How to Secure Your Mac | Mac|Life

When you first set up your Mac, the only security measure that’s enforced is that you add a password to your user account. The Setup Assistant makes no mention of extra measures you might want to enable, even though several are built into OS X. The features we’re about to look at are defenses against local attacks, rather than protection against online attacks. The measures are particularly important if you work in an open environment, such as a library, an office, or a café, and if your Mac is stolen, because they help to keep your data under lock and key.

via How to Secure Your Mac | Mac|Life.

10 Things Most Exceptional CIOs Never Do | Richie Etwaru

The list below is from over two decades of observations in first, second and third person. Before publishing I asked over 50 Fortune 1000 CIOs and CTOs to review and comment; their feedback is included.

At the core of everything below is going against the grain and the herd, and embracing counter intuition. Whether you embrace counter intuition systematically, or selectively, most of the items below are suggesting in their cognitive DNA counter-intuitive thinking.

via 10 Things Most Exceptional CIOs Never Do | Richie Etwaru.

10 iPhone speed hacks: great ways to be more efficient on your handset | News | TechRadar

Apples iPhone is designed to be efficient, the minimal operating system mostly getting out of your way and providing fast access to content.However, various settings and shortcuts can speed things up even further, resulting in a more usable and streamlined iPhone experience.

via 10 iPhone speed hacks: great ways to be more efficient on your handset | News | TechRadar.

Five settings every privacy-conscious iPhone owner should change | TUAW: Apple news, reviews and how-tos since 2004

The iPhone is a useful tool to manage your work and play, but it isn’t perfect when it comes to privacy. There are a handful of settings that privacy-conscious owners should change if they want to keep their data as safe as possible from prying eyes.

via Five settings every privacy-conscious iPhone owner should change | TUAW: Apple news, reviews and how-tos since 2004.

Numerics: A customizable business dashboard app for iOS | TUAW: Apple news, reviews and how-tos since 2004

I’ve been playing with this lately and confirm it seems to work pretty well (although I have only used Google Analytics so far.

Simon

Numerics: A customizable business dashboard app for iOS | TUAW: Apple news, reviews and how-tos since 2004.

 

 

Download Original Iphone iOS Firmwares | Tech ArrivalTech Arrival

Below you can find the direct links to the download original iphone iOS Firmwares Files for every released firmware version. Please note that if you use Safari you must disable the auto unzip feature. It may be easier to just use Firefox!

via Download Original Iphone iOS Firmwares | Tech ArrivalTech Arrival.

Creative use of Gmail addresses can help you tame your inbox | TUAW: Apple news, reviews and how-tos since 2004

Gmail supports a nifty email feature that you can use to take control your inbox. The trick takes less than a minute to implement and can save you hours in organization.

As noted by Gizmodo, you can add a modifier, such as a period or a “+” sign, to the first half gmail address and gmail will process the mail just like your regular email address. For example, email messages sent to john.smith@gmail.com will handled just like messages sent to johnsmith@gmail.com. You can put the modifier at any point before the @ sign.

The power in this technique comes from Gmail’s filtering options that allow you to sort emails based on the email address that is being used for the message. For example, you can use john.smith@gmail.com for all of your newsletters. When an email is sent to the john.smith@gmail.com address, you can configure a filter to forward it to specific folder, delete it or more

via Creative use of Gmail addresses can help you tame your inbox | TUAW: Apple news, reviews and how-tos since 2004.

The history of Android | Ars Technica

The history of Android | Ars Technica.

How to install Yosemite on a USB 3.0 flash drive | Apple news, reviews and how-tos since 2004

How to install Yosemite on a USB 3.0 flash drive | Apple news, reviews and how-tos since 2004.

How to use the OS X character viewer – CNET

The keyboard offers a number of common characters for the language layout you have chosen, especially when you use modifier keys such as Shift, Command, and Option to invoke alternative character sets; however, while those that are mapped to various keys are common, they are only a minor subset of the characters that are available for you to use when composing documents.

via How to use the OS X character viewer – CNET.