5 Mac Security Tips You Canít Live Without

Written by Paulo Fretowski

So, youíve bought a new Macintosh, and now you may be wondering how to make it safer. There are several things that you can do which will protect your Mac from viruses and hackers. Macs are already very difficult to hack, but donít let that fact allow you to become lenient with your security.

1. Download all ofrepparttar software updates available. This seems like a no-brainer, but some Mac users forget to downloadrepparttar 143382 newest updates. You can even set your computer to automatically download new updates. However, some dial-up users encounter trouble when trying to downloaded updates. If you are a dial-up user,repparttar 143383 best suggestion is to leave your Mac on overnight and let it download. Apple releases many programs that fix bugs in iLife applications, and in Mac OS X. Probablyrepparttar 143384 most important of these updates arerepparttar 143385 security updates. Apple periodically offers security updates for its operating systems (Panther and Tiger).

2. Be careful what you download. Some people use P2P downloads for Macintosh (I.E. Poisoned). Be careful when downloading using a P2P because you do not know whererepparttar 143386 music or file is coming from. Some P2P users specifically make corrupted files to send via music downloading programs. Generally, it is a good idea to stick to iTunes, because those files are ACC Protected and offered through Apple so they certainly wonít have viruses.

3. Chooserepparttar 143387 best and safest Internet Browser. Safari comes standard on all new Macs as part of iLife. However, some people do not enjoy Safari as much as others. Some say that Safari is not as safe from hackers as other browsers. Safari can also be a problem if you are going to a web page that requires a version of Internet Explorer or Netscape to view it. You can download Internet Explorer and Netscape for Mac, but again, some believe that these browsers are not as safe from hackers. Many people believe that Mozilla Firefox (my personal favorite) isrepparttar 143388 safest browser to use because of its customizable features. Firefox is available for downloading onrepparttar 143389 Macintosh.

Printer's - Now As Common As The Telephone

Written by Alberto R. Pino

Printers have been around for a very long time. Fromrepparttar old hand cranked block printing machines, torepparttar 143381 most advanced color laser printers onrepparttar 143382 market, they have made tedious writing by hand outdated. Now you simply have to type up what you want to say on your computer, put paper into sheet feeder, and push print. Like magic out comes your document making it easy to print a book, send out some flyers for your church bake sale, or whatever your printing needs are.

Beforerepparttar 143383 advent of computer printers for home use, to get these types of documents one would have to go and pay a printing business to make them for you, or make one by hand and photocopy it. Either way could be quite costly if you wanted to make lots of copies.

Printers come in a wide variety; there is dot matrix, ink-jet, bubble-jet, and laser printers to name a few. Dot matrix printers are sort of antiques now but they used a series of pins to makerepparttar 143384 lettering. If you look closely at a document or photo printed on one of these you can make outrepparttar 143385 dot patterns. Ink and bubble-jet printers work by squirting heated ink through a matrix of holes to form images or characters.

Laser printers formrepparttar 143386 characters or image on a special-coated drum with a laser light, which is turned off and on as dictated byrepparttar 143387 computer, then transfersrepparttar 143388 output fromrepparttar 143389 drum torepparttar 143390 paper, using photocopying techniques. Less commonly used printers for home use are Thermal-wax-transfer printers and dye-sublimation printers that use heat to transfer color pigment from a ribbon to a special paper to produce photographic-quality color images.

Cont'd on page 2 ==>
ImproveHomeLife.com © 2005
Terms of Use