Take Control is here to support you! So through August 24th, you can add any number of our books to your Take Control library for 50% off the cover price. All our books are DRM-free and available in PDF, EPUB, and Mobipocket (Kindle) formats, so you can read wherever, whenever, and on whatever device you like. Use this link to pick the titles you need to stay up to date:
(We expect everything to work properly, but if our newly redesigned site is overloaded by sale traffic, try again later in the day when things have settled down.)
Remember, there’s no need to read a Take Control title from front to back; instead, each book has a Quick Start that helps you jump instantly to the information you need.
We have books that will help with numerous Apple-related technology tasks and projects, including:
* Converting from iPhoto to Photos
* Figuring out what the heck iTunes 12 is up to
* Maintaining an AirPort-based Wi-Fi network
* Installing and running OS X Server
* Syncing and sharing files with Dropbox
* Enjoying your Apple Watch
For those new to Take Control and looking for a quick fix, we have a few instant-purchase bundles, also 50% off:
* iWork explained: Apple’s iWork suite — Pages, Numbers, and Keynote — now comes free with every new Mac, and offers a level of power that compares well with the heavyweight Microsoft Office. The three books in our iWork trilogy provide 750 pages of comprehensive documentation. Normally the three books would cost $55, but for this week, they’re only $27.50 — perfect for college papers and projects.
* Automation for everyone: Macs have fabulous time-saving tools that can turn anyone into a power user. This bundle of “Take Control of Automating Your Mac,” “Take Control of LaunchBar,” “Take Control of TextExpander,” and “Take Control of the Mac Command Line with Terminal” would normally cost $50, but is only $25 in the sale.
* Safe computing: Today’s Internet is unfortunately an insecure place, with hackers, malware, and bots threatening your privacy and security. With calm, friendly advice, Joe Kissell explains how you can stay safe in “Take Control of Security for Mac Users,” “Take Control of Your Online Privacy,” “Take Control of Your Passwords,” and “Take Control of FileVault.” Together they’re normally $50, but if you’ve been meaning to lock down your Mac and improve your passwords, you can now pick them up for only $25.
We also have books about Yosemite, iOS 8, Apple Mail, iCloud, Audio Hijack, PDFpen, Scrivener, DEVONthink, Apple TV, and more. So stock your Take Control library today with the titles that you’ve been wanting to read or that might be useful in the future!
Thanks so much for your continued support, and the many useful questions and kind comments you’ve sent over the years. Please do us a quick favor, and spread the word about this sale to your friends and colleagues — it’s the perfect way to introduce someone to the series or to get your mother to switch over to using Photos.
krypted August 18th, 2015
Little article I/Bushel contributed to from Tech Republic covering considerations for small businesses looking to move to the Apple platform. It’s available at http://www.techrepublic.com/article/5-considerations-for-smbs-that-want-to-move-to-apple/#ftag=RSS56d97e7.
krypted August 9th, 2015
Conferences for Apple Systems Administrators have been popping up all over the place. There are the ones that have been around forever, like MacIT and then there are new conferences that sprung up in the past year, such as ACES and MacDevOps. Some have reached maturity, such as MacTech and Penn State Mac Admins. Now, we have conferences in North America, Europe and Australia (so only 4 continents to go). So, I made a page listing them. And a Pinterest board. The page is available here. And that Pinterest board:
I also took the liberty of listing a couple of conferences that are platform agnostic, as I’ve been seeing Mac and iOS sessions pop up in them. Also, if I forgot any conferences, just let me know.
krypted July 31st, 2015
Love interviewing this guy! Who wants to be next?
krypted May 8th, 2015
I’ve long been an attendee and supporter of MinneBar, a Barcamp in Minneapolis. This year, I’ll be doing a presentation on publishing in the tech world. If you live here in town, I’d love to see you there!
Also, JAMF Software is a sponsor, so if you’d like to talk JAMF or Bushel, I’m of course always excited to discuss both!
krypted April 9th, 2015
The latest book, Learning iOS Security is now available on Amazon, Packt, etc. One of my better writing experiences, so thanks to all for making it so! Buy it here, if you’re into iOS Security and all that kind of fun stuff.
krypted March 3rd, 2015
As an author of technical books, I’ve been very interested in the comings and goings of technical books for a long time. This new Instagram feed is an expedition into what once was and how quickly the times change. Feed is embedded into a page on krypted to make it easier to see. Curious how many of my books are now “Dead Tech Books”…
krypted February 1st, 2015
MacWorld is kinda’ dead. Long live MacWorld (I cry nightly over this). But MacIT, alive and well and awesome (I hadn’t really spent any time on the floor for a long time anyway)! Here’s the email announcing the MacIT dates, which will be July 14th through 16th in Santa Clara! I’m super-stoked!
Mark your calendars for MacIT 2015!
I’m pleased to announce that we have secured dates for the MacIT 2015 Conference. This year’s event will be held July 14-16 at the Santa Clara Convention Center in Silicon Valley (Santa Clara, CA). Our team is hard at work to ensure the first “stand alone” MacIT is a must-attend event for enterprise professionals. The program committee is currently vetting themes and topics for the conference and our call for presenters is currently posted on our website – http://www.macitconf.com. Our returning sponsors, JAMF, Code42, ESET, Parallels, and CoSoSys are ready to preview their iOS and OS X solutions at MacIT 2015, and our sponsor recruitment team is in discussions with many of the manufacturers you have requested access to.
The world of enterprise integration for iOS and OS X continues to evolve at an exciting pace and MacIT continues to be a unique meeting and marketplace for the enterprise professional. MacIT will continue to focus on all things “Apple in the Enterprise” – technology and standards tutorials, realistic product and solution chain evaluations, candid analysis, case studies, peer problem solving, access to key vendors, and insights to help you assess Apple’s role in the enterprise technology world, and how these tools can best be put to work in your organization. Our goal is always to provide you the best (quantity and quality) content, presenters, manufacturers, and professional networking access to make you a success in your deployment projects.
I look forward to keeping in touch with you via email and social media with event updates and announcements over the coming months, and hope to see you at MacIT 2015.
Paul Kent Conference Chairman, MacIT
MacIT on Twitter: https://twitter.com/MacITConf #MacIT2015
MacIT on Facebook: https://www.facebook.com/pages/MacIT/151684994917868
krypted January 23rd, 2015
When I put a computer in my daughters room, I soon realized I could no longer watch over her shoulder as she worked away at school games, Minecraft and of course Civilization (after all, that was my first game). So much as I wrote an article a long time ago about child-proofing an iPad, now I’m writing about child-proofing a Mac.
For me, I find that child-proofing is a bit like taking my kid to McDonald’s. I said never ever ever ever would I do this and then… Well, peer pressure, ya’ll… So if I have to do it, I figure someone else might. So here’s a quick and dirty guide to doing so. The gist of this guide is to continue using the same admin account that was created when you setup the computer initially. But to also create another account for the child, one that has some restrictions to keep them in a customized user experience. This might be to keep them out of things they try to do on purpose, keep them from accidentally finding some things they shouldn’t or maybe just to customize the user experience to make the computer easier to use (after all, if they can’t remove Minecraft from the Dock, they can’t come crying when they can’t find it.
Most of the work that needs to be done, can be done within the System Preferences. This is available under the Apple menu as System Preferences…
Once open, click on the Users & Groups System Preference.
At the Users & Groups System Preference pane, click on the plus sign (+).
At the new account screen, choose “Managed with Parental Controls” in the New Account field. Then provide the child’s name in the Full Name field and an Account Name will be automatically created (note that I shortened the name in this example to make it easier for the child to log in).
Assuming your child doesn’t have their own iCloud account, set the password to “Use separate password” and then type it in. Once you’re happy with these settings, create the new account, which can be managed with Parental Controls by clicking on the Create User button.
Once the account is created, click on the “Enable parental controls” checkbox and then on the Open Parental Controls… button.
At the Parental Controls System Preference pane, you’ll have a few options.
Next, click on the Web tab. Here, you’ll effectively have 3 options: don’t restrict any content, let Apple try and block inappropriate content and build a whitelist of allowed content (with all other content blocked). Now, it’s worth mentioning that there can be an annoying element here, which is that if a site needs to be opened up for access, a child might come bugging you. But I like that, so I’m configuring this.
Note: It’s worth mentioning that I discovered a few websites I’d of never tried to use in the allow list, so worth checking them out to see if your child will dig on some of these sites!
Once you’re satisfied with the options you’ve configured, click on the People tab.
At the People screen, you can configure who the person using the Managed Account can communicate with. Here, restrict access to Game Center, restrict who the account can send and receive mail with and of course, who the account can use the Messages app with.
The above options include the following:
Note: Apple rarely uses the word restrict. Instead, they prefer to allow things to happen by default and then let you disallow these features. Basically the same thing, but keep this in mind when you’re configuring accounts as sometimes you can accidentally click the wrong thing if you’re not accustomed to such double-negativery.
Once you have configured who the user of this account can communicate with, click on the Time Limits tab.
Time limits are used to restrict what times the user can use the computer as well as how long per day that the user can actually use the computer. The options available include:
Time limits are the only things that matter for some who like to physically sit with a child while they use a computer, as you might just want to keep the child from waking up in the middle of the night and accidentally seeing something that scares them. But for many, time limits won’t be enough, as kids might spend hours gaming or doing homework unmonitored.
Next, click the Other tab. Here, you’ve got the miscellaneous restrictions that really don’t fit anywhere else in Parental Controls. The options available include the following:
Note: I know I said earlier that Apple rarely says restrict or disable. They will get around to fixing this screen eventually… 😉
Once you have configured parental Controls, click on that Logs button in the lower right corner of the screen. Here, you’ll see the following:
And that’s what you can do with Parental Controls. But there’s more, which we’ll look at shortly. When you click out of a field, the settings are changed in a System Preference, so you should be able to just close the window and have your settings persist.
We’ve gone through creating a new account, restricting access to what that account can do and how and when to use these options. But there’s much, much more than we can cover in this article. There are tons of other restrictions that don’t fit into these basic options, accessed either through what are known as managed preferences or via profiles, which can easily be created by tools like Apple Configurator, Profile Manager and 3rd party mobile device management tools such as Bushel.
Ultimately, I can pretty much break out of about any managed environment you put me in. And in the age of YouTube, chances are that your child has many the same materials I’ve either presented, written or that others have written. So please don’t consider these options as much more than just a general guideline unless you’re using a Device Enrollment Program-enabled device.
Anyway, good luck, and you’re a good parent for caring.
krypted December 29th, 2014