But the most important aspect of maintenance is a rock-solid backup strategy that protects all your important data in the event of catastrophe. To that end, Joe provides an at-a-glance comparison of different strategies, explains the pros and cons of each type of media, and helps you pick the best backup program for your needs. You'll find time-tested recommendations that help you set up, test, and maintain your backups, complete with instructions on how to restore after a crash. Important lessons you'll learn along the way include the utility of having both a duplicate and an archive, the necessity of testing backups, and the importance of offsite backups.
In this book you'll find the answers to questions like these:
When is my Mac likely to have trouble? How can I find out which unnecessary files are taking up space on my disk? Should I defragment my hard disk and repair permissions regularly? What is the best backup software and hardware? How can I make sure I can restore from my backups?
Updated Feb 2, 2016
If you've ever thought you should learn to use the Unix command line that underlies Mac OS X, or felt at sea when typing commands into Terminal, Joe Kissell is here to help! With this 167-page ebook, you'll become comfortable working on the Mac's command line, starting with the fundamentals and adding more advanced topics as your knowledge increases.
Joe includes 50 real-life "recipes" for tasks that are best done from the command line, as well as directions for working with permissions, carrying out grep-based searches, creating shell scripts, and installing Unix software.
"I found answers to many questions in your book, and I enjoyed reading it. I am definitely more confident now in facing the Mac command line. Thank you for the time and art that you spent to create such a clarifying text."
--Mona Hosseini, grad student in Genomic Medicine and Statistics at the University of Oxford
The book begins by teaching you these core concepts:The differences between Unix, a command line, a shell, and TerminalExactly how commands, arguments, and flags workThe basics of Terminal's interface and how to customize it
Next, it's on to the command line, where you'll learn:How to navigate your Mac's file systemBasic file management: creating, copying, moving, renaming, opening, viewing, and deleting filesCreating symbolic linksThe types of command-line programsHow to start and stop a command-line programHow to edit a text file in nanoWhat a profile is, why it's cool, and how to customize yoursThe importance of your PATH and how to change it, if you need toHow to get help (Joe goes way beyond telling you to read the man pages)
You'll extend your skills as you discover how to:Create basic shell scripts to automate repetitive tasks. Make shell scripts that have variables, user input, conditional statements, loops, and math.See which programs are running and what system resources they're consuming.Quit programs that refuse to quit normally.Enable the command line to interact with the Finder.Control another Mac via its command line with ssh.Understand and change an item's permissions, owner, and group.Run commands as the root user using sudo.Handle output with pipe (|) or redirect (>).Use grep to search for text patterns in files and filter output.Install new command-line software from scratch or with a package manager.
Questions answered include:Which shell am I using, and how can I change my default shell?How do I quickly figure out the path to an item on my Mac?How can I customize my Terminal window so I can see man pages behind it?How can I make a shortcut to avoid retyping the same long command?Is there a trick for entering a long path quickly?What should I say when someone asks if I know how to use vi?How do I change my prompt to suit my mood or needs?What is Command Line Tools for Xcode?When it comes to package managers, which one should I use?
"Very good! A pleasure to read, the right balance of coverage and clarity."
Finally, to help you put it all together, the book showcases over 50 real-world "recipes" that combine commands to perform useful tasks, such as listing users who've logged in recently, using a separate FileVault password, figuring out why a disk won't eject, copying the source code of a Web page, determining which apps have open connections to the Internet, flushing the DNS cache, finding out why a Mac won't sleep, sending an SMS message, and deleting stubborn items from the Trash.
Updated December 20, 2016
Wrangling your Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, handle two-factor authentication (2FA), and sync and share passwords with various techniques -- including iCloud and Dropbox, as well as a hosted account (individual, family, or team).
While reading Take Control of 1Password on my iPad I was furiously highlighting passages and following along with 1Password open on my Mac. [The book] showed me how some of my passwords were weak or duplicates. I immediately changed those passwords to unique and secure ones.
--Elisa Pacelli, in her MyMac book review.
The book focuses on 1Password 6 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password.
Meet 1Password: Set your master passcode, explore the various 1Password components, and decide on your ideal usage strategy.
Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, and more. You'll especially find help with editing logins. For example, if you change a site's password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to create highly secure random passwords, like dGx7Crve3WucELF#s.
Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly.
Go beyond Web logins: A primary point of 1Password is to speed up Web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, scans of important cards or documents, and more.
Sync your passwords: Discover which 1Password syncing solution is right for you: a hosted account, Dropbox, iCloud, or a Finder folder, as well as a device-to-device Wi-Fi sync.
Share your passwords: Learn to store passwords in shared vaults within a family or team hosted account.
You'll also discover the answers to key questions, including:What's the best way to buy 1Password?Should I use my Web browser's autofill feature?What about iCloud Keychain? Should I use that too?What can I do quickly to get better password security?How can I find and update weak passwords I created long ago?What should I do about security questions, like the name of my pet?How can 1Password provide a time-based one-time password (TOTP)? How do I initiate 1Password logins from utilities like LaunchBar?
Email is a necessary evil in today's world, but you can work more effectively in Apple Mail with the hard-won advice in this book, written by email expert Joe Kissell. You'll learn how to make Mail serve your needs with essential setup, usage, and troubleshooting instructions, whether you use Gmail, iCloud, Exchange, IMAP, or POP -- or more than one -- in both 10.10 Yosemite on your Mac and iOS 8 on your iPad, iPhone, or iPod touch.
Joe explains core concepts like special IMAP mailboxes and email archiving, reveals Mail's hidden interface elements, helps with common tasks like addressing and adding attachments, and offers tips on customizing Mail to your preferences. You'll also learn how to find that message in the haystack, figure out how digital signatures and encryption work in Mail, and uncover solutions to numerous common problems. Perhaps most important, Joe shares his strategy for avoiding email overload; the article where he first introduced it won American Business Media's Neal Award for Best How-To Article.
Mavericks and iOS 7? After you download this ebook, you can follow its Ebook Extras link to download the first edition, which focuses on Mavericks and iOS 7.
Using the fully linked table of contents, Quick Start page, or other hot links in the ebook, you'll quickly find the essential information that's most important to you, including:Key changes in Mail for Yosemite and iOS 8The whys and hows of sending attachments with Mail DropHow to sign, annotate, and otherwise modify outgoing attachments (such as permission forms or contracts) within MailSetting Mail's Junk Mail filter correctly and other tips for defeating spamUnderstanding special mailboxes like Sent, Drafts, and JunkUsing notifications to manage incoming messagesTurning on the much-loved classic window arrangementUsing search tokens AND understanding Boolean searchesTaking charge of email organization with rules and other measures14 things everyone should know about iOS MailDeciding whether you should encrypt your email, plus detailed, real-world steps for signing and encrypting emailFixing problems: receiving, sending, logging in, bad mailboxes, and moreManaging Mail's new "Automatically detect and maintain account settings" checkbox -- especially if it's causing a connection problem
Need to give a presentation, but worried about how you'll do? Steve Jobs relied on Keynote for his famous keynote presentations, and while using Keynote won't guarantee Jobs-level success, Joe Kissell's advice in Take Control of Keynote will get you closer.
Drawing on years of speaking experience, Joe suggests you start by figuring out what you want to say -- and he explains exactly how to accomplish this task, even though you won't do it in Keynote. He then helps you work in Keynote with the right theme, and explains how to create slides by filling in placeholders, adding objects (images, movies, sounds, tables, and charts), and inserting and styling text. You'll also learn how to add build effects to slides and transitions between slides, as well as how to make self-playing presentations designed for kiosks, and presentations with recorded narration or a soundtrack.
Finally, Joe offers real-world advice about delivering presentations, including tips on what to bring, making presenter notes and customizing the presenter display, setting up your display, and controlling your presentation.
"As someone whose life (and income) is doing training presentations, this ebook is the most useful I have ever bought. I know Keynote well and have used it since its first release; however, Joe's ebook has both challenged me to think about the way I structure my presentations and has taught me stuff about Keynote I didn't know." -Michael Durrant, Psychologist ... mental health & corporate trainer (Sydney, Australia)
You'll learn how to use the features that go into making a great slide deck:Making master slides with carefully positioned placeholdersAdjusting the slide orderViewing more than one slide at onceUsing all the fancy layout features to position objects on a slideApplying cool visual effects to photos, such as masking and Instant AlphaSorting out builds gone wild with the Build Order paletteHiding particular slides from an audience without deleting themTaking control of text boxes and Keynote's many text styling optionsCreating a presentation that requires clicks in specific places to advanceCommenting on slides while collaborating on your presentation
Additional advice helps you prep for a successful delivery and avoid technical glitches:What to consider in advance, with respect to the screen(s) you'll be usingPracticing the mechanics of delivering from KeynoteViewing presenter notes while you speakPlaying a sound or movie from a slide during your presentationEvaluating the many options for remote control instead of a mouse or trackpadPacking your bag with the right set of cables and gadgetsSetting up once you're at the speaking venue
You'll find even more assistance with answers to questions like:Should I store my presentation on iCloud Drive?What are my options if I want to print my presentation?What's the best way to turn my slide deck into a PDF?
The bulk of the book documents Keynote for the Mac, but an appendix explains what's similar and different about Keynote for iOS and Keynote for iCloud.
"I really enjoyed Take Control of Running Windows on a Mac. It was very informative, easy to read, and not too complicated." —Brian Henson
You'll also learn how to make Windows run smoothly on your Mac, with practical advice on how to integrate Windows windows with the Finder, share files between Windows and Mac OS X, run anti-malware software, print from Windows, and back up Windows data.
The ebook comes with a coupon for $10 off on VMware Fusion 3.
You'll find answers to questions like:What are 13 things that you can do in Windows, but not on the Mac?How can I get a copy of Windows that will work on a Mac?How can I set things up so that Windows won't bog down?How should I handle partitioning for my Windows installation?How do I avoid and handle activation hassles?What's the best way to right-click in Windows?How do I make my Bluetooth devices work in Windows?What is FAT32, and why might it matter to me?What are the coolest new features in Parallels Desktop 6?Is VirtualBox 4 a serious contender in the world of virtualization?
Special topics include handling Gmail and iCloud email accounts.
Read this ebook to learn how to:Make a VIP list for email you especially want to read.Set up mailboxes for effective navigation and filing. Address, compose, and send a message.Handle incoming and outgoing attached photos and documents.Locate a specific message.Understand how Mail interacts with the Calendar and Contacts apps.Decide whether to receive messages with push or fetch.Set up and use signatures.
And, find answers to questions like:How can I effectively work with the same email on more than one device?Help! I can't send my email... what should I do?What if I have more than one "From" email address?
Gain confidence and stay in control as Mac guru Joe Kissell explains how to ensure that your hardware and software are ready for OS X 10.9 Mavericks, prevent problems with a bootable duplicate of your main disk, and decide on your best installation method, whether you're upgrading from 10.4 Tiger, 10.5 Leopard, 10.6 Snow Leopard, 10.7 Lion, or 10.8 Mountain Lion.
You'll find smart suggestions for managing the installer, with tips for installing on multiple Macs and dealing with bandwidth limitations. Joe walks you through installing Mavericks and then gives important advice for handling your Mac when it first starts up in Mavericks, including working through a pile of post-installation alerts, signing in with the right Apple ID(s), turning on iCloud Keychain, enabling enhanced (and local) dictation, managing user accounts, and quite a bit more.
Additional important topics include troubleshooting installation problems, upgrading from an older Mac or PC to a new Mac running Mavericks, and a brief look at installing OS X Server.You'll experience an easy upgrade and quickly deal with post-installation quirks with these topics:
Start fast: A short Quick Start overview links to detailed content behind each topic, letting you read lightly or more deeply, depending on your specific needs.
Catch the wave: Find out what you can look forward to in Mavericks, and why this upgrade is important for Apple.
Older cat upgrades: For people who are upgrading from 10.4 Tiger, 10.5 Leopard, or 10.6 Snow Leopard, Joe offers advice about the most effective way to carry out an upgrade.
Compatibility check: Make sure your hardware and software are ready for Mavericks, and consider if this might be a good time for new hardware, even if it's not essential for your upgrade. (Tip: if your Mac can run Mountain Lion, it can also run Mavericks.)
Prep steps: Avoid upgrade calamities by ensuring you can go back to the previous state of your Mac - and that you can boot from your backup. This crucial step can save a lot of trouble, and Joe recommends software that can make a bootable duplicate without a huge hassle. Also, your operating system is getting a fresh start, but what about the rest of your stuff? Whether you need the disk space or just want to delete some digital detritus, you'll find helpful tips. You'll also run Apple Hardware Test (or Apple Diagnostics) and Disk Utility, to be sure your disk is good to go. Finally, for those who need it, Joe discusses special cases relating to disk encryption (including FileVault) and partitioning.
Picking a plan: Decide on your installation method. Most people can go with an easy in-place upgrade, but some will want the more complex clean install. 10.5 Leopard users will find special help, and those still on 10.4 Tiger get a special sidebar.
Installing: Find out the smartest way to download and store the installer, with special tips for people who want to install on more than one Mac or who have bandwidth limitations. And, although running the installer will be easy for many people, you'll get full steps for what to click and when.
Post-installation tune-up: Make sure your new system is running smoothly with a few important housekeeping tasks, including managing Spotlight, Software Update, Java Runtime, enhanced dictation, user accounts, Apple IDs, iCloud Keychain, FileVault, Time Machine, iTunes changes, and more. Plus learn how to unhide the user Library folder.
Troubleshooting: Yikes! It is possible that something will go wrong during installation, or once you've booted up under Mavericks that you'll discover an important incompatibility with an existing piece of software. Find time-tested troubleshooting advice to get your system working again. Plus learn what the Recovery HD volume can do for you.
Migrating to a new Mac: If your "upgrade" includes moving from an older computer (Mac or Windows PC) to a new Mac that's running Mavericks, learn the best way to move your user account to the new Mac.
Installing OS X Server: Find a brief introduction to OS X Server, plus basic steps for downloading and installing it.
Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out!
Author Joe Kissell explains why Dropbox is cool, shares best practices for using Dropbox on your own or with a group, helps you avoid common mistakes, clues you in to newer and advanced collaboration features, teaches you how to secure your Dropbox account, and describes unusual uses of Dropbox.
Readers can quickly benefit from the book: new users can start in the "Dropbox Quick Start," which directs you to beginner basics or to special information for people who just want to access a shared Dropbox document.
But, for those who already know Dropbox basics, "Check Your Dropbox Skills" routes you immediately to help with exciting new features that you may not yet have mastered -- or even been aware of(!) -- such as Dropbox Team, Dropbox Paper collaboration, file requests, and Office integration/collaboration.
Teach This Book! Because a powerful aspect of Dropbox is sharing files with others, you may want to help your colleagues and friends use it. To that end, Take Control of Dropbox includes links to a downloadable 1-page PDF handout and to a 21-slide PDF-based presentation.
Joe focuses on using Dropbox from a Macintosh or Windows PC, or Linux, but part of why this book has crept up to 151 pages in its second edition is that he has included helpful details for integrating a mobile device (primarily iOS and Android) into your Dropbox workflow.
You'll find out how to:Recover accidentally deleted or revised files.Put new photos and videos into Dropbox with Camera Upload and share them easily.Sync data from Dropbox-savvy apps on all your devices (apps like 1Password, DEVONthink, and GoodReader). Make sure you're set up optimally by checking a few account-related details. These include security settings and methods of getting more storage space.Edit shared Office documents on the Dropbox Web site -- you don't need to have Office installed locally on your computer or subscribe to Office 365.Work with the Dropbox badge if you are editing a Dropbox-shared Office file on your local computer.Open PDFs from Dropbox from within Adobe Acrobat DC or Acrobat Reader DC -- and save any changes back to Dropbox.Set up a Dropbox team: learn how it works, and how to control who can do what and when.Create a Dropbox folder that other people can drop files into, but not see inside of.Unlink and remote-wipe Dropbox from a stolen device.
Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!
Gain confidence and stay in control as Mac guru Joe Kissell explains how to ensure that your hardware and software are ready for Yosemite, prevent problems by making a bootable duplicate of your main drive, eliminate digital clutter, prepare your Mac, and decide on the best installation method for your particular situation. You'll also find fullinstallation directions plus advice on over a dozen things to do immediately after installation and troubleshooting techniques.
The book covers upgrading from 10.9 Mavericks, 10.8 MountainLion, 10.7 Lion, 10.6 Snow Leopard, 10.5 Leopard, and even 10.4 Tiger. It also looks at upgrading from the Yosemite public beta and at "upgrades" that involve moving your data to a new Mac from an old Mac or Windows PC.
You'll experience an easy upgrade and quickly deal with post-installation quirks with these topics:
Take in the view: Find out what you can look forward to in Yosemite, and why this upgrade is important for Apple.
Catch-up upgrade: If you're upgrading from 10.4 Tiger, 10.5 Leopard, or 10.6 Snow Leopard, you'll want to know about a few special compatibility issues and decide on the most effective way to upgrade.
Compatibility check: Make sure your hardware and software are ready for Yosemite (and for the new Continuity features that work with iOS 8), and consider if this might be a good time for new hardware, even if it's not essential for your upgrade.
Backing up: Avoid upgrade calamities by ensuring you can return your Mac to its previous state, and that you can boot your Mac from a backup. This crucial step can save a lot of trouble, and Joe recommends software that can make a bootable duplicate with minimal hassle.
Cleaning up: Your operating system is getting a fresh start, but what about the rest of your stuff? Whether you need the disk space or just want to delete some digital detritus, you'll find helpful tips. You'll also run either Apple Hardware Test or Apple Diagnostics as well as Disk Utility, to be sure your disk is good to go.
Prepping your disk: For those who need it, this chapter covers special cases relating to disk encryption and partitioning.
Picking a plan: Most people can go with an easy in-place upgrade, but some will want the more complex clean install. Yosemite beta testers will find a special sidebar, 10.5 Leopard users will find special help, and those still on 10.4 Tiger will learn about the extra steps they'll have to go through.
Installing: Find out the smartest way to download and store the installer, with special tips for people whowant to install on multiple Macs or who have bandwidth limitations. And, although running the installer will be easy for many people, you'll get full instructions on what to click and when.
Post-installation tune-up: Make sure your new system is running smoothly by answering questions posed by Yosemite, specifying your Apple ID in all the right places (and perhaps setting up Family Sharing), checking your Handoff status, and handling translucency. You'll also find advice on Spotlight, Java Runtime, iBooks, enhanced dictation, and more. Plus, learn how to unhide the user Library folder.
Troubleshooting: Yikes! It's possible that something will go wrong during installation, or once you've booted up under Yosemite that you'll discover an incompatibility with an essential piece of software. Find time-tested troubleshooting advice to get your system working again.
Migrating to a new Mac: If your "upgrade" includes moving from an older computer (Mac or Windows PC) to a new Mac that's running Yosemite, learn the best way to move your useraccount to the new Mac.
"Thanks for a great guide! I used it to successfully cook my first complete Thanksgiving, almost single-handed. While I can follow recipes, I am nowhere close to 'a cook'—your guide gave me the confidence to take on this meal!" —Ed Ruder
Appendixes cover special cases from allergies to vegans, drawings guide you as you work with the turkey, and a special included "Print Me" file provides shopping lists and schedules, as well as versions of the recipes that you can tape up in the kitchen. Although these recipes scale easily for a few more people, they are meant for 8-12 people. The recipes use U.S. and metric units.
Read this ebook to learn the answers to questions such as:What type of turkey should I buy?Is there a fast way to make cranberry relish? What's the secret behind making perfect gravy?How do you deal with a raw turkey, and which end is the neck?
"I've been cooking Thanksgiving dinner for longer than I care to admit, and I never would have thought I'd pick up so many good tips! Great book!" —Trish Huffman
Whether your upgrade is fairly straightforward or utterly complicated, Joe explains what to do before you start upgrading to Lion, how to upgrade effectively, what to do if your upgrade has a problem, and how to get a smart start once the upgrade is completed. New Lion features that you'll learn about include FileVault 2 encryption (Joe recommends this for most laptop users) and Recovery mode. The ebook also covers the basics of installing Lion Server.
Benefit from Joe's experience in writing about how to install Mac OS X since 2003, and let him help you install Lion.
You'll get specific advice for how to:Prepare for a Problem-free Upgrade
Part with Rosetta: Understand and manage the fact that PowerPC-based software will not run under Lion, given the lack of the Rosetta emulator that was used in recent versions of Mac OS X.
Handle your hardware: Check your hardware for Lion compatibility. Also, in order to fully enjoy Lion, it might be time for more RAM, disk space, or other peripherals, particularly a Magic Trackpad.
Deal with duplication: Learn what a disk duplicate is, why having one is essential before installing Lion, and how to make one easily and affordably. Also, get help with backing up a Windows volume, should you be running Windows on your Mac via Boot Camp.
Verify that all systems are go: Test to be sure your memory and disks are running properly—better to discover and correct a problem now during your upgrade—and find advice on clearing extra files and software off your disk so that you get a fresh start with Lion (and more disk space for it!).
Consider a few geeky details: If you secure your data and documents with some form of disk encryption now, or would like to under Lion, get advice on what to do before you upgrade and learn how Lion's much-improved FileVault 2 will operate, plus consider the pros and cons of running FileVault 2. Also, read about what Joe thinks of partitioning and what you might want to do about it before installing.
Make a plan: Learn how to install Lion if you're installing over 10.6 Snow Leopard, and consider the pros and cons of several techniques for how to install onto a Mac running either 10.5 Leopard or 10.5 Tiger. Also, if you have more than one Mac in your home, get ideas for downloading the Lion installer only once, but using it legitimately on your different Macs. And, if a nearly 4 GB download is unrealistic, get guidance for how to best obtain Lion.
If your "upgrade" involves moving to a new Mac from an old Mac (or a Windows PC), learn how to best install Lion (if needed) and transfer your old stuff. A tip: ideally, do not even turn on a new Mac that has Lion installed until you've read this ebook!Install Lion!
Install with confidence: Buying, downloading, and running the Lion installer isn't all that difficult, but it is an an entirely new (and rather slow) way of installing an operating system upgrade, so Joe explains what to expect.
Solve problems If your Mac won't restart after the installation, this ebook explains exactly what to do (knock on wood!).Start Smart with Key Post-installation Tasks
Avoid slowdowns: Put off a few tasks (running Spotlight, turning on Time Machine) that will slow you down during your first few hours in Lion.
Get set and go: Joe reminds you to run Software Update, helps you set up an extra user account while noting a few account-related changes in Lion, discusses the pros and cons of the new FileVault 2 and gives directions for enabling it, explains the Incompatible Software Folder, explains need-to-know-now Time Machine basics (including encryption of Time Machine backups), helps you understand what's going on with Apple Mail plug-ins, and more.
Go beyond...Learn why the $49.99 Lion Server is interesting for Lion users, and how to complete a basic installation.Reconnoiter with Recovery Mode:
A final chapter explains the new-in-Lion Recovery HD volume, and even tells you what to type in Terminal so you can check it out. It also explains how to boot in Recovery mode, in case your Mac won't boot and you don't have a convenient way to boot it otherwise.
You can work more effectively in Apple Mail with expert advice from Joe Kissell. You'll learn how to make Mail serve your needs with essential setup, usage, and troubleshooting instructions, whether you use Gmail, iCloud, Exchange, IMAP, or POP -- or more than one -- in both 10.11 El Capitan on your Mac and iOS 9 on your iPad, iPhone, or iPod touch.
Joe explains core concepts like special IMAP mailboxes and email archiving, reveals Mail's hidden interface elements and gestures, and helps with common tasks like addressing and adding attachments. He also offers tips on customizing Mail, including a nifty chapter on how simple plug-ins and special automation can dramatically improve the way you use Mail. Joe also covers finding that message in the haystack with El Capitan's new natural language search, improving the messages you send, how digital signatures and encryption work in Mail, and -- perhaps most important -- a strategy for avoiding email overload (the article where he introduced it won an American Business Media's Neal Award for Best How-To Article).
* Older OS? After you download this ebook, you can follow its Ebook Extras link to download an earlier edition (look in the Blog) about Mail in Mavericks/iOS 7 or Yosemite/iOS 8.
You'll quickly find the information that's most important to you, including:Key changes in Mail for El Capitan and iOS 9What the new natural language search features mean for emailGetting through your email faster with gesturesLetting a plug-in significantly enhance how you use MailTaking Mail to the next level with AppleScript and AutomatorThe whys and hows of sending attachmentsUsing markup features to embellish, and even sign, outgoing attachmentsDefeating spam with the Junk Mail filter -- and what to do if you need more firepowerUnderstanding special mailboxes like Sent, Drafts, and JunkUsing notifications to stay apprised of incoming messagesTurning on the much-loved classic window arrangementTaking charge of email organization with rules and other measures15 things everyone should know about Mail in iOS 9Deciding whether you should encrypt your email, along with detailed, real-world steps for signing and encrypting messagesFixing problems: receiving, sending, logging in, bad mailboxes, and more
Updated December 17, 2015
Beyond keeping track of what's new in the latest operating system is the larger problem facing most of us—how to work effectively in today's ecosystem of devices, servers, and collaborators. Frankly, sharing with other people and devices is messy, because everyone wants something different. That's why this may be our most important book, and why we are so grateful to Joe Kissell for taking on the challenge of describing how to share nearly everything you can think of in nearly every imaginable situation.
Here are just a few of the gems in this book:How iCloud Photo Sharing and My Photo Stream are entirely differentHow to share photos fleetingly, privately, permanently, or with your fridgeThe best ways to sync a project's worth of files with othersServices to provide ubiquitous access to your own files across devicesQuick ways to make a file available for download by anyoneHow to share calendars with others, whether or not they use iCloudA tutorial on enabling Family SharingTweaky workarounds for contact sharing, which is surprisingly difficultHow to rip a DVD to your MacBook Air using an older Mac's SuperDriveHow to turn your iPhone or Mac into a Wi-Fi hotspotWays of watching your uncle work remotely, as you help him with iTunesApproaches to syncing Web browser bookmarks and tabs with multiple devicesHow to securely share a collection of passwords with someone else
The list of essential but often frustrating tasks goes on and on, and the solutions go way beyond what Apple offers, so the book does too.
Non-Apple products mentioned include 1Password, AirFoil, Air Login, BitTorrent Sync, CargoLifter, CloudyTabs, Dropbox, Exchange, Facebook, Firefox, Flickr, Google+, Google Calendar, Google Chrome, Google Docs, handyPrint, Instagram, LastPass, Outlook, Pandora, PhotoCard, PowerPhotos, Printopia, Reflector, ScreenFlow, Spotify, SyncMate, Transporter, Twitter, Xmarks, and more.
And, thanks to the Take Control Crash Course format, you can jump right to the chapter that answers your question, without having to read through lots of other information -- as part of our Crash Course series, this book provides the first-rate content you expect from us in short chunks so you can dip in and read quickly. Because so many Take Control readers give tech support to others, each concise chapter has sharing buttons and practical tweet-tips, making it easy to share a few pages with Facebook friends, Twitter followers, and others who need the info. Crash Courses have a modern, magazine-like layout in PDF while retaining a reflowable design in the EPUB and Mobipocket versions.
Gain confidence and stay in control as Mac guru Joe Kissell explains how to ensure that your hardware and software are ready for El Capitan, prevent problems by making a bootable duplicate of your main drive, eliminate digital clutter, prepare your Mac, and decide on the best installation method for your particular situation. You'll also find full installation directions, plus advice on over a dozen things to do immediately after installation and troubleshooting techniques.
The book covers upgrading from 10.10 Yosemite all the way back to 10.4 Tiger. It also looks at upgrading from the El Capitan public beta and at "upgrades" that involve moving your data to a new Mac from an old Mac or Windows PC.
You'll experience an easy upgrade and quickly deal with post-installation quirks with these topics:
Start fast: A two-page Quick Start overview helps you read lightly or more deeply, depending on your needs.
Take in the view: Find out what you can look forward to in El Capitan if you are upgrading from 10.10 Yosemite, and get an idea of some of the important changes in store for you if you're upgrading from an older version of Mac OS X.
Catch-up upgrade: If you're upgrading from 10.8 Mountain Lion or earlier (especially if you're coming from 10.4 Tiger or 10.5 Leopard), find out about significant changes and compatibility issues you can expect.
Compatibility check: Make sure your hardware and software are ready for El Capitan, and consider whether this is a good time to buy new hardware, even if it's not essential for your upgrade.
Backing up: Avoid upgrade stress by ensuring you can go back to the previous state of your Mac -- and that you can boot from your backup. Joe provides steps for carrying out this essential task in Carbon Copy Cloner or SuperDuper.
Cleaning up: Your operating system is getting a fresh start, but what about the rest of your stuff? Whether you need the disk space or just want to delete some digital detritus, you'll find helpful tips. You'll also run either Apple Hardware Test or Apple Diagnostics as well as Disk Utility, to be sure your disk is good to go.
Prepping your disk: For those who need it, a chapter helps you handle special cases relating to disk encryption and partitioning.
Picking a plan: Most people can go with an easy in-place upgrade, but some will want the more complex clean install. Find out which option is right for you.
Installing: Find out the smartest way to download and store the installer, with special tips for people who want to install on multiple Macs or who have bandwidth limitations. And, although running the installer will be easy for many people, you'll get full steps for what to click and when.
Post-installation tune-up: Make sure your new system is running smoothly by completing a few important housekeeping tasks and making a few decisions.
Troubleshooting: Yikes! It is possible that something will go wrong during installation, or once you've booted up under El Capitan that you'll discover an important incompatibility. Joe's time-tested troubleshooting advice will help get your system working again.
Migrating to a new Mac: If your "upgrade" includes moving from an older computer (a Mac or Windows PC) to a new Mac that's running El Capitan, learn the best way to move your user account and its data to the new Mac.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.
Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations.
Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance.
• Learn Google Searching Basics
Explore Google’s Web-based Interface, build Google queries, and work with Google URLs.
• Use Advanced Operators to Perform Advanced Queries
Combine advanced operators and learn about colliding operators and bad search-fu.
• Learn the Ways of the Google Hacker
See how to use caches for anonymity and review directory listings and traversal techniques.
• Review Document Grinding and Database Digging
See the ways to use Google to locate documents and then search within the documents to locate information.
• Understand Google’s Part in an Information Collection Framework
Learn the principles of automating searches and the applications of data mining.
• Locate Exploits and Finding Targets
Locate exploit code and then vulnerable targets.
• See Ten Simple Security Searches
Learn a few searches that give good results just about every time and are good for a security assessment.
• Track Down Web Servers
Locate and profile web servers, login portals, network hardware and utilities.
• See How Bad Guys Troll for Data
Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.
• Hack Google Services
Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.
In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.
This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat.
Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services.
Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.
With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.
Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.
From the Hardcover edition.
She writes, ÒContent platforms and social media networks do not have the power to restrain stalkers, end intimate partner violence, eliminate child abuse, or stop street harassment. But they can cultivate better interactions and better discourse, through thoughtful architecture, active moderation and community management.Ó
So how do we filter content from garbage? Read on.
Sarah Jeong writes about technology, policy and law with bylines at Forbes, The Verge, The Guardian, Slate and WIRED.
The important stuff you need to know:Get started fast. Quickly set up accounts, customers, jobs, and invoice items.Follow the money. Track everything from billable and unbillable time and expenses to income and profit.Keep your company financially fit. Examine budgets and actual spending, income, inventory, assets, and liabilities.Gain insights. Open a new dashboard that highlights your company’s financial activity and status the moment you log in.Spend less time on bookkeeping. Create and reuse bills, invoices, sales receipts, and timesheets.Find key info. Use QuickBooks’ Search and Find features, as well as the Vendor, Customer, Inventory, and Employee Centers.
instructions with callouts to photos that show you exactly what to do
when you run into problems or limitations with Evernote
Tips and Notes
to help you take full advantage of Evernote on your smartphone, tablet, or computer
Full-color, step-by-step tasks walk you through making the most of
Evernote –free or premium, on any device! Learn how to
• Install and use Evernote on your iPhone, Android, iPad, BlackBerry, Windows Phone, PC or Mac, and beyond
• Create and share notebooks, customized just the way you like, and organize your
notes your way
• Save images, drawings, handwriting, web content, even webcam snapshots in
notes you can access anywhere, anytime
• Add notes straight from Twitter or Google+, and link Evernote to your Facebook account
• Format your notes to look great, and easily print the notes you want to file
the old-fashioned way
• Build easy-to-use To Do lists, complete with checkboxes
• Sync your notes across multiple devices, and store them in the cloud so they’re always available over the Web
• Import notes from other popular note-taking tools, such as Microsoft OneNote and
• Record high-quality audio notes and organize and share them as needed
• Send notes to Evernote from Apple’s Siri digital assistant
• Organize, tag, and search your notebooks to instantly find whatever you’re looking for
• Install and use the Evernote Web Clipper in all popular web browsers
• Securely share notebooks publicly or privately and collaborate with teams, wherever they are
• Find apps and add-ons that make Evernote do even more for you
CATEGORY: Desktop Applications
USER LEVEL: Beginning-Intermediate
A thoroughly revised and updated edition of the essential guide to preserving your personal security
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business.
J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.
There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security.
Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on:
- The dangers from Facebook, smartphones, and facial recognition
- How to locate a nominee (or proxy) you can trust
- The art of pretexting, aka social engineering
- Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands
- The secrets of international privacy, and much more!
An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.
Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
With SQLite, you'll discover how to develop a database-backed application that remains manageable in size and complexity. This book guides you every step of the way. You'll get a crash course in data modeling, become familiar with SQLite's dialect of the SQL database language, and much more.Learn how to maintain localized storage in a single file that requires no configurationBuild your own SQLite library or use a precompiled distribution in your applicationGet a primer on SQL, and learn how to use several language functions and extensionsWork with SQLite using a scripting language or a C-based language such as C# or Objective-CUnderstand the basics of database design, and learn how to transfer what you already know to SQLiteTake advantage of virtual tables and modules
"Complex SQL concepts explained clearly."
--D. Richard Hipp, creator of SQLite
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment
“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI
Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includesDiscovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies
The important stuff you need to know:Dive into relational data. Solve problems quickly by connecting and combining data from different tables.Create professional documents. Publish reports, charts, invoices, catalogs, and other documents with ease.Access data anywhere. Use FileMaker Go on your iPad or iPhone—or share data on the Web.Harness processing power. Use new calculation and scripting tools to crunch numbers, search text, and automate tasks.Run your database on a secure server. Learn the high-level features of FileMaker Pro Advanced.Keep your data safe. Set privileges and allow data sharing with FileMaker’s streamlined security features.
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits—both how to perform them and how to prevent them.
Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.
Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures– both technical and human. Coverage includes:Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors’ Web sites Performing—and preventing—corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more
Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award.
Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award.
Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad.
Cover photograph © Corbis /
The 2011 version of the Microsoft Office productivity suite for the Mac sports major changes from what Mac users are accustomed to. This soup-to-nuts guide gets the Mac crowd up to date quickly and easily. Individual minibooks thoroughly cover the Project Gallery, Word, Excel, PowerPoint, Outlook (new for Mac), and the Project Center. You’ll learn how the new Office integrates with the Windows version, how to use and customize the new Ribbon interface, and much more.Office for Mac is the most popular office productivity suite for the Mac, used by 1.5 to 2 million people The new version includes new features such as the Ribbon interface, Outlook (which replaces Entourage), and greater integration with the Windows version Covers everything you’ll want to know about the Project Gallery, Word, Excel, PowerPoint, Outlook, and the Project Center
With Office 2011 for Mac All-in-One For Dummies, you’ll be ready to use the newest version of Office like a pro.
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
“Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure.” — Christian Science Monitor
The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
“@War is superb . . . Rigorous, comprehensive, and a joy to read.” — Lawfare
You’ll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.Apply four principles for obtaining the best results from performance testingUse JDK tools to collect data on how a Java application is performingUnderstand the advantages and disadvantages of using a JIT compilerTune JVM garbage collectors to affect programs as little as possibleUse techniques to manage heap memory and JVM native memoryMaximize Java threading and synchronization performance featuresTackle performance issues in Java EE and Java SE APIsImprove Java-driven database application performance
CorelDRAW X The Official Guide is the one-stop tutorial/reference for learning how to create gorgeous graphics for a variety of print and web uses. Veteran graphic designer and author Gary Bouton shows you how to use the new product features, and shows off beautiful graphics and techniques in this Corel-authorized guide. Packed with examples and techniques, this book delivers details no CorelDRAW user can afford to be without!
Ideal for beginners through experts getting started on the new release, the book explains how to install the software, use the illustration and drawing tools, work with text, apply colors, fills, and outlines, apply special effects, and work in 3D.
CorelDRAW X The Official GuideOffers hundreds of tips, tricks, and shortcuts that show how to get the most out of product features, not just what the features do Includes online access to 30+ video tutorials of hands-on instruction from the author, plus CorelDRAW native files, stock images for tutorials in Corel PHOTO-PAINT, custom typefaces designed by the author, and other useful starter pieces for learning CorelDRAW Includes a full-color insert demonstrating results of various filters and effects Provides a comprehensive CorelDRAW X reference as well as drawing tips and illustration techniques Discusses print and web use and potential issues Explains how to use PHOTO-PAINT, Corel’s image-editing tool
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:Lingo--Common security terms defined so that you’re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work
This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)
Written with the clarity, humor, and objective scrutiny, Photoshop CS5: The Missing Manual is the friendly, thorough resource you need.
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA
Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.Contains the essentials for developing both data breach and malware outbreak response plans—and best practices for maintaining those plans Features ready-to-implement CIRPs—derived from living incident response plans that have survived the rigors of repeated execution and numerous audits Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties—and how to protect shareholder value Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24
Tom Thomas and Donald Stoddard
Your first step into the world of network securityNo security experience required Includes clear and easily understood explanations Makes learning easy
Your first step to network security begins here!Learn how hacker attacks work, from start to finish Choose the right security solution for each type of risk Create clear and enforceable security policies, and keep them up to date Establish reliable processes for responding to security advisories Use encryption effectively, and recognize its limitations Secure your network with firewalls, routers, and other devices Prevent attacks aimed at wireless networks
No security experience required!
Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.
Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!