𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Take Control of Security for Mac Users

✍ Scribed by Kissell, Joe


Publisher
TidBITS Publishing
Year
2015
Tongue
English
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Prevent -- or recover from -- illicit access to your Mac and its data. Do credit card fraud, hacking, identity theft, and online shopping and banking risks concern you? How about the dangers of malware, phishing, and Wi-Fi sniffing when you use your Mac? You are not alone -- these dangers top the lists of security concerns in many surveys. But you needn't unplug to stay secure, no more than you should barricade yourself in your home to keep from being mugged. Instead, you can take common sense precautions to reduce the risks and avoid the harm that could befall you, your Mac, and your data. Take Control of Security for Mac Users is a calm, friendly look at the topic, designed to help you determine your risk level (from 1-4) and provide sensible recommendations for increasing your security without causing undue inconvenience. In particular, you'll find help with: Determining your risk level (from 1-4) Implementing essential quick security fixes Identifying and avoiding phishing attempts Controlling access to your Mac via a firewall Managing local access to your data with sensible user accounts Sharing Mac resources like screens and files safely Securing your home network and working securely on someone else's network Protecting your Mac's data from snoops and thieves with FileVault Sharing/transferring encrypted files Keeping your iCloud data (such as email and photos!) safe Preventing data theft with encrypted disk images, files, and folders Deleting data securely to prevent unexpected leaks Deciding whether to use anti-malware software Improving passwords to block unauthorized access Perhaps most important, you'll also find advice about what to do if something bad happens, with suggestions about how to recover from data loss, a malware or phishing attack, a network intrusion, or identity theft.

✦ Subjects


Computer security;COMPUTERS / Internet / Security;COMPUTERS / Networking / Security;COMPUTERS / Security / General;Hackers;;Mac OS


πŸ“œ SIMILAR VOLUMES


Take Control of Securing Your Mac, 2nd E
✍ Glenn Fleishman πŸ“‚ Library πŸ“… 2023 πŸ› alt concepts 🌐 English

Keep your Mac safe from intruders, malware, and more! Version 2.3, updated May 11, 2023 Securing your Mac requires an attention to detail, but not a degree in computer science. This book provides everything you need to know to reduce your risk dramatically of intrusion, hijacking, and data extractio

Take Control of Home Security Cameras
✍ Glenn Fleishman πŸ“‚ Library πŸ“… 2020 πŸ› Take Control Books 🌐 English

In Take Control of Home Security Cameras, networking and security expert Glenn Fleishman shows you how to make smart choices about buying and configuring cameras that take into account technical details, video quality, system integration, your own privacy and that of others, and internet security.

Take Control of Home Security Cameras
✍ Glenn Fleishman πŸ“‚ Library πŸ“… 2023 πŸ› alt concepts 🌐 English

Make your home safer! Version 1.4.1, updated April 28, 2023 Are you thinking about installing a home security cameraβ€”or several? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. Or do you own an existing system

Take Control of Home Security Cameras
✍ Glenn Fleishman πŸ“‚ Library πŸ“… 2023 πŸ› alt concepts 🌐 English

Make your home safer! Version 1.4.1, updated April 28, 2023 Are you thinking about installing a home security cameraβ€”or several? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. Or do you own an existing system