Author: Max

  • You Might Get Hacked & That’s Okay

    Online threats are a part of modern life. From major data breaches to scam emails and fake texts, it feels like no one is truly safe. But we shouldn’t let fear of these exploits stop us from enjoying technology.

    When people think of hacking, they often imagine someone stealing passwords or accessing private data. Not all hacking is harmful—ethical hackers help find security weaknesses. Technology comes with risks, but avoiding it entirely isn’t practical.

    Common Ways People Get Exploited

    • Phishing Emails and Texts: These messages look real but are designed to trick you into giving away personal information like passwords or credit card details.
    • Public Wi-Fi Attacks: Public Wi-Fi is often insecure, making it easier for hackers to steal your data.
    • Credential Stuffing: Reusing passwords allows hackers to use stolen credentials from one site to break into your other accounts.
    • Malware Downloads: Clicking on suspicious links or downloading fake apps can install malware, which can steal data or lock you out until a ransom is paid.
    • Impersonation Scams: Scammers pretend to be someone you trust, like a family member or bank representative, to get you to share sensitive information.

    Fear vs. Preparation

    Fear of getting exploited might make people avoid online activities. While caution is smart, letting fear control you isn’t the answer. Just like wearing seatbelts, taking precautions online—using strong passwords and enabling two-factor authentication (2FA)—can reduce risks significantly.

    Tools to Stay Safe Online

    • Password Managers: Tools like 1Password, Apple Passwords, and Android Passwords help create and store strong, unique passwords.
    • Two-Factor Authentication (2FA): Adds extra security to accounts. Apps like Google Authenticator or SMS codes can help.
    • Have I Been Pwned: A free site to check if your email or phone number has been in a breach (https://haveibeenpwned.com).
    • VPNs: Virtual Private Networks help protect your data on public Wi-Fi.
    • Banking and Insurance Monitoring: Many banks offer services that monitor your accounts for unusual activity.
    • Credit Monitoring Services: Experian, Equifax, TransUnion, and LifeLock offer credit monitoring to catch unusual activity.

    Living with Risk

    Online threats are just part of life. We still drive cars despite accidents, and we still eat out despite risks. In the same way, we can embrace technology with precautions. Understanding cybersecurity makes online risks more manageable.

    Life is too short to let fear hold us back. By balancing caution with trust, we can live confidently and fully in a connected world.

  • Snags

    What follows are random solutions to one-off issues I’ve run into, lost & only barely found again. Posting for any other poor souls, or future me, to find!

    AEServer: AEServer is the Apple Events Server. It is used to control Apple Events that come in from other Macs.

    gamesd daemon in System Preferences (Settings) > Privacy: Game Center needs your contacts for gaming with pals.

    It promises multiplayer games with your friends, or at least the ability to share scores, achievements etc. Your identity on game center, and those of your gaming buddies are stored in Contacts– which it needs access to.

    JeremyAndrewErwin

    .CFUserTextEncoding

    I came across this cleaning up my user directory.

    ~/.CFUserTextEncoding stores the default text encoding and preferred language for a user.

    Mac: What’s ~/.CFUserTextEncoding for?
  • Spotting Phony Emails

    Having worked in various technical positions over the years, I’m no stranger to Email. But I still get questions from people asking if something looks legitimate to me; you probably won’t be surprised that I’ll usually reply “No”.

    What follows is going to be an evolving document outlining how anyone can better answer this question for themselves. Let’s dig in.

    What matches up?

    When we find ourselves in front of a questionable email, a few things are worth checking before replying or clicking on any links in said email:

    • Is the sender someone you know; can you see them in your contacts?

    What you can do

    • Report the phony to the person or company they’re claiming to be; some organizations have dedicated lines of support for this. If this is someone you know more personally, tossing them a text asking them to confirm they sent that email could be a way to get to the bottom of this quickly—if not to let them know their account may be compromised.