How to Enable the Root User on a Mac
Matt Cone January 9, 2021
The most advanced tasks demand the most powerful user account of them all: the root user. When you log in as root, you have read and write privileges to every file on your Mac. This awesome power lets you override any account or permission restriction, but be careful! You could really mess things up if you don’t know what you’re doing. Warning: The root account is disabled by default. To prevent accidents, you should only enable and utilize the root account when you absolutely need it.
Enabling Firmware Password Protection on Your Mac
Matt Cone January 16, 2013
Firmware password protection can help safeguard your Mac and the data stored on it. With this feature enabled, users are prevented from booting from another startup disk or entering single-user mode — a command-line interface that can be accessed at startup. Firmware password protection is especially effective in enterprise or educational environments where administrators can secure the physical hardware but cannot be present to prevent tampering by employees or students. For example, unauthorized users can’t start the computer from a USB emergency drive when firmware password protection is enabled.
How to Remotely Lock Your iPad
Matt Cone June 5, 2012
You already know that you can password protect your iPad. But if you have enabled Find My iPad, you can also remotely set a password to lock your iPad. (The iPad must be turned on and connected to a cellular or wireless network.) This can be useful when you’ve misplaced your iPad and need to prevent others from accessing your private information. Of course, this feature also has other potential applications.
How to Password Protect Your iPad
Matt Cone May 2, 2012
Did you know that you can enable password protection and hardware encryption on your iPad? It’s an easy and effective way to protect your private data from prying eyes. After you enable password protection, users will have to enter a password to unlock the iPad or access certain iOS system settings, as shown below. There are a couple different reasons why you would want to do this. If you’re the only person who uses the iPad, you’ll want to keep your email messages, Safari history and bookmarks, and app settings safe and secure when you leave your iPad at home or in the office.
How to Monitor Your Mac's Firewall Logs
Matt Cone December 27, 2011
If you’re reading this article, you probably know that Mac OS X has a built-in firewall that should be turned on at all times. But how do you know that the firewall working, and how do you find out what’s happening behind the scenes? To check, you need to access your Mac’s firewall log - a file that contains a record of every event the firewall has processed. Here’s how to monitor your Mac’s firewall logs:
How to Hide Your AirPort Extreme Network
Matt Cone December 26, 2011
Own an AirPort Extreme Base Station? Congratulations! You have one of the most secure network devices in the industry. The AirPort Extreme’s WPA2 Personal and WPA2 Enterprise encryption options are the best available. But there’s another powerful security feature that you’ll want to enable on AirPort Extreme: The ability to “hide” the wireless network so that users can’t see it in wireless menu. (In technical terms, this is known as disabling or hiding the AirPort Extreme SSID.
How to Set File Permissions in Mac OS X
Matt Cone December 23, 2011
Mac OS X uses permissions to restrict access to applications, files, and folders. Utilizing this security control can help protect your data from unauthorized access. Whether you use your Mac in public places or share it with other users, you may want to change the permissions on your documents to ensure the confidentiality and integrity of your data. Of course, it can be difficult to strike a balance between convenience and security when using permissions.
How to Configure Your Mac's Firewall
Matt Cone December 17, 2011
Every Mac ships with a built-in firewall - a service that can be configured to disallow information from entering your Mac. But what is a firewall, and why do you need to use it on your Mac? Firewall Crash Course Every time you request information from the Internet, such as a web page or email message, your Mac sends data packets to request the information. Servers receive the packets, and then send other packets back to your Mac.
How to Password Protect Your Mac
Matt Cone December 13, 2011
Your computer contains personal documents, photos, email messages, and even a log of your Internet activities. Password protecting your Mac keeps this private information safe and allows you to control who accesses your computer. You should follow these steps whether you you work primarily from work, home, or a cafe. No one should ever have unauthorized access to your Mac! Here’s how to password protect your Mac: Disable automatic login to ensure that only authorized users can use the computer.
How to Disable Automatic Login
Matt Cone December 12, 2011
When you set up your Mac for the first time, you create an administrator account that automatically logs in when you turn on your computer - a convenient feature that poses a major security risk if you regularly use your Mac in public, or if other people use your computer. For maximum security, you’ll want to disable automatic login, even if you’re the only person who uses your Mac. From the Apple menu, select System Preferences.