Skip to content
JONATHANS BLOG
View website Menu
  • Adventures
    • DIY
    • WhiskyWhisky!
    • Beerphotos of the beer I drink…
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Icalthis is the category for ical. in it you will find lots of tips and tricks and some hacks for ical on your mac.
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protoolsprotools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search
Search this website
  • Adventures
    • DIY
    • Whisky
    • Beer
    • Cooking
    • Fitness
    • London
    • Edinburgh
    • Liverpool
    • Glasgow
    • digit expo 2023
    • digitexpo 2022
    • CYBERUK19
    • Amsterdam Blockchain 2018
    • Sorrento 2015
    • West Highland Way 2014
    • West Island Way 2014
    • Aberfoyle 2013
    • Scottish islands cycle 2012
    • Cyprus 2011
    • Europe cycle 2010
    • Cycle across europe 2009
  • Crypto Coins
    • Amsterdam Blockchain
    • Alt coins
    • Bitcoin
    • Exchanges
    • Mining
  • Development
    • Editors
    • Methodology
    • Multiloquent
    • Multiloquent wordpress theme
    • Php
    • SEO
    • SQL
    • Vagrant
    • vuejs
    • WordPress
  • Hardware
    • raspberry pi
  • Pentest
    • Metasploit
    • Hacking Tools
    • CYBERUK19
    • OSCP
  • Android
  • Kali Linux
  • Linux
    • Apache
    • Kali Linux
    • Commandline
    • Networking
    • Metasploit
  • Apple
    • Iphone and ipad
    • Apple tv
    • Addressbook / contacts
    • Dock
    • Finder
    • Gaming
    • Google chrome
    • Ical
    • Ichat / messages
    • Iphoto
    • Itunes
    • Mission control
    • Notification center
    • Osx
    • Reminders.app
    • Safari
    • Mail.app
    • Security
    • Spotlight
    • Tasks
    • Terminal
    • Time machine
  • Other
    • News
    • Ableton
    • Music
    • Albums
    • Legal stuff
    • Protools
    • Internet
    • Social networking
    • Formula 1
  • About Me
    • Portfolio
  • Type your search

Security

  1. Home>
  2. Apple>
  3. Mac stuff>
  4. Security>
  5. Page 2
Image by The Belgian Nomad on Shutterstock
Image by The Belgian Nomad on Shutterstock

How To Defend Against Pegasus Spyware

  • Post author:jonathansblog
  • Post published:July 22, 2022
  • Post category:Security
  • Post comments:0 Comments

Last year, an international group of journalists came to the limelight with extensive and thorough details of new evidence against Pegasus spyware, which was developed by cyber-arms company NSO Group.…

Continue ReadingHow To Defend Against Pegasus Spyware
Read more about the article Best practice for mac security

Best practice for mac security

  • Post author:jonathansblog
  • Post published:August 25, 2013
  • Post category:Security
  • Post comments:0 Comments

This post is a collection of things to form a best practice for mac security. 1) enable password after sleep or screensaver. settings > security > require a password immediately…

Continue ReadingBest practice for mac security
Read more about the article How to encrypt external usb flash drives on mac osx

How to encrypt external usb flash drives on mac osx

  • Post author:jonathansblog
  • Post published:August 22, 2013
  • Post category:Security
  • Post comments:0 Comments

This post will show you how to encrypt your external drives so that your data remains safe. it really only works with new drives though, so if you have a…

Continue ReadingHow to encrypt external usb flash drives on mac osx
Read more about the article How to encrypt your mac harddrive with filevault

How to encrypt your mac harddrive with filevault

  • Post author:jonathansblog
  • Post published:July 27, 2013
  • Post category:Security
  • Post comments:0 Comments

Enabling encryption on your macs harddrive is easy. goto system preferences > security and privacy > filevault click the padlock in the bottom left hand corner type your password click…

Continue ReadingHow to encrypt your mac harddrive with filevault
Read more about the article Use siri to generate secure passwords

Use siri to generate secure passwords

  • Post author:jonathansblog
  • Post published:June 19, 2013
  • Post category:Iphone and ipad/Security
  • Post comments:0 Comments

Finally a use for siri! you can use siri to generate secure passwords. thanks to the wolfram alpha integration inside siri you can ask: wolfram alpha password and siri will…

Continue ReadingUse siri to generate secure passwords
Read more about the article What to do when your mac or ipad or iphone is stolen

What to do when your mac or ipad or iphone is stolen

  • Post author:jonathansblog
  • Post published:March 10, 2012
  • Post category:Security
  • Post comments:6 Comments

What to do when your mac or ipad or iphone is stolen. This is a horrible post to have to write. My house just got broken in to and my…

Continue ReadingWhat to do when your mac or ipad or iphone is stolen
  • Go to the previous page
  • 1
  • 2

Latest Posts

  • A Guide to Open-WebUI: Using It with Ollama
  • How to install ollama and run deepseek
  • Operation Triangulation: Unraveling a Sophisticated Cyber Espionage Campaign
  • Digit Expo 2024
  • Modifying my guitar hardware
  • Mkcert on Laravel Homestead for trusted SSL certs
  • Bash & Zsh Command History Hacks: Say Goodbye to history | grep
  • WordPress Yoast add focus keywords to all posts without focus keywords
  • Configure azure notification hub for ios android and web
  • Azure static website hosting with blob storage and CDN
  • Azure Notification Hubs for push notifications in laravel and nextjs
  • How to block calls on your iphone
  • WildCard SSL certificates with Letsencrypt in Azure App-Service
  • Azure Wildcard Subdomains
  • New Guitar Day

Popular Posts

  • How to install ollama and run deepseek
  • DIY Skateboard Light
  • MetaSploit tutorial for beginners
  • OS Detection Techniques
  • Website crawler software kali linux
  • WordPress Security
  • Metasploit for website pentest
  • Remote Debugging PHP in Visual Studio Code with XDebug
  • How to use metasploit to scan for vulnerabilities
  • Coding in php on android
  • Burpsuite beginners tutorial – how to use burp suite
  • Ubuntu on the chuwi hi10 pro
  • Linux commands for networking with command line
  • Wapiti tutorial
  • Nikto tutorial for kali linux
  • Privacy Policy
  • Jonathan Mitchell CITP BSc MSc MBCS
Copyright - WordPress Theme by OceanWP