Ways of Setting Up Workgroup Name in Mac OS X

workgroup name

Ways of Setting Up Workgroup Name in Mac OS X

 

In one of my previous articles, I have talked about how to set up workgroup name in Mac OS X. You can click on the link to read more about that in this article. In this infographic, I want to show us some of the ways we want to set up a workgroup name in Mac OS X.

Follow me as we look at this together in these infographics. Do not forget that if you have any question you can make use of the comment box to raise questions in the comment box.

Revealed: Ways of Setting Up Workgroup Name in Mac OS X

 

Introducing ways of sharing files and folders in Macintosh OS X

 

In many of my previous articles, I have decided to talk about some of the processes that need to be followed when you need to transfer files and folders on Windows 7. In this article, I want to talk about some of the ways that files and folders in Macintosh OS X.

 

 

Now, let us look at how some of this can be done. Once again, I will be using my graphic illustration to show some of the ways that this can be done in this article. If you have any questions, you can make use of the comment box to ask your questions.

Ways of Sharing Files and Folders in Macintosh OS X

 

Introducing a firewall as a tool for Network Protection

 

A firewall is a part of the computer system or network that is designed to block unauthorized access to a network. It ensures that only legitimate users are allowed to access a particular network. In this article, we want to look at some of the ways that firewalls can be used for network protection.

 

 

The firewall controls traffic coming into and leaving the system by permitting authorized communication. It hides the users home network from the outside world.

One major thing you should know about a firewall is that it can be software or hardware. Apart from being separate hardware, there are some firewall features that are also built into any network.

Why you Should use a Firewall for Network Protection

The firewall as a tool for network protection also monitors all the requests coming into the system, alerts the user, and asks permission for allowing or blocking them as well.

There are some clear examples of firewalls such as Windows firewall (check securing Operating system module), Norton Personal Firewall, McAfee Personal Firewall, Sunbelt Personal Firewall, Zone Alarm, and Comodo Personal Firewall among others.

Ways of Creating User Accounts and Groups in Mac OS X

 

In this article, I want to show you how to create user accounts and groups in Mac OS X. When I say Mac OS X, I mean Apple Laptops and Desktop. User Accounts are accounts that allow users that belong to the same department to share data and files together without any intervention from third parties. Follow the illustration displayed below to see how this can be done. If you have any questions while you are trying to do this, feel free to reach out to me through the comment box.

 

Ways of Creating User Accounts and Groups in Mac OS X

 

Revealed: 10 General Practices for Home Networking

 

 

I have talked about home networking in my previous article. They are a combination of two or more computers that are set up at home or offices to communicate with one another. I also said once you are connected to the internet, your system can be easily corrupted.

 

 

In this article, I want to talk about some of the general practices that can be done to save our networks. I believe that If you follow some of the practical steps that I am going to list out in this article, you can stay secured from Hackers and others that might want to attack your network. Follow me as we look at some of these steps in this article.

#1           Use Anti-virus as part of home networking practices

I have said this in many of my articles. One of the ways to stay secured in a home network environment is to use anti-virus. This will help you to detect malicious software that might want to run on your network and eliminate them. This will help you to stay secured from every malicious code that might want to steal personal and confidential information from your network.

#2           Turn off Ethernet interface as part of home networking practices

There is a need for you to turn any Ethernet port that is not in use. When you have an unused Ethernet port on your switch or your router. You can administratively shut it that so that such ports will not be used as a means of gaining access to the network. This will help you to stay secured from Hackers.

#3 Personal firewall as part of home networking practices

In order to stay secure in a network, there is a need for you to use a personal firewall on your system. When you make use of a firewall, you will be able to monitor traffic going in and out of your network. Firewall work more or less like an anti-virus that scans all data going in and out of the network. Without it, you might become a victim of network attacks.

#4 Turn of scripts

There is the need for you to turn off Java scripts and ActiveX which hackers can use as a means of gaining access to your network. Turning off this script ensures that you do not fall, a victim of malicious attacks, normally when you are on the internet, some of these scripts are passed from the sender computer to the receivers’ computers. This can cause some issues at times. That is why Java and ActiveX scripts need to be turned off.

#5 Email attachments

In order to stay secure in a home networking environment, you should also ensure that you scan all email attachments before they are opened. Some of the email attachments flying around are sent by hackers. You should never open an email if you are not sure of the source of the attachments. Make sure you scan every email before they are opened.

#6 Backups

If there is anything that you need to do regularly, it is to back up your data regularly. You have to make sure that you have a backup copy of your document so as to avoid a situation where you will lose important documents to hackers or viruses. You can choose the frequency at which you will be backing your data. This can also be automated so that it will be done automatically.

#7 Trusted source

In order to save on home networks, you have to make sure that you only run programs from a trusted source. When you also need to download any software or program, you have to be sure that it is only downloaded from the manufacturer’s website. Without that, you are giving an open invitation to hackers to attack your network.

#8 File extension

10 General Practices for Home Networking

The Windows Operating system contains the option to “hide file extension for known file types”. You have to disable this option in order to have file extensions displayed by Windows.

Patching as part of home networking practices

You have to keep all the file applications including the operating system patched.

Boot Disk

There is a need for you to make a boot disk to recover the system when it is damaged or compromised.

 

Now tell us your own side of this story.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

 

You can also join our WhatsApp Group Here.

 

 

Adeniyi Salau Scrum Master Certified , CCNA R&S , BeingCert and Scrum Certified Digital Marketing Professional, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

CommentLuv badge
%d bloggers like this: