Category: Security

How to Turn Off Siri on Apple Watch to Stop Siri Listening

Go to OSX Daily to read How to Turn Off Siri on Apple Watch to Stop Siri Listening

Don’t want Apple Watch to always be listening for the “Hey Siri” command? You can turn off Siri on Apple Watch if you want to stop it from listening to you, ready to take your commands.

We’ll show you how to turn off the Siri listening feature Apple Watch, which still allows you to use Siri if manually activated, and also how to turn off Siri completely so that the entire feature is not available on Apple Watch. Finally, we’ll also show you how to delete your Siri history and voice commands from Apple servers.


Note that by disabling Siri listening on…

Read more: How to Turn Off Siri on Apple Watch to Stop Siri Listening

How to Remove Old Devices from Apple ID on Mac

Go to OSX Daily to read How to Remove Old Devices from Apple ID on Mac

If you’ve owned a variety of Apple devices over the years, you may eventually get to a point where you have sold, handed down, or traded away some of those older Macs, iPhones, iPads, or other Apple hardware. Whatever the situation, once a device is no longer in your possession, you should remove the devices you’re no longer using from your Apple account for security reasons. Plus it’s just good practice to clean out devices that are no longer yours so they are not associated with your Apple ID anymore.

Signing in to your Apple ID from a device to take…

Read more: How to Remove Old Devices from Apple ID on Mac

How to Check sha256 Hash of a File on Mac

Go to OSX Daily to read How to Check sha256 Hash of a File on Mac

Need to check the sha256 hash of a file? You can easily check the SHA 256 checksum of any file in macOS from the command line.

We’ll cover two different command line tools to verify a sha256 checksum on the Mac, and both come preinstalled with all modern versions of MacOS.

For those who are not familiar, a checksum is basically a string of letters and numbers that can be used to determine file integrity, like whether an error occurred during transmission, or whether a file was tampered with. For example, if the file checksum matches on your end with the…

Read more: How to Check sha256 Hash of a File on Mac

How to Replace a Lost Recovery Key for Apple ID with iPhone or iPad

Go to OSX Daily to read How to Replace a Lost Recovery Key for Apple ID with iPhone or iPad

Apple reintroduced the Recovery Key security feature in modern iOS and iPadOS versions that may come in handy for resetting your Apple ID password. Recovery Key acts as an extra layer of security for your Apple account just in case you forget your password, and lose access to your trusted device. But what happens if you need a new recovery key for your Apple ID?

Although resetting an Apple ID password is a pretty simple task in most cases, things could get super complicated and frustrating if you don’t have access to the device you’re already signed into….

Read more: How to Replace a Lost Recovery Key for Apple ID with iPhone or iPad

How to Limit App Access to Photos on iPhone or iPad

Go to OSX Daily to read How to Limit App Access to Photos on iPhone or iPad

An interesting privacy feature allows iPhone and iPad users to have complete control over which apps can access the photos on their device. If you’re interested in limiting which apps can access your device photos, read along.

This app specific access feature is available in iOS 14 and later. Previously, there were two options when it came to providing photo access for apps. You could choose to either share all the photos in your library or completely block photo access. But with new iOS and iPadOS versions, you’ll be able to take advantage of a new…

Read more: How to Limit App Access to Photos on iPhone or iPad

How to Get Verification Codes For Apple ID on iPhone & iPad

Go to OSX Daily to read How to Get Verification Codes For Apple ID on iPhone & iPad

Do you use Apple’s two-factor authentication system to verify the sign-ins to your Apple account from new devices? In that case, you might be interested in learning another way to get your verification codes, right from your iPhone or iPad.

For people who aren’t aware, two-factor authentication is an added layer of security for your Apple account to ensure that only you have access to your account, even if your password gets leaked in a data breach. By default, when you sign in to your Apple ID from a new device, your iPhone, Mac, or iPad will auto-notify…

Read more: How to Get Verification Codes For Apple ID on iPhone & iPad

Changing MAC Address in macOS Big Sur & Monterey with mac-spoof

Go to OSX Daily to read Changing MAC Address in macOS Big Sur & Monterey with mac-spoof

If you want to change your MAC address in macOS Monterey or Big Sur, you can use the traditional method to spoof a MAC address, or you can use a slightly easier approach by using a command line tool called mac-spoof. We’ll be covering the mac-spoof method here, which relies on HomeBrew.

For some quick background, your computers MAC address is unique and identifies it to connected networks, and some services use MAC addresses for filtering who or what is allowed onto a particular network. Additionally, some services use a MAC address to track a computer or…

Read more: Changing MAC Address in macOS Big Sur & Monterey with mac-spoof