Glenn FleishmanSenior Contributor, Macworld Follow me on Google+

Glenn Fleishman is the owner and editor of The Magazine, a fortnightly periodical of stories for curious people with a technical bent. He is a regular contributor to the Economist and a senior contributor to Macworld.

Get in Sync: BlackBerry

The e-mail–focused BlackBerry, by Research in Motion (RIM), inaugurated the smart-phone category and is still largely regarded as a must-have accessory in corporate and government realms. Its Mac support is fairly limited, but e-mail junkies can convince a BlackBerry to sync with their Macs.

Get in Sync: Windows Mobile

If you use a Windows PC all day, a smart phone running Windows Mobile is instantly familiar. But that's not a whole lot of help to most Mac users, who have their reasons for avoiding Windows. Still, some people prefer Microsoft's smart phone approach.

Get in Sync: Palm OS

Palm-based PDAs have always been the most Mac-friendly models out there. And with the Treo, Palm has done a nice job of melding its PDAs with a cell phone that Mac users can enjoy toting around and has showed the rest of the industry wha's smart about a smart phone.

Back up photos on the road

There’s no point in lugging along a laptop on your vacation just so you can archive or organize your digital pictures. A laptop not only adds weight and heft, but is also vulnerable to theft and damage. Luckily, you have other options. Our recommendations will help ensure that all your photos come home safely with you.

Get online from anywhere

Until recently, if you wanted to get online while on the road, you had two main options: jack in to your hotel’s in-house network or find a Wi-Fi hotspot. But a third option is slowly gaining traction.

Protect your Mac

Are you leaving your Mac vulnerable to viruses, intruders, and other dangers? OS X may be more secure than other operating systems, but it's not invulnerable. Here are 18 things you can do right now to protect your Mac -- and your data -- from potential disaster.

Create a wireless hotspot

Whether you want to entice customers to your hip café or simplify life for everyone in your apartment building, it makes sense to set up a wireless hotspot.

Ad hoc networking

When you’re on the road, your portable Mac is often on its own. And while you can often get Net access, one way or another, there are times when you need to share that access, or share files, with your traveling companions. The solution is ad hoc (or computer-to-computer) networking.

PGP Desktop Home 9

PGP Desktop Home 9 is still not for every Mac user—you must have a real need for encryption to get use from it. But for the large audience PGP applies to, the program has never been more useful or relevant, or less intrusive.

GoLive CS2

Adobe has added key features to GoLive that make this veteran of the Web-design wars even more appealing to its key audience of designers. But bugs in the release version make GoLive CS 2 a tough product to recommend.

How to use hotspots

You’d have to be living far, far away from a Starbucks not to know that Wi-Fi hotspots are everywhere these days. But using those hotspots to get online isn’t always easy.

AirPort dynamics

Most broadband ISPs offer just a single address for their least-expensive accounts, which is why many users need to take control of dynamic addressing: assigning private Internet protocol (IP) numbers to machines on their local networks to share a single IP address.

Instant Collaboration

SubEthaEdit can shave hours off projects—from building outlines and conducting group meetings to revising articles.

Stranger in a Strange LAN

If you’re trying to log onto a network using an AirPort Base Station, your Mac will alert you to the presence of the network. But if it’s a non-Apple network, getting on can be anything but simple. Find out how to navigate the wireless maze.

Mac Security: Fact and Fiction

Are you worrying too much about security—or not enough? Our panel of Mac security experts examines several commonly held assumptions about viruses, spyware, wireless networking, and Web privacy and reveals which ones are true and which ones are false.