In this article we’ll see what a TPM module is and get some details about TPM on Linux, Windows and macOS as well as what are some of the advantages in adopting Trusted Computing.
In this article we have a look at how to check disks health status using SMART and smartctl on Linux OS (RHEL, CentOS, PacketLinux and Debian/Ubuntu/KALI based distros), macOS and BSD systems.
In this quick how-to we’ll see how to rename your Apple Mac hostname correctly.
In this quick how to we see all Mac OS X startup key combinations (for Intel based Macs) to fix problems, force Mac booting from a usb key or an external drive, to reset PRAM and more.
In this article we give a look at a practical case of using BSD sandbox by sandboxing Tor WEB Browser Bundle on Mac OS X to reduce risks of exploits from malicious websites while preserving full anonymity using Tor network and Tor browser.
In this article we’ll see how to configure and execute your software applications in an Apple Mac OS X sandbox. This kind of feature helps a lot to protect your Mac OS X security by executing an arbitrary application in a complete isoulated environment.
This short how-to describes how to check which CPU is installed on a Mac Pro, iMac, MacBook Pro and MacBook Air and the new MacBook.