Take Control of iOS & iPadOS Privacy and Security, 4th Edition


Book Description

Master networking, privacy, and security for iOS and iPadOS! Version 4.2, updated January 29, 2024 Ensuring that your iPhone or iPad’s data remains secure and in your control and that your private data remains private isn’t a battle—if you know what boxes to check and how to configure iOS and iPadOS to your advantage. Take Control of iOS & iPadOS Privacy and Security takes you into the intricacies of Apple’s choices when it comes to networking, data sharing, and encryption—and protecting your personal safety. Substantially updated to cover dozens of changes and new features in iOS 17 and iPadOS 17! Your iPhone and iPad have become the center of your digital identity, and it’s easy to lose track of all the ways in which Apple and other parties access your data legitimately—or without your full knowledge and consent. While Apple nearly always errs on the side of disclosure and permission, many other firms don’t. This book comprehensively explains how to configure iOS 17, iPadOS 17, and iCloud-based services to best protect your privacy with messaging, email, browsing, and much more. The book also shows you how to ensure your devices and data are secure from intrusion from attackers of all types. You’ll get practical strategies and configuration advice to protect yourself against psychological and physical threats, including restrictions on your freedom and safety. For instance, you can now screen images that may contain nude images, while Apple has further enhanced Lockdown Mode to block potential attacks by governments, including your own. Take Control of iOS & iPadOS Privacy and Security covers how to configure the hundreds of privacy and data sharing settings Apple offers in iOS and iPadOS, and which it mediates for third-party apps. Safari now has umpteen different strategies built in by Apple to protect your web surfing habits, personal data, and identity, and new features in Safari, Mail, and Messages that block tracking of your movement across sites, actions on ads, and even when you open and view an email message. In addition to privacy and security, this book also teaches you everything you need to know about networking, whether you’re using 3G, 4G LTE, or 5G cellular, Wi-Fi or Bluetooth, or combinations of all of them; as well as about AirDrop, AirPlay, Airplane Mode, Personal Hotspot, and tethering. You’ll learn how to: • Twiddle 5G settings to ensure the best network speeds on your iPhone or iPad. • Master the options for a Personal Hotspot for yourself and in a Family Sharing group. • Set up a device securely from the moment you power up a new or newly restored iPhone or iPad. • Manage Apple’s built-in second factor verification code generator for extra-secure website and app logins. • Create groups of passwords and passkeys you can share securely with other iPhone, iPad, and Mac users. • Decide whether Advanced Data Protection in iCloud, an enhanced encryption option that makes nearly all your iCloud data impossible for even Apple to view, makes sense for you. • Use passkeys, a high-security but easy-to-use website login system with industry-wide support. • Block unknown (and unwanted) callers, iMessage senders, and phone calls, now including FaceTime. • Protect your email by using Hide My Email, a iCloud+ tool to generate an address Apple manages and relays messages through for you—now including email used with Apple Pay transactions. • Use Safari’s blocking techniques and how to review websites’ attempts to track you, including the latest improvements in iOS 17 and iPadOS 17. • Use Communication Safety, a way to alert your children about sensitive images—but now also a tool to keep unsolicited and unwanted images of private parts from appearing on your devices. • Understand why Apple might ask for your iPhone, iPad, or Mac password when you log in on a new device using two-factor authentication. • Keep yourself safe when en route to a destination by creating a Check In partner who will be alerted if you don’t reach your intended end point or don’t respond within a period of time. • Dig into Private Browsing’s several new features in iOS 17/iPadOS 17, designed to let you leave no trace of your identity or actions behind, while protecting your iPhone or iPad from prying eyes, too. • Manage data usage across two phone SIMs (or eSIMS) at home and while traveling. • Use a hardware encryption key to strongly protect your Apple ID account. • Share a Wi-Fi password with nearby contacts and via a QR Code. • Differentiate between encrypted data sessions and end-to-end encryption. • Stream music and video to other devices with AirPlay 2. • Use iCloud+’s Private Relay, a privacy-protecting browsing service that keeps your habits and locations from prying marketing eyes. • Deter brute-force cracking by relying on an Accessories timeout for devices physically being plugged in that use USB and other standards. • Configure Bluetooth devices. • Enjoy enhanced AirDrop options that let you tap two iPhones to transfer files and continue file transfers over the internet when you move out of range. • Protect Apple ID account and iCloud data from unwanted access at a regular level and via the new Safety Check, designed to let you review or sever digital connections with people you know who may wish you harm.




Take Control of Your Passwords, 4th Edition


Book Description

Overcome password frustration with Joe Kissell's expert advice! Version 4.1.1, updated March 21, 2024 Password overload has driven many of us to take dangerous shortcuts. If you think ZombieCat12 is a secure password, that you can safely reuse a password, or that no one would try to steal your password, think again! Overcome password frustration with expert advice from Joe Kissell! Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet’s favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes nine different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can’t help. New in the Fourth Edition is complete coverage of passkeys, which offer a way to log in without passwords and are rapidly gaining popularity—but also come with a new set of challenges and complications. The book also now says more about passcodes for mobile devices. An appendix shows you how to help a friend or relative set up a reasonable password strategy if they're unable or unwilling to follow the recommended security steps, and an extended explanation of password entropy is provided for those who want to consider the math behind passwords. This book shows you exactly why: • 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. • You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. • It is not safe to use the same password everywhere, even if it’s a great password. • A password is not immune to automated cracking because there’s a delay between login attempts. • Even if you’re an ordinary person without valuable data, your account may still be hacked, causing you problems. • You cannot manually devise “random” passwords that will defeat potential attackers. • Just because a password doesn’t appear in a dictionary, that does not necessarily mean that it’s adequate. • It is not a smart idea to change your passwords every month. • Truthfully answering security questions like “What is your mother’s maiden name?” does not keep your data more secure. • Adding a character to a 10-character password does not make it 10% stronger. • Easy-to-remember passwords like “correct horse battery staple” will not solve all your password problems. • All password managers are not pretty much the same. • Passkeys are beginning to make inroads, and may one day replace most—but not all!—of your passwords. • Your passwords will not be safest if you never write them down and keep them only in your head. But don’t worry, the book also teaches you a straightforward strategy for handling your passwords that will keep your data safe without driving you batty.




Firewalls Don't Stop Dragons


Book Description

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You’ll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don’t really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves—step by step, without judgment, and with as little jargon as possible.




Learn AppleScript


Book Description

AppleScript is an English-like, easy-to-understand scripting language built into every Mac. AppleScript can automate hundreds of AppleScript-able applications, performing tasks both large and small, complex and simple. Learn AppleScript: The Comprehensive Guide to Scripting and Automation on Mac OS X, Third Edition has been completely updated for Mac OS X Snow Leopard. It's all here, with an emphasis on practical information that will help you solve any automation problem—from the most mundane repetitive tasks to highly integrated workflows of complex systems. Friendly enough for beginners, detailed enough for advanced AppleScripters Includes major contributions from expert AppleScripters: Emmanuel Levy, Harald Monihart, Ian Piper, Shane Stanley, Barry Wainwright, Craig Williams, and foreword by AppleScript inventor, William Cook




IPhone Manual for Beginners


Book Description

The iPhone Manual for Beginners is the complete guide to using the iPhone. This book was made with the beginner in mind, and is great for seniors and first-time iPhone users.The book is suitable for the following iPhone models: 8, 8 Plus, 7, 7 Plus, 6s, 6s Plus, 6, 6 Plus, 5s, 5c, and SE.




Ready Player Two


Book Description

#1 NEW YORK TIMES BESTSELLER • The thrilling sequel to the beloved worldwide bestseller Ready Player One, the near-future adventure that inspired the blockbuster Steven Spielberg film. NAMED ONE OF THE BEST BOOKS OF THE YEAR BY THE WASHINGTON POST • “The game is on again. . . . A great mix of exciting fantasy and threatening fact.”—The Wall Street Journal AN UNEXPECTED QUEST. TWO WORLDS AT STAKE. ARE YOU READY? Days after winning OASIS founder James Halliday’s contest, Wade Watts makes a discovery that changes everything. Hidden within Halliday’s vaults, waiting for his heir to find, lies a technological advancement that will once again change the world and make the OASIS a thousand times more wondrous—and addictive—than even Wade dreamed possible. With it comes a new riddle, and a new quest—a last Easter egg from Halliday, hinting at a mysterious prize. And an unexpected, impossibly powerful, and dangerous new rival awaits, one who’ll kill millions to get what he wants. Wade’s life and the future of the OASIS are again at stake, but this time the fate of humanity also hangs in the balance. Lovingly nostalgic and wildly original as only Ernest Cline could conceive it, Ready Player Two takes us on another imaginative, fun, action-packed adventure through his beloved virtual universe, and jolts us thrillingly into the future once again.




Take Control of DEVONthink 3


Book Description

With the information-management app DEVONthink 3 , you no longer have to swim in a sea of web bookmarks, email receipts, RSS feeds, scanned memos, and downloaded bank statements. DEVONthink stores your digital documents and clippings, helps you scan and store paper documents, and serves as home base for organizing and viewing all your information. But mastering all that power can take effort, and this book-created in partnership with DEVONtechnologies-has the real-world advice you need to understand how DEVONthink can bring order to your information. You'll also learn how to extend your DEVONthink experience beyond your main Mac with detailed coverage of the many ways you can sync DEVONthink databases to other Macs and to iOS devices using the DEVONthink To Go iOS app. After covering essential DEVONthink vocabulary and concepts, including the completely reworked user interface of DEVONthink 3, Joe helps you start using DEVONthink effectively. You'll learn how to: Decide how many databases you need and set them up Determine whether to input or index data Configure where incoming data will go Import data from many different apps Import data from a scanner, including OCR options Use grouping and tagging to organize data Add and work with DEVONthink 3's expanded metadata capabilities Use simple (and sophisticated) techniques for searching Create smart groups that automatically gather newly imported data Use smart rules and AppleScript to automate countless activities within DEVONthink Create documents in plain text, HTML, Markdown, and more Edit documents in DEVONthink (or externally) Find the best way to sync DEVONthink data with other devices Work with reminders, smart templates, and other sophisticated tools Convert documents between formats Effectively use the DEVONthink To Go iOS app Share DEVONthink documents with other people Export documents from DEVONthink Back up and maintain healthy databases Questions answered in the book include: What is DEVONthink good for, and what should be left to other apps? What kinds of data can I import? (Short answer: Nearly everything!) How can I display my data in a way that works well for me? When I import documents from different sources, where do they end up, and why? Is it better to sort imported documents right away, or leave them for later? Should I group my data, tag it, or both? What are duplicates and replicants, and how can I tell them apart? Which types of data can be created or edited within DEV...




Take Control of Securing Your Apple Devices


Book Description

Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. Glenn Fleishman guides you through protecting yourself from phishing, email, and other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more.n The digital world is riddled with danger, even as Apple has done a fairly remarkable job at keeping our Macs, iPhones, and iPads safe. But the best security strategy is staying abreast of past risks and anticipating future ones. This book gives you all the insight and directions you need to ensure your Apple devices and their data are safe. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! Also get the rundown on Lockdown Mode to deter direct network and phishing attacks, passkeys and hardware secure keys for the highest level of security for Apple Account and website logins, and Mac-specific features such as encrypted startup volumes and FileVault’s login protection process. Security and privacy are tightly related, and this book helps you understand how macOS, iOS, and iPadOS have increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here’s what this book has to offer: • Master the privacy settings on your Mac, iPhone, and iPad • Calculate your level of risk and your tolerance for it • Use Apple’s Stolen Device Protection feature for iPhone that deflects thieves who extract your passcode through coercion or misdirection. • Learn why you’re asked to give permission for apps to access folders and personal data on your Mac • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the past few years • Prepare against a failure or error that might lock you out of your device • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection for Mac, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys




Take Control of IOS 13 and IPadOS 13


Book Description

Learn how to make the most of Apple's mobile operating systems! The latest annual update to iOS features the usual selection of new features, improved user interface, and security enhancements. It also marks the split of Apple's mobile operating system into iOS (for iPhone and iPod touch) and iPadOS (for iPad only). This is more than just a name change; with iPadOS 13, the iPad gets huge improvements that bring it much closer to the computing power and flexibility we expect from conventional computers. TidBITS Managing Editor Josh Centers is back to guide you through all the major capabilities of both operating systems in this new book. Take Control of iOS 13 and iPadOS 13 goes far beyond the new features, providing an extensive guide to getting the most out of iOS 13 and iPadOS 13. Among other things, you'll learn how to: New! Discover all the major changes in iOS and iPadOS New! Use activity views (which replace Share sheets and are for more than just sharing) New! Enable Dark Mode on your mobile device Updated! Use the new Find My app New! Make the most of improved text editing tools Updated! Use Siri and Shortcuts to do even more than before, thanks to significantly expanded capabilities New! Use accessibility improvements, including voice control and mouse support Updated! Discover the new (and existing) capabilities of Apple's upgraded apps--including Files, Mail, Maps, Messages, Notes, and Reminders Updated! Use Screen Time to make better choices about when and how you use your device New! Work with the updated iPad Home screen, Dock, and onscreen keyboard New! Learn about the new iPad multitasking capabilities, including more ways to split the screen, use multiple windows, and drag & drop between apps New! Browse the web with ease using the desktop-class Safari for iPadOS New! Use the significantly updated Camera and Photos apps to take photos and videos, apply camera effects, and organize your media Make sense of the Lock screen, Home screen, and Control Center--and customize them to meet your needs Search with Spotlight Switch between apps and use Handoff to transfer your work Navigate the App Store Understand the ins and outs of Family Sharing Manage your data--both locally on your device and in the cloud Make calls and use FaceTime and Voicemail Organize your Wallet and use Apple Pay Protect your privacy Improve your battery life ... and much more! Anyone with a compatible iPhone, iPad, or iPod touch will benefit from Josh's in-depth ...