Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
How to Know Your iPod Model

If you have an old iPod but aren't sure exactly which model it is, check the info at the Web page linked below. You'll find lots of photos and information that will help you determine exactly which model you have.

Visit Identifying iPod Models

 
 

What You Need to Know About the Thunderstrike 2 Worm

Researchers will demonstrate a new proof-of-concept worm that attacks Mac firmware at this week’s Black Hat security conference. It’s fascinating research, but not something average users should worry about.

 
Show summaries of articles

Take Control of Security for Mac Users, Chapter 5: Improve Your Passwords

Chapter 5 of “Take Control of Security for Mac Users” Available

Take Control of Security for Mac Users, Chapter 4: Beef Up Your Security Settings

Chapter 4 of “Take Control of Security for Mac Users” Available

Take Control of Security for Mac Users, Chapter 3: Quick Security Fixes

Chapter 3 of “Take Control of Security for Mac Users” Available

Take Control of Security for Mac Users, Chapter 2: Learn Security Basics

Take Control of Security for Mac Users, Chapter 1: Introducing Mac Security

 

Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Apple users who actually buy stuff.
More information: <http://tidbits.com/advertising.html>
 

“Take Control of Security for Mac Users” Streaming in TidBITS

SpamSieve 2.9.19

ClamXav 2.7.2

Computing for the Visually Impaired, Part 2

CrashPlan 3.7

Little Snitch 3.5.1

Thunderstrike Proof-of-Concept Attack Serious, but Limited

Next 20 articles for Stay Safe on Your Computer...

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to William Postman Jr., Dave Vaklyes, rhett bohling,
and Gary Fultz for their generous support!