I’ve been an ebook user for a very long time now, and bought my first dedicated ebook reader nine years ago. In 2011, it got replaced with an Amazon Kindle, and I’ve been a Kindle user ever since, using both their dedicated devices (including the larger DX size), as well as PC, Mac, and iOS apps.
Category: How To
For the past two years, I’ve been enabling two-factor authentication (2FA) wherever I can, and particularly on services where I want to ensure that my data is as secure as possible. Back in April, I added 2FA to this site. As this was the first time I’d ever set something like this up on a service that I maintain myself, I went to the task with a fair bit of trepidation as I simply had no idea how easy or difficult it would be. As it turns out, it is very easy. Here’s how I did it:
I’ve been seeing a surprising number of tickets from users asking why they are seeing double bookings of meeting rooms of late. In each and every case, the issue has boiled down to one of user error, with users not knowing or understanding how meeting invitations work in Outlook. This was a source of confusion to me, until a user put it as follows:
As you may have gathered at this point, I’m – among many other things – a YouTuber. While most of my videos are fairly simple, some of them benefit from having a table of contents (complete with clickable links) in the description. When I first came across the need to do so, I spent a fair amount of time searching, before I finally found out how to do it.
A while back, Facebook introduced a feature where posts would pop up in your browser window if people respond to you. Now, I can certainly see how it is a useful feature to have, both for Facebook – it increases engagement with posts – and for users – you don’t have to leave the news feed to continue interacting. That said, I don’t like it. I would rather leave the news feed and go into a specific post if I want to follow up.
I’ve had an Apple Watch for some time now, and am a very happy user. Being fairly security and privacy conscious, I immediately set it up with a pin code, meaning that it locks when I take it off, and prompts me for a pin code when I try to access it. This is a very nice feature, and one which I haven’t really seen too much of, due to another feature which unlocks the Apple Watch when unlocking your iPhone. It was either on by default, or I set it up when setting up the Apple Watch. Either way, if you want to change this setting one way or another, here’s how:
If you’re like me, you’ve got your Mac set up so that you can only access it after inputting a password. One of the useful features of the Apple Watch is that it can automatically unlock your Mac when you activate it. It is quite simple to set up and has made my life that little bit easier. Here’s how:
Two-factor verification is always a good idea, and anyone who is security- and privacy conscious should find it in their interest to set it up wherever possible. As a user of a number of Apple devices, I have had it set up on my Apple ID for some time. Before turning it on, you should ensure that two-step verification is turned off. Here’s how:
Before implementing two-factor authentication, Apple had a hybrid system called two-step verification. In order to turn on two-factor authentication, two-step authentication must be turned off. Here’s how:
For a number of reasons, I often find myself needing to find information about a system that can be somewhat difficult to source, such as when it was last rebooted, or when the system was installed originally. Luckily, there’s a tool to help us out, called System Information. A command line utility,
systeminfo.exe, offers a lot of information. This is both good and bad. It is good, because there are lots of things to be found. It is bad, because it can be hard to find the specific thing you are looking for. Enter the Pipe. By adding a vertical bar and a search query, we can find the exact information we are looking for without having to wade through irrelevant information.