Take Control of iOS iPadOS Privacy and Security 3rd Edition

More dual-SIM and roaming info: After a trip to Europe, I've provided more detail in Use Multiple SIMs about managing two SIMs (eSIM or otherwise) while roaming. New data connection troubleshooting messages: iOS 16 and iPadOS 16 added a ...

Take Control of iOS   iPadOS Privacy and Security  3rd Edition

Master networking, privacy, and security for iOS and iPadOS! Version 3.1, updated December 23, 2022 This book describes how to securely use your iPhone and iPod touch with iOS 16 and iPad with iPadOS 16 on Wi-Fi and cellular/mobile networks, making connections with ease while protecting your data and your privacy.n Your iPhone and iPad have become the center of your digital identity, and it’s easy to lose track of all the ways in which Apple and other parties access your data legitimately—or without your full knowledge and consent. While Apple nearly always errs on the side of disclosure and permission, many other firms don’t. This book comprehensively explains how to configure iOS 16, iPadOS 16, and iCloud-based services to best protect your privacy with messaging, email, browsing, and much more. The book also shows you how to ensure your devices and data are secure from intrusion from attackers of all types. Take Control of iOS & iPadOS Privacy and Security covers how to configure the hundreds of privacy and data sharing settings Apple offers in iOS and iPadOS, and which it mediates for third-party apps. You’ll learn how Safari has been increasingly hardened to protect your web surfing habits, personal data, and identity—particularly with the addition of the iCloud Private Relay, an option for iCloud+ subscribers to anonymize their Safari browsing. In addition to privacy and security, this book also teaches you everything you need to know about networking, whether you’re using 3G, 4G LTE, or 5G cellular, Wi-Fi or Bluetooth, or combinations of all of them; as well as about AirDrop, AirPlay, Airplane Mode, Personal Hotspot, and tethering. You’ll learn how to: • Master the options for a Personal Hotspot for yourself and in a Family Sharing group. • Troubleshoot problematic Wi-Fi connections. • Set up a device securely from the moment you power up a new or newly restored iPhone or iPad. • Manage Apple’s new built-in second factor verification code generator for extra-secure website and app logins. • Get to know Apple’s passkeys, a new high-security but easy-to-use website login system with industry-wide support. • Protect your email by using an address Apple manages and relays messages through for you. • Understand Safari’s blocking techniques and how to review websites’ attempts to track you. • Learn about Apple’s privacy-challenging changes designed to improve the safety of children, both those using Apple hardware and those who suffer abuse. • Optimize cellular data use to avoid throttling or overage charges, while always getting the best throughput. • Understand why Apple might ask for your iPhone, iPad, or Mac password when you log in on a new device using two-factor authentication. • Figure out whether an embedded SIM (eSIM) is right for you—or the only choice. • Share a Wi-Fi password with nearby contacts and via a QR Code. • Differentiate between encrypted data sessions and end-to-end encryption. • Stream music and video to other devices with AirPlay 2. • Deter brute-force cracking by relying on a USB Accessories timeout. • Engage Lockdown Mode when directly targeted by high-end attackers, such as government spies—from your or another nation—and criminal organizations. • Configure Bluetooth devices. • Transfer files between iOS and macOS with AirDrop. • Block creeps from iMessage, FaceTime, text messages, and phone calls. • Secure your data in transit with a Virtual Private Network (VPN) connection. • Protect Apple ID account and iCloud data from unwanted access at a regular level and via the new Safety Check, designed to let you review or sever digital connections with people you know who may wish you harm.

Take Control of Your Apple ID 3rd Edition

You can also have both. (It also enables a device-based recovery method that uses a device passcode.) For more on ADP, read Apple's advice, or see my book Take Control of iOS & iPadOS Privacy and Security, in which I provide full ...

Take Control of Your Apple ID  3rd Edition

Prevent (or solve) problems with your Apple ID! Version 3.4, updated December 23, 2022 This book covers everything you need to know about configuring an Apple ID account, interactions with iCloud-based services, and troubleshooting account access. Your Apple ID is much more than a simple username. It's a key that unlocks a long list of Apple products and services on any of numerous devices. iCloud uses an Apple ID, as does Apple Music; the App Store; the Music, TV, and Books apps; and more. An Apple ID protects your personal information, including email and iOS/iPadOS backups; helps you find a lost iPhone; and can even unlock your Mac. So it goes without saying that if something goes wrong with your Apple ID, you could be in for a world of hurt. Unfortunately, things go wrong with Apple IDs all the time. Fortunately, Glenn Fleishman, a veteran technology journalist and the author of Macworld's "Mac 911" column, is ready to help with expert advice on how to manage your Apple ID—including how to prevent, solve, or work around most common problems! In this book, Glenn answers questions like: • What all is my Apple ID used for? • How does my iCloud account relate to my Apple ID? • What problems can two-factor authentication (2FA) solve, and how do I use it? • Are there other mechanisms I can use to ensure that I can recover an Apple ID in the event of a problem? (Spoiler: yes!) • What if I have a device that's too old to work with two-factor authentication? • What should I do if I have two or more Apple IDs or iCloud accounts? • Will I lose access to all my Apple media purchases if I move to another country? • Can I share an Apple ID with someone else? • What exactly should I do if I think someone is hacking my Apple ID account? • How can I recover a forgotten Apple ID password? • What steps should I take if Apple locks me out of my account? • If I lose access to an email address associated with my Apple ID, what can I do? • What Apple ID changes in recent versions of iOS, iPadOS, and macOS do I need to know about? • How does "Sign in with Apple" work? • How can I use Family Sharing to share data and purchases within my family? • What types of subscriptions can I manage with my Apple ID, and how? • Which payment methods can I associate with my Apple ID, and how do I manage them? And that's just the beginning. Glenn has packed a remarkable amount of concise problem-solving information into this compact, 140-page book. Read it before you encounter Apple ID problems to minimize your risk, and if you've already encountered a problem, read it to find the best path to a rapid solution.

Take Control of Your Passwords 3rd Edition

Tip: If you use an iOS or iPadOS device, also make sure prompts for your Apple ID password are really coming from Apple! Read the article iOS Privacy: steal.password - Easily get the user's Apple ID password, just by asking for details.

Take Control of Your Passwords  3rd Edition

Overcome password frustration with Joe Kissell’s expert advice! Version 3.2, updated July 28, 2021 Password overload has driven many of us to take dangerous shortcuts. If you think ZombieCat12 is a secure password, that you can safely reuse a password, or that no one would try to steal your password, think again! Overcome password frustration with expert advice from Joe Kissell! Passwords have become a truly maddening aspect of modern life, but with this book, you can discover how the experts handle all manner of password situations, including multi-factor authentication that can protect you even if your password is hacked or stolen. The book explains what makes a password secure and helps you create a strategy that includes using a password manager, working with oddball security questions like “What is your pet’s favorite movie?”, and making sure your passwords are always available when needed. Joe helps you choose a password manager (or switch to a better one) in a chapter that discusses desirable features and describes a dozen different apps, with a focus on those that work in macOS, iOS, Windows, and Android. The book also looks at how you can audit your passwords to keep them in tip-top shape, use two-step verification and two-factor authentication, and deal with situations where a password manager can’t help. The book closes with an appendix on helping a relative set up a reasonable password strategy for those whose friends or relatives have distressing password strategies, and an extended explanation of password entropy for those who want to consider the math behind passwords. This book shows you exactly why: • 9-character passwords with upper- and lowercase letters, digits, and punctuation are not strong enough. • You cannot turn a so-so password into a great one by tacking a punctuation character and number on the end. • It is not safe to use the same password everywhere, even if it’s a great password. • A password is not immune to automated cracking because there’s a delay between login attempts. • Even if you’re an ordinary person without valuable data, your account may still be hacked, causing you problems. • You cannot manually devise “random” passwords that will defeat potential attackers. • Just because a password doesn’t appear in a dictionary, that does not necessarily mean that it’s adequate. • It is not a smart idea to change your passwords every month. • Truthfully answering security questions like “What is your mother’s maiden name?” does not keep your data more secure. • Adding a character to a 10-character password does not make it 10% stronger. • Easy-to-remember passwords like “correct horse battery staple” will not solve all your password problems. • All password managers are not pretty much the same. • Your passwords will not be safest if you never write them down and keep them only in your head. But don’t worry, the book also teaches you a straightforward strategy for handling your passwords that will keep your data safe without driving you batty.

Cybersecurity Best Practices

Das Thema Cybersecurity ist so aktuell wie nie, denn im Cyberspace lassen sich nur schwer Grenzen in Bezug auf den Zugang zu Informationen, Daten und Redefreiheit setzen. Kriminelle nutzen die Lücken oft zu ihrem Vorteil aus.

Cybersecurity Best Practices

Das Thema Cybersecurity ist so aktuell wie nie, denn im Cyberspace lassen sich nur schwer Grenzen in Bezug auf den Zugang zu Informationen, Daten und Redefreiheit setzen. Kriminelle nutzen die Lücken oft zu ihrem Vorteil aus. Die Vielzahl der IT-Systeme, ihre unterschiedlichen Nutzungsarten und ihre Innovations- und Lebenszyklen haben zu hohen Sicherheitsrisiken für Unternehmen und staatliche Einrichtungen geführt. Diese Risiken werden sich auch langfristig nicht so einfach aus der Welt schaffen lassen. Daher müssen Institutionen Strategien und Lösungen zu ihrem Selbstschutz entwickeln. Dieses Buch beschreibt Lösungsansätze und Best Practices aus den unterschiedlichsten Bereichen, die nachweislich zu einer höheren Resilienz gegenüber Cyberangriffen führen. Weltweit renommierte IT-Sicherheitsexperten berichten in 40 Beiträgen, wie sich staatliche Institutionen, unter anderem das Militär (Cyber Defence), Behörden, internationale Organisationen und Unternehmen besser gegen Cyberangriffe schützen und nachhaltige Schutzstrategien entwickeln können. Die Autoren widmen sich den Gründen und Zielen, die ihren jeweiligen Strategien zugrunde liegen, sie berichten, wie Unternehmen auf konkrete Cyberattacken reagiert haben und wie einzelne staatliche Institutionen angesichts nationaler Cyberstrategien agieren. In weiteren Kapiteln zeigen Wissenschaftler auf, was bei der Abwehr von Cyber-Attacken bereits heute möglich ist, welche Entwicklungen in Arbeit sind und wie diese in Zukunft eingesetzt werden können, um die Cyber-Sicherheit zu erhöhen. Im letzten Kapitel berichten Hersteller, Anwenderunternehmen und Dienstleister welche Best Practices sie in ihren Unternehmen eingeführt haben und wie andere Unternehmen ihrem Beispiel folgen können. Das Buch richtet sich an IT-Verantwortliche und -Sicherheitsbeauftragte in Unternehmen und anderen Organisationen, aber auch an Studierende in den verschiedenen IT-Studiengängen.

Handlettering Mit Procreate

Dieses Buch kombiniert das Trendthema Handlettering mit Procreate, der beliebten Zeichen- und Design-App fürs iPad.

Handlettering Mit Procreate

Dieses Buch kombiniert das Trendthema Handlettering mit Procreate, der beliebten Zeichen- und Design-App fürs iPad. Mit wunderschönen, abwechslungsreichen Beispielen und einfachen Anleitungen führt Handlettering-Künstlerin Liz Brown die Leser*innen in die Kunst des digitalen Handletterings ein. Schritt für Schritt erklärt sie die Funktionen und Möglichkeiten der App sowie die Grundlagen des Letterings von einfachen Alphabeten über schöne Sprüche bis zu ausgefallenen Bildkompositionen. Neben Übungsseiten und Anleitungen zum Erstellen eines digitalen Übungsblatts gibt es alle von der Autorin benutzten Procreate-Pinsel zum kostenlosen Download, sodass man direkt loslegen und die Beispiele nachzeichnen kann.- Inspirationen mit Farbpaletten, Deko-Elementen und Buchstabenformen für einzigartige Stile- Tipps und Tricks zum Hinzufügen von Texturen, Ebenen, Schattierungen und Tiefe- Kreative Ideen, um den Raum um die Buchstaben herum aufzupeppen.