Let me preface this with a question: Can Apple really sell anything as long as it has its logo affixed to it?The Apple Watch, in a sense, is the first new product launch since Steve Jobs. There has been a lot of doubt surrounding Tim Cook and whether or not he can lead Apple to a future just as bright (or maybe even brighter) than if Steve was still with on this earth. Though Steve Jobs is depicted as a self-centered, egotistical, control freak, he had a knack for being a brilliant businessman, having a keen sense of good versus bad design, and the ability to stretch the limits of current capabilities. Given all those qualities that made him into a unique human being, the world was given the iMac, the iPod, and the iPhone – three consumer electronic devices that changed the very history of technology for the better (or to some, for the worse).
How do you secure the data on your portable computer from thieves, without having to chain your computer to a concrete slab?
I have just the answer.
Disclaimer: The methods I outline here are nowhere near foolproof. Always keep the possibility of theft in the back of your mind when you leave your gadgets unattended.
If you, dear reader, were to tell me after I had purchased the original iPad Mini that I would make the jump to the larger and heavier iPad Air a little over a year later, I would have scoffed at your remarks. Why wouldn’t I? The iPad (or future iterations thereof) is a heavy, bulky, and overpowered piece of gadgetry. I already have a MacBook Air for all my portable computing needs, so why in the world would my next tablet be the larger and more expensive iPad when I could wait for the retina iPad Mini? Hell would have to freeze over before I would make that change.
A year later, hell has frozen over.
The TV and computing landscape has changed forever.
A growing number of young adults and adults alike are cutting the cord – disconnecting themselves from the cable oligarchy and finding entertainment solace in the internet. Moving from a cable provider to the internet is not an easy task, however. Today, there are an infinite number of choices to choose from – ranging from Google TV, Roku, Boxee, and Apple TV, all with their own method of self-control and DRM-laden content. So how are you supposed to choose the right ecosystem?
To all of those who spent the timeless years with AT&T, you have a way out.
As of yesterday, April 8th, if you have an iPhone with a cellular contract with AT&T, you can unlock the phone.
“Huzzah!”, said the millions of AT&T iPhone users.
In this hard economy, one can never be too careful about what they put on the web, and this holds especially true for (would-be) employees.
Here’s a question for you to ponder: Can employers, potential or not, ask you to divulge your Facebook profile login information?
Continue reading →
I’m relatively new to the whole cryptography and computing security scene and it has always intrigued me on how so many people with their Macbooks, Netbooks, iPhones, external hard drives, and other mobile devices are so vulnerable to malicious attacks from outsiders. There has always been an age-old saying in the IT business: PEBKAC (Problem Exists Between Keyboard and Chair).
While most of the problems that IT managers and security professionals deal with stem from the inability of users to practice some common sense when browsing the web, those types of problems are easy to rectify.
However, there is very little IT managers and security professionals can do about physical theft, such as a burglaries and corporate espionage. Thankfully, there is a way for ordinary people like you and me to protect your sensitive data from physical theft.