Each of my two teenage daughters has her own MacBook, and they would like to lock their computer screens to prevent their machines from being used without their permission by other kids at school (and each other). Is there some software I can purchase to make this happen?
The web was built to be open, with people freely sharing and accessing information. However, many employers and schools block access to certain websites to preserve the productivity of their employees and students. Your boss still insists that those reports be finished before you share pictures of last nights exploits on Facebook. What a party pooper.
Sometimes legitimate websites that you actually need to get your work done are blocked, or maybe you're on break you'd like to check your Twitter feed. For those times, you may want to consider setting up and using a Tor network. A Tor network is a network of proxy servers that can reroute your Mac's Internet traffic, bypassing any filters that your company or school may have set up.
If you happened to open up your subscription to The Daily after installing iOS 4.3 on Wednesday and got a prompt to enter your iTunes password again, you’ve stumbled across a new security measure in iOS 4.3 that Apple has put in place to help squelch accidental purchases.
Typically, Apple sets the design trend for the computer industry. For years they've done this, laying out some design principle that gets snatched up by nearly everyone else, in a way that makes the industry prettier. Since we're all so use to that direction of inspiration, it seems surprising for Apple to be influenced by others, and it's especially surprising to see them influenced by their largest competitor in the mobile market.
Earlier today, a story appeared on PocketGamer.biz alleging that Apple had scolded Capcom over last week's $1400 smurfberry scandal. The report was based on comments from an anonymous source who said that Apple was upset by the recent flurry of return requests due to children accidentally buying expensive virtual items in the online Capcom game Smurfs' Village, and "had strong words" with Capcom over the issue. The report also said this controversy had prompted Apple to reconsider their iTunes log-in policies. However, when we spoke to representatives at Capcom, they said Apple never talked to them at all about this situation.
Though it's been available to Google Apps customers for a few months, two-step verification hasn't been accessible by regular Gmail users. That changes today, as Google has begun rolling it out to all Gmail users.
Most of us who use a computer on a regular basis have had the unsettling experience of seeing online ads that fit our shopping and browsing habits follow us around the internet. By closely tracking our site visits, online purchases and web searches, search engines providers and advertisers are able to build up a made-to-fit portfolio of what might be appealing, and then inundate us with the propaganda for those findings no matter where we roam online. This might be unsettling for some.
Fortunately, it's easier than you might think to pull the blinds down on these digital peeping toms. Let Mac|Life show you how to turn your browser's privacy options up to eleven.
With more and more Enterprise level users taking an interest in what iOS mobile devices can do for their business, Apple has invested heavily in the acquisition of security-minded managers in recent years to ease the paranoid minds of corporate security types when it comes to buying Apple-branded smartphones and tablets for their workforce. The latest edition to Apple's stable of security specialists is rumored to be David Rice, a former Naval Intelligence officer and author of the book Geekonomics.
If you've been begging your business' IT overlords to upgrade your old Blackberry beater to some new iPhone hotness, you might soon get your wish, as Apple has sorted out a method for enterprise iOS users to create customizeable App Store filters.