Create a shared album with iCloud Photo Sharing

On a Mac using Photos In the Photos app, select the photos and videos you want to share. Click the Share button in the toolbar, click iCloud Photo Sharing, then click New Shared Album. Type a name for the shared album, then type the email addresses of the people you...

How to quickly find and organise thousands of photos

Find photos by keyword Keywords are tags or labels you add to your photos to help you easily find the photos. Photos offers a selection of keywords, and you can add your own keywords. You can assign keywords to photos in the Info window or the Keywords Manager, and...

Equifax Hacked

Credit monitoring agency Equifax revealed shocking news late September 7: A data breach of the company’s servers from mid-May through July 2017 resulted in the theft of the personal information of up to 143 million U.S. consumers— a huge chunk of the country’s 324...

Apple TV and tvOS: Everything you need to know

Bloomberg has reported that Apple is planning on releasing a new 4K Apple TV in the fall. You’ll need to bring your own HDMI cable to hook up Apple TV to your TV set. Apple TV has grown up a lot since its iTV days. It’s not just for iTunes rentals anymore—Apple TV...

How to Verify Time Machine Backups

You’ve been diligent about maintaining up-to-date backups of your Mac’s data by using Time Machine, but there’s a nagging worry in the back of your mind. How do you know the backups are any good? That’s a good question, and one we should all ask about our backups....

Automating Mac Mail Workflow With Rules (filters)

Mail for Mac: Use rules to manage your inbox Where Are Rules Hidden? The Rules tool is hidden in Mail > Preferences under the Rules tab. By default, there’s usually a rule that highlights any news that is sent to you containing news from Apple (see screenshot below):...

Why you should start using a VPN

Why do you need to start considering a Virtual Private Network (VPN) service? Virtual Private Networks (VPNs) aren’t new but they’re getting a lot of attention lately for both security and privacy-related reasons. With stories of hackers seemingly...

Selling Your iOS Device

What to do before you sell or give away your iPhone, iPad, or iPod touch Use these steps to remove your personal information from a device, even if you don’t have it anymore. If you still have your iPhone, iPad, or iPod touch Before you sell or give away your...

How to use your iPhone or iPad as a wireless hotspot

Setting up and connecting to a hotspot Before you begin, you’ll need to make sure your cellular service plan supports the wireless hotspot feature. If it doesn’t, check with your carrier for plan pricing and availability. Also, you’ll need to make sure your iPhone or...

USB-C and Thunderbolt 3 (USB-C) ports

USB-C and Thunderbolt 3 (USB-C) ports Through USB-C ports, you can:   • Charge your Mac. • Provide power out. • Transfer data between your Mac and other devices. • Connect video output such as HDMI, VGA, and DisplayPort (requires adapter). • Connect to other...

Using multiple libraries in Photos

Photos for Mac: System Photo Library overview When you first use Photos, you create a new library or select the library that you want to use. This library automatically becomes your System Photo Library. Although you can use multiple photo libraries in Photos, the...

Photos for Mac: System Photo Library overview

Create a shared album with iCloud Photo Sharing by Kevin | Oct 8, 2018 | Photos Blog | 0 Comments On a Mac using Photos In the Photos app, select the photos and videos you want to share. Click the Share button in the toolbar, click iCloud Photo Sharing, then click New...

iCloud Photo Library

iCloud Photo Library works seamlessly with the Photos app to keep your photos and videos securely stored in iCloud and up to date on your iPhone, iPad, iPod touch, Mac, Apple TV, and iCloud.com Here’s how it works iCloud Photo Library automatically keeps every...

Apple may abandon Wireless Routers

Apple may abandon Wireless Routers and Time Capsule Apple is reportedly done with routers. While the company hasn’t said anything publicly, Bloomberg’s Mark Gurman(who has an excellent track record with Apple rumors) reports that Apple’s wireless router division has...

Is This iPhone Compatible with My Network?

Q: What’s the difference between GSM and CDMA? A: GSM and CDMA are two different technologies used by cellular carriers to transmit voice  and data to and from your phone. While the differences between the two are highly technical, GSM and CDMA carriers all largely...

How To Check If A Link Is Safe To Click

On the internet you will barely find a place without any kind of reference in the form of hyperlinks – or links in short. They will lead you to another page and you’ll not always be able to reliably tell its destination.  This can sometimes even be dangerous in regard...

De-Authorize Apps on Facebook, Twitter, Google

De-Authorize Apps on Facebook, Twitter, Google, etc. Some social media services let you link apps to your account. These apps are able to post for you, as well as read and write information about your account. You may have authorized a number of apps to use Facebook...

Time Machine

How to Set Up Time Machine Backups in Mac OS X  Time Machine is an easy Mac backup solution built into OS X that allows for automated continual backups of files, apps, and the operating system itself. Not only does Time Machine make it incredibly easy to maintain...

Macro Virus in Word Making Comeback

SUMMARY This article describes what macro viruses are, what to do if you think your computer might have a Word macro virus, and how to ensure that your documents do not become infected with a macro virus. The first macro virus was discovered in the summer of 1995....

Ransomware

Ransomware is a growing and lucrative attack in the cybercrime market. The FBI reported that known incidents of ransomware numbered nearly 2,500 in 2015, equaling approximately $1.6 million in losses by individuals and businesses. And as Intego predicted earlier this...

Mac keyboard shortcuts

By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C...

iMac 21.5″ Ram Upgrade Not so Easy (2012, 2013, 2014)

21.5-inch iMac Ram Upgrades. Memory is not removable by users on iMac (21.5-inch, Late 2012), iMac (21.5-inch, Late 2013), and iMac (21.5-inch, Mid 2014). If the memory in one of these computers needs to be replaced, Contact Us. When we say not removable by the user,...

2009 MacBook: Antiques Road Show, I Think Not!

Always a tough question to answer. Nobody likes to invest money into an older item, only to have a something else fail. I have pulled machines (G3, G4, G5 servers) out of closets still running happily after years, and with thick layers of dust you can’t imagine....

What is two-step verification for Apple ID?

Frequently asked questions about two-step verification for Apple ID Two-step verification is an additional security feature for your Apple ID that’s designed to prevent anyone from accessing or using your account, even if they know your password. It requires you...

Java installer: Read before you click next.

Sneaky. If you wiz through the Java installer like me, you get Yahoo as your default search engine! Under the Java Control Panel (found under System Preferences > Java). Choose the Advanced tab, then check “Suppress sponsor offers when installing or updating...

Install a Second Drive in a Mid-2012 MacBook Pro

TECH TIPS Install a Second Drive in a MacBook Pro. Is the optical drive in your 2012 MacBook Pro dead or unused? We can add a second hard drive in its place giving you an instant backup drive, or maybe a place to move your hefty music, or photo libraries. Either way,...

Tech Support Scam pop-ups

The typical tech support scam presents itself to the user while browsing the web, in the form of a pop-up message saying that a virus or “suspicious activity” has been detected. A phone number is provided, of course, which the user can call to get “support” with this...

What is Adware on the Mac?

Adware is a form of software that downloads or displays unwanted ads when a user is online, collects marketing data and other information without the user’s knowledge or redirects search requests to certain advertising websites. Adware that does not notify the...