Switching to the Mac


Book Description

Demonstrates how to become adjusted to the Macintosh operating system and how to transfer data from a Windows system to a Macintosh, discussing topics such as moving files and Macintosh equivalents to Windows-only programs.




OS X Yosemite


Book Description

Demonstrates the OS X 10.10 Yosemite operating system's basic features, including Internet access, file management, configuring the desktop, networking, installing peripherals, file sharing, and working with applications.













The Whole Damn Deal


Book Description

Robert S. Strauss was for many decades the quintessential Democratic power broker. Born to a poor Jewish family in West Texas, he founded the law firm that became Akin, Gump, Strauss, Hauer & Feld, and -- while forever changing the nature of the Washington law firm -- worked as chairman of the Democratic National Committee, special trade representative, ambassador to the Soviet Union and then Russia, and an advisor to presidents. As former first lady Barbara Bush wrote of Strauss in her memoir: "He is absolutely the most amazing politician. He is everybody's friend and, if he chooses, could sell you the paper off your own wall." But it isn't the positions Strauss held that make his story fascinating; it is what he represented about the culture of Washington in his day. He was a master of the art of knowing everyone who mattered and getting things done. Based on exclusive access to Strauss, The Whole Damn Deal brings to life a vanished epoch of working behind the scenes, political deal making, and successful bipartisanship in Washington.










Take Control of Securing Your Apple Devices


Book Description

Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. Glenn Fleishman guides you through protecting yourself from phishing, email, and other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more.n The digital world is riddled with danger, even as Apple has done a fairly remarkable job at keeping our Macs, iPhones, and iPads safe. But the best security strategy is staying abreast of past risks and anticipating future ones. This book gives you all the insight and directions you need to ensure your Apple devices and their data are safe. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! Also get the rundown on Lockdown Mode to deter direct network and phishing attacks, passkeys and hardware secure keys for the highest level of security for Apple Account and website logins, and Mac-specific features such as encrypted startup volumes and FileVault’s login protection process. Security and privacy are tightly related, and this book helps you understand how macOS, iOS, and iPadOS have increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here’s what this book has to offer: • Master the privacy settings on your Mac, iPhone, and iPad • Calculate your level of risk and your tolerance for it • Use Apple’s Stolen Device Protection feature for iPhone that deflects thieves who extract your passcode through coercion or misdirection. • Learn why you’re asked to give permission for apps to access folders and personal data on your Mac • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the past few years • Prepare against a failure or error that might lock you out of your device • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection for Mac, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys




Take Control of the Mac Command Line with Terminal, 3rd Edition


Book Description

Learn how to unleash your inner Unix geek! Version 3.3, updated February 12, 2024 This book introduces you to the Mac’s command line environment, teaching you how to use the Terminal utility to accomplish useful, interesting tasks that are either difficult or impossible to do in the graphical interface.n If you've ever thought you should learn to use the Unix command line that underlies macOS, or felt at sea when typing commands into Terminal, Joe Kissell is here to help! With this book, you'll become comfortable working on the Mac's command line, starting with the fundamentals and adding more advanced topics as your knowledge increases. Now includes complete coverage of Monterey, Big Sur, Catalina, and zsh! Joe includes 67 real-life "recipes" for tasks that are best done from the command line, as well as directions for working with permissions, carrying out grep-based searches, creating shell scripts, and installing Unix software. The book begins by teaching you these core concepts: • The differences among Unix, a command line, a shell, and Terminal • Exactly how commands, arguments, and flags work • The basics of Terminal's interface and how to customize it Next, it's on to the command line, where you'll learn: • How to navigate your Mac's directory structure • Basic file management: creating, copying, moving, renaming, opening, viewing, and deleting files • Creating symbolic links • The types of command-line programs • How to start and stop a command-line program • How to edit a text file in nano • How to customize your prompt and other shell defaults • The importance of your PATH and how to change it, if you need to • How to get help (Joe goes way beyond telling you to read the man pages) You'll extend your skills as you discover how to: • Create basic shell scripts to automate repetitive tasks. • Make shell scripts that have variables, user input, conditional statements, loops, and math. • See which programs are running and what system resources they're consuming. • Quit programs that refuse to quit normally. • Enable the command line to interact with the Finder. • Control another Mac via its command line with ssh. • Understand and change an item's permissions, owner, and group. • Run commands as the root user using sudo. • Handle output with pipe (|) or redirect (> or <). • Use grep to search for text patterns in files and filter output. • Install new command-line software from scratch or with a package manager. • Use handy shortcuts in the Terminal app itself and in zsh. Questions answered include: • What changed on the command line in recent versions of macOS? • What are the differences between the zsh shell and the bash shell? • Which shell am I using, and how can I change my default shell? • How do I quickly figure out the path to an item on my Mac? • How can I customize my Terminal window so I can see man pages behind it? • How can I make a shortcut to avoid retyping the same long command? • Is there a trick for entering a long path quickly? • What should I say when someone asks if I know how to use vi? • How do I change my prompt to suit my mood or needs? • What is Command Line Tools for Xcode? • When it comes to package managers, which one should I use? Finally, to help you put it all together, the book showcases 67 real-world "recipes" that combine commands to perform useful tasks, such as listing users who've logged in recently, manipulating graphics, using a separate FileVault password, creating and editing user accounts, figuring out why a disk won't eject, copying the source code of a webpage, determining which apps have open connections to the internet, flushing the DNS cache, finding out why a Mac won't sleep, sending an SMS message, and deleting stubborn items from the Trash.