Track your stuff, find your friends, and safely share your location Version 3.0, updated September 20, 2024 Take Control of Find My and AirTags takes you inside Apple’s Find My ecosystem, a robust, privacy-protecting way to track your things, share your location (and see others’ with their permission), and aid in recovery lost and stolen devices. Find My lets you and someone else arrange to meet and see your live, updated ETA; figure out where you left your iPad (was it on a flight?!), and know that your bicycle remains firmly in place where you locked it.n Find My lost the “iPhone” moniker long ago, as the app and system of location tracking hardware, software, and infrastructure became “Find My Everything.” The current ecosystem encompasses people, Apple devices (iPhone, iPad, Mac, and Apple Watch), Apple and Beats audio hardware, and low-power, long-life trackers. Apps can be used in iOS, iPadOS, macOS, and watchOS, and on iCloud.com. Take Control of Find My and AirTags takes you through the many parts of Find My so you can configure and refine how you and your stuff is tracked and shared. The book looks at three different kinds of tracking: • People: Learn how to share your location safely, follow others who let you, and send and receive notifications about arrivals and departures. (Also, prevent being tracked when you don’t want to be.) • Devices: See the whereabouts of your and Family Sharing group members’ devices and audio hardware. Get to know the ins and outs of enabling Find My and taking remote actions, from playing a sound to wiping your data from a device. • Items: Find out how AirTags make use of the crowdsourced network of other people’s Apple devices to help you find a lost or forgotten purse, backpack, or even car, and about third-party devices licensing the technology from Apple. Learn how to share your items with up to five other people. Also get to know the dangers of people using Find My tech for stalking. The book explains how to identify the risk, deter unwanted tracking from happening, block it if you find it—and report it to law enforcement or get other help. This edition includes detailed information about the Apple and Google industry initiative for Android, iOS, and iPadOS that lets Android, iPhone, and iPad users get notified about unknown trackers on either Apple or Google’s tracking systems that are traveling with them. The book also digs into how Family Sharing interacts with personal and device location sharing and finding, and how to help other people find their lost stuff if they don’t have one of their own Apple devices handy. The book focuses on the latest Apple operating systems: iOS 18/iPadOS 18, macOS 15 Sequoia, and watchOS 11. However, it looks back as far as iOS 16/iPadOS 16 and macOS 14 Monterey for nearly every feature—and sometimes back even years before those releases—so you can best use your mix of Apple devices of all vintages. Here’s more of what you can find in this book: • Start sharing AirTags and other items with up to five other people. • Find out the difference between device-based Find My tracking and the Find My network. • Figure out if your Apple or Beats audio hardware can be tracked just over Bluetooth nearby or via the Find My Network. • Lost a single earbud? Apple may have you covered by playing a sound out of it or providing nearly pinpoint tracking. • Experience the joy of playing a sound over the internet or nearby to help find a missing device or item. • See the place in Apple’s ecosystem for third-party Find My tracking from nearly a dozen companies that make bike, bag, and general stuff trackers, some with extra alarms. • Spot Google and Apple trackers following you that aren’t yours and aren’t shared Apple Find My items. • Control and monitor the way you let others track your whereabouts. • Get to know presence, the way you define which of your devices indicates where you are to other people. • Learn about the capability to track an iPhone or iPad even after it’s been erased! • See how Messages simplifies and improves location sharing and maps. • Dig into Apple’s efforts to prevent Find My from being used for stalking and unwanted tracking, including audio alerts and other behavior. • Discover buried controls for configuring exactly how Find My updates your device’s location, including when power runs low. • Develop an understanding of your Apple Watch’s three distinct Find My to use them effectively on the go. • Understand Activation Lock, which protects devices from being reused even if someone has erased them, and Find My Lock, which keeps Find My items from being reset and taken over. • Help family members find lost and stolen gear through Find My’s Family Sharing support.
Connect and Secure Your iPhone and iPad (for iOS 13 and iPadOS 13) covers a huge range of common setup and routine usage issues, with illustrated step-by-step instructions for carrying out these tasks. The book offers insight into what information you may unintentionally expose about yourself, and how Apple prevents third parties from gaining access to your details. It also walks you through security scenarios from securing your data in transit to connecting to a secure Wi-Fi network to recovering or erasing a lost phone. Learn about using the new Find Me feature, set up a VPN, install anti-tracking Safari extensions, and more. Covers Wi-Fi, Bluetooth, AirDrop, AirPlay, Content-Blocking Safari Extensions, Find My, Personal Hotspot, and two-factor authentication with Apple ID.
Leverage your smartphone and smartwatch for improved personal safety! Version 1.0, updated July 30, 2024 The digital and “real” worlds can both be scary places. The smartphone (and often smartwatch) you already carry with you can help reduce risks, deter theft, and mitigate violence. This book teaches you to secure your hardware, block abuse, automatically call emergency services, connect with others to ensure you arrive where and when you intended, detect stalking by compact trackers, and keep your ecosystem accounts from Apple, Google, and Microsoft secure.n You don’t have to be reminded of the virtual and physical risks you face every day. Some of us are targeted more than others. Modern digital features built into mobile operating systems (and some computer operating systems) can help reduce our anxiety by putting more power in our hands to deter, deflect, block, and respond to abuse, threats, and emergencies. Keep Safe Using Mobile Tech looks at both digital threats, like online abuse and account hijacking, and ones in the physical world, like being stalked through Bluetooth trackers, facing domestic violence, or being in a car crash. The book principally covers the iPhone, Apple Watch, and Android devices, but doesn’t ignore Wear OS watches, the iPad, and computers running macOS or Windows. This book explores many techniques to help: • Learn how to harden your Apple ID/Apple Account, Google Account, and Microsoft Account beyond just a password or a text-message token. • Discover blocking tools in operating systems and third-party apps that can prevent abusive, fraudulent, and phishing messages and calls from reaching you. • Block seeing unwanted sensitive images on your iPhone, iPad, Mac, or Apple Watch—and help your kids receive advice on how not to send them. • Turn on tracking on your devices, and use it to recover or erase stolen hardware. • Keep your cloud-archived messages from leaking to attackers. • Lock down your devices to keep thieves and other personal invaders from accessing them. • Prepare for emergencies by setting up medical information on your mobile devices. • Let a supported smartphone or smartwatch recognize when you’re in a car crash or have taken a hard fall and call emergency services for you (and text your emergency contacts) if you can’t respond. • Keep track of heart anomalies through smartwatch alerts and tests. • Tell others where or when you expect to check in with them again, and let your smartphone alert them if you don’t. • Deter stalking from tiny Bluetooth trackers. • Protect your devices and accounts against access from domestic assailants. • Block thieves who steal your phone—potentially threatening you or attacking you in person—from gaining access to the rest of your digital life.
Register, configure, and manage your domain names like a pro! Having your own domain name - like takecontrolbooks.com - is fun for individuals and essential for organizations, but the details of managing a domain name can be perplexing. Networking expert Glenn Fleishman demystifies the jargon and tells you everything you need to know, beginning with how domain names work behind the scenes. He then explains the best ways to decide upon and find an available domain name, register it, configure it with a DNS host, and use it for your Web site and email address. Additional sections cover using dynamic DNS; special problems and troubleshooting; explain how to change your registrar, DNS host, Web host, or email host; and offer tips for buying or selling a registered domain name. Read this book to find answers to questions such as: What can I do with a domain name? How do I learn what domain names are available? What features does a good registrar offer? What is DNS and what should I do about it? I hate my registrar. How can I switch to a new one? What should I look for in a Web- or email-hosting service? How can I run a Web server if my ISP gives me a dynamic IP address? How do I set up an email service at my domain for family members without running my own mail server? Help! My Web site is dead and I'm not getting email. What should I do?
Master Apple's video, audio, and text messaging tools! Version 3.0, updated October 15, 2024 Dig into FaceTime, Messages, and Phone from the basics through the most advanced and interesting features available, including screen sharing, group calls, and sending rich messages in Take Control of FaceTime and Messages. This comprehensive book will answer every question and reveal useful features you never knew existed.n FaceTime, Messages, and Phone form the core of video, texting, and calling tools for Apple devices. In this book, Glenn Fleishman lays out your options to best understand, use, and customize these apps. Start by mastering (or reviewing) the basics of each app, then move into group calls and texts, using rich media, maintaining your privacy, and adding whimsy to conversations. Covers iOS, iPadOS, macOS, tvOS, and watchOS. The book covers all three apps (and the many ways in which they interact) extensively, showing you: • What's new in the FaceTime, Messages, and Phone apps (updated for macOS Sequoia 15.1, iOS 18.1, iPadOS 18.1, watchOS 11.1, and tvOS 18.1) • How to master the basics of the FaceTime, Messages, and Phone apps • Essential settings and preferences for these apps • Ways to share your screen (or let someone share theirs with you) in both FaceTime and Messages, and when to use which • How to have fun and get creative with Message Effects, Camera Effects, stickers, and hashtag images • How Apple secures live audio, video, and texting • Strategies and tools to identify and block unwanted phone calls and messages • How to use Apple Intelligence features in the Messages and Phone apps You’ll learn about FaceTime capabilities such as: • How to use FaceTime for audio or video calls with one person or a group of up to 32 people • Why you might want to use a FaceTime Link, and how it can extend FaceTime to Windows and Android users • How to work with audio input and output devices in FaceTime • How to use enhanced audio (Mic Mode) and video (Portrait Mode) effects in FaceTime calls on supported devices • How to place and receive FaceTime calls on an Apple TV using Continuity Camera • How to use SharePlay, which lets parties carry on a FaceTime conversation while enjoying synchronized video, audio, or screen sharing • How to use gestures to create animated video effects • How to replace your background in video calls Find out things you never knew about Messages, including: • Why some conversations in Messages use iMessage (blue bubbles for individuals, gray bubbles for businesses) while others use SMS/MMS/RCS (green bubbles), and the differences between them • All about advanced Messages features, such as nested replies and person-to-person Apple Pay • Why Messages isn’t just for text, but also for audio messages, Digital Touch effects, animations, and more • How to use satellite features to send and receive iMessages when you're outside cellular range • Simple ways to create events and reminders from Messages conversations • What to do when group chats get out of control—managing notifications, using mentions, and understanding the differences between SMS and MMS chats • How to view transcriptions of audio messages Make better use of the Phone app: • How to make phone calls (including emergency calls) from your iPhone, iPad, Mac, or Apple Watch • What the “verified” label on incoming phone calls means • How to use Live Voicemail to see the message a caller is leaving in real time
It can be a concierge, camera, flashlight, game console, magazine, photo editor, panorama maker, note taker, travel planner, radio, bookstore, night-sky guide, GPS, music player, music maker, and plenty more...if only you could figure out which of the 250,000 (and counting) apps to put on your iPhone or iPad or iPod touch. Author Glenn Fleishman set out to discover how to use your device to find a movie, read a book, retrieve a distant file, make a phone call, play a strategy game—to accomplish a host of useful, and sometimes completely unuseful, tasks. Glenn sifted through and road tested thousands of apps to find the nearly 200 programs that fit his criteria for interesting, entertaining, useful—and essential—five-star apps. His clear-eyed selections will surprise and charm you and help you complete tasks, have fun, be creative, and learn something. Want to read a book or PDF or follow your Twitter, RSS , or Facebook feeds? You’ll find the perfect app for the job. Ready to find the best action, word, and strategy games—so good, you may never put down your iPhone? We know the ones. Yearning for Thai food in an unfamiliar neighborhood or looking to reserve a table at a local restaurant? This book points you to the perfect apps. Need to track the delivery status of a package or turn your device into a barcode reader? Start reading and start scanning. Want to watch a movie—either from the studios or of your own creation? Glenn can direct you to the perfect app. Plus essential apps that will stream music, make you more productive, keep track of files, and much, much more.
Manage your schedule more effectively using Calendar and Reminders! Version 5.0, updated November 16, 2023 Learn how to unlock the full potential of Apple’s Calendar and Reminders! This book helps you get the most out of these two apps, showing you how to customize them, sync data across devices, and share meeting invitations and reminder lists. You’ll also learn how to use Siri as a shortcut and how to fix common problems.n In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple’s Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends. This book was originally written by veteran Mac journalist and editor Scholle McFarland, and the fifth edition was revised by Glenn Fleishman, with complete coverage of macOS 14 Sonoma, macOS 13 Ventura, iOS 17/iPadOS 17, iOS 16/iPadOS 16, and watchOS 10 (and considerably more information about using these apps on an iPhone or iPad than in previous editions). Scholle and Glenn guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that Calendar lets you set an alert that factors in public transportation schedules and time to get to your starting point, so you can leave early enough to catch the train, bus, tram, or ferry you need—and any connections—and arrive at your event on time? Or that Reminders can prompt you to do something not only at a certain time, but also once you’ve reached a specific destination, like the grocery store? If you’ve never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you’ve already been using Calendar and Reminders, you’ll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities. Learn how to get the best out of Calendar and Reminders, including how to: • Customize Calendar to your liking, from setting time zones, to color coding specific calendars • Create events, making them repeat at regular intervals or on certain dates • Set up notifications and alerts, so you never miss an event • Invite people to events, or share your calendar with them • Create, manage, and share lists in Reminders, including powerful new smart lists • Organize reminder lists into categories and optionally view them in columns • Designate a list as a grocery list, so that items auto-sort into supermarket departments • Set alarms in Reminders at a certain time or a certain place • Tag entries for better searching and organizing in Reminders • Use Siri to save time when creating events or reminders • Easily check events and reminders on your Mac, iPhone, iPad, Apple Watch, or HomePod • Troubleshoot common problems in Calendar and Reminders • Share calendars and reminders using iCloud Family Sharing, and assign reminders to a specific person • Sort reminders on your Mac • Print a calendar (to paper or PDF) • Embed video links in Calendar events for quick launching
Track your stuff, find your friends, and safely share your location Version 3.0, updated September 20, 2024 Take Control of Find My and AirTags takes you inside Apple’s Find My ecosystem, a robust, privacy-protecting way to track your things, share your location (and see others’ with their permission), and aid in recovery lost and stolen devices. Find My lets you and someone else arrange to meet and see your live, updated ETA; figure out where you left your iPad (was it on a flight?!), and know that your bicycle remains firmly in place where you locked it.n Find My lost the “iPhone” moniker long ago, as the app and system of location tracking hardware, software, and infrastructure became “Find My Everything.” The current ecosystem encompasses people, Apple devices (iPhone, iPad, Mac, and Apple Watch), Apple and Beats audio hardware, and low-power, long-life trackers. Apps can be used in iOS, iPadOS, macOS, and watchOS, and on iCloud.com. Take Control of Find My and AirTags takes you through the many parts of Find My so you can configure and refine how you and your stuff is tracked and shared. The book looks at three different kinds of tracking: • People: Learn how to share your location safely, follow others who let you, and send and receive notifications about arrivals and departures. (Also, prevent being tracked when you don’t want to be.) • Devices: See the whereabouts of your and Family Sharing group members’ devices and audio hardware. Get to know the ins and outs of enabling Find My and taking remote actions, from playing a sound to wiping your data from a device. • Items: Find out how AirTags make use of the crowdsourced network of other people’s Apple devices to help you find a lost or forgotten purse, backpack, or even car, and about third-party devices licensing the technology from Apple. Learn how to share your items with up to five other people. Also get to know the dangers of people using Find My tech for stalking. The book explains how to identify the risk, deter unwanted tracking from happening, block it if you find it—and report it to law enforcement or get other help. This edition includes detailed information about the Apple and Google industry initiative for Android, iOS, and iPadOS that lets Android, iPhone, and iPad users get notified about unknown trackers on either Apple or Google’s tracking systems that are traveling with them. The book also digs into how Family Sharing interacts with personal and device location sharing and finding, and how to help other people find their lost stuff if they don’t have one of their own Apple devices handy. The book focuses on the latest Apple operating systems: iOS 18/iPadOS 18, macOS 15 Sequoia, and watchOS 11. However, it looks back as far as iOS 16/iPadOS 16 and macOS 14 Monterey for nearly every feature—and sometimes back even years before those releases—so you can best use your mix of Apple devices of all vintages. Here’s more of what you can find in this book: • Start sharing AirTags and other items with up to five other people. • Find out the difference between device-based Find My tracking and the Find My network. • Figure out if your Apple or Beats audio hardware can be tracked just over Bluetooth nearby or via the Find My Network. • Lost a single earbud? Apple may have you covered by playing a sound out of it or providing nearly pinpoint tracking. • Experience the joy of playing a sound over the internet or nearby to help find a missing device or item. • See the place in Apple’s ecosystem for third-party Find My tracking from nearly a dozen companies that make bike, bag, and general stuff trackers, some with extra alarms. • Spot Google and Apple trackers following you that aren’t yours and aren’t shared Apple Find My items. • Control and monitor the way you let others track your whereabouts. • Get to know presence, the way you define which of your devices indicates where you are to other people. • Learn about the capability to track an iPhone or iPad even after it’s been erased! • See how Messages simplifies and improves location sharing and maps. • Dig into Apple’s efforts to prevent Find My from being used for stalking and unwanted tracking, including audio alerts and other behavior. • Discover buried controls for configuring exactly how Find My updates your device’s location, including when power runs low. • Develop an understanding of your Apple Watch’s three distinct Find My to use them effectively on the go. • Understand Activation Lock, which protects devices from being reused even if someone has erased them, and Find My Lock, which keeps Find My items from being reset and taken over. • Help family members find lost and stolen gear through Find My’s Family Sharing support.
Manage your schedule more effectively using Calendar and Reminders! Version 4.1, updated December 23, 2022 Learn basic techniques and special tips for keeping yourself on time and on track with Apple’s Calendar and Reminders apps.n In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple’s Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends. This book was originally written by veteran Mac journalist and editor Scholle McFarland, and the fourth edition was updated by Glenn Fleishman, with complete coverage of macOS 12 Monterey, macOS 13 Ventura, iOS 15/iPadOS 15, and iOS 16/iPadOS 16. Scholle and Glenn guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that Calendar lets you set an alert that factors in public transportation schedules and time to get to your starting point, so you can leave early enough to catch the train, bus, tram, or ferry you need—and any connections—and arrive at your event on time? Or that Reminders can prompt you to do something not only at a certain time, but also once you’ve reached a specific destination, like the grocery store? If you’ve never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you’ve already been using Calendar and Reminders, you’ll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities. This fully revised fourth edition is now up to date with macOS 13 Ventura, iOS 16/iPadOS 16, and watchOS 9 (as well as covering the previous version of each operating system), and it has been expanded with new topics and additional tips. Learn how to get the best out of Calendar and Reminders, including how to: • Customize Calendar to your liking, from setting time zones, to color coding specific calendars • Create events, making them repeat at regular intervals or on certain dates • Set up notifications and alerts, so you never miss an event • Invite people to events, or share your calendar with them • Create, manage, and share lists in Reminders, including powerful new smart lists • Set alarms in Reminders at a certain time or a certain place • Tag entries for better searching and organizing in Reminders • Use Siri to save time when creating events or reminders • Easily check events and reminders on your Mac, iPhone, iPad, Apple Watch, or HomePod • Troubleshoot common problems in Calendar and Reminders • Share calendars and reminders using iCloud Family Sharing, and assign reminders to a specific person • Sort reminders on your Mac • Print a calendar (to paper or PDF) • Embed video links in Calendar events for quick launching
Leverage your smartphone and smartwatch for improved personal safety! Version 1.0, updated July 30, 2024 The digital and “real” worlds can both be scary places. The smartphone (and often smartwatch) you already carry with you can help reduce risks, deter theft, and mitigate violence. This book teaches you to secure your hardware, block abuse, automatically call emergency services, connect with others to ensure you arrive where and when you intended, detect stalking by compact trackers, and keep your ecosystem accounts from Apple, Google, and Microsoft secure.n You don’t have to be reminded of the virtual and physical risks you face every day. Some of us are targeted more than others. Modern digital features built into mobile operating systems (and some computer operating systems) can help reduce our anxiety by putting more power in our hands to deter, deflect, block, and respond to abuse, threats, and emergencies. Keep Safe Using Mobile Tech looks at both digital threats, like online abuse and account hijacking, and ones in the physical world, like being stalked through Bluetooth trackers, facing domestic violence, or being in a car crash. The book principally covers the iPhone, Apple Watch, and Android devices, but doesn’t ignore Wear OS watches, the iPad, and computers running macOS or Windows. This book explores many techniques to help: • Learn how to harden your Apple ID/Apple Account, Google Account, and Microsoft Account beyond just a password or a text-message token. • Discover blocking tools in operating systems and third-party apps that can prevent abusive, fraudulent, and phishing messages and calls from reaching you. • Block seeing unwanted sensitive images on your iPhone, iPad, Mac, or Apple Watch—and help your kids receive advice on how not to send them. • Turn on tracking on your devices, and use it to recover or erase stolen hardware. • Keep your cloud-archived messages from leaking to attackers. • Lock down your devices to keep thieves and other personal invaders from accessing them. • Prepare for emergencies by setting up medical information on your mobile devices. • Let a supported smartphone or smartwatch recognize when you’re in a car crash or have taken a hard fall and call emergency services for you (and text your emergency contacts) if you can’t respond. • Keep track of heart anomalies through smartwatch alerts and tests. • Tell others where or when you expect to check in with them again, and let your smartphone alert them if you don’t. • Deter stalking from tiny Bluetooth trackers. • Protect your devices and accounts against access from domestic assailants. • Block thieves who steal your phone—potentially threatening you or attacking you in person—from gaining access to the rest of your digital life.
Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. Glenn Fleishman guides you through protecting yourself from phishing, email, and other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more.n The digital world is riddled with danger, even as Apple has done a fairly remarkable job at keeping our Macs, iPhones, and iPads safe. But the best security strategy is staying abreast of past risks and anticipating future ones. This book gives you all the insight and directions you need to ensure your Apple devices and their data are safe. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! Also get the rundown on Lockdown Mode to deter direct network and phishing attacks, passkeys and hardware secure keys for the highest level of security for Apple Account and website logins, and Mac-specific features such as encrypted startup volumes and FileVault’s login protection process. Security and privacy are tightly related, and this book helps you understand how macOS, iOS, and iPadOS have increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here’s what this book has to offer: • Master the privacy settings on your Mac, iPhone, and iPad • Calculate your level of risk and your tolerance for it • Use Apple’s Stolen Device Protection feature for iPhone that deflects thieves who extract your passcode through coercion or misdirection. • Learn why you’re asked to give permission for apps to access folders and personal data on your Mac • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the past few years • Prepare against a failure or error that might lock you out of your device • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection for Mac, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys
A guide to wireless networking using AirPort for use with Macintosh computers provides information on such topics as connecting a USB printer, adding access points, and evaluting security needs.
This is the eighth volume of Dr. Justin Glenn’s comprehensive history that traces the “Presidential line” of the Washingtons. Volume one began with the immigrant John Washington, who settled in Westmoreland Co., Va., in 1657, married Anne Pope, and became the great-grandfather of President George Washington. It continued the record of their descendants for a total of seven generations. Volume two highlighted notable members of the next eight generations, including such luminaries as General George S. Patton, the author Shelby Foote, and the actor Lee Marvin. Volume three traced the ancestry of the early Virginia members of this “Presidential Branch” back to the royalty and nobility of England and continental Europe. Volumes four, five, six, and seven treated respectively generations eight, nine, ten, and eleven. Volume Eight presents generations twelve through fifteen, comprising more than 8,500 descendants of the immigrant John Washington. Although structured in a genealogical format for the sake of clarity, this is no bare bones genealogy but a true family history with over 1,200 detailed biographical narratives. These strive to convey the greatness of the family that produced not only The Father of His Country but many others, great and humble, who struggled to build that country.
Wireless networks are becoming commonplace, but choosing and configuring the right equipment and services for the home, small offices, and the business traveler can prove frustrating. That is where you need the wide-ranging expertise of wireless mavens Adam Engst and Glenn Fleishman. Using illustrated step-by-step instructions, in-depth discussions, and tons of tips, they help you decide what to buy, show you how to configure wireless hardware and software, and explain the best techniques for managing your connections. Whether you re a novice or an experienced network administrator, you'll find the practical information you need about wireless networking. Each book also has three coupons worth a total of $125 in discounts off regular subscriptions from three major wireless ISPs: Boingo Wireless, FatPort (Canada), and Wayport. What's New in the Second Edition: In its first edition, The Wireless Networking Starter Kit covered every angle of Wi-Fi and the 802.11a and b standards. In this second edition, we expanded to cover 802.11g, the latest, fastest Wi-Fi flavor, as well as these additional topics: Bluetooth (background and configuring). Cellular data (background and configuring). Centrino laptops. Ultrawideband (UWB). Working with software from wireless ISPs. Setting up Palm and Pocket PC handhelds with Wi-Fi. Small-office networking. Cameras, displays, and other unique Wi-Fi-connected gadgets. If you own the first edition, you'll want the second edition to get up to speed with the latest developments. Overview of the Second Edition: Practical advice and instructions for dozens of common wireless tasks. Thorough grounding in wireless networking basics. Coverage of 802.11b, 802.11a, 802.11g, Bluetooth, cell data, and more. Details tailored to Windows, Macintosh, Palm, PocketPC, and Linux users. Suggestions for extending your network and linking multiple locations. Real-world discussions on protecting home wireless networks from snoops. Advice about how to make a small office wireless network as secure as a large corporate network. Hard-won tips on finding and using wireless networks while traveling. Troubleshooting advice to help you figure out sticky situations.
Manage your schedule more effectively using Calendar and Reminders! Version 5.0, updated November 16, 2023 Learn how to unlock the full potential of Apple’s Calendar and Reminders! This book helps you get the most out of these two apps, showing you how to customize them, sync data across devices, and share meeting invitations and reminder lists. You’ll also learn how to use Siri as a shortcut and how to fix common problems.n In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple’s Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends. This book was originally written by veteran Mac journalist and editor Scholle McFarland, and the fifth edition was revised by Glenn Fleishman, with complete coverage of macOS 14 Sonoma, macOS 13 Ventura, iOS 17/iPadOS 17, iOS 16/iPadOS 16, and watchOS 10 (and considerably more information about using these apps on an iPhone or iPad than in previous editions). Scholle and Glenn guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that Calendar lets you set an alert that factors in public transportation schedules and time to get to your starting point, so you can leave early enough to catch the train, bus, tram, or ferry you need—and any connections—and arrive at your event on time? Or that Reminders can prompt you to do something not only at a certain time, but also once you’ve reached a specific destination, like the grocery store? If you’ve never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you’ve already been using Calendar and Reminders, you’ll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities. Learn how to get the best out of Calendar and Reminders, including how to: • Customize Calendar to your liking, from setting time zones, to color coding specific calendars • Create events, making them repeat at regular intervals or on certain dates • Set up notifications and alerts, so you never miss an event • Invite people to events, or share your calendar with them • Create, manage, and share lists in Reminders, including powerful new smart lists • Organize reminder lists into categories and optionally view them in columns • Designate a list as a grocery list, so that items auto-sort into supermarket departments • Set alarms in Reminders at a certain time or a certain place • Tag entries for better searching and organizing in Reminders • Use Siri to save time when creating events or reminders • Easily check events and reminders on your Mac, iPhone, iPad, Apple Watch, or HomePod • Troubleshoot common problems in Calendar and Reminders • Share calendars and reminders using iCloud Family Sharing, and assign reminders to a specific person • Sort reminders on your Mac • Print a calendar (to paper or PDF) • Embed video links in Calendar events for quick launching
Prevent (or solve) problems with your Apple Account! Version 1.0, published September 20, 2024 The center of the Apple world is your Apple Account. This little identifier ties up your access to iCloud; to purchased and streaming music, TV, and movies; and to all your devices. While an Apple Account is essential, Apple has made it difficult to navigate the many features associated with it—and particularly to troubleshoot and resolve problems that crop up. This book answers dozens of questions and guides you through solutions. It also explains how to use security, recovery, and other features tied to your Apple Account. Everything Apple relies on your Apple Account. It’s a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple Account, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple Account protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone, iPad, Mac, or Apple Watch; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple Account, you could be in for a world of hurt. Unfortunately, things go wrong with Apple Accounts all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld’s “Mac 911” column, is ready to help with expert advice on how to manage your Apple Account—including how to prevent, solve, or work around most common problems! This book is fully up to date with all the changes released by Apple in 2024 connected to your Apple Account—including the change of name from Apple ID to Apple Account—as well as for iOS 18, iPadOS 18, macOS 15 Sequoia, watchOS 11, tvOS 18, and other Apple products and services. In this book, Glenn answers questions like: • What all is my Apple Account used for? • How does my iCloud account relate to my Apple Account? • What’s two-factor authentication and how do I manage it—and not get locked out of my account? • Should I invest in hardware security keys to up the protection of my Apple Account account? • Are there other mechanisms I can use to ensure that I can recover an Apple Account in the event of a problem? (Spoiler: yes!) • What should I do if I have two or more Apple Accounts or iCloud accounts? • Will I lose access to all my Apple media purchases if I move to another country? • Can I share an Apple Account with someone else? • What does an Apple One subscription offer and how does it interact with Family Sharing and iCloud+ storage tiers? • Is there an explanation for how code-based and hardware-based second factors protect my account and how they differ from passkeys? (Yes!) • What exactly should I do if I think someone is hacking my Apple Account account? • How can I recover a forgotten Apple Account password? • What happens if I’m assaulted or drugged and someone gains access to my iPhone passcode and resets my Apple Account? (Sadly, a too real, if uncommon, problem.) • What steps should I take if Apple locks me out of my account? • If I lose access to an email address associated with my Apple Account, what can I do? • What Apple Account changes in recent versions of iOS, iPadOS, and macOS do I need to know about? • How can I use Family Sharing to share data and purchases within my family? • What types of subscriptions can I manage with my Apple Account, and how? • Which payment methods can I associate with my Apple Account, and how do I manage them? And that’s just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this comprehensive book. Read it before you encounter Apple Account problems to minimize your risk, and if you’ve already encountered a problem, read it to find the best path to a rapid solution.
Cases in Leadership, Third Edition is a unique collection of 32 real-world leadership cases from Ivey Publishing plus 16 practitioner readings from the Ivey Business Journal. The updated casebook helps business students gain a better understanding of leadership and enables them to be more effective leaders through their careers. Each of the selected cases are about complex leadership issues that require the attention of the decision maker. This casebook provides an invaluable supplement to any standard leadership text by connecting theory to actual cases. However, it has been organized to work especially well in conjunction with the Sixth Edition of Peter Northouse’s Leadership: Theory and Practice.
A study of what happens when abstract planning concepts meet the contingencies of politics, culture, and resource competition within real human communities. Includes discussion of the lawsuit of Hollman v. Cisneros.
This insightful reference work explores the relationship between mainline Christian denominations and U.S. politics and public policy, from colonial times to the present. Mainline Christian Values and U.S. Public Policy: A Reference Handbook provides a revealing and unbiased look at the emergence of Christian denominations as a political force, primarily from the late 19th century to the present. The book examines the origins, development, current organization and activities, and future prospects of nine mainline U.S. denominations: the American Baptist Churches in the U.S.A., the Catholic Church, the Christian Church, the Episcopal Church, the Evangelical Lutheran Church in America, the Presbyterian Church, the Reformed Church in America, the United Church of Christ, and the United Methodist Church. Readers will encounter a surprising variety of Christian voices offering a range of positions on the Iraq War, abortion, same-sex marriage, global warming, stem-cell research, the death penalty, and other controversial issues.
Long before Mount Bachelor became one of the country's largest ski areas, the booming timber mills drew workers to Oregon's forested hills. In the late 1920s, Scandinavian immigrants started a community ski club, and their passion for the mountains creat
Born in Italy in 1891, Andy Varipapa immigrated to the United States in 1903, uneducated and unable to speak English. Equipped with little more than athletic ability, the will to succeed, and a healthy dose of self-confidence, he became bowling's first superstar. In the 1940s and 1950s, Varipapa was the world's most famous bowler. For more than 50 years, he dazzled fans with an array of never-before-seen trick shots in person, on movie screens, and on television. Varipapa was not only a performer but one of the greatest bowlers ever. He won the prestigious BPAA All-Star tournament in 1946, silencing critics who claimed he was just an entertainer. And he did so at age 55, long past most bowlers' retirement age. To prove it was no fluke, he repeated in 1947. Bowling fans recognized the outspoken and brash "Great Varipapa," who once said, "I'm the most skillful, talkative, and controversial bowler who ever lived." Few knew Andy, the kind and loyal family man and friend. Sourced from interviews with family and friends and more than 1,000 secondary sources, this first-ever biography of Varipapa tells the personal story of bowling's greatest showman and one of its most influential figures.
The emotional impact of having a newborn hospitalized in an intensive care unit is immense. The parents' perceptions of the child's fragility and of their role in the vulnerable child's life represent important facts of the crisis in which the infant and the parents are involved. Such early stress marks the child's later development which may include chronic ailments and learning disabilities. This book explores a whole spectrum of psychological questions raised by the birth of medically fragile infants, from the parents' ability to restore a sense of meaning and mastery in the face of the profound challenges confronting them, to the importance of social support and coping strategies, and finally, to the crisis of newborn intensive care in the context of the marital relationship.
Published in two parts, the General Index of all Washington descendants and their spouses completes a ten-volume history that traces the “Presidential Line” of the Washington family in America. Volume one began with the immigrant John Washington who settled in Westmoreland County, Va., in 1657, married Anne Pope, and became the great-grandfather of President George Washington. It contained the record of their descendants for a total of seven generations. Subsequent volumes two through eight continued this family history for an additional eight generations, also highlighting most notable members (volume two) and tracing lines of descent from the royalty and nobility of England and continental Europe (volume three). Volume nine treated in detail the recently discovered line of William Wright (died in Franklin County, Va., ca. 1809). It also provided briefer accounts of five other Southern Wright families that have often been mentioned by researchers as close kinsmen of George Washington. ADVANCE PRAISE “At long last the Washingtons have a published history worthy of their place in history. Glenn has done a masterful job. . . . I am convinced that his work will be of wide interest to historians and academics as well as members of the Washington family itself. Although the surname Washington is perhaps the best known in American history and much has been written about the Washington family for well over a century, it is surprising that no comprehensive family history has been published. Justin M. Glenn’s The Washingtons: A Family History finally fills this void for the branch to which General and President George Washington belonged, identifying some 63,000 descendants. This is truly a family history, not a mere tabulation of names and dates, providing biographical accounts of many of the descendants of John Washington who settled in Westmoreland County, Virginia, in 1657.” — John Frederick Dorman, editor of The Virginia Genealogist (1957-2006) and author of Adventurers of Purse and Person “Decades of reviewing Civil War books have left me surprised and delighted when someone applies exhaustive diligence to a topic not readily accessible. Dr. Glenn surely meets that standard with the meticulous research that unveils the Washington family in gratifying detail—many of them Confederates of interest and importance.” — Robert K. Krick, author of The Smoothbore Volley that Doomed the Confederacy and Stonewall Jackson at Cedar Mountain
Keep your Mac, iPhone, and iPad safe! Version 1.0, published September 30, 2024 Secure your Mac, iPhone, or iPad against attacks from the internet, physical intrusion, and more with the greatest of ease. Glenn Fleishman guides you through protecting yourself from phishing, email, and other exploits, as well as network-based invasive behavior. Learn about built-in privacy settings, the Secure Enclave, FileVault, hardware encryption keys, sandboxing, privacy settings, Advanced Data Protection, Lockdown Mode, resetting your password when all hope seems lost, and much more.n The digital world is riddled with danger, even as Apple has done a fairly remarkable job at keeping our Macs, iPhones, and iPads safe. But the best security strategy is staying abreast of past risks and anticipating future ones. This book gives you all the insight and directions you need to ensure your Apple devices and their data are safe. You’ll learn about the enhanced Advanced Data Protection option for iCloud services, allowing you to keep all your private data inaccessible not just to thieves and unwarranted government intrusion, but even to Apple! Also get the rundown on Lockdown Mode to deter direct network and phishing attacks, passkeys and hardware secure keys for the highest level of security for Apple Account and website logins, and Mac-specific features such as encrypted startup volumes and FileVault’s login protection process. Security and privacy are tightly related, and this book helps you understand how macOS, iOS, and iPadOS have increasingly compartmentalized and protected your personal data, and how to allow only the apps you want to access specific folders, your contacts, and other information. Here’s what this book has to offer: • Master the privacy settings on your Mac, iPhone, and iPad • Calculate your level of risk and your tolerance for it • Use Apple’s Stolen Device Protection feature for iPhone that deflects thieves who extract your passcode through coercion or misdirection. • Learn why you’re asked to give permission for apps to access folders and personal data on your Mac • Moderate access to your audio, video, screen actions, and other hardware inputs and outputs • Get to know the increasing layers of system security deployed over the past few years • Prepare against a failure or error that might lock you out of your device • Share files and folders securely over a network and through cloud services • Upgrade your iCloud data protection to use end-to-end encryption • Control other low-level security options to reduce the risk of someone gaining physical access to your Mac—or override them to install system extensions • Understand FileVault encryption and protection for Mac, and avoid getting locked out • Investigate the security of a virtual private network (VPN) to see whether you should use one • Learn how the Secure Enclave in Macs with a T2 chip or M-series Apple silicon affords hardware-level protections • Dig into ransomware, the biggest potential threat to Mac users (though rare in practice) • Discover recent security and privacy technologies, such as Lockdown Mode and passkeys
Real World Adobe GoLive 6" is the definitive, in-depth guide for Web pros and beginners alike who want to create professional Web sites with Adobe GoLive 6. Users will learn to use GoLive for page creation, editing, and site management, and will learn to work with images, tables, and color.
This challenging and highly practical book draws on the findings from an international study designed to help practitioners and researchers understand the factors and processes that enable healthcare organisations in the United States and Europe to achieve - and sustain - high quality services for their users. The in-depth case-studies from seven leading hospitals give an international, evidence-based outlook that focuses on both the organisational and cultural processes of quality improvement. Implication for research and practice are considered, and a checklist of possible challenges has been drawn up to help identify any 'gaps' in initiatives. Healthcare policy makers and shapers including hospital chief executives and NHS directors will find this book enlightening, as will healthcare quality improvement and service development researchers and professionals. Clinicians with an interest in quality improvement will also find much of interest.
Get more from your Wi-Fi network Version 2.0, updated January 16, 2024 Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.n Perhaps you already have a Wi-Fi network running in your home and office, but you’re dissatisfied with it. Or maybe you’re setting up a new house, apartment, business, or school room with Wi-Fi and need to know the basics about what to get and how to configure it. In either case, this book is for you. After over 18 years of writing regularly about Wi-Fi and answering reader questions, author Glenn Fleishman finds that the same issues still crop up: • How do I spend the least money to the best effect? • What’s the best place to put my Wi-Fi gateways? • Is a mesh network a good idea—and if so, what do I need to know? • How can I get both high throughput (speed) on my network and solid coverage across everywhere I want to use Wi-Fi? • What can I do to secure my network against outsiders near my house and elsewhere on the internet? • How do I add networked hard drives and printers? • Interference is slowing my network; what can I do to reduce it? • What’s the best way to extend my network to a garage, yard, or nearby building? • What’s different about the latest standards—Wi-Fi 6E, Wi-Fi 7, and 802.11be? This book answers those questions in depth, as well as many others related to Wi-Fi, including how to set up a personal or mobile hotspot with all major operating systems, how to access computers on your network remotely, and why you should use a VPN (virtual private network). If you have any question about overhauling your network, setting up a new one, or just finally figuring out something that’s never worked, this book has the answer.
Make your home safer! Version 1.4.1, updated April 28, 2023 Are you thinking about installing a home security camera—or several? This book guides you through the many decisions about quality, features, privacy, and security that will help you find just what you want. Or do you own an existing system and want to swap out parts, expand it, or upgrade it? You’ll learn options for cameras you own and what interoperates. The book explains the role of Apple’s HomeKit Secure Video, and how to make its highest-level security work for you. In Take Control of Home Security Cameras, networking and security expert Glenn Fleishman shows you how to make smart choices about buying and configuring cameras that take into account technical details, video quality, system integration, your own privacy and that of others, and internet security. As you read this book, you'll: • Figure out which features are right for you • Configure your system securely to ensure that you and people you authorize are the only ones with access to live and stored video • Understand the different kinds of cloud-based storage of video, and which you might be comfortable with • Learn about Apple HomeKit Secure Video, an option available for the Apple ecosystem that lets you access video and control cameras from several manufacturers in a highly secure way from your iPhone, iPad, or Mac, including Logitech’s Circle View • Get to know features found in home security cameras, and how they affect the quality and nature of video you capture • Set your system so that alerts only appear for the kinds of motion, sound, or other triggers that meet your threshold • Avoid becoming part of the surveillance state—or opt into a limited and controlled part of it with a fuller understanding of what that means • Learn about the legal aspects and limits of recording audio and video, and how they might (or might not) help catch criminals
The single best dictionary for communicating with Spanish-speaking patients! The book that breaks the language barrier between healthcare professionals and Spanish-speaking patients! This pocket-sized book contains virtually all health-related terms likely to occur in a conversation between a health worker and a Spanish-speaking patient, including common colloquialisms and slang terms not found in similar dictionaries. You will have instant access to more than 20,000 words and terms used in medicine, nursing, and dentistry, along with tips, a pronunciation guide, abbreviations, and sample dialogues. The fourth edition includes expanded sample dialogue on history taking and performing a physical examination. Here's why this is the single-best Spanish-English dictionary: The most useful terms - Updated to include the latest terminology as well as medical colloquialisms and hard-to-translate phrases - covers general medicine, psychiatry, nursing, dentistry, physical therapy, social work, and more - lists over 700 drug names The most accurate translations - All technical terms have been verified through word frequency analyses on large databases of medical literature in Spanish and English The most scholarly - Lists parts of speech; indications of gender; and irregular plurals, preterites, and past participles - provides useful example phrases
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.