Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
If you are going to sell, give away, recycle or pass on your Mac to someone else, you want to make sure you sign out of all of your accounts and completely erase the drive on the Mac.
Link to video in case you don't see it above: <a href="https://vimeo.com/588895323" rel="nofollow noopener" target="_blank">https://vimeo.com/588895323</a> Here's another location in case that doesn't work: <a href="https://archive.org/download/the-super-secret-mac-keyboard-shortcuts-almost-no-one-knows-about-macmost-2511/2511KeyBindings.mp4" rel="nofollow noopener" target="_blank">https://archive.org/download/the-super-secret-mac-keyboard-shortcuts-almost-no-one-knows-about-macmost-2511/2511KeyBindings.mp4</a> I'm very excited about this video I just finished for next week. It describes a way to create text entry keyboard shortcuts, "macros" and text insertions that I don't think many other people have ever even talked about. These are called Key Bindings and you can use them to do all sorts of interesting stuff. I thought I'd post it here early and we can discuss it. I'll attach the file I create for reference. Here are some of the links I mention at the end of the video: <a href="https://ss64.com/osx/syntax-keybindings.html" rel="nofollow noopener" target="_blank">https://ss64.com/osx/syntax-keybindings.html</a> <a href="https://github.com/ttscoff/KeyBindings" rel="nofollow noopener" target="_blank">https://github.com/ttscoff/KeyBindings</a> <a href="https://www.hcs.harvard.edu/~jrus/site/cocoa-text.html" rel="nofollow noopener" target="_blank">https://www.hcs.harvard.edu/~jrus/site/cocoa-text.html</a> <a href="http://www.hcs.harvard.edu/~jrus/Site/selectors.html" rel="nofollow noopener" target="_blank">http://www.hcs.harvard.edu/~jrus/Site/selectors.html</a> <a href="https://www.hcs.harvard.edu/~jrus/Site/system-bindings.html" rel="nofollow noopener" target="_blank">https://www.hcs.harvard.edu/~jrus/Site/system-bindings.html</a>
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Touch ID makes it more convenient to log on to your Mac and perform other tasks. By making it easier it encourages more people to use stronger account passwords.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
While private browser windows are a good privacy feature, they don't protect you from malware, account break-ins, or other security issues.
Since so many enjoyed how I built a custom green screen, here's how I made a custom mounting system for my camera and the lights. Very low budget, but not on purpose. They simply don't make anything like this. A tripod would take up too much space. I said a foot or so in the video, but the legs would have stuck out way more than that actually. Here are some links to some of the items I bought: WALI Single LCD Monitor Desk Mount <a href="https://www.amazon.com/gp/product/B018MT6ZEK" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B018MT6ZEK</a> WALI Dual Fully Adjustable Arm <a href="https://www.amazon.com/gp/product/B07BHY3CNM" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B07BHY3CNM</a> Pergear Q02S DSLR Camera Tripod Ball Head <a href="https://www.amazon.com/gp/product/B07T5RBQLD" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B07T5RBQLD</a> Diffusion Film Filter Sheet 6 Packs Kit <a href="https://www.amazon.com/gp/product/B08PTCGTX9" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B08PTCGTX9</a> SMALLRIG Left Side Cold Shoe Adapter Relocation Plate <a href="https://www.amazon.com/gp/product/B07RWC8Y6J" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B07RWC8Y6J</a> 2 Pack Set Magnetic Flexible Gooseneck Metal with Alligator Clips <a href="https://www.amazon.com/gp/product/B07XNSYK6F" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B07XNSYK6F</a>
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Find My Mac will allow you to locate your Mac if it is lost or stolen, and also to lock it or erase it if you can't get it back.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Use an Uninterruptible Power Supply (UPS) to prevent problems during power outages when using an iMac, Mac mini or Mac Pro.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
FileVault encrypts your drive in a way that is seamless to you, but would make it impossible for someone else to access the data on your drive without your password.
When you copy large files, or lots of files, with the Finder, you can cancel but not pause. However, if you use the Terminal you can pause in the middle of a large copy, move or anything. This works best using rsync so you can see the progress. Basically you use Control+Z to pause the Terminal command. Then you use fg to continue.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Using iCloud Drive can make your Mac more secure by providing an easy way to get your files back if your Mac is lost or damaged.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
In addition to a Time Machine backup, you may want to consider a second backup that is also Time Machine, or a clone of your drive, or an online backup.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Every computer user should back up their data. Time Machine is the Mac's built-in backup software and can be used by just getting a simple external drive.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Each individual using a Mac should have their own user account. Keeping separate user accounts is critical for data security.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
To protect your Mac from malware, follow these three simple rules.
The green screen I use isn't one from off-the-shelf. This is my own design using a green screen fabric, two 1x4 pieces of wood, and some chain and tacks. This is version 3 or 4 of the design. I think I showed an earlier design a year or two ago. This is the fabric I bought. I guess I remember it being cheaper in the video. <a href="https://www.amazon.com/gp/product/B004EKAJ1M" rel="nofollow noopener" target="_blank">https://www.amazon.com/gp/product/B004EKAJ1M</a>
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
You don't need third-party anti-virus software on your Mac. In fact, your Mac already comes with anti-malware software as part of macOS.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
If one of your online accounts has been compromised, you need to take action immediately. Those accounts, and all of your others, need to be checked carefully and you will need to contact banks and other services to protect yourself.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Using a VPN will protect your data from malicious Wi0Fi networks and ISPs. But thanks to HTTPS, it is mostly unnecessary for typical Mac users.
Check out the rest of the videos in this special course: The Practical Guide To Mac Security.
Even if you have a strong password and use two-factor authentication, your Mac and accounts can still be vulnerable to social engineering when you fall victim to simple scams.