Take Control of 1Password, Second Edition

Take Control of 1Password, Second Edition
Author: Joe Kissell
Publisher: "O'Reilly Media, Inc."
Total Pages: 199
Release: 2016-01-13
Genre: Computers
ISBN: 1457199394

Easily create and enter secure passwords on all your devices! Remembering and entering Web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter Web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, and sync and share your passwords using a variety of techniques--including 1Password for Teams. Joe focuses on 1Password 6 for the Mac, but he also provides details and directions for the iOS, Windows, and Android versions of 1Password. Meet 1Password: Set your master passcode, explore the various 1Password components, and decide on your ideal usage strategy. "While reading Take Control of 1Password on my iPad I was furiously highlighting passages and following along with 1Password open on my Mac. [The book] showed me how some of my passwords were weak or duplicates. I immediately changed those passwords to unique and secure ones. " --Elisa Pacelli, in her MyMac book review. Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a Web site. Find out how to create logins, sort them, search them, tag them, and more. You'll especially find help with editing logins. For example, if you change a site's password from dragon7 to eatsevendragonsforlunchatyahoo, you'll want to incorporate that into its login. Or, use 1Password's password generator to create highly secure random passwords, like dGx7Crve3WucELF#s. Understand password security: Get guidance on what makes for a good password, and read Joe's important Password Dos and Don'ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly. Go beyond Web logins: A primary point of 1Password is to speed up Web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You'll also find advice on storing passwords for password-protected files and encrypted disk images, plus ideas for keeping track of confidential files, scans of important cards or documents, and more. Sync your passwords: Discover which 1Password syncing solution is right for you: Dropbox, iCloud, or a Finder folder, as well as a device-to-device Wi-Fi sync. Share your passwords: Learn how 1Password integrates with the 1Password for Teams online service for sharing passwords within groups, such as your family or company work group. You'll also discover the answers to key questions, including: Should I use my Web browser's autofill feature? What about iCloud Keychain? Should I use that too? What can I do quickly to get better password security? Should I buy 1Password from AgileBits or the Mac App Store? How can I find and update weak passwords I created long ago? What's the best way to work with the password generator? What should I do about security questions, like the name of my pet? How can 1Password provide a time-based one-time password (TOTP)? How can I access my 1Password data on another person's computer? How do I initiate 1Password logins from utilities like LaunchBar?

Take Control of Thanksgiving Dinner, 2nd Edition

Take Control of Thanksgiving Dinner, 2nd Edition
Author: Joe Kissell
Publisher: alt concepts
Total Pages: 103
Release: 2023-10-22
Genre: Cooking
ISBN: 1990783406

Learn how to prepare a delicious Thanksgiving dinner with a maximum of enjoyment and a minimum of stress, snafus, and sleeplessness! Version 2.0, updated October 22, 2023 Joe Kissell trades his trackpad for a whisk and brings his knack for breaking complex topics into simple steps to the task of preparing a full-bore Thanksgiving dinner. With Joe's help and extensively tested recipes, cooking a complete Thanksgiving feast can be both delicious and stress-free! If you'd like your Thanksgiving preparations to go smoothly (and who wouldn't?), turn to experienced tech writer and foodie Joe Kissell for help. At least half the battle is a good plan, and Joe provides you with a customizable plan that gets you organized, helps you figure out what you need to buy, and prevents last-minute problems. Once the planning and shopping are done, follow Joe's detailed, tested recipes for Thanksgiving dinner: roast turkey with gravy, stuffing, mashed potatoes, cranberry relish, candied sweet potatoes, and pumpkin pie. Read this ebook to learn the answers to questions such as: • What type of turkey should I buy? • Is there a fast way to make cranberry relish? • What's the secret to making perfect gravy? • How do you deal with a raw turkey, and which end is the neck? • See the FAQ tab above for more questions and some answers.

Take Control of Your Digital Legacy, 2nd Edition

Take Control of Your Digital Legacy, 2nd Edition
Author: Joe Kissell
Publisher: alt concepts
Total Pages: 94
Release: 2024-02-02
Genre: Computers
ISBN: 1990783295

Preserve your data for posterity! Version 2.0.1, updated February 2, 2024 How do you want to be remembered? A will takes care of your physical possessions, but what about your digital life—photos, email, files, online accounts, and so on? If you want to pass your electronic ephemera on as part of your digital legacy, turn to tech expert Joe Kissell for advice on dealing with large quantities of data, file formats, media types, the need for a “digital executor,” and more.n We all have digital data that's important to us now, but a lot of it could also be important to our children, friends, and relatives long after we're gone. But you have to take concrete steps now to make sure that data is preserved in the right way and handled according to your wishes. It’s not all about posterity either, since following Joe’s advice will also help loved ones access your key accounts and important info if you’re temporarily incapacitated, which can happen at any time. The book will help you with these essential tasks: • Identify your key digital assets: online accounts, photos, audio files, videos, passwords, documents, email, and more. • Plan for each type of digital asset based on your priorities for today, for shortly after you are no longer around, and for posterity. Joe explains the ideal file formats to use, how to deal with social media sites, the best ways to digitize paper documents and photos, and strategies for sharing passwords with family members, among much else. • Communicate your wishes in a “digital will” and designate someone to be its “digital executor.” The book includes a template document that you can develop into a personalized digital will. • Preserve your data for the future. You’ll consider types of archival storage media, cloud-based storage services, backups, and what instructions to provide about maintaining your data as file formats and storage media types evolve. Whether you just want to ensure that your heirs get copies of your favorite family photos and a few key documents or you want to catalog and preserve tens of thousands of digital items, this book helps you make smart decisions about your digital legacy. Questions answered include: • What strategies can I use for sorting and preserving email and instant messages? • How can I ensure that my email account(s) will be available to those wrapping up my estate? • What if I have digital data that should be destroyed when I die? • What should I do with my huge photo collection (both digital and paper)? • How should I pass on control of my Apple, Google, and Microsoft accounts? • How can I make my passwords and passkeys available to those who will need them—but keep them private for now? • What should I think about when handing down purchased audio and video files? • What should happen to my Facebook account when I’m no longer around? • What choices are available for keeping my digital archive available and backed up? • How long should I expect archival media to last? • Should I write an autobituary? • Are online digital legacy services any good? • How will organizing all this stuff benefit me while I’m alive?

Take Control of 1Password, 6th Edition

Take Control of 1Password, 6th Edition
Author: Joe Kissell
Publisher: alt concepts
Total Pages: 130
Release: 2024-03-20
Genre: Computers
ISBN: 199078318X

Easily create and enter secure passwords on all your devices! Version 6.2, updated March 20, 2024 Annoyed by having to type hard-to-remember passwords? Let 1Password do the heavy lifting. With coverage of 1Password version 8 for Mac, Windows, Linux, iOS/iPadOS, Android, and Apple Watch, author Joe Kissell shows you how to generate and enter secure passwords, speed up your online shopping, and share and sync web logins and other confidential data. Wrangling your web passwords can be easy and secure, thanks to 1Password, the popular password manager from AgileBits. In this book, Joe Kissell brings years of real-world 1Password experience into play to explain not only how to create, edit, and enter web login data easily, but also how to autofill contact and credit card info when shopping online, audit your passwords and generate better ones, handle two-factor authentication (2FA), sync data across devices using a hosted 1Password account (individual, family, or business), and securely share passwords with family members, coworkers, and friends. This fully revised sixth edition covers 1Password version 8 for Mac, Windows, Linux, iOS/iPadOS, Android, and Apple Watch. It does not include instructions for using earlier versions of 1Password. Topics include: Meet 1Password: Set your master password, explore the various 1Password components, and decide on your ideal usage strategy. What's New in Version 8: 1Password 8 unifies features and interface across platforms and adds important new features—but it also includes some controversial changes. Learn what has changed, how to migrate from older versions, and what new behaviors you must adjust to. Master logins: In 1Password, a typical login contains a set of credentials used to sign in to a website. Find out how to create logins, sort them, search them, tag them, and more. You’ll also find help with editing logins—for example, changing a password or adding further details. Understand password security: Get guidance on what makes for a good password, and read Joe’s important Password Dos and Don’ts. A special topic covers how to perform a security audit in order to improve poor passwords quickly. Go beyond web logins: A primary point of 1Password is to speed up web logins, but 1Password can also store and autofill contact information (for more than one identity, even), along with credit card information. You’ll also find advice on storing SSH keys, passwords for password-protected files and encrypted disk images, confidential files, software licenses, scans of important cards or documents, and more. Sync your passwords: Discover how a hosted 1Password account can sync all your data securely across your devices. Share your passwords: Learn to store passwords within a family or team hosted account, or even with people who don't already use 1Password at all. You’ll also discover the answers to key questions, including: • Should I keep using my web browser’s autofill feature? • What about iCloud Keychain? Should I use that too? • Do I need the full 1Password app, or is the browser extension enough? • How does the Universal Autofill feature for Mac work across browsers and apps? • What are passkeys, and what can 1Password do with them? • How can 1Password help me with sites where I sign in with my Apple, Google, or Facebook account? • What's the easy way to prevent sensitive information from falling into the wrong hands at a border crossing? • What can I do quickly to get better password security? • How can I find and update weak passwords I created long ago? • What should I do about security questions, like the name of my pet? • How can 1Password provide a time-based one-time password (TOTP)?

Take Control of Wi-Fi Networking and Security

Take Control of Wi-Fi Networking and Security
Author: Glenn Fleishman
Publisher: alt concepts
Total Pages: 110
Release: 2022-11-21
Genre: Computers
ISBN: 1990783236

Get more from your Wi-Fi network Version 1.4, updated November 21, 2022 Setting up and securing a Wi-Fi network can be complicated and confusing. This book helps you over every hurdle involved in picking gateways, setting up a network, adding devices, and securing the network and connected phones, tablets, and computers. It’s useful for those who have set up networks in the past and want to replace them with new gear, as well as people who have never built a Wi-Fi network before.n Perhaps you already have a Wi-Fi network running in your home and office, but you’re dissatisfied with it. Or maybe you’re setting up a new house, apartment, business, or school room with Wi-Fi and need to know the basics about what to get and how to configure it. In either case, this book is for you. After over 16 years of writing regularly about Wi-Fi and answering reader questions, author Glenn Fleishman finds that the same issues still crop up: • How do I spend the least money to the best effect? • What’s the best place to put my Wi-Fi gateways? • How can I get both high throughput (speed) on my network and solid coverage across everywhere I want to use Wi-Fi? • What can I do to secure my network against outsiders near my house and elsewhere on the internet? • How do I add networked hard drives and printers? • Interference is slowing my network; what can I do to reduce it? • What’s the best way to extend my network to a garage, yard, or nearby building? This book answers those questions in depth, as well as many others related to Wi-Fi, including how to set up a personal or mobile hotspot with all major operating systems, how to access computers on your network remotely, and why you should use a VPN (virtual private network). If you have any question about overhauling your network, setting up a new one, or just finally figuring out something that’s never worked, this book has the answer. Covers macOS, Windows, iOS, Android, and Chrome OS.

Take Control of Your Digital Storage, 2nd Edition

Take Control of Your Digital Storage, 2nd Edition
Author: Jeff Carlson
Publisher: alt concepts
Total Pages: 132
Release: 2022-07-07
Genre: Computers
ISBN: 1990783066

The Mac user’s guide to mass storage Version 2.3, updated July 7, 2023 This book demystifies storage on the Mac, from mechanical hard drives to solid-state disks, and covering topics such as network-attached storage (NAS), cloud storage, repairing and managing disks, encryption, filesystems (including APFS), and managing data. As the amount of data we store continues to grow, figuring out where to put it and how to access it becomes more complicated. It’s not just that we need to find space for our increasingly large collections of photos, videos, music, and apps—we want it to be available whenever we need it, and be sure that it’s safe from hackers and thieves. Every Mac includes internal storage in the form of a hard drive, SSD, or Fusion drive. But you may also have one or more external devices (such as hard drives, flash drives, SD cards, or RAID devices), not to mention network-attached storage (NAS) devices or cloud storage (like Dropbox or iCloud Drive). Making sense of all your options, managing your stored data, choosing new devices or services when you're running out of space, or even just figuring out what's where can drive anyone to distraction. Fortunately, Jeff Carlson has a book with all the answers! After decades of working with Macs and accumulating massive collections of photos and videos, Jeff has pulled together a wide-ranging book about Mac storage that contains just the help you're looking for. Among many other topics, this book covers: • How to choose a new (internal or external) hard drive, SSD, or hybrid drive • Determining how much storage space you need • What you need to know about APFS, Apple’s new filesystem • How to use APFS snapshots (a.k.a. Time Machine local snapshots) • Formatting and partitioning disks using Disk Utility • How to repair a misbehaving disk • RAIDs: what they are and how different types compare • How to tell when a hard drive is about to fail, and what to do about it • What to do with a hard drive when it has outlived its usefulness • When to use a flash drive or SD card • How to create and use disk images • Deciding among local, network, and cloud storage for various types of files • What a personal cloud is and why you might consider using one • Strategies for freeing up extra disk space NAS devices get special coverage, including: • Why you might want a NAS • How to choose a NAS—and when it's a better idea than an external hard drive • Using a NAS with your Mac for a wide variety of purposes • Special considerations when using a NAS for digital photos Jeff also digs into details about numerous storage-related technologies: • How to tell if your third-party SSD needs to have TRIM enabled (and what to do if the answer is yes) • How to create a software RAID using Disk Utility or SoftRAID • What you need to know about filesystems—and how to choose among APFS, Mac OS Extended, FAT, and ExFAT • Why and how to encrypt a disk using FileVault or the Finder • Using iCloud Drive's Optimized Mac Storage feature If you've ever been stumped at the difference between a volume and a partition, need help figuring out whether to buy a big external hard drive or a NAS for extra storage, or wonder whether Apple's new APFS filesystem is right for your needs, this book will tell you what you need to know.

Take Control of Your Passwords, 4th Edition

Take Control of Your Passwords, 4th Edition
Author: Joe Kissell
Publisher: alt concepts
Total Pages: 108
Release: 2024-03-21
Genre: Computers
ISBN: 1990783309

Overcome password frustration with Joe Kissell's expert advice! Version 4.1.1, updated March 21, 2024 Password overload has driven many of us to take dangerous shortcuts. If you think ZombieCat12 is a secure password, that you can safely reuse a password, or that no one would try to steal your password, think again! Overcome password frustration with expert advice from Joe Kissell! Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like "What is your pet’s favorite movie?", and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes nine different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can’t help. New in the Fourth Edition is complete coverage of passkeys, which offer a way to log in without passwords and are rapidly gaining popularity—but also come with a new set of challenges and complications. The book also now says more about passcodes for mobile devices. An appendix shows you how to help a friend or relative set up a reasonable password strategy if they're unable or unwilling to follow the recommended security steps, and an extended explanation of password entropy is provided for those who want to consider the math behind passwords. This book shows you exactly why: • 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. • You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. • It is not safe to use the same password everywhere, even if it’s a great password. • A password is not immune to automated cracking because there’s a delay between login attempts. • Even if you’re an ordinary person without valuable data, your account may still be hacked, causing you problems. • You cannot manually devise “random” passwords that will defeat potential attackers. • Just because a password doesn’t appear in a dictionary, that does not necessarily mean that it’s adequate. • It is not a smart idea to change your passwords every month. • Truthfully answering security questions like “What is your mother’s maiden name?” does not keep your data more secure. • Adding a character to a 10-character password does not make it 10% stronger. • Easy-to-remember passwords like “correct horse battery staple” will not solve all your password problems. • All password managers are not pretty much the same. • Passkeys are beginning to make inroads, and may one day replace most—but not all!—of your passwords. • Your passwords will not be safest if you never write them down and keep them only in your head. But don’t worry, the book also teaches you a straightforward strategy for handling your passwords that will keep your data safe without driving you batty.

Operating Systems and Middleware

Operating Systems and Middleware
Author: Max Hailperin
Publisher: Max Hailperin
Total Pages: 496
Release: 2007
Genre: Computers
ISBN: 0534423698

By using this innovative text, students will obtain an understanding of how contemporary operating systems and middleware work, and why they work that way.

SSH, The Secure Shell

SSH, The Secure Shell
Author: Daniel J. Barrett
Publisher: "O'Reilly Media, Inc."
Total Pages: 666
Release: 2005-05-10
Genre: Computers
ISBN: 0596008953

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.