Tuesday, June 4, 2013

How to Reset an Admin Password on Mac OS X with Apple ID?

It happens to people at some point—you have a innovative new online password and don't please build up that anyplace, but now in no time flat you’ve forgotten what it proved to. Here's how one can reset due to password on Mac OS X computer.

Reset Mac OS X password with Apple ID

In OS X Lion or later, you can reset your user password with your Apple ID.
In Mac OS X v10.6.8 or earlier, follow these steps to reset a password when there is only one administrator account on the computer, or if the original administrator account needs a password reset. "Original" administrator account refers to the one that was created immediately after installing Mac OS X. If the original administrator password is known, that administrator account may be used to reset the passwords of other administrator accounts using the steps described above. These steps require an optical drive; if your Mac does not have an optical drive and you have a Mac OS X v10.6 Install disc, see below.

Step 1: Start up from a Mac OS X Install disc (one whose version is closest to the version of Mac OS X installed). Usually, you can start from the disc by putting it in your computer, restarting, and holding the C key.
Or, put it in the computer and click the Install or Restore icon you see in the disc's main window (after which the computer will start from the disc without you needing to hold C). Or, you can use Startup Manager or the Startup Disk preference pane to select the Install disc.

Step 2: Choose a language, click the arrow button to continue:
Mac OS X v10.6 or later: Choose Password Reset from the Utilities menu.
Mac OS X v10.5 or v10.4: Choose Reset Password from the Utilities menu.
Mac OS X v10.3: Choose Reset Password from the Installer menu.

Tip: If you don't see this menu or menu choice, you're probably not started from the disc yet.

Note: The default keyboard layout is U.S. English while started from the installation disc. If you use a keyboard layout other than U.S English, use the Input menu (the flag icon on the right side of the menu bar) to select the desired layout before typing a new password.

Step 3: Select your Mac OS X hard disk volume.

Step 4: Select the user name of your original administrator account.

4 Smartphone Security Risks To Be Aware Of

If you’re anything like me, you’re pretty attached to your smartphone. I use mine almost constantly, checking for emails while I’m out and about; I play games on it, research work, chat, interact with social networks and enjoy videos. I also use the camera extensively to photograph family and friends.
I’m sure I’m not alone in this wide use of my handheld multimedia computer and communication device. But do you have security software installed? Are you even aware of the risks to your smartphone?
There seems to be a sort of general malaise among users – the tech savvy and everyday users alike – that because your computer fits in your pocket, it can’t be infected by malware, Trojans, worms or other threats. This is, of course, ridiculous, and perhaps stems from the age-old misunderstanding of the nature of malware transmission.
The benefits afforded to us by smartphones are immense; the threats they can introduce into our lives if left unprotected are considerable.

Threats from SMS

Remarkable as it may seem, the old school SMS text messaging service is a popular choice for rogue programmers working for hacking gangs around the world. SMS spam is bad enough, but have you considered that it might be a form of Smishing?

This term is used to name phishing attempts sent via SMS, and is used to fool victims into giving up personal data, perhaps to a fake delivery company. Smishing can be achieved either wholly through a return message or by being prompted to call a number where the information is recorded.

Wi-Fi and Bluetooth Security Risks

Free Wi-Fi hotspots always look attractive, but they can prove to be both rife with malware and provided by scammers looking to capture your personal data such as passwords, credit card data and other user-identifiable information. If you find free Wi-Fi in a public place that isn’t provided by a reputable business, avoid it. Similarly, if you are using your smartphone as a mobile hotspot, make sure you have set a secure password. You should change this each time you use the hotspot feature.
Another threat is War Texting, in which smartphone-connected car systems can be hacked by sniffing the authentication codes sent from phone to car. The best outcome of this is that you are tracked; the worst is that your car is stolen, without a key.
As such systems become more popular and widespread in cars, so many more people will become targets – as things stand, few cars can be activated in this way.
Any password that you use on your phone, whether it is for unlocking, accessing voicemail or setting up Bluetooth, should be changed from the device to something memorable. Failure to do this can lead to all sorts of problems.

Location-based Threats

Thanks to wireless networks, cellphone triangulation and GPS, it is possible to take advantage of many location-based tools for smartphones and tablets. These might be sat-nav tools or social ones, but there are many threats to be aware of too.
One of these is geotagging, a default option on many smartphone apps that you should disable if you wish your current location to remain a secret.
Social network check-in features can also be used to track you. When a criminal knows your whereabouts he or she might be planning to assault you or use your absence from your home or car to cause criminal damage or theft.

The Danger of Rogue Apps

There are rogue apps on any platform. On Android they can usually be spotted pretty quickly thanks to the reviews of others (although on iPhone and Windows Phone such apps are unlikely to be permitted to be listed) but it could be too late if you’ve already installed the app. This is why you should only install apps from trusted repositories.

This can be a particular problem for Android users, mainly because there are several online marketplaces from which software can be installed. It’s no surprise that the number of threats for Android has increased over the past few years. One example is Android.Spyware.GoneSixty.Gen – discovered in 2011, this malware if installed, sends important information from your phone to a remote server and uninstalls itself within a minute.
You’ll never know it was ever there – frightening stuff.
On the subject of apps, you should also be aware that shortened URLs in Twitter and email can be dangerous. This is as important on smartphones as on desktop computers, as the resulting links can be effortlessly tailored to serve malicious code depending on the device that is connecting.