On June 15, 2015, password manager LastPass made an announcement that its password database was hacked and some user account information had been stolen. Since LastPass has uses encryption and many layers of protection to slow down hackers, the damage will be minimal for LastPass users. While the hackers may have obtained the database of master passwords, they still don't have immediate access to everyone's passwords. That information has been encrypted, salted, and hashed, so it would take quite a bit of effort to break into it.
The Tech Guy Blog
Target Disk Mode is a simple and efficient way to move files from one Mac to another. This can be used if your Mac won't boot and you need to get files off of it. Or you could transfer files onto a Mac this way, just as you would with an external hard drive. Here's how to take advantage of this convenient feature built into OS X:
Google recently released a new Photos app, with free unlimited cloud storage for 1080p video files and photos up to 16 MP in quality. It makes it easy to browse and search through all of your photos, but you may have discovered some unfamiliar photos after installing it. This is because the app searches your entire device, and displays the photos it finds in the app. At first glance it may seem to be an error, but there's a way you can quickly find out where the photos came from.
There are accessibility features built into the Mac that make it easier to see things on screen. One of those settings is called "Zoom," and it lets you magnify the part of the screen that you need bigger. This can be done system-wide, meaning you can zoom in and out no matter what application you're currently running.
If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better secure your account:
If you're experiencing a dramatic slowdown on your Mac or PC, you may be able to track down the culprit by using a process monitor. This will show you all of the programs and processes currently running on the computer, and how much of your system resources those processes are taking up. If you close out of all programs and still see a process taking up nearly 100% of the system resources, you'll know what's causing the issue. Then you can Google the name of that process and find out how to get it under control.
When browsing the web, you may have encountered a "certificate" warning from your browser. This happens when you're connecting to a site using encryption, and the browser can't verify the identity of that site. Every browser or operating system comes with a preset list of "Certificate Authorities." These authorities could be governments, companies, or other entities that issue identity certificates to websites. This is all part of the SSL encryption process, and it verifies that you're securely connected to the right place.
If you're looking to stream audio wirelessly through your house, there are a few different ways to do it.
If you plan on using your smartphone when traveling overseas, it may be worth checking to see if your phone is compatible with the wireless bands in that area.
Uninstalling a Mac application seems like an easy task -- just drag the icon from the Applications folder to the trash. This doesn't get rid of all of the files associated with that application, however. It might not always be necessary to get rid of all of an app's remnants, but if you're trying to reinstall an app that isn't working properly, you may need to take some extra steps first.