How to Protect Your iTunes Library: Back It Up
It seems the entire blogosphere—and even a lot of mainstream newspapers—are talking about a blog post, written last week,...
It seems the entire blogosphere—and even a lot of mainstream newspapers—are talking about a blog post, written last week,...
How To + Recommended + Security & Privacy
A home VPN router can protect your laptops and smartphones wherever you are from man-in-the-middle attacks. Use this VPN...
Web browsers have adopted "fraudulent site protection" to protect you from suspected phishing sites. Here's how to activate your...
More websites and services are using two-step or two-factor authentication to provide an additional layer of security. Here’s how...
Have you ever misplaced your iPhone? Here’s how Find My iPhone works, how you can use it to find...
Two-step verification prevents others from accessing your account on other devices. Here's how to turn on Amazon's two-step verification.
Apple's Disk Utility lets you create an encrypted disk image to store sensitive files. Here’s how to encrypt disk...
There’s something to be said about the benefits of sharing a good meal, sharing affections, stories, and events at...
Apple + How To + Recommended
Apple removed the "Secure Empty Trash" option in OS X El Capitan. This article explains how to securely delete...
Want to learn how to use OS X's Disk Utility? Here’s how to get information about your drives, format...