Towards a More Secure Mac

Posted on Friday, August 03 2007 @ 7:00 CEST by Thomas De Maesschalck
The level to which you use these techniques will depend on your particular needs: Is your computer used by more than one person? Is it in a public or private area? Is it an easily-misplaced laptop or a hard-to-lose-track-of desktop? It’s up to you to decide what makes the most sense for your situation.

Read on at Icrontic.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments