bear, Season 2: https://www.hulu.com/guides/the-bear Elliot's site: https://www.elliotjordan.com/  Upcoming JNUC session on Escrow Buddy: https://reg.jamf.com/flow/jamf/jnuc2023/home23/page/sessioncatalog/session/1682654671482001Ah7L Sponsors: Kandji Kolide SimpleMDM Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson  

cmdOS
cmdOS 198: «Disheartened» και «peeved»

cmdOS

Play Episode Listen Later Dec 1, 2022 129:07


Απορίες και εκρήξεις, επικίνδυνες συζητήσεις που μπλέκουν Apple, Κίνα, πολιτικά δικαιώματα και M2 Max με 12 πυρήνες. Το παρόν επεισόδιο φτάνει σε εσάς με την υποστήριξη της: LEAP: Η LEAP είναι creative studio και αναζητεί συνεργάτες. Ακολουθήστε το link προς τη θέση που σας ενδιαφέρει: Junior Web Developer | Front End Developer Επικοινωνία με την εκπομπή: Email | Facebook Group | Twitter Λεωνίδας Μαστέλλος: Facebook | Twitter | Spotify Μάνος Βέζος: The Vez | Facebook | Twitter | Instagram | Apple Music Apple TV+ Apple Nearing Deal For Michael Lewis' Book Rights On Wild Story Of Fallen Crypto King Sam Bankman-Fried & FTX: The Dish – Deadline Apple honored with first BAFTA Children & Young People Award wins for “El Deafo,” “Wolfwalkers,” “Here We Are: Notes for Living on Planet Earth” and “Lovely Little Farm” - Apple TV+ Press Apple Original comedy series “Shrinking,” starring Jason Segel and Harrison Ford, to premiere globally January 27, 2023 on Apple TV+ - Apple TV+ Press Apple Music Apple Music launches new Replay experience; reveals 2022's Top Charts - Apple Apple Arcade SpongeBob SolitairePants on the App Store New Apple Arcade Games in December 2022 Include JellyCar Worlds, Dead Cells+, and My Little Pony: Mane Merge - TouchArcade App Store και Apple Podcasts Awards App Store Awards celebrate the best apps and games of 2022 - Apple Apple announces the 2022 Apple Podcasts Award winner - Apple Κίνα Apple to Lose 6 Million iPhone Pros From Tumult at China's Foxconn Plant (AAPL) - Bloomberg At a China Covid Protest, a Mix of Giddy Elation and Anxiety - The New York Times Why Protesters in China Are Using Blank Sheets of White Paper - The New York Times Kuo: iPhone 14 Pro Sales Are in Big Trouble Due to Foxconn Factory Protests - MacRumors Apple iPhone factory workers clash with police in China | Ars Technica Analysis: Apple supply chain data shows receding exposure to China as risks mount | Reuters Twitter και Apple Elon Musk Claims Apple Has 'Mostly Stopped' Offering Ads on Twitter and Is Making Moderation Demands - MacRumors Daring Fireball: Today, in Twitter-Apple Drama Musk claims Apple threatens to remove Twitter from App Store - The Washington Post M2 Max 'M2 Max' Geekbench Scores Leak Online, Revealing Rumored Specs and Performance - MacRumors

halftone.fm Master Feed
cmdOS 198: «Disheartened» και «peeved»

halftone.fm Master Feed

Play Episode Listen Later Dec 1, 2022 129:07


Απορίες και εκρήξεις, επικίνδυνες συζητήσεις που μπλέκουν Apple, Κίνα, πολιτικά δικαιώματα και M2 Max με 12 πυρήνες. Το παρόν επεισόδιο φτάνει σε εσάς με την υποστήριξη της: LEAP: Η LEAP είναι creative studio και αναζητεί συνεργάτες. Ακολουθήστε το link προς τη θέση που σας ενδιαφέρει: Junior Web Developer | Front End Developer Επικοινωνία με την εκπομπή: Email | Facebook Group | Twitter Λεωνίδας Μαστέλλος: Facebook | Twitter | Spotify Μάνος Βέζος: The Vez | Facebook | Twitter | Instagram | Apple Music Apple TV+ Apple Nearing Deal For Michael Lewis' Book Rights On Wild Story Of Fallen Crypto King Sam Bankman-Fried & FTX: The Dish – Deadline Apple honored with first BAFTA Children & Young People Award wins for “El Deafo,” “Wolfwalkers,” “Here We Are: Notes for Living on Planet Earth” and “Lovely Little Farm” - Apple TV+ Press Apple Original comedy series “Shrinking,” starring Jason Segel and Harrison Ford, to premiere globally January 27, 2023 on Apple TV+ - Apple TV+ Press Apple Music Apple Music launches new Replay experience; reveals 2022's Top Charts - Apple Apple Arcade SpongeBob SolitairePants on the App Store New Apple Arcade Games in December 2022 Include JellyCar Worlds, Dead Cells+, and My Little Pony: Mane Merge - TouchArcade App Store και Apple Podcasts Awards App Store Awards celebrate the best apps and games of 2022 - Apple Apple announces the 2022 Apple Podcasts Award winner - Apple Κίνα Apple to Lose 6 Million iPhone Pros From Tumult at China's Foxconn Plant (AAPL) - Bloomberg At a China Covid Protest, a Mix of Giddy Elation and Anxiety - The New York Times Why Protesters in China Are Using Blank Sheets of White Paper - The New York Times Kuo: iPhone 14 Pro Sales Are in Big Trouble Due to Foxconn Factory Protests - MacRumors Apple iPhone factory workers clash with police in China | Ars Technica Analysis: Apple supply chain data shows receding exposure to China as risks mount | Reuters Twitter και Apple Elon Musk Claims Apple Has 'Mostly Stopped' Offering Ads on Twitter and Is Making Moderation Demands - MacRumors Daring Fireball: Today, in Twitter-Apple Drama Musk claims Apple threatens to remove Twitter from App Store - The Washington Post M2 Max 'M2 Max' Geekbench Scores Leak Online, Revealing Rumored Specs and Performance - MacRumors

Mac Admins Podcast
Episode 292: New Apple Documentation

Mac Admins Podcast

Play Episode Listen Later Nov 22, 2022 73:04


Apple continues to get better and better at documenting not only APIs but also the Apple Platform Deployment portal that contains plenty of information on how Apple intends for administrators to centrally manage their devices. In this episode we'll look at a couple of new ways to peruse the docs as well as some insights about device management that can be had by looking at their change control system.  Hosts: Tom Bridge - @tbridge777 Charles Edge - @cedge318 Marcus Ransom - @marcusransom Transcript: Transcription of this episode brought to you by Meter.com Click here to read the transcript Links: The Apple Platform Deployment portal The revision history Deploy “helper” apps Rapid security response documentation Carrier eSIM settings Using MDM with eSIM GDMF Apple software lookup service with json definitions Deferral settings Migration Assistant changes Managed Device attestation and ACME Where to find Bundle identifiers for native apple apps easily Wi-fi specs MDM Payload List MCX as FileVault payload settings Sponsors: Kandji Mosyle Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast! The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson

AppleVis Podcast
Quick Tip: How to Configure VoiceOver to Start Automatically when Logging into Your Mac

AppleVis Podcast

Play Episode Listen Later Nov 5, 2022


By default, VoiceOver does not start automatically at the macOS login prompt. In this podcast, Tyler demonstrates how to change this. The steps to do so are as follows:Choose Apple > System Settings, and select Lock Screen in the table.Click accessibility options and toggle the “VoiceOver” switch on.Click done.If FileVault disk encryption is turned on, which is the default, VoiceOver should start when the Mac boots and prompt for the username, and then prompt for the password if the username is entered correctly. However, if you'd rather not have to manually enter your username or be able to navigate other elements in the window, you must turn FileVault off. To do this, open System Settings, select Privacy & Security in the table, and click “FileVault turn off.”

The Essential Apple Podcast
S1E252 - Essential Apple Podcast 252: A smorgasbord of stories

The Essential Apple Podcast

Play Episode Listen Later Feb 12, 2022 62:07


Nick, Jim and Simon are joined by David Ginsburg of In Touch With iOS, The Mac Show and MacVoices Live to mull over the news of the last couple of weeks including Apple's earnings, new betas with new features and more... GIVEAWAYS & OFFERS Get 2 months on the Kino Premium Plan with offer code KINOWITHJOHNNEMO Why not come and join the Slack community? You can now just click on this Slackroom Link to sign up and join in the chatter! Recorded 6th February 2022 On this week's show DAVID GINSBURG David Ginsburg is an IT professional supporting Mac, iOS and Windows users and his wealth of knowledge of iPhone, iPad, Apple Watch, and Apple TV. In Touch With iOS YouTube channel @daveg65 on Twitter Regular guest on The Mac Show Regular panelist on MacVoices Live NICK RILEY @spligosh on Twitter very occasionally. Sometimes appears on Bart Busschots' Let's Talk Apple Sutton Park Circuit church worship on YouTube Nick's church stream videos on You Tube APPLE Apple brought in a record-breaking $123.9 billion in revenue, despite headwinds – Engadget iOS 15.4 Beta Lets You Use Face ID With a Mask On – MacRumors Apple Rushes Out watchOS 8.4.1 with Undisclosed Bug Fixes – TidBITS iOS 15.4 Will Let EU Residents Add COVID-19 Vaccine Certificates to Wallet – MacRumors U.S. states, DoJ, and Microsoft declare support for Epic Games – iMore Apple warns macOS Monterey beta testers of FileVault issue – AppleInsider AirTags with deactivated speakers being sold on eBay and Etsy; seller claims not for stalking – 9to5Mac Apple explains that Pro Display XDR and MacBook Pro will automatically dim when hot – The Apple Post Judge throws out lawsuit against iPhone's water resistance – Cult of Mac Apple's $95 Million Settlement Over Refurbished Replacement Devices – MacRumors Apple will charge 27% commission for app purchases made using alternative methods – 9to5Mac OneDrive Mac Users Unhappy With Buggy Update That Removes Ability to Keep Files On Device – MacRumors Microsoft Responds to OneDrive Mac User Criticism – MacRumors TECHNOLOGY SpaceX reveals $500 monthly 'Premium' Starlink service with speeds up to 500 Mbps – Engadget GDPR enforcer rules that IAB Europes consent popups are unlawful – Irish Council for Civil Liberties Fujifilm Cameras Have Serious macOS File Issue, Firmware Fix Incoming Soon – PetaPixel Intel Core i9 vs. Apple M1 Max: Which Laptop CPU Is Better? – PCMag SECURITY & PRIVACY Booby-trapped sites delivered potent new backdoor trojan to macOS users – Ars Technica Companies know what you do inside your email inbox. Here's how to block them. – Washington Post Mac malware spreading for ~14 months installs backdoor on infected sysstems.– Ars Technica Serious iPhone Warning Issued For A Billion Apple Users – Forbes WORTH A CHIRP / ESSENTIAL TIPS iBook G3 mod makes the coolest iPad case you'll ever see – Cult of Mac Essential Apple Recommended Services: All Things Secured – Online security made simple by Josh Summers. Pixel Privacy – a fabulous resource full of excellent articles and advice on how to protect yourself online. Doug.ee Blog for Andy J's security tips. Ghostery – protect yourself from trackers, scripts and ads while browsing. Simple Login – Email anonymisation and disposable emails for login/registering with 33mail.com – Never give out your real email address online again. AnonAddy – Disposable email addresses Sudo – get up to 9 “avatars” with email addresses, phone numbers and more to mask your online identity. Free for the first year and priced from $0.99 US / £2.50 UK per month thereafter... You get to keep 2 free avatars though. ProtonMail – end to end encrypted, open source, based in Switzerland. Prices start from FREE... what more can you ask? ProtonVPN – a VPN to go with it perhaps? Prices also starting from nothing! Comparitech DNS Leak Test – simple to use and understand VPN leak test. Fake Name Generator – so much more than names! Create whole identities (for free) with all the information you could ever need. Wire and on the App Stores – free for personal use, open source and end to end encryted messenger and VoIP. Pinecast – a fabulous podcast hosting service with costs that start from nothing. Essential Apple is not affiliated with or paid to promote any of these services... We recommend services that we use ourselves and feel are either unique or outstanding in their field, or in some cases are just the best value for money in our opinion. Social Media and Slack You can follow us on: Twitter / Slack / EssentialApple.com / Soundcloud / Spotify / Facebook / Pinecast Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.

iWeek (la semaine Apple)
iWeek (la semaine Apple) 74 : Microsoft lâche 70 milliards de $ pour Activision, et alors ?

iWeek (la semaine Apple)

Play Episode Listen Later Jan 20, 2022 92:24


Bienvenue dans cet épisode 74, le 22è numéro de la saison 2 d'iWeek (la semaine Apple),le podcast. Microsoft lâche 70 milliards de $ pour Activision, et alors ? Présentation : Benjamin Vincent. Intervenants : François Le Truedic, Elie Abitbol. Production : OUATCH Audio. Cette semaine : l'annonce surprise de l'acquisition, mardi 18 janvier, pour près de 70 milliards de $ d'Activision-Blizzard par Microsoft, marque un tournant historique pour l'industrie du jeu vidéo. Redmond, dont la valorisation est désormais proche d'Apple, à des niveaux historiquement hauts (plus de 2.200 milliards de $), a réussi un coup magistral. Quelles conséquences pour Apple et sa potentielle stratégie dans le gaming, entre Apple Arcade et le futur casque de réalité mixte ? C'est l'info de la semaine ! Le dossier de la semaine est consacré aux écrans OLED et à leur arrivée annoncée, dans les prochaines années, sur deux nouveaux produits au moins : l'iPad Pro et les MacBook Pro. Comme chaque semaine, retrouvez Pomme-S, avec trois infos de la semaine, et notamment l'arrivée, chez Apple, de Fred Potter, fondateur de Netatmo et co-fondateur de Withings. Elle date de l'été dernier mais était restée secrète jusqu'à ce début 2022. Egalement au programme : la (seule) mise à jour de la semaine destinée aux AirPods 3, les rumeurs de la semaine avec l'iPhone SE 3 et l'iPad Air 5 qui n'ont jamais été aussi proches, "Ma maison connectée" avec François Le Truédic et les news HomeKit, le diner d'Elie Abitbol et le tuto audio Avec Benjamin VINCENT : aujourd'hui, les neuf étapes à suivre avant de céder son Mac. Attention : la sauvegarde et la désactivation de FileVault peuvent prendre plusieurs heures et donc, ne vous y prenez pas au dernier moment ! Le châpitrage de cet épisode 74 est intégré par Apple, à Apple Podcasts. Vous pouvez donc en profiter aussi, désormais, en nous écoutant sur votre iPhone, iPad, Mac, Apple TV ou Apple Watch ! Rendez-vous jeudi prochain, 27 janvier 2022 vers 20h, pour l'épisode 75 d'iWeek (la semaine Apple). Par ailleurs, retrouvez la version vidéo du podcast sur la chaîne YouTube d'iWeek ! Mise en ligne : chaque vendredi. Abonnez-vous à la chaîne YouTube d'iWeek et cliquez sur la cloche pour être alerté dès qu'un nouvel épisode est disponible en vidéo. Essayez iFive, votre dose Apple quotidienne, le 1er podcast quotidien sur l'actu Apple : 5 minutes par jour, 5 jours par semaine, du lundi au vendredi, avec l'essentiel de l'info Apple quotidienne. iFive (la dose Apple) by iWeek : 3,99€ par mois, sans engagement et avec 3 jours d'essai gratuit. Sur Apple Podcasts : https://apple.co/2RORQzn  Et désormais aussi sur Spotify : https://open.spotify.com/show/35TL5Av7WVKCjih07Jtdb5?si=fb4913aa7bf2477a   Pour avoir les dernières nouvelles d'iFive et d'iWeek, suivez nos deux comptes sur Twitter : @iFiveFR et @iweeknews. Bonne écoute, bonne fin de semaine, bon week-end et n'oubliez pas #iweekLSA sur Twitter : on reste à votre écoute ! Benjamin & la team iWeek (la semaine Apple)

MacMost - Mac, iPhone and iPad How-To Videos
The Practical Guide To Mac Security: Part 15, FileVault (MacMost #2502)

MacMost - Mac, iPhone and iPad How-To Videos

Play Episode Listen Later Aug 12, 2021


View in HD at . FileVault encrypts your drive in a way that is seamless to you, but would make it impossible for someone else to access the data on your drive without your password.

Accidental Tech Podcast
430: Apple Did Not Eat That Food

Accidental Tech Podcast

Play Episode Listen Later May 13, 2021 115:09


THE ATP STORE IS BACK!! Make your purchases until Friday, May 14. Pre-show: ⅔ of ATP is “maxinated”! The vaccination train keeps a’chuggin’! Toot toot!

Accidental Tech Podcast
428: A Series of Rectangles

Accidental Tech Podcast

Play Episode Listen Later Apr 29, 2021 112:49


THE ATP STORE IS BACK!! Make your purchases until Friday, May 14. Pre-show: ⅔ of ATP has completed their journey on the vaccination train! Toot toot!

Ethical Hacking
How Encryption helps us to secure our hard disks in which we will store our precious information...

Ethical Hacking

Play Episode Listen Later Apr 21, 2021 18:28


hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 19 today we are discussing about Disk encryption, encryption is a process that scrambles data into unreadable information.It does this to ensure that nobody can read it,except the person who holds the secret key.This ensures confidentiality.If you have the key you can unlock that randomized data and translate it back into something readable.Think about it like a magic machine.The information goes in one side,and out the other side comes a jumbled mess.Without that key you don't know how to read the jumbled mess.Another example of this is actually language.I'm speaking English right now.If I spoke English into my machine and out the other side came Spanish,and you didn't understand Spanish,it would be encrypted, and you wouldn't understand it.But if you knew the key,meaning you understood Spanish,you could understand everything that was being said.There are two different types of encryption,hardware-based and software-based.The first one we're going to talk about is hardware-based encryption.A great example of this is a self-encrypting drive.It looks like an external hard drive,and it has embedded hardware that performs full disk, or whole disk encryption.These are very fast, unfortunately,they're also very expensive, so they're not commonly used.Instead, most people use software-based encryption in the marketplace and in our organizations. Luckily for us, there are two forms of whole disk encryption already embedded into our operating systems if we're using Mac or Windows.In a Mac we have a system called FileVault where we can turn on whole disk encryption with a single click.This is located under your system preferences and under the security tab.On Windows we use a system called BitLocker.BitLocker, again, is very easy to turn on.If I want to encrypt my D drive I simply right-click it,turn on BitLocker, and then I'll be able to encrypt the entire drive with a single click.As I said previously, encryption requires a key.And when you're using BitLocker specifically you're actually going to be using a hardware key that resides on your motherboard.It's called the Trusted Platform Module, or TPM.This TPM chip resides on the motherboard,and it contains the encryption key inside of it.This is what BitLocker is going to use to encrypt your drive.So if you're going to take that hard drive out and put it into another system you have to decrypt that drive first,otherwise you're not going to be able to decrypt it on the other system because it has a different TPM module and different secret key.If your motherboard doesn't have TPM you still can use BitLocker, but instead you have to use an external USB drive as a key.It'll store the key on that USB drive.But if you use that USB drive you're never going to be able to unlock that hard drive again.Because every time you boot up that computer you have to make sure you have that USB key inserted so it can unlock the drive.Both BitLocker and FileVault use the same type of encryption. They use Advanced Encryption Standard, also known as AES.AES is a symmetric key encryption that supports 128-bit and 256-bit keys, and is considered unbreakable as of the time of this recording.Encryption sounds like a wonderful thing, and it is.It secures our data and keeps prying eyes out.It secures our data and keeps prying eyes out.But it does have some drawbacks.Encryption adds additional security for us,but it comes with a lower performance for your system.If I'm doing whole disk encryption that means before I can even boot up the computer and read things from that drive I have to decrypt it,and that takes time and processing.So you have to remember there is a sacrifice in speed and performance when you're using full disk encryption.Because of this performance hit some people decide not to use full disk encryption.

Björeman // Melin
Avsnitt 252: Stängt i hela Jira

Björeman // Melin

Play Episode Listen Later Apr 1, 2021 109:39


Inledning Jocke använder Markdown, det är störigt med saker som försöker formattera ens inklistrade text Jocke e-postar med John Gruber, Microsoft menar allvar med Vista Christian kan hantera barntema. Det har hänt mycket med Wordpress, och det är inte odelat bra Påsken närmar sig, har alla plockat fram sina dymlar? Sveriges bästa kebab Pandemianpassning. Citigroup inför Zoomfria fredagar. Fredrik och Christian lämnar sin backlog bakom sig, funderar över hur distansmöten hackar upp dagen, och börja på ny ticket Uppföljning Intel vill bygga fler kretsar åt Apple, om de får Ämnen Microsoft erbjuder upp till 30 000 dollar för den som hittar buggar (säkerhetshål) i Teams Robotdammsugare - vad är bäst och vad ska man köpa? Pratar de med Homekit? Ljudlimpa eller liknade snygg diskret ljudlösning med Apple TV 4K - vad är bäst och vad ska man köpa? Ett fort av Homepod? Kabel och kaffe - följtips på Instagram Fredrik skriver 17 rader kod, fröjdas över datorers kraft OS X-retrospekt? Nog var Panther tidernas bästa version? Voltswagen - ett otroligt dåligt hanterat aprilskämt. Vid inspelning hade de inte erkänt att det var ett skämt än Länkar Markdown Notion Windows Vista Building a better dinosaur Windows Vista means business Preview-bilder med Jekyll - texten som felsöktes i sändning Kramdown Dymmelonsdag Kebaben i Årsta Sveriges bästa kebab ska finnas i Jönköping Kebabsåsreceptet i Jönköpingsposten Zoomfria fredagar på Citigroup Intel vill ändå gärna bygga kretsar åt Apple Microsoft betalar för att hitta säkerhetshål i Teams Sonos ljudlimpor - Arc och Beam Sonos sub Kabel och kaffe Teknikveckan intervjuar Kabel och kaffe-Erik En podd om teknik om hemautomatisering Cpanel Phpmyadmin CUPS Slå på Cups i Macos Alla John Siracusas Mac OS-recensioner Spotlight Isight-kamerorna Filevault Snow leopard Mac OS X server Ical Xiaomi mi laptop pro Oroligt i FeeBSD-land Xiaomi-klockor Voltswagen - ett extremt misslyckat aprilskämt Fredrik Björeman, Joacim Melin och Christian Åhs. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-252-stangt-i-hela-jira.html.

Mac Admins Podcast
Episode 207: Security Research and the Apple Ecosystem

Mac Admins Podcast

Play Episode Listen Later Mar 15, 2021 85:10


The macOS security architecture continues to evolve. We have new boot modes, fallback recovery operating systems, sealed key protection for Filevault, revive. The new security documentation is a solid read. So we’re curious, what does a security researcher see when looking at that! What new green fields of hackerationing opportunity lie in front of us? In this episode we chat with Patrick Wardle to see what he’s been up to and to talk about the evolving security footprint of Apple devices. Guest: Patrick Wardle Hosts: Tom Bridge - @tbridge777 Charles Edge - @cedge318 Marcus Ransom - @marcusransom Links: The Art Of Mac Malware Apple’s security documentation Objective-See Github Safari Extension nerderation Sponsors: Kandji VMWare Workspace One Halp Watchman Monitoring If you're interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. Get the latest about the Mac Admins Podcast, follow us on Twitter! We're @MacAdmPodcast!

A2
3: Passare a Mac nel 2021: le basi di macOS

A2

Play Episode Listen Later Feb 24, 2021 76:59


In questa ultima puntata su come passare a Mac nel 2021 parliamo delle diversità tra Mac e Windows che potrebbero spiazzare il nuovo utente. Ci addentriamo quindi nel funzionamento di base del sistema operativo di Apple e nelle novità di Big Sur. Suggerimenti per chi passa da Windows a Mac - Supporto Apple (https://support.apple.com/it-it/HT204216) guida ben fatta di Apple per gli utenti che provengono da Windows e vogliono prendere confidenza. Usare Spotlight sul Mac (https://support.apple.com/it-it/HT204014): ⌘ SPAZIO Usare Launchpad sul Mac (https://support.apple.com/it-it/HT202635) Usare AirDrop su Mac (https://support.apple.com/it-it/HT203106) Abbreviazioni da tastiera del Mac (https://support.apple.com/it-it/HT201236) Utilizzare abbreviazioni da tastiera macOS (https://support.apple.com/it-it/guide/mac-help/mchlp2262/mac) Uso di FileVault per codificare il disco di avvio sul Mac (https://support.apple.com/it-it/HT204837): piccola nota: non ne abbiamo parlato in puntata ma è possibile codificare anche dischi esterni. Passare a macOS Big Sur - Supporto Apple (https://support.apple.com/it-it/macos): con Big Sur se già si dispone di un iPhone o di un iPad il passaggio è forse più indolore perché l'interfaccia grafica di Big sur si è molto avvicinata ai dispositivi iOS. Supporto Mac - Supporto Apple (https://support.apple.com/it-it/explore/new-to-mac)

Mac Power Users
576: No Judgement Here

Mac Power Users

Play Episode Listen Later Feb 21, 2021 101:28


In this feedback episode, the guys revisit dictation, UUIDs, FileVault and the longevity of recent Mac hardware. Then, David talks about a new computer in his life and Stephen reworks his home screen.

Relay FM Master Feed
Mac Power Users 576: No Judgement Here

Relay FM Master Feed

Play Episode Listen Later Feb 21, 2021 101:28


In this feedback episode, the guys revisit dictation, UUIDs, FileVault and the longevity of recent Mac hardware. Then, David talks about a new computer in his life and Stephen reworks his home screen.

Command Control Power: Apple Tech Support & Business Talk

Topics: -Sam shares with us that he has been vaccinated with the Moderna vaccine. -He volunteers with the local Emergency Response Team and was given the opportunity for early vaccination. -Going back to tech, Joe has an issue related to his passwords in Safari hanging up the process. As he digs into the problem, he discovers an issue with his Keychain. -Howard Oakley from one of our favorite sites, Eclectic Light Company (https://eclecticlight.co), guides him through the process of correcting issues with your Login Keychain. -Sam shares a great little tidbit he learned from colleague Steve Leebove of Mac Rescue (https://macrescue.com). Holding down the Option key while clicking the Advanced button in Network Preferences reveals additional fields like Hidden or Shareable. But what are the grayed out networks that can only be seen while holding down Option? -Another good one that Sam found was when attempting to access a backup DMG on a Synology and receives the message “resource temporarily unavailable”. Using the Synology widget for Connected Users, he was able to remove the sessions for that user and mount the DMG after that. -And oldie but goodie. Joe talks about using Migration Assistant after Setup Assistant and configuring a user as opposed to doing it during. In addition, when going through Migration Assistant, wait for all the folder sizes to be calculated before proceeding with migration. He has a recent engagement with a client where this proved to still be the correct method. -Sam’s last tip involves KEXT user approvals. When Turbo Boost Switcher Pro was not functioning properly in macOS Big Sur, he had to find a way to re-allow it. Here is the syntax pulled from https://www.rugarciap.com/faqs/: kmutil trigger-panic-medic --volume-root /Volumes/. -Joe talks about the Staged Extensions folder where these kernel extensions could live prior to approval. -What is FileVault Disk incrimination?

Hands-On Mac (Video)
HOM 35: Securing macOS Big Sur - Secure and Protect your Mac with macOS Big Sur

Hands-On Mac (Video)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple protect mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac pro how-to mac how-to macbook how-to imac help imac how-to mac pro help
All TWiT.tv Shows (Video HD)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Hands-On Mac (Audio)
HOM 35: Securing macOS Big Sur - Secure and Protect your Mac with macOS Big Sur

Hands-On Mac (Audio)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple protect mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac pro how-to mac how-to macbook how-to imac help imac how-to mac pro help
Radio Leo (Audio)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Audio)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video HI)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video HI)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video HD)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video HD)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video LO)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video HI)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video LO)
Hands-On Mac 35: Securing macOS Big Sur

Radio Leo (Video LO)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (MP3)
Hands-On Mac 35: Securing macOS Big Sur

All TWiT.tv Shows (MP3)

Play Episode Listen Later Nov 13, 2020 26:44


macOS Big Sur is here! now you have to keep it secure. Here are some easy ways (and some pretty tricky ways) to keep your Mac safe. You have a lot of security options with macOS Big Sur, and third party software can give you even more options. Use secure passwords. To keep your information safe, you should use passwords to secure your Mac, and choose passwords that can't be easily guessed. See Tips for creating secure passwords and Learn how passwords are used. Require users to log in. If others can get physical access to your Mac, you should set up separate users for each person using the Mac, and require each user to log in. This prevents an unauthorized person from using the Mac. It also separates user files, so users only have access to their own personal files and settings. Users cannot see or modify the files or settings of other users. See Set up users, guests, and groups. Secure your Mac when it's idle. You can set your Mac to log out the current user if the Mac has been inactive for a certain period of time. See Set your Mac to log out when not in use. You should also require a password to wake it from sleep or from the screen saver. See Require a password after waking your Mac. For convenience, you can set up a hot corner to click whenever you want to immediately lock your screen. See Use hot corners to start the screen saver. Limit the number of administrative users. One or more people can have administrator privileges for a Mac. By default, the administrator is the person who initially set up the Mac. Administrators can create, manage, and delete other users, install and remove software, and change settings. For these reasons, an administrator should create a standard user account to use when administrator privileges are not needed. If the security of a standard user is compromised, the potential harm is far more limited than if the user has administrator privileges. If multiple people use your Mac, limit the number of users with administrator privileges. See Set up users, guests, and groups. Encrypt the data on your Mac with FileVault. If you have private or confidential information on your Mac, you can use FileVault encryption to protect that information from being seen or copied. FileVault encodes the information stored on your Mac so it is locked and cannot be read unless the login password is entered. Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac! Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple mac secure limit users securing require administrators macbook imac mac pro twit encrypt leo laporte macos big sur filevault mac security hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
The History of Computing
PGP and the First Amendment

The History of Computing

Play Episode Listen Later Sep 28, 2020 14:17


I was giving a talk at DefCon one year and this guy starts grilling me at the end of the talk about the techniques Apple was using to encrypt home directories at the time with new technology called Filevault. It went on a bit, so I did that thing you sometimes have to do when it's time to get off stage and told him we'd chat after. And of course he came up - and I realized he was really getting at the mechanism used to decrypt and the black box around decryption. He knew way more than I did about encryption so I asked him who he was. When he told me, I was stunned. Turns out that like me, he enjoyed listening to A Prairie Home Companion. And on that show, Garrison Keillor would occasionally talk about Ralph's Pretty Good Grocery in a typical Minnesota hometown he'd made up for himself called Lake Wobegon. Zimmerman liked the name and so called his new encryption tool PGP, short for Pretty Good Privacy. It was originally written to encrypt messages being sent to bulletin boards.  That original tool didn't require any special license, provided it wasn't being used commercially. And today, much to the chagrin of the US government at the time, it's been used all over the world to encrypt emails, text files, text messages, directories, and even disks. But we'll get to that in a bit.  Zimmerman had worked for the Nuclear Weapons Freeze Campaign in the 80s after getting a degree in computer science fro Florida Atlantic University in 1978. And after seeing the government infiltrate organizations organizing Vietnam protests, he wanted to protect the increasingly electronic communications of anti-nuclear protests and activities.  The world was just beginning to wake up to a globally connected Internet. And the ARPAnet had originally been established by the military industrial complex, so it was understandable that he'd want to keep messages private that just happened to be flowing over a communications medium that many in the defense industry knew well. So he started developing his own encryption algorithm called BassOmatic in 1988. That cipher used symmetric keys with control bits and pseudorandom number generation as a seed - resulting in 8 permutation tables. He named BassOmatic after a Saturday Night Live skit. I like him more and more.  He'd replace BassOmatic with IDEA in version 2 in 1992. And thus began the web of trust, which survives to this day in PGP, OpenPGP, and GnuPG. Here, a message is considered authentic based on it being bound to a public key - one that is issued in a decentralized model where a certificate authority issues a public and private key where messages can only be encrypted or signed with the private key and back then you would show your ID to someone at a key signing event or party in order to get a key. Public keys could then be used to check that the individual you thought was the signer really is. Once verified then a separate key could be used to encrypt messages between the parties.  But by then, there was a problem. The US government began a criminal investigation against Zimmerman in 1993. You see, the encryption used in PGP was too good. Anything over a 40 bit encryption key was subject to US export regulations as a munition. Remember, the Cold War. Because PGP used 128 bit keys at a minimum. So Zimmerman did something that the government wasn't expecting. Something that would make him a legend. He went to MIT Press and published the PGP source code in a physical book. Now, you could OCR the software, run it through a compiler. Suddenly, his code was protected as an exportable book by the First Amendment.  The government dropped the investigation and found something better to do with their time. And from then on, source code for cryptographic software became an enabler of free speech, which has been held up repeatedly in the appellate courts. So 1996 comes along and PGP 3 is finally available. This is when Zimmerman founds PGP as a company so they could focus on PGP full-time. Due to a merger with Viacrypt they jumped to PGP 5 in 1997.  Towards the end of 1997 Network Associates acquired PGP and they expanded to add things like intrusion detection, full disk encryption, and even firewalls. Under Network Associates they stopped publishing their source code and Zimmerman left in 2001. Network Associates couldn't really find the right paradigm and so merged some products together and what was PGP commandline ended up becoming McAfee E-Business Server in 2013.  But by 2002 PGP Corporation was born out of a few employees securing funding from Rob Theis to help start the company and buy the rest of the PGP assets from Network Associates. They managed to grow it enough to sell it for $300 million to Symantec and PGP lives on to this day.  But I never felt like they were in it just for the money. The money came from a centralized policy server that could do things like escrow keys. But for that core feature of encrypting emails and later disks, I really always felt like they wanted a lot of that free. And you can buy Symantec Encryption Desktop and command it from a server, S/MIME and OpenPGP live on in ways that real humans can encrypt their communications, some of which in areas where their messages might get them thrown in jail. By the mid-90s, mail wasn't just about the text in a message. It was more. RFC934 in 1985 had started the idea of encapsulating messages so you could get metadata. RFC 1521 in 1993 formalized MIME and by 1996, MIME was getting really mature in RFC2045. But by 1999 we wanted more and so S/MIME went out as RFC 2633. Here, we could use CMS to “cryptographically enhance” a MIME body. In other words, we could suddenly encrypt more than the text of an email and it since it was an accepted internet standard, it could be encrypted and decrypted with standard mail clients rather than just with a PGP client that didn't have all the bells and whistles of pretty email clients.  That included signing information, which by 2004 would evolve to include attributes for things like singingTime, SMIMECapabilities, algorithms and more.  Today, iOS can use S/MIME and keys can be stored in Exchange or Office 365 and that's compatible with any other mail client that has S/MIME support, making it easier than ever to get certificates, sign messages, and encrypt messages. Much of what PGP was meant for is also available in OpenPGP. OpenPGP is defined by the OpenPGP Working Group and you can see the names of some of these guardians of privacy in RFC 4880 from 2007. Names like J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. Despite the corporate acquisitions, the money, the reprioritization of projects, these people saw fit to put powerful encryption into the hands of real humans and once that pandoras box had been opened and the first amendment was protecting that encryption as free speech, to keep it that way. Use Apple Mail, GPGTools puts all of this in your hands. Use Android, get FairEmail. Use Windows, grab EverDesk.  This specific entry felt a little timely. Occasionally I hear senators tell companies they need to leave backdoors in products so the government can decrypt messages. And a terrorist forces us to rethink that basic idea of whether software that enables encryption is protected by freedom of speech. Or we choose to attempt to ban a company like WeChat, testing whether foreign entities who publish encryption software are also protected. Especially when you consider whether Tencent is harvesting user data or if the idea they are doing that is propaganda. For now, US courts have halted a ban on WeChat. Whether it lasts is one of the more intriguing things I'm personally watching these days, despite whatever partisan rhetoric gets spewed from either side of the isle, simply for the refinement to the legal interpretation that to me began back in 1993. After over 25 years we still continue to evolve our understanding of what truly open and peer reviewed cryptography being in the hands of all of us actually means to society.  The inspiration for this episode was a debate I got into about whether the framers of the US Constitution would have considered encryption, especially in the form of open source public and private key encryption, to be free speech. And it's worth mentioning that Washington, Franklin, Hamilton, Adams, and Madison all used  ciphers to keep their communications private. And for good reason as they knew what could happen should their communications be leaked, given that Franklin had actually leaked private communications when he was the postmaster general. Jefferson even developed his own wheel cipher, which was similar to the one the US army used in 1922. It comes down to privacy. The Constitution does not specifically call out privacy; however, the first Amendment guarantees the privacy of belief, the third, the privacy of home, the fourth, privacy against unreasonable search and the fifth, privacy of of personal information in the form of the privilege against self-incrimination. And giving away a private key is potentially self-incrimination. Further, the ninth Amendment has broadly been defined as the protection of privacy.  So yes, it is safe to assume they would have supported the transmission of encrypted information and therefore the cipher used to encrypt to be a freedom. Arguably the contents of our phones are synonymous with the contents of our homes though - and if you can have a warrant for one, you could have a warrant for both. Difference is you have to physically come to my home to search it - whereas a foreign government with the same keys might be able to decrypt other data. Potentially without someone knowing what happened. The Electronic Communications Privacy Act of 1986 helped with protections but with more and more data residing in the cloud - or as with our mobile devices synchronized with the cloud, and with the intermingling of potentially harmful data about people around the globe potentially residing (or potentially being analyzed) by people in countries that might not share the same ethics, it's becoming increasingly difficult to know what is the difference between keeping our information private, which the framers would likely have supported and keeping people safe. Jurisprudence has never kept up with the speed of technological progress, but I'm pretty sure that Jefferson would have liked to have shared a glass of his favorite drink, wine, with Zimmerman. Just as I'm pretty sure I'd like to share a glass of wine with either of them. At Defcon or elsewhere!

All TWiT.tv Shows (MP3)
Hands-On Mac 10: Using FileVault to Secure Your Data

All TWiT.tv Shows (MP3)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video LO)
Hands-On Mac 10: Using FileVault to Secure Your Data

Radio Leo (Video LO)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video HI)
Hands-On Mac 10: Using FileVault to Secure Your Data

Radio Leo (Video HI)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
Radio Leo (Video HD)
Hands-On Mac 10: Using FileVault to Secure Your Data

Radio Leo (Video HD)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video LO)
Hands-On Mac 10: Using FileVault to Secure Your Data

All TWiT.tv Shows (Video LO)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video HI)
Hands-On Mac 10: Using FileVault to Secure Your Data

All TWiT.tv Shows (Video HI)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
All TWiT.tv Shows (Video HD)
Hands-On Mac 10: Using FileVault to Secure Your Data

All TWiT.tv Shows (Video HD)

Play Episode Listen Later May 22, 2020 10:11


Filevault is Apple's proprietary full-disk encryption technology. It uses XTS-AES encryption, the industry-standard used by Microsoft's BitLocker, and the open-source Veracrypt among many others. It's fast, secure, and thanks to hardware support built-into all Macs with the T2 chip, it protects you without impacting efficiency or performance. Filevault is so efficient that it's on by default on all Macs sold today.Why would you want to turn on Filevault on an older Mac? Suppose you lose your Mac. Anyone who has it could bypass your account login and access the disk directly. Which means anything your store on your hard drive would be vulnerable. Modern smartphones are encrypted, so should be the drive on your Mac.Macs shipped with OS X Lion and later offer Filevault 2 - and that's the version we're referring to here. The original version was fairly limited. Filevault 2 is a great choice for all Mac users.When FileVault is enabled the system invites the user to create a master password for the computer. If a user password is forgotten, the master password or recovery key may be used to decrypt the files instead.Launch **System Preferences**.Select **Security & Privacy**.Click the **Lock** icon to enable changes.Read the **WARNING**.Click **Turn On FileVault**.You must make a choice on whether you want to use your iCloud account as a key to unlock your encrypted disk or to create a recovery key. If you plan on having highly sensitive data that you want to ensure that no one but you can get access to, the select to create a recovery key. Otherwise choose to **Allow my iCloud Account to unlock my disk**.If you've chosen to create a recovery key you must **store it in a safe place** not on your hard drive where you'll be able to retrieve it for recovery purposes. Otherwise your data will be unrecoverable.Instead of using FileVault to encrypt a user's home directory, using Disk Utility a user can create an encrypted disk image themselves and store any subset of their home directory in there (for example, ~/Documents/private). This encrypted image behaves similar to a Filevault encrypted home directory but is under the user's maintenance.Users who use FileVault 2 in OS X 10.9 and above can validate their key correctly works after encryption by running sudo fdesetup validaterecovery in Terminal after encryption has finished. The key must be in form xxxx-xxxx-xxxx-xxxx-xxxx-xxxx and will return true if correct.Leo Laporte gives you helpful tips to get the most from your Mac every week on Hands-On Mac Host: Leo Laporte Download or subscribe to this show at https://twit.tv/shows/hands-on-mac Discuss episodes in the TWiT Community. Sponsor: LastPass.com/twit

apple data modern security mac secure privacy lock users documents terminal macbook macs imac icloud t2 encryption mac pro os x twit leo laporte veracrypt filevault os x lion hands on mac twit community mac help macbook help mac how-to macbook how-to imac help imac how-to mac pro help mac pro how-to
The Essential Apple Podcast
S1E175 - Essential Apple Podcast 175: An SSD and a Hackintosh fail

The Essential Apple Podcast

Play Episode Listen Later May 13, 2020 62:30


Recorded 11th May 2020 A full house of guests this week as Suffolk Pete, MacJim, Nick Riley and Mark Chappell join me - other than the new MacBook Pro, we didn't really have much news so we chat about Pete's SSD replacement in his 2014 MacBook Air and Nick's experiment with creating a cheap Hackintosh. GIVEAWAYS & OFFERS Glenn Fleishman's Working From Home book is completely FREE and can be downloaded here Steve at Geeks Corner will be having more giveaways including Luminar 4 and Affinity softwares in the near future. Keep an eye on the site or follow him on Twitter @GeekCorner_uk Why not come and join the Slack community? You can now just click on this Slackroom Link to sign up and join in the chatter! Slacker @MacJim has a family friendly Flickr group for listeners to share photos because the Darkroom channel in the Slack has become so popular - if you're interested head over to to the Essential Apple Flickr and request an invitation. MARK CHAPPELL @oceanspeed on Twitter Puts Essential Apple related stuff on YouTube Co-host of the The Watching Men Podcast with Karl Madden JAMES ORMISTON MacJim in the Slack In charge of the Essential Apple Flickr Also on Flickr as thesrpspaintshop SUFFOLK PETE On the Twitter a occasionally as @hermboy mostly about beer and footie NICK RILEY @spligosh on Twitter very occasionally. Sometimes appears on Bart Busschots' Let's Talk Apple APPLE Updated 13-inch MacBook Pro Dumps Butterfly Keyboard, Doubles Storage – TidBITS SSD REPLACEMENT Suffolk Pete: A few months ago I bought MacBook Air 2014 that ‘broke' when I tried to encrypt the SSD with FileVault. After talking to Mark at Suffolk Macs I decided to replace the ‘blade style' SSD. A little research soon showed that : Apple use a completely proprietary chip in the 2104 model with a non standard pin arrangement. Third party manufacturers have started to make adapters & even chips that mimic the Apple SSD. Plenty of people report problems using these 3rd party chips. I decided to stick with an Apple SSD. my Go-To store for 2nd hand parts is The Bookyard, they even format & install OS X on it for you! I purchased a 256GB recycled module that was pulled from a working MBA and guaranteed for 3 months. This also doubled my storage capacity. I had to buy the tools to take the back off the Air, because though I've taken apart several Macs & have a lot of tools, the Air uses 2.5 mm 5-point Pentalobe screws. Thanks to iFixIt I had a working MBA running 10.14 in about 15 minutes. All in all a good result! HACKINTOSH Technolli.com Technolli on YouTube Hackintosh.com TonyMacx86.com TECHNOLOGY Major Thunderbolt security flaws found, affect Macs shipped 2011-2020 – 9to5 Mac Microsoft's Office apps on iPadOS will reportedly get mouse support by this fall – NeoWin Facebook update crashes TikTok and other rivals – [BBC}(https://www.bbc.co.uk/news/technology-52572381) Square launches Online Checkout to take on PayPal – Venture Beat Newton Mail will be saved by fans after it was saved, and shut down again, by Essential – The Verge SECURITY & PRIVACY North Korean spies are attacking Macs with stealth Trojans – Tom's Guide WORTH A CHIRP / ESSENTIAL TIPS FusionCast is a new macOS app for quickly turning podcast episodes into videos — 9to5 Mac NEMO'S HARDWARE STORE Urbanista just launched the latest entry in its line of sleek earphones, the “London” earbuds with active noise cancelling for an immersive experience. It's got 25 hours of playtime, and comes in a range of four colors like Dark Sapphire Blue and Rose Gold. Each Urbanista product has an urban aesthetic, with models named after metro cities like New York, Athens, and Brisbane. London earbuds give AirPods a run for their money at a more attractive price. It's terrific for travelers, young professionals, and up-and-comers with a stylish vibe. www.urbanista.com London Press Release Essential Apple Recommended Services: Pixel Privacy – a fabulous resource full of excellent articles and advice on how to protect yourself online. Doug.ee Blog for Andy J's security tips. Ghostery – protect yourself from trackers, scripts and ads while browsing. 33mail.com – Never give out your real email address online again. Sudo – get up to 9 “avatars” with email addresses, phone numbers and more to mask your online identity. Free for the first year and priced from $0.99 US / £2.50 UK per month thereafter... You get to keep 2 free avatars though. ProtonMail – end to end encrypted, open source, based in Switzerland. Prices start from FREE... what more can you ask? ProtonVPN – a VPN to go with it perhaps? Prices also starting from nothing! Comparitech DNS Leak Test – simple to use and understand VPN leak test. Fake Name Generator – so much more than names! Create whole identities (for free) with all the information you could ever need. Wire – free for personal use, open source and end to end encryted messenger and VoIP. Pinecast – a fabulous podcast hosting service with costs that start from nothing. Essential Apple is not affiliated with or paid to promote any of these services... We recommend services that we use ourselves and feel are either unique or outstanding in their field, or in some cases are just the best value for money in our opinion. Social Media and Slack You can follow us on: Twitter / Slack / EssentialApple.com / Spotify / Soundcloud / YouTube / Facebook / Pinecast Also a big SHOUT OUT to the members of the Slack room without whom we wouldn't have half the stories we actually do – we thank you all for your contributions and engagement. You can always help us out with a few pennies by using our Amazon Affiliate Link so we get a tiny kickback on anything you buy after using it. If you really like the show that much and would like to make a regular donation then please consider joining our Patreon or using the Pinecast Tips Jar (which accepts one off or regular donations) And a HUGE thank you to the patrons who already do. Support The Essential Apple Podcast by contributing to their Tip Jar: https://tips.pinecast.com/jar/essential-apple-show This podcast is powered by Pinecast.

Not Insecure
#SecurityCulture: Security and Working Remotely

Not Insecure

Play Episode Listen Later Mar 19, 2020 2:34


Welcome to the 11th episode of our Security Culture Campaign! On today’s show Matt Konda discusses remote work and security. We put together a checklist for securing your remote work environment that you can download and use across your teams. The highlights are: Secure your home network. Use WPA2, a complex password and don’t share it with everyone. Phishing is always something to watch for, but expect more of it and for coronavirus related tricks Use 9.9.9.9 as your DNS provider Have a room that closes with storage that locks and keep any company private information locked up Don’t share your computer with your family, relatives or friends Make sure your laptop is encrypted (BitLocker or FileVault for most people) Update your operating system and programs frequently. Favor automatic updates if possible. Use antivirus. Use approved file sharing and communications (eg. Drive and Slack or OneDrive and Teams) Check out the corresponding blog post to learn more. Click here for the associated YouTube video. The Jemurai Security Culture Campaign Series is a stream of topical content released every Thursday intended to help developers think about security in a particular area. The content will be available in associated videos, podcasts and blog posts. Click here to request a topic.

Brad & Will Made a Tech Pod.
20: It's Like a USB Condom

Brad & Will Made a Tech Pod.

Play Episode Listen Later Feb 2, 2020 48:51


Information security is more important than ever these days, so it's time to talk best practices, from two-factor authentication to Yubi keys, password strength, drive encryption, financial security, and more. Don't miss out on free food like we did!

Donau Tech Radio - DTR
DTR196 iMac Upgrade, Smart Home, HP Drucker, Switch Games

Donau Tech Radio - DTR

Play Episode Listen Later Jan 13, 2020 89:08


Nach der Weihnachtspause haben sich naturgemäß bei Tom und André etliche Themen angestaut die in dieser Episode kulminieren. Es geht unter anderem über Andrés iMac und diverse Upgrades davon, Toms Smart Home, die neuen HP Tango Drucker, FileVault unter Mojave wieder zum Laufen zu bringen und diverse Spiele für die Nintendo Switch.

TechByter Worldwide (formerly Technology Corner) with Bill Blinn
TechByter Worldwide 2019-12-22: Is Cryptomator a Solution in Search of a Problem?. Short Circuits. Spare Parts.

TechByter Worldwide (formerly Technology Corner) with Bill Blinn

Play Episode Listen Later Dec 21, 2019 19:52


Mac users have FileVault, Windows users have BitLocker, and all the big cloud-based storage systems encrypt files before storing them, so do we really need another encryption utility? As it turns out, maybe we do. In Short Circuits: Yahoo's Groups service is starting what's likely to be a long slide to oblivion and that reminded me of older services that have met a similar fates -- CompuServe, Prodigy, GEnie, and others. • Also sliding into oblivion: Windows 7. Starting in mid-January, Microsoft will make it crystal clear to users that it's time to upgrade. • Adobe has released a holiday gift for users of its Capture utility. Although both Android and IOS versions receive updates, the IOS version got more this time around. In Spare Parts (only on the website): Beware medical scams that may arrive by email, phone call, or even in-person visits by people who want to steal your information. • Bots that are used to place fake online orders are still more prevalent on desktop computers, but the growing trend points to mobile devices. • Twenty years ago: Remember 56K modems? In 1999 an Oregon company called WorldSpy started offering free dial-up access to the internet. It didn't work out as intended.

EasyApple
#388: Il Crotalo e il Pavone

EasyApple

Play Episode Listen Later Dec 14, 2018 44:42


Si parla delle frequent location di iOS, del FileVault, della Universal Clipboard, di un aggregatore di estensioni per Telegram, di un supporto di ricarica da auto molto ingegnoso, e di quanto sia fenomenale il machine learning dell'HomePod.

EasyApple
#387: X Sette

EasyApple

Play Episode Listen Later Dec 7, 2018 49:56


Si parla di FileVault, degli elementi di login di macOS e dell'iPhone XS di Luca.

Command Control Power: Apple Tech Support & Business Talk

Topics: -After recent hardware announcements from Apple, Jerry, Joe & Sam discuss the Mac mini specifically and where this updated model falls into their client needs. And what about a new iMac? -Sam is excited about the new iPad Pro (he may have purchased one) but Jerry shoots down new product talk -TidBITS Content Network is continually proving its value for the team -Joe has an excellent tip about using affiliate links when doing email marketing like TidBITS -Based on a listener’s feedback in our Slack channel, Sam recommends SetApp, a subscription service for Mac apps -Turning on mark down support in secure notes is now a feature of 1Password. Thanks to Joe’s feedback/rant online? Who knows. -Jerry struggled on-site at a client with an odd Gmail issue with Apple Mail and as it turns out, it was the Keychain. -One of Joe’s client has an issue where their iCloud outgoing emails are going to spam for recipients. He utilized a blacklist tool to see if their IP or domain was on any blacklists. After working hard to diagnose, it turned out to be the fact that the user was using their ISP’s mail server to send messages. -FileVault encryption proved to be more difficult for Jerry and it required running Disk Utility from the Recovery partition -One of Joe’s clients was trying a remote session and found MacHelp Mate!

The Small Business Show
Small Business Systems vs. Goals and Complying with GDPR – Small Business Show 173

The Small Business Show

Play Episode Listen Later May 30, 2018 37:40


small business systems and gdpr compliance       Why are systems more important for your Small Business than goals? Join us today for episode 173 of the Small Business Show to learn more about this awesome technique to accelerate your success. After the systems discussion, we jump into details of the recently enacted GDPR privacy and data management laws enacted by the EU. Does your Small Business need to worry about the GDPR? You'll want to listen in to find out if you do and how to comply. Listen in for all this and more, then join us on the Small Business Support Group to share your thoughts! 00:00:00 Small Business Show #173 for Wednesday, May 30, 2018 00:01:30 Goals vs. Systems 00:07:12 Breakthroughs come from Systems 00:07:58 Treat the carrot as the byproduct 00:12:00 Your business is not THAT business, it's YOUR business 00:13:40 Contact Shannon and Dave: feedback@businessshow.co or Small Business Support Group 00:13:52 The GDPR Talk 00:18:38 The burden of GDPR Xero.com GDPR Small Business Guide 00:21:02 The eventual poster child 00:26:27 Act in Good Faith, Follow the Instructions 00:28:06 Passwords are insufficient FileVault 2 TrueCrypt is dead! Check VeraCrypt or CipherShed 00:30:00 Protecting Customer Data and Privacy 00:32:53 On the internet, we need speed limits, stop signs, and maybe even speed bumps 00:35:58 SBS 173 Outtro

kompot
030 Podróż technologiczna

kompot

Play Episode Listen Later May 5, 2018 49:43


Witamy w trzydziestym odcinku cyklicznego, cotygodniowego (z drobnymi wyjątkami) podkastu pod apetyczną nazwą: kompot! Wyjątkowo wiosenna a momentami wręcz letnia aura, wolna od pracy majówka nastroiły nas na temat podróży. Być może niektórzy z Was wykorzystają ten czas właśnie na zmianę miejsca, zwiedzanie, wyjazd za granicę. Niezależnie od tego gdzie i na jak długo, jeśli zabieramy ze sobą nasze gadżety, technologiczne wspomagacze – warto zadbać o ich bezpieczeństwo oraz o to, by były naprawdę przydatne a nie stanowiły zbędnego balastu. O tym właśnie prawimy przez kilkadziesiąt tłustych minut. A poniżej jak zwykle garść linków do przydatnych informacji oraz aplikacji dla macOS i iOS. Przygotowanie Maca do wyjazdu: Dodawanie plików z folderów Biurko i Dokumenty do usługi iCloud Drive – krytyczne dokumenty dostępne w chmurze jeśli to możliwe Szyfrowanie zawartości Maca przy użyciu funkcji FileVault – włączyć Panel FileVault w preferencjach ochrony i prywatności w oknie Preferencji systemowych Wyświetlanie wygaszacza ekranu na komputerze Mac – żądanie hasła na natychmiast po wygaszaczu, informacja na wygaszaczu z numerem telefonu Panel Zapora sieciowa w preferencjach ochrony i prywatności w oknie Preferencji systemowych – włączyć Sposoby udostępniania swojego ekranu, plików i innych rzeczy innym użytkownikom w sieci lokalnej – zalecamy wyłączyć wszystko Wybieranie preferowanych sieci Wi-Fi – porządki przed i po wyjeździe Zarządzanie programami mogącymi korzystać z usług lokalizacji – nie wyłączać funkcji Znajdź mój Mac Przygotowanie iPhone / iPad do wyjazdu: Konfigurowanie karty medycznej w aplikacji Zdrowie na telefonie iPhone – uzupełnić Sprawdzanie użycia danych sieci komórkowej na telefonie iPhone i iPadzie – wyłączyć aplikacje które nie potrzebują danych lub zużywają zbyt wiele np.: App Store, Mail, Photos, Music, Audible, Audioteka, Netflix Używanie funkcji AirDrop na telefonie iPhone, iPadzie lub iPodzie touch – wyłączyć, ew. zostawić Tylko kontakty Korzystanie z funkcji Alarmowe SOS na telefonie iPhone – wyłączyć funkcję Dzwoń automatycznie Jak tworzyć backup telefonu iPhone, iPada lub iPoda touch – kopia zapasowa w iCloud i/lub w iTunes Przydatne aplikacje dla macOS: Carbon Copy Cloner SuperDuper! MacID TripMode TeamViewer Wybrane aplikacje dla iOS: Navigon Google Maps TeamViewer Parallels Access Revolut Airbnb Kayak Booking.com Going Abroad Yelp Uber Usługi: proXPN Encrypt.me Inne: Jeśli komputer Mac zginie lub zostanie skradziony Śledzenie i znajdowanie zaginionego urządzenia Apple Prepaid Data SIM Card Wiki Nasz podcast znajdziecie w iTunes (link), możecie też dodać do swojego ulubionego czytnika RSS (link) lub przesłuchać bezpośrednio w przeglądarce (link). Zapraszamy do kontaktu na Twitterze: Remek Rychlewski @RZoG. Marek Telecki @mantis30. Natomiast całe przedsięwzięcie firmuje konto @ApplejuicePl. Jesteśmy również dostępni dla Was pod adresem e-mail kompot[at]applejuice.pl

In Reply To
InReplyTo 2018-04-03

In Reply To

Play Episode Listen Later Apr 2, 2018 17:36


De Omnifocus a Filevault Si el título no te ha ahuyentado lo suficiente, bienvenido. Te hablo de la forma en la que organizo proyectos y tareas en Omnifocus, mientras que llega la nueva versión este año y quizá nos facilite la gestión de las tareas a aquellos que nos gusta personalizar el GTD de la manera que nos resulte más cómoda y con sentido. Filevault 2 termina para mi aquí, te cuento el doloroso y poco veloz proceso Recomendaciones: Red Por Momentos Atlanta Monster. Si quieres suscribirte a este podcast este es el Feed. Puedes dejar un comentario en InReplyTo.net. Si quieres apoyar este podcast puedes usar el link de afiliados en Amazon.

Counsel to Counsel - Career Advice for Lawyers
Episode 6-Going Solo With Matt Yospin

Counsel to Counsel - Career Advice for Lawyers

Play Episode Listen Later Apr 1, 2018 43:06


Launching your own law practice can be both exhilarating and terrifying. For lawyers who are accustomed to the structure of a law firm and a steady paycheck, hanging a shingle means saying goodbye to security. Leaving a large firm means that there is no one between you and the client. You need to figure out how to advise your clients without the help of partners who are just down the hall. You also need to develop your own infrastructure. At the same time, leaving a law firm also means having tremendous flexibility and a chance to really build something of your own. But it is not for everyone. In this episode, I am joined by Matt Yospin. Matt is an IP attorney who graduated from law school in 2009 at the end of the Great Recession, not a great time to be starting a legal career. But Matt was one of the lucky ones. While the economy was reeling, he was still able to start practice at one of the top law firms in Boston. He stayed with the firm a little over two years. Eventually, there was not enough work to keep him busy and he was laid off. Since that time, Matt has been building a successful law practice of his own. Matt is a patent and intellectual property attorney who has been in solo practice since 2012. He began his career at the Boston firm Bingham McCutchen (which has since been acquired by Morgan Lewis & Bockius). Prior to law school, he ran his own computer software consulting business. Matt works with businesses, entrepreneurs, non-profits, government agencies and inventors on a range of intellectual property and transactional work. He speaks regularly at bar association events and events for other professional groups, publishes a blog on developments in IP, writes on technology and practice management for others’ blogs, and co-hosts a TV show on issues in the news from a legal perspective. He enjoys working with entrepreneurs and creative people, helping them to build or grow a business, to protect their ideas and inventions with IP and business strategies that make sense for them. He also is on the Boards of two local non-profits. Matt is very effective at marketing and his ability to keep his visibility high in the bar is one of the reasons I invited Matt to be a guest this week. What I mean is that not only does Matt really understand marketing, but his own marketing efforts kept Matt on my radar when I was thinking about a good solo to invite on as a guest. Additional Resources to Help You Build a Solo Practice For practice management and mentoring, find other solos in your area and ask them for help.  Matt Yospin is happy to field your questions.  Find him  at www.yospinlaw.com , 617-340-9295, or email him via his Contact Me form. If you are in Massachusetts and looking for some general support around starting a law practice, try the Massachusetts Law Office Management Assistance Program  (a free resource). Most states have similar organizations. Check with your state bar association or board of bar overseers. In Massachusetts, join the Solo and Small Firm Section of the Boston Bar Association or the Law Practice Management Section of the Massachusetts Bar Association. Most state bar associations have similar committees where you can meet other solos who are happy to share their experience (and possibly referrals). Jared Correia of Red Cave Law Firm Consulting writes and speaks frequently on law practice management and technology. He also does a great podcast called the Legal Toolkit. Jared offers low cost consulting services that are targeted at solo and small firms looking for help with law office technology and general law practice management systems. He is a fountain of knowledge on the full range of issues that you need to consider in going solo. Hanging Your Shingle, offered periodically by Massachusetts Continuing Legal Education, is a great program which you can purchase for replay.  MCLE has also published a book by the same name.  I originally set this program up 20 years ago and happy to see that it is still alive and well. Starting Out Solo is an organization to consider (particularly if you are in Massachusetts). For Information on Law Office Hardware and Law Office Ergonomics consider Matt Yospin's article in Law Technology Today Get a multi-function laser printer, so you can photocopy and scan books. Matt Yospin recommends a dedicated two-sided fast scanner; most attorneys like the Fujitsu ScanSnap line. You can get great scanner software for your phone or tablet, too.  Matt Yospin recommends Readdle’s Scanner Pro. Matt suggests you consider practice management software, to tie together your contacts, calendar, tasks, project flow, and notes.  There are many attorney-specific platforms, or you could make your own system work.  Matt likes Daylite but there are also Clio, Rocket Matter, MyCase, Practice Panther, Smokeball, and too many more to name. Every attorney (and everyone else) should use a password manager.  Matt likes 1Password.  I use LastPass. Matt recommends using some keystroke expansion or macro software (to save a lot of time typing.)  He wrote about this category of software here. Matt uses TextExpander, and there are many others. Local and remote backups, with encryption, are a must.  If you hire someone, be sure they are doing this for you.  If you prefer DIY, consider FileVault and Time Machine (on a Mac), and services like Dropbox, Box, and Boxcryptor (and there are many others).

EasyApple
#335: Bello da tenere in mano

EasyApple

Play Episode Listen Later Nov 10, 2017 49:21


Si parla di quante persone usano Filevault, di quanti iPhone X abbiamo visto in giro, di alcuni bot per telegram, di come cancellare le foto duplicate in Photos, di 1Password 7 e degli Animoji Karaoke.

Fast Talking
190: Encryption and Backup: Aaron Traffas

Fast Talking

Play Episode Listen Later Oct 9, 2017 9:19


Auction professionals spend a lot of time working on their laptops and never know when disaster might strike. In this episode, host Aaron Traffas looks at preventative measures that can save both time and stress when, not if, a computer is broken or stolen. Subscribe on iTunes | Google Play | Stitcher Today’s SponsorsGlobal Auction Guide Episode Linkshttp://www.auctioneertech.com The Fast Talking Podcast is a small business building podcast as seen through the lens of auctioneers and auction professionals. Focusing on social media, marketing strategies, finance, operations, human resources, and time management, we provide focused discussions on important topics weekly. ----- Episode 190: Transcription Hello and welcome to the  Fast Talking Podcast. My name is Aaron Traffas and I'm excited to once again be your guest host for today's episode. We auctioneers store large amounts of important and sensitive information on our laptops. What happens to our work if our computer is broken or, worse, stolen? We'll examine two crucial preventative measures that will save us both time and stress in just a moment after a word from our sponsor. [sponsor] I wrote the article that inspired this episode recently for the Colorado Auctioneers Association quarterly newsletter which, this quarter, is focused on technology. After making sure we're using strong passwords, which was the topic of my last appearance on the Fast Talking Podcast, I feel that backup and encryption are the two next steps auctioneers need to make as we strive to make sure our data is secure and our work is safe.   It was 2007. NAA Conference and Show was in San Diego. My bags were packed in my truck. I swung by the office to grab my computer and other electronics that I'd need for the week in California. As I walked out the door for my two hour drive from Manhattan, Kansas, to the Kansas City airport, I realized I'd forgotten something. I sat my computer bag on the ground next to my pickup's passenger door and went back inside. When I returned, I got in my truck, cranked the wheel to the left and backed out, only to realize that my front tire just rolled over my laptop bag. My computer — and my mood — was crushed. I had unfinished work for upcoming auctions that I'd planned to do on the plane and I had no time before my flight to prep another computer. It made for an interesting and uncomfortable trip. Broken hardware is one thing, but what if I'd lost the computer? What if instead of picking up pieces off the ground, I was instead unsure of where it was? Had it fallen into malicious hands? Were all the accounts that I'd logged in to now at risk of being compromised? It's always better to know a computer is destroyed than to wonder if someone is combing through the data. The scenario is simple — at any time, you can suddenly lose your laptop. In order to make sure that the only cost to you is the value of the hardware, it's crucial that your computer is encrypted and backed up properly. Encryption Computer encryption can get very technical very quickly, but for our purposes it simply means a way of scrambling the data on the computer's hard drive so it can't be read by anyone who doesn't have the password. The password to login to Windows isn't enough, as it's fairly trivial to bypass. The correct solution is called full disk encryption, where everything on the computer is encrypted for everyone who doesn't have the password. For many years, the right answer for encryption was a product called TrueCrypt. It was free software and the encryption was bulletproof. A few years ago, the TrueCrypt project closed down. Luckily it's successor, called VeraCrypt, is also free and based on much of the same code base as TrueCrypt. Since it's open source, third parties have been able to audit the software to make sure there aren't backdoors or other ways for criminals or governments to bypass the encryption. Operating systems have their own versions of encryption. Windows has BitLocker and Apple has FileVault. While I'll always prefer a free and open source solution over one from an operating system provider, these solutions may be a good fit in some situations. Many modern laptops also provide built-in encryption options on the hardware level. Many of these might work as well as VeraCrypt, though there's no way to guarantee there isn't a backdoor. Sometimes, a laptop's password simply prevents the laptop from booting up and doesn't actually encrypt the data. This means someone could simply remove the hard drive and put it in another computer to access your files. Make sure if you're using a built-in password function on your laptop that it's actually encrypting the data. Only by using full disk encryption can you rest assured that if your computer falls into the wrong hands, all your data about your auctions, customers, clients and personal accounts won't be at risk. Entering a password every time you boot your computer is a small price to pay for that peace of mind. Backup Encryption prevents the bad guys from getting your data, but what about losing your work? If you drive over your laptop with the front wheel of a diesel pickup, how do you get your files off of a hard drive that's in pieces on the ground? In addition to the possibility of losing your computer, new viruses called ransomware actually encrypt your files and make you pay a ransom before giving you the key to decrypt them. A good backup solution can mitigate a ransomware infection by allowing you to restore the unencrypted versions of your files. There is a frequently recited rule of backup called 3-2-1. You need three copies of your data, on two different mediums and one needs to be offsite. Simply buying an external hard drive and copying your files there is better than nothing, but it's also grossly insufficient and inefficient. A good backup solution will run continually in the background, copying versions of  your files offsite as you create them, so you don't notice it until you need it. In much the way that TrueCrypt was the best answer for encryption, there was also a best answer for backup called Crashplan. Crashplan allowed users to backup to friends for free. I wrote on my AuctioneerTech blog in 2012 how this was a perfect backup solution that didn't have a monthly fee like most of the backup services. Unfortunately, a few weeks ago, Crashplan  announced that it's discontinuing its free version in October 2018. While I've been hunting for a replacement, it's unlikely that anything will be as simple as Crashplan to use without a monthly fee. There are still myriad subscription backup services. Some of the best known are Carbonite, Backblaze and Mozy, and each has a different pricing plan based on the amount of data to store and how many computers will be using the service. As you shop around for the best  deal, pay attention to the cost to get your data back. In 2011, I lost 2 terabytes of data that was backed up with Mozy. Only then did I learn that they charged $.50 per gigabyte to restore the data, and I had to come up with the $1000 within 30 days before my files were deleted. In the auction business, like any business, time is money. Some backup solution is better than nothing. In my search for a Crashplan replacement, I've found a lot of negative comments about Carbonite and a lot of positive comments about Backblaze, so if I were looking for a simple turn-key subscription backup service, I'd probably start with Backblaze. Wrap-up In summary, disaster happens when we least expect it. We need to take steps now to ensure that when, not if, we lose a computer, it might cost us money to replace the device but it doesn't cost us time to recreate all our work or, worse, cost us sleep worrying about who might have our data and what he or she might be doing with it. And now, here's a word from our sponsor. [sponsor] I'd like to thank Andy for giving me the opportunity to guest host the Fast Talking Podcast this week. The show is built for you, the fast talking nation. We're always looking for suggestions and feedback, so if you have an idea for great topic or guest you think would be a good fit, leave a comment on  fasttalkingpodcast.com or find us @auctionpodcast on Twitter or facebook.com/fasttalkingpodcast. My blog is auctioneertech.com and if you'd like to contact me personally, find me on Twitter @traffas or, better yet, email aaron.traffas@purplewave.com With that, we want to thank you  for gifting us with your time. As always, be sure to like, favorite and share this podcast in whichever venue you choose to listen. We enjoy creating this podcast for you and strive to share this industry we love with more and more people each week. I'm Aaron Traffas. Thanks for listening. Now go sell something.

Björeman // Melin
Avsnitt 93: Då kan man ringa Jeff Minter

Björeman // Melin

Play Episode Listen Later Sep 9, 2017 58:27


Har du tips på svenska pixelkonstnärer eller till och med fina pixelkonstverk som kunde pryda Datormagazin retros omslag? Hör av er! 00: Skype kan man tydligen lita på 01:36: Datormagazin retro är i produktion 05:36: Mystiska “vänner” och Linkedin 16:43: Grattis Karl Emil Nikka! 18:27: Hindenburg-uppföljning 22:13: Kryddad entreprenör, lantchips och karate 24:23: Oracle sparkar folk, ZFS-snack 40:08: Polybius 42:16: Är Dropbox en resursigel? Ja. 47:30: Legos senaste underverk 49:47: Commodore 128-nytt 50:38: Mild spoiler: Nästa vecka demonterar Jocke Twin Peaks 53:08: En liten Apple-idé Länkar Discord - sköter sig sådär för oss när vi vill spela in Datormagazin retro Karl Emil Nikka slutar på Kjell & company Hindenburg Förra veckans Kodsnack, handlade också om frilansjobb Podcast chapters Audacity LUFS Lantchips med grillsmak Oracle dödar Sun-hårdvara, med mera SPARC ZFS Solaris Labor day Openzfs Opensolaris Björn Hesthamar openzfsonosx.org WAFL Macpro om ZFS BTRFS Filevault (2) Polybius Less than - Nine inch nails-låten Owncloud Legos senaste monstermästerverk: Millennium falcon The americans Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-93-da-kan-man-ringa-jeff-minter.html.

Infinitum
Filter sedeminpedeset

Infinitum

Play Episode Listen Later May 23, 2017 99:06


Ep-57 Infinitum FU Apple Services > Netflix + AWS BG GEEK podcast Sal Soghoian i drugari prave Cmd-D konferenciju Vesti Apple najavio fond of 1 milijarde dolara za US investicije i Corning je dobio prvih 200M odatle U prodaji je Amazon Echo Show. Bilo zanimljivih reakcija ;) Wired objavio sjajan tekst o Apple Parku Brent Simmons i Manton Reece objavili JSON feed spec Realni život ⌘I radi u Terminalu Kako vratiti podatke sa FileVault drivea ako ste zaboravili password i recovery key? Nikako. Appleov programa zamene starih MBP-ova zbog problema sa grafikom je završen Silicon Valley ne pravi samo pametne tostere Apple ulaže velike pare u razvoj zdravstvenih pomagala i Tim Cook je viđen kako testira jedan od njih Monday Note o značaju takvog pomagala Alek pomenuo da koristi City Mapper za snalaženje po gradovima u inostranstvu, kao i Trafi Domaćica Novosti iz NBS Macola u akciji: Apple u Srbiji Hashtag na Tviteru Alekov post od prošle godine MTS Optika za privatne korisnike Kako je lako biti hakovan Nekih par sati je bio aktuelan opasan Google Docs bug: Ars Technica sa degenskim naslovom Rešeno vrlo, vrlo brzo Handbrake mirror site provaljen Steven Frank, jedan od ko-osnivača Panic-a, na nesreću skinuo fajl odatle i source code njihovih aplikacija je ukraden 150 haknutih zemalja kasnije… Zanimljivosti MacPaw muzej Zahvalnice Snimljeno 23.05.2017. Uvodna muzika by Vladimir Tošić, stari sajt je ovde. Logotip by Aleksandra Ilić. Artwork epizode Harmony of the spheres (2017) by Saša Montiljo, njegov kutak na Devianartu.

Life on the Swingset - The Swinging & Polyamory Podcast
SS 273: Cybersecurity for our Naughty Bits, aka: Bring on 2017

Life on the Swingset - The Swinging & Polyamory Podcast

Play Episode Listen Later Jan 14, 2017 73:16


We've been overdue for for a rapprochement with one of our favorite past topics: Privacy and Security in Swinging & Polyamory.The team of Mister Pent and Dylan Thomas put together information about securing yourself on the internet that a panel also including Dr. Liz Powell, Mike Joseph, and Cooper S. Beckett could discuss, digest, and put into action. In the age of our ability to connect anywhere and anytime, share information easily, and be as open as we want to be, it's important we arm ourselves with the knowledge  necessary to make good decisions about what we put online and the information required to raise our level of computer and internet security. As you listen, don’t forget to tweet at #sspodcast and feel free to ask questions of @MisterPent and @DylanTheThomas! We’re sponsored by Castle Megastore, a one stop shop with everything you could want, from wand vibrators, to harnesses, to lube and condoms, to a complete suite of BDSM equipment including sex furniture. If you use the promo code SWINGSET at check out you can save 20% on your order.   While we are definitely going to put together ebook / guide on cybersecurity for perverts, we wanted to list some of the resources we discussed during the podcast here: On Two-Factor Authentication When enabled, two-factor authentication (or 2FA) can surface as a "we don't recognize this device" message sent to an email address or a mobile phone number, or it can refer to an installed mobile app or a physical security token. You can find a list of websites that support 2FA here: https://twofactorauth.org/ In the meantime if you have a Google account, or have logins on sites like Dropbox, Lastpass, or Microsoft, go grab the Google Authenticator app. If you're a steam gamer, grab the Steam app and enable Steam Guard. On Passwords Securityinabox.org has a lot of great contnet with tools and tactics for digital security, they have a particularly good guide on creating, maintaining, remembering, and recording secure passwords, including with a password manager. XKCD's comic on Password Security that we love: On Password Managers and Sharing Passwords: Mister Pent, Cooper S. Beckett, and Dylan Thomas use Lastpass. Lastpass allows you to have a single set of passwords securely accessible over multiple devices and over the web, while setting up two factor authentication to limit access. It includes web browser extensions to automatically log you into sites and an Android app that does the same, depending on desired level of ease of use. It also allows you to share sets of passwords secureiy and simply with other people. Dylan Thomas also uses mSecure synchronized to a Dropbox account. mSecure has mobile and computer apps. It's not as nice or feature filled as Lastpass, but it's a little extra hassle for a lot of extra security for the most sensitive of passwords. If you need to share a temporary password with someone you can use OneTimeSecret. You create an a self-destructing link that disappears once it's accessed or once a certain amount of time passes. On using VPNs: You can't always trust the access to the internet you have, whether it's because you're in an airport on free airport wireless or a coffee shop or because you're travelling. Sometimes you may just want to tune into BBC Radio 5 using their iPlayer and you happen to not live in the Commonwealth. VPNs can keep your traffic secure when you can't trust your connection, with the added benefit of giving you choice on what country your traffic exits so you can use region specific resources. Dylan Thomas uses BlackVPN. Mister Pent and Cooper S. Beckett use Private Internet Access. Both can support simultaneous connections to cover multiple devices at once, and both allow multiple country exit points  It has guides for usage on Windows, OS X, Linux, Android and iOS. On Encrypting your Devices using Passwords or Biometric Authentication: If you don't use a password, pin code, or thumbprint on your mobile devices, set one up! Modern Android and iOS based phones will automatically encrypt your device or give you the option to once you've set a password. While a six digit pin code or better is best, anything is better than nothing. Just Do It. On Encrypting your Computer with Full Disk Encryption! If you have a maching running a Pro version of Windows, use Bitlocker. Windows 7 ||| Windows 10 If you are running any other version of Windows, use Veracrypt. Securityinabox.org has a great guide on using Veracrypt to encrypt an external drive or your entire computer. If you're running MacOS, Backblaze (the Cloud Storage company) has a comprehensive FileVault usage guide, though Apple's isn't so bad. If you're running Linux you probably don't need our assistance. *grin* On Backing up your data & Encryption in the Cloud: One of the biggest risks to your data is physical failure or destruction of your devices. While services like Google Drive, iCloud, Dropbox and Box give us places to put our files in a pretty secure way, information stored on those services can be accessed and recovered by the services themselves in case of an investigation or subpoena. We recommend Backblaze as they encrypt data at rest and support two factor authentication. On Communicating Securely: We recommend using Signal Private Messenger, which includes iOS and Android apps and a Chrome extension and supports private messaging and calling. Whatsapp supports end-to-end encryption. With Facebook Messenger you can enable secret conversations. We suggest never sending sensitive information over email. On Social Media: Check out SecurityInABox.org's guide to security and privacy on social networking sites. On Browsing Secureiy: Drive-by malware downloads and poisoned ad networks, or shady looking porn sites, can mean you may pick something up while browsing the internet, often through no fault of your own. Most of us use both Google Chrome and Mozilla Firefox to browse the web, each for different sets of accounts (Multiple Google Accounts!) and with different sets of extensions installed to help protect ourselves. Mister Pent prefers Ghostery. Dylan Thomas uses Adblock Plus with Google Chrome, and NoScript on Mozilla Firefox. For ultimate browsing privacy, the Tor Browser is a good option.   Leave us a review and a five star rating on iTunes! Leave us a review and a five star rating on Stitcher! Subscribe to us on Youtube! Android Users: Download and review our Android App! Leave us a comment on this post or at contact@lifeontheswingset.com or leave us a voicemail at 573-55-SWING (573-557-9464). Find Cooper on Twitter @CooperSBeckett, Dylan on Twitter @DylanTheThomas, and Ginger on twitter @GingerNTheProf. You can Cooper’s novel about swinging, A Life Less Monogamous, at alifelessmonogamous.com or his memoir My Life on the Swingset: Adventures in Swinging & Polyamory at mylifeontheswingset.com as an ebook, paperback, or audiobook and if you buy them from his sites, use promo code SWINGSET to save 10%! Our 2017 LOTS THEME comes courtesy of Vlad Lucan and his track: Reverse! Intro Music: Pegboard Nerds - Talk About It f/ Desirée Dawson, off the new Nerds By Nature EP Outtakes Music: Tokyo Machine - PIXEL Outro Music: nanobii - Chipland   Cooper S Beckett Dylan Thomas Dr. Liz Powell Mike Joseph Chris Pent

/dev/hell
Episode 86: Necromantic Spies and Imagined Corporate Friends

/dev/hell

Play Episode Listen Later Jan 10, 2017


YOUR 2016 PHP PODCAST OF THE YEAR from simpleprogrammer.com Welcome to the very first episode of 2017! We’re back after a nice break for the holidays and ready to get back to being insightful and unfiltered. In this episode we talked about the concept of “programming as craft” with Chris and Ed having a great discussion about what should follow after the phrase “programmers need to learn empathy.” Ed also released some music, and is donating all the proceeds to OSMI. Chris was sad that he did not get the opportunity to re-record the vocal tracks from some of Ed’s older material in his own signature vocal style. Chris also talked (not so briefly) about the new laptop he bought and the security measures he decided to take with it. Do these things! Check out our sponsors WonderNetwork, Grumpy Learning and Open Sourcing Mental Illness Buy stickers at devhell.info/shop Follow us on Twitter here Rate us on iTunes here Listen Download now (MP3) Links and Notes Kent Beck’s tweet about programmers and empathy Ed recommended a book on non-violent communication Ed’s music stylings as Dead Agent Chris bought a Satechi Slim Type-C Multi-Port Adapter and one of the Apple USB-A-to-C adapters for his YubiKey Can Single User Mode get around FileVault? Prey can help protect your laptop if it gets stolen Chris blogged about his new laptop and setup Both Ed and Chris have had great success with recommendations provided by The Wirecutter

Mac Geek Gab (Enhanced AAC)
MGG 566: Mechanizing The Exorcism

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Aug 16, 2015


Bluetooth tips and solutions, FileVault 2 usage strategies, shared iCloud Safari security concerns, Photos woes and AirDrop advice. All of this and more in this week's show! Sponsor: Lynda.com is the place to learn software, creative, and business skills from in-depth and easy-to-follow video tutorials taught by industry experts. And […]

Infinitum
Skakuće par puta i...nestane

Infinitum

Play Episode Listen Later Mar 25, 2015 99:44


Followup Ovog puta smo imali samo jedan followup od našeg stalnog dopisnika iz Windows sveta, Slobe Ljubišića, o prvom satu koju bi se mogao nazvati "pametnim" Vesti Šuška se po Tviteru i drugim društvenim mrežama i portalima da će Apple konačno najaviti unapređeni AppleTV i SDK za AppleTV, pa smo i nas dvojica rekli šta mislimo o tome 05.04.2015. od 11 časova ćemo u Domu omladine u Beogradu uveličati proslavu desete godišnjice srpske Apple korisničke grupe javnim snimanjem jedne epizode. Glavni deo epizode Particije i file sistemi (13:30) Vrste particionih šema (MBR, Apple Partition Map, GUID) Vrste volume formata (Mac OS Extended, Journaled, Case sensitive) i zašto ne treba koristiti Case sensitive file sistem Šta ako imamo eksterni disk koji hoćemo istovremeno da koristimo i na Macu i na PC-u? Šta je CoreStorage i zašto je bitan? Od Mac OS X 10.5 (Leopard) Disk Utility radi dinamičko reparticionisanje, ako je izvodljivo Razlozi ZA i PROTIV particioniranja Negde tokom ovog dela epizode smo pomenuli kako se HOME folder pomera na drugu particiju ili na drugi disk. Detaljna analiza problema aktuelnih fajl sistema: Hypercritical Ep.56 Belt and Suspenders Rešavanje problema u fajl sistemu (48:30) Prvo ustanoviti da li uopšte imamo problem sa fajl sistemom, tj. da nije možda reč o hardverskom problemu sa diskom (DriveDX je aplikacija koja može da proveri SMART status na eksternim USB ili Firewire diskovima) Ako nemamo hardverski problem, onda u Disk Utility ako nije reč o sistemskom disku Ako moramo da proverimo šta nije u redu sa sistemskim diskom, onda moramo da podignemo računar sa Recovery particije ili drugog diska ako nemamo Recovery particiju. Ako nemamo ni jedno ni drugo, a imamo drugi Macintosh i Firewire ili Thunderbolt kabl na raspolaganju, možemo računar koji ima problem da pokrenemo u tzv, Target modu: svi njegovi diskovi postaju "eksterni" diskove računara u koji smo ubacili drugi kraj kabla Šta sve mogu da uradim kada računar podignem sa Recovery particije (58:40) resetpassword Disk Utility reinstalacija sistema postavim/isključim firmware password Internet Recovery Šta je Internet Recovery? Koje su mašine podržane? Kada će da se traži AppleID a kada ne kod reinstalacije FileVault (01:07:20) FileVault omogućava enkripciju podataka na disku na nivou samog diska. Takozvani "legacy" FileVault je enkriptovao sadržaj home foldera, ko ga koristi što pre preći na FileVault 2. Ukoliko ne postoji Recovery particija, ne može se koristiti File Vault. Permissions (01:16:40) Šta je POSIX, a šta su ACL-ovi? "Razbiti" mit o repair permissions, tj. objasniti šta on tačno radi (01:24:30) Default permissions za HOME folder se "popravljaju" iz resetpassword u Terminalu kada se podigne sa recovery particije (01:27:00) Kreiranje instalacione particije/USB sticka (01:29:25) U Mavericksu i Yosemiteu koristimo createinstallmedia UNIX tool, za ranije operativne sisteme koristimo opciju "restore" u Disk Utility aplikaciji. Create bootable OS X drive from the Installer app Ovo je primer, podeljen u nove redove da se lakše vidi šta je šta, inače sve treba pisati u istoj liniji: sudo /Applications/Install OS X Yosemite.app/Contents/Resources/createinstallmedia --volume /Volumes/Untitled --applicationpath /Applications/Install OS X Yosemite.app --nointeraction Create bootable OS X drive using InstallESD.dmg and Disk Utility Zahvalnice Snimljeno 23.03.2015. uz veliku pomoć Velikog Maga zvučnih majstorija Ognjena Tomića, i ovog puta ne u studiju Visoke škole elektrotehnike i računarstva strukovnih studija , već u učionici Crossover Apple Training Centra. Uvodna muzika by Vladimir Tošić. Logotip by Aleksandra Ilić. Artwork epizode by Saša Montiljo, Pukotine, 2001.

Mac Power Users
Mac Power Users 240: MPU Live: Auto-Magically, with Kenny G

Mac Power Users

Play Episode Listen Later Feb 10, 2015 99:50


David and Katie talk with Bonni Stachowiak, a professor at Vanguard University about providing better feedback, they also follow-up with listener comments about financial management apps, clarify FileVault, share their thoughts on antivirus, discuss upgrading your Mac with an SSD and share listener tips and tricks. Thanks to MPU listener Hay Oborn for assistance with the shownotes this week!

Mac Power Users
Mac Power Users 218: MPU Live: A Festival of Skeuomorphism

Mac Power Users

Play Episode Listen Later Oct 8, 2014 95:19


We're joined by Luke Soules of iFixit to talk about iPhone 6 repairability and follow-up on our own experiences with the iPhone and iOS 8. We also discuss security concerns and FileVault, review listener feedback and workflows in education and review tips on a variety of topics including uses for TextExpander, automated filing services, travel. Thanks to MPU listener Hay Oborn for assistance with the shownotes this week!

NotesIn9
NotesIn9 150: Announcing fileVault for XPages

NotesIn9

Play Episode Listen Later Aug 1, 2014 23:51


This is a different show today.  I'm going to be speaking at MWLug at the end of August.  In this show I'm going to do a little demo of what I intended to present at MWLug.  I'm not going to tell you HOW to do it yet, you'll need to come to see that.  Or wait for it to hit a future NotesIn9. In addition to the commercial, I've taken a small clip from my show 100 (which ran WAY too long).  In this clip I give suggestions on how to get more involved in the XPages community and why you might want to.  At the end I refute any excuses that you might have.   Hope you like the show.        

Mac Geek Gab (Enhanced AAC)
MGG 508: Lightning Cable Longevity, Gmail Replacements & More

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Jun 30, 2014


Dave's considering leaving Gmail and he and John discuss options. They also talk about Lightning cable longevity and what to do to protect yours (hint: have extras when you travel!). Then it's on to answering your questions and sharing your tips. Topics include enabling FileVault on all your drives, changing […]

JAMF Software Podcast
Understand FileVault 2 and Manage Disk Encryption with the Casper Suite

JAMF Software Podcast

Play Episode Listen Later Dec 7, 2013 62:32


Build and Analyze
106: Outlasted The Daily

Build and Analyze

Play Episode Listen Later Dec 3, 2012 86:00


Dan and Marco discuss the Mac Pro's relevance, the effects of RAM and FileVault on performance, the App Store Volume Purchase discount, how well Instapaper for Android is doing, why The Daily failed, deciding whether articles belong on blogs or in The Magazine, and how to collaborate with a designer when you don't agree with all of their choices.

Ni Tan Fanboys Podcast
Podcast #040

Ni Tan Fanboys Podcast

Play Episode Listen Later Jun 3, 2012 82:18


En este nuevo podcast en conjunto con Monky, comentamos acerca del fallo en FileVault, los rumores de la WWDC 2012, los rumores del iPhone 5, los rumores del iPad Mini y los rumores del iTV. Además comentamos de los recientes cambios de iPhone de Monky y MrAnderson. También hablamos acerca de las Apple Store y de cómo hay menos tiendas de las que supuestamente están planificadas. En la sección iOS Apps les comentamos acerca de LogosQuiz, Comic Zeal, Comic Zeal Mini, Hello Vino, Active Voice y Gears. En la sección Mac Apps les comentamos acerca de CleanMyMac y Swiss Arrows. En la sección Cydia Apps les comentamos acerca del untethered jailbreak para iOS 5.1.1 llamado Absinthe.

Ni Tan Fanboys Podcast
Podcast #040

Ni Tan Fanboys Podcast

Play Episode Listen Later Jun 3, 2012 82:18


En este nuevo podcast en conjunto con Monky, comentamos acerca del fallo en FileVault, los rumores de la WWDC 2012, los rumores del iPhone 5, los rumores del iPad Mini y los rumores del iTV. Además comentamos de los recientes cambios de iPhone de Monky y MrAnderson. También hablamos acerca de las Apple Store y de cómo hay menos tiendas de las que supuestamente están planificadas. En la sección iOS Apps les comentamos acerca de LogosQuiz, Comic Zeal, Comic Zeal Mini, Hello Vino, Active Voice y Gears. En la sección Mac Apps les comentamos acerca de CleanMyMac y Swiss Arrows. En la sección Cydia Apps les comentamos acerca del untethered jailbreak para iOS 5.1.1 llamado Absinthe.

Mac Geek Gab (Enhanced AAC)
MGG 374: Cool Stuff Found at CES, Questions Answered & More

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Jan 11, 2012


Dave's out at CES and he talks about the cool stuff found on the show floor (and elsewhere!) there. Then he and John are off to the races, answering your questions about controlling a Mac with your iPad or iPhone, manually decrypting a FileVault 2 partition, troubleshooting a slowing Handbrake, […]

Mac Geek Gab (Enhanced AAC)
MGG 362: Backups, Processors, Migration & Syncing

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Nov 7, 2011


Dave and John are back in action, all systems go! Today they cover your questions on backups, FileVault, iCloud, Migration and more. Download today, listen, participate, and enjoy! Sponsor: PDFpen from Smile: Effortlessly edit your PDFs. Add text, images and signatures, combine and split PDFs, reorder and remove PDF pages, […]

Macinme Daily
Macinme Daily #29

Macinme Daily

Play Episode Listen Later Feb 22, 2008 8:03


Was wäre das Leben ohne ständige neue Sicherheitslücken? Ganz bestimmt sicherer, aber auch um einiges langweiliger. Daher haben sich einige schlaue Köpfe an die gängigen Verschlüsselungsverfahren für Festplatten wie zum Beispiel FileVault herangemacht und man stelle sich vor, dass diese tatsächlich knackbar sind. Moment, war das nicht so, dass man mit genügend Zeit und Hirnschmalz alles knacken kann? Sogar ein Stück kryptischer als FileVault sind die Apple-typischen Release-Meldungen, dieses Mal für ein iTunes-Update. Auch Microsoft verschleiert und möchte seinen Namen lediglich mit halbwichtigen Kram in den Nachrichten auf der ganzen Welt sehen. Wenigstens benutzen einige AllBookmarks und haben dort Webseiten jenseits von Gut und Böse gespeichert, die sie von dem Weltmarktführer - zumindest für eine gewisse Zeit - ablenken. Macinme Daily #29 Download

Geek Muse
Geek Muse - Episode 23

Geek Muse

Play Episode Listen Later Jan 31, 2006 51:31


Geek Muse Frappr Map, Newsvine invites, Play-Doh fools Fingerprint systems, BIOS Rootkits, Extensible Firmware Interface (EFI), The IT Crowd, Full Drive Encryption, SafeBoot, Pointsec, PGP, SecurStar, CompuSec, WinMagic, Linux Disk Encryption, Folder and File Encryption, TrueCrypt, Cypherix, AxCrypt, FileVault, Mac OSX sparse secure image, Knox, Linux Encryption links, OpenSolaris xlofi, "The Contest": Dual Boot XP/OSX on a MacBook Pro, Geek Muse 10K contest