Welcome to my blog

Join me on my journey as I share my insights and experiences on web development, business, and content creation.

Blog Video

2024

tips video

AppCleaner: Streamlining macOS Uninstallations and Troubleshooting

In the vast landscape of macOS utilities, finding a tool that seamlessly manages application uninstallations while ensuring no residual files clutter your system is invaluable. AppCleaner, developed by FreeMacSoft, emerges as a standout solution, providing users with an intuitive interface and powerful features that extend far beyond ordinary uninstallers. Exploring AppCleaner’s Features: User-Friendly Interface: AppCleaner greets users with a clean and intuitive interface, simplifying the process of app removal. Comprehensive File Removal: Unlike basic uninstallers, AppCleaner digs deep, removing not only the application but also associated preferences, settings, cookies, and...

2023

tips video

NIST macOS Security & JAMF Compliance Review

In an era where cybersecurity is paramount, staying ahead of the curve is essential. For the macOS community, NIST’s Security and Compliance Project have opened doors to a new realm of possibilities. In our recent video, we delved deep into this groundbreaking initiative, uncovering the secrets to bolstering macOS security with tailored compliance frameworks. Understanding NIST’s macOS Security and Compliance Project: NIST, known for its expertise in setting security standards, has extended its guidance to the Mac community. The project provides comprehensive insights into hardening macOS systems, ensuring organizations adhere...

tips video

Reviewing UTM and Crystal Fetch

In today’s tech-driven world, virtualization has become indispensable. Join me in exploring UTM, a powerful virtualization tool for Mac, and CrystalFetch, its seamless companion for downloading OS files. This comprehensive walkthrough guides you through setting up Windows 11 and Mac OS virtual machines, providing a glimpse into the future of computing. Key Takeaways: UTM Unleashed: Discover the versatility of UTM, simplifying virtual machine creation and management on Mac computers. Windows 11 in Action: Witness the step-by-step setup of a Windows 11 virtual machine, showcasing the synergy between UTM and CrystalFetch....

tips video

Mastering Apple's Notarization Tool: A Comprehensive Guide for Developers

In the ever-evolving landscape of software development, staying ahead of the curve is paramount. With Apple’s introduction of the Notarization Tool, developers now have a powerful new ally in ensuring the security and integrity of their applications. In this comprehensive guide, we will walk you through the process of notarizing packages and signing them using this groundbreaking tool, ensuring your applications are compliant and ready for the future. Understanding the Transition The first step in this journey is understanding the transition from the AL tool to the Notary Tool. We...

tips video

🔧 Mastering Chrome Preferences: A Comprehensive Guide for IT Professionals 🔧

In today’s rapidly evolving tech landscape, efficient management of browser preferences is paramount for IT professionals. Chrome, being a widely used browser, often demands tailored configurations to meet organizational needs. In this comprehensive guide, I’ll walk you through the process of managing Chrome preferences using Mobileconfig files, MDM, and open-source tools. By the end of this journey, you’ll have a profound understanding of how to streamline Chrome settings effortlessly across multiple devices. Prerequisites: Basic knowledge of Mobile Device Management (MDM) systems. Familiarity with macOS terminal and Python. Tools and Resources:...

tips video

Mastering Mac Software Deployment: A Step-by-Step Guide

Hello, tech enthusiasts! Today, we embark on a journey into the world of Mac software deployment using the powerful Packages app. Whether you’re a seasoned Mac admin or a budding developer, understanding the nuances of software deployment is crucial. In this comprehensive guide, we will walk you through the process step by step, ensuring you grasp every detail. Let’s dive in! Step 1: Introduction to Packages App First things first, familiarize yourself with the Packages app. It’s a versatile tool that simplifies software distribution on Mac devices. If you haven’t...

tips video

Notarize PKG files with ATOOL and Script2Pkg Review

In today’s tech-driven world, application security is paramount. For macOS developers, understanding the nuances of Package Signing & Notarization is essential. Whether you’re a seasoned coder or a curious tech enthusiast, this comprehensive guide will walk you through the intricacies of ensuring your applications are secure, trusted, and ready for distribution. Why Package Signing & Notarization Matter: When users download an application, they expect it to be safe and free from malicious intent. Apple’s Package Signing & Notarization processes guarantee this safety. Notarization is more than just signing; it’s a...

tips video

Mastering Transcription: A Step-by-Step Guide to Using Hear

Hey everybody! In today’s video, I’m excited to introduce you to one of my favorite Apple binary applications - Hear. Hear is an incredible program that allows you to transcribe text using the dictation feature directly from Terminal or convert audio and movie files into text. It utilizes the built-in dictation feature of Mac OS, making transcription tasks easier than ever before. 🔧 How to Use Hear: Enable Dictation: Before you install Hear, ensure that dictation is enabled on your Mac. Check your system settings under keyboard preferences to turn...

tips video

🔏 Signing Mobile Config Files: A Step-by-Step Guide 🔏

In today’s tutorial, we’ll delve into the essential process of signing mobile configuration files, a crucial step in ensuring the security and integrity of your configurations. Before we dive in, make sure you have the following prerequisites in place: a mobile config file that needs signing, Xcode installed, and an active developer account associated with your Apple ID. Getting Started: Setting Up Xcode and Certificates Launch Xcode and sign in with your Apple ID under Xcode settings. Create new certificates by managing your certificates in Xcode. Generate development and distribution...

tips video

🚀 Unveiling MIST: Revolutionizing macOS Management! 🚀

Today, I am thrilled to introduce you to a groundbreaking macOS utility that is reshaping the landscape of Mac administration: MIST. This powerful open-source tool is designed to simplify macOS management tasks, offering an unprecedented level of efficiency and flexibility. In this deep dive, I’ll walk you through the intricacies of MIST, providing insights into how it works, where to get it, and how to harness its full potential. Understanding MIST: MIST, short for the MacOS Install Super Tool, is a versatile utility created by the talented developer Nindi Gill....

2021

dark-web video articles downloads

Download our White Paper - Penetration Testing for your Business

What is a pentest and why should I have it performed? Organizations are faced with the increasing scrutiny of more complex and sophisticated attacks by threat actors against key information systems that are essential to the organization. Complex attacks such as ransomware and data exfiltration are being used against organizations or systems that they encounter or somehow get access to. When an attacker wants to break into a system, they will typically choose the easiest and most direct methods in means in order to access it. The problem is an...

dark-web video articles downloads

Download our White Paper - Why your Small Business needs a vCISO

Cybersecurity Threats and Talent Shortage Cybersecurity risks and threats are issues that all organizations, large and small, must deal with. Whether the issues are information security program related or a technical challenge, organizations need to have the personnel resources to solve the cybersecurity issues as aligned to the business requirements set forth. In an ever-growing cloud-based services industry, information security risk is never greater. Cyberattacks are growing in impact and frequency. Not a week passes without a headline of another cybersecurity attack such as a data breach or a ransomware...

dark-web video articles downloads

Download our White Paper - Cybersecurity Training 101 For Small Businesses

Why is a cybersecurity training so important? Security awareness training is one of the most critical and important security requirements for any size organization to consider implementing within their environment. Arguably, the greatest risk faced by any organization is the danger of insider threat as employees are can be considered a weak link in the chain as they are susceptible to curiosity, greed, envy, etc. To further increase risk, employees may be faced with the threat of social engineering attacks including phishing, baiting, spear phishing, tailgating, scareware, pretexting, quid pro...

dark-web video articles downloads

Download our White Paper - Cybersecurity Risk Assessments For Small Businesses

Why is a risk assessment so important? A cyber security risk assessment is a critical activity performed on your company’s security policy procedures and infrastructure to reveal potential threats to key corporate assets and vulnerabilities in your current security controls as implemented. What is the goal of a risk assessment? The goal of a security risk assessment is to define the appropriate safeguards that your company will need to implement in order to align to your company’s risk assessment objective, profile, and priorities. An organization faces many types of threats...

dark-web video articles downloads

Download our CMMC White Paper and learn what CMMC means for your small business.

What is the CMMC (Cybersecurity Maturity Model), and what does it mean for you? The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) latest cybersecurity program designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks. The DIB consists of all suppliers of DOD related services including primes/subs/consultants that provide any type of service on a DOD related contract. The DoD implemented requirements for safeguarding CUI information and cyber incidents through the release...

2020

tips video

Stop Group FaceTime Video Tiles from Bouncing with Recent Apple OS Updates

Since iOS 12 and macOS 10.14 Mojave, Apple has supported Group FaceTime, which lets you have a video call with up to 32 people. However, as has become painfully obvious in today’s era of non-stop videoconferencing, Group FaceTime has a feature that some find obnoxious: automatic speaking prominence that causes the video tile for the speaker to grow and move around. Happily, Apple finally took the feedback and added options to disable that feature in iOS 13.5, iPadOS 13.5, and macOS 10.15.5 Catalina. In iOS and iPadOS, disable the Speaking...

tips video

Heres How to Set a Default Printer on the Mac

If you have access to multiple printers, you probably know that you can choose one from the Printer pop-up menu at the top of the Print dialog. But macOS has a feature that should make it so you don’t have to switch printers manually as often. Open System Preferences > Printers & Scanners, and look at the bottom of the Print view. The Default Printer pop-up menu lists all your installed printers, plus an option for Last Printer Used. That last one makes sense if you print a number of...

tips video

Find Files in the Finder Better by Specifying a Search Scope

This isn’t about periscopes or mouthwash—when it comes to searching, a scope is the area in which a search takes place. When you use the Search field in a Finder window to look for files and folders, you have the choice of two scopes: This Mac or the current folder. You can always switch the scope after starting the search by clicking the other choice near the top of the window, but it’s easier to set the default search scope in Finder > Preferences > Advanced so it’s set right...

tips video

Apple and Googles contact tracing API gaining momentum

The Covid-19 (coronavirus) contact tracing API from Apple & Google has yet to be adopted across the board with countries opting to produce their own systems. However, some countries such as Switzerland are now switching from their own system to the contact tracing API, with other countries such as Portugal & Ireland choosing to adopt the solution from Apple & Google. With Austria and Switzerland announcing they will be switching to it Countries across the globe that have managed to control the rate of infection are looking for contact tracing apps...

tips video

Approve App Authentication Requests with Your Apple Watch in Catalina

Tired of typing your admin account password whenever you try to install software or change security settings on your Mac? A new feature in macOS 10.15 Catalina removes that requirement for Apple Watch owners. In System Preferences > Security & Privacy > General, select the checkbox for “Use your Apple Watch to unlock apps and your Mac.” Then, whenever an app asks for your account credentials, you can instead just double-press the side button on your Apple Watch. Of course, if you forgot to wear it or its battery has...

tips video

The No Longer Shared Bug has been Patched in iOS

Tuesday 26th of May, Cupertino stated the bug in Family Sharing that caused apps not to open has been fixed. The bug would cause your iPhone, iPad, or iPod to show a message stating: “This app is no longer shared with you”, and requesting that you purchase the app yourself from the App Store. This is despite the fact the app is still paid for and being shared via the family sharing feature. The error affected many apps, including Facebook, Audible, & WhatsApp. The issue first surfaced in May with...

tips video

Ever Wondered Which Words to Capitalize in a Title? Use Capitalize My Title

When you’re writing a blog post or email newsletter, you’ll eventually hit the question of how to capitalize words in a title. There is no one right way, but just as with poor spelling and grammar, randomly capitalized titles can reduce reader trust in your knowledge, competence, and expertise. The trick is to pick a capitalization form and style guide to follow. There are two capitalization forms: title case (where important words are capitalized) and sentence case (which is capitalized like a normal sentence). Then there are a handful of...

tips video

iPhone Not Charging Reliably- Clean Its Lightning Port with a Toothpick

If you’re plugging your iPhone in regularly but getting low-battery warnings when you shouldn’t, consider the possibility that something is preventing your iPhone from charging successfully while plugged in. If there’s no lightning bolt badge on the battery icon when the iPhone is plugged in, that’s a sure sign that no power is reaching the device. Another hint that failures could be happening intermittently would be a lack of charging in the Last Charge Level graph in Settings > Battery when you know the iPhone was plugged in. Luckily, the...

tips articles video

No More Lightning Port

If like me Apple’s move from the original 30-pin port in 2012 to the Lightning ports you saw this as a positive move, the Lightning connector being a much more user-friendly connector. Next they took away the home button and the headphone socket, the home button going in favour of a larger screen was no real hardship once you learnt the new interface. However losing the headphone jack was a real annoyance for some people, as a compromise Apple provided a free lightning headphone set with new iPhones, sadly this...

tips video

Do You Know Who Can Track Your Location? It's Worth Checking Periodically

Sharing your location works well when you’re out with friends or family and want everyone to be able to see where everyone else is. It’s easy to enable in various spots in iOS 13—in Messages, in Contacts, in the Find My app, and so on. You can share your location for an hour, until the end of the day, or indefinitely, but beware of this final option. If you’re with a group for a weeklong trip, for instance, sharing indefinitely makes sense, but it’s easy to forget to turn it...

tips articles video

Top 10 Apple Business Resources you may have forgotten

Video Blog We work with lots of businesses, all Mac based businesses. The biggest point of confusion for many Mac based small businesses is to understand all the business offerings that Apple has to offer. Apple has many offerings for Apple businesses. From where to buy and how to buy *(Apple Retail vs Apple Resellers). From purchasing and pricing options *(Apple Card vs Leasing). As well as its own support offerings *(Applecare, Apple Store & Joint Venture) the path forward for many businesses is not always clear and with so...

tips articles video

Customize What Appears in New Finder Windows with This Tip

When you’re in the Finder, choosing File > New Finder Window does, as you’d expect, open a new Finder window. But what folder appears in that window? By default, new Finder windows open to Recents, which is a built-in smart folder showing recently opened documents. If you’d prefer to see items in a fixed location on your drive, go to Finder > Preferences > General and choose any location from the New Finder Windows Show pop-up menu. We’re partial to Desktop or Documents, but you can choose whatever folder makes...

dark-web video articles downloads

Top Tips on Working From Home Securely

Top Tips on Working From Home Securely The necessity of working from home is becoming a reality for many workforce members that may not have had this access before. While remote working offers many benefits to employees, many more risks appear as cybercriminals prey on the lax security protocols of the remote worker. It is critical that we as employees treat this access as a privilige, making security our top concern. Your organizations remote access policy will layout the requirements you should be adhering to during remote sessions. If your...

dark-web video downloads

COVID19 Protect Your Small Business Data

The threat of the Novel Coronairus has recently been a top concern worldwide. With many conspiracy theories, disinformation or just general curiosity many citizens are looking for more information on the outbreak from a trusted source. Cybercriminals are aware in the interest in these subjects and are crafting malicious emails designed to infect your computer or steal information. This means trying to get information on a virus could lead to a virus on your computer. In this recent scam people are impersonating the World Health Organization (WHO), a trusted name...

dark-web video downloads

COVID19 Work From Home Dangers & Scams

The COVID-19 crisis has forced many organizations and businesses to work from home. Are you aware of the cybersecurity risks to your business with your employees working remotely? As we shift to working from home you’re business has to face new challenges. Verifying the legitimacy of a potential phishing email is not as easy as it once was with new techniques being deployed daily. How are your computers being managed? Is your data safe? Have you talked about cybersecurity with your staff? COVID-19 is not going away any time soon,...

dark-web video

COVID19 Scam Alert Stimulus Checks

Its really sad that we live in a time when scammers are still so active in the face of such hardship and adversity, however it is the environment where people are the most vulnerable. We have seen an uptick in emails and calls to individuals and businesses scamming or trying to scam people out of their stimulus monies, and trying to defraud people by posing as banks asking for sensitive information for Paycheck Protection Loans. The Federal Government nor Banks will call to solicit or entice you into giving you...

Subscribe to my newsletter

Join me on my journey as I set out to help aspiring entrepreneurs take that critical first step.