A primer in Profile Manager: The setup

This is part 2 in a multi-part series on setting up Profile Manager to manage your Mac OS, iOS, and Apple TV devices. For an introduction to the series, have a look at last week’s article, A primer in Profile Manger.

To begin our work with Profile Manager, we’re going to start with a fresh install of El Capitan and a fresh install of the Server app.

A note of caution

Read more »


A primer in Profile Manager

Over the next several weeks we’ll be taking an in-depth look at Profile Manager, the Mobile Device Management (MDM) service built in to Apple’s Server app.

Profile Manager is a tool you can use to take control of all the Mac OS, iOS, and Apple TV devices you own or are responsible for. It can also help you provide your employees access to company resources, such as VPNs, file servers, and email, using their own devices while still requiring those employees to secure their devices in ways that comply with your company security policies.

Why use a MDM service?

Read more »


Remove extra application files with AppCleaner

One of the many great things about the Mac OS is how easy it is to install and remove applications.

To install: Download an app from the App Store and it’s automatically dropped into your Applications folder and ready to use.

Or: Download an application directly from a developer and drag the app to your Applications folder. Once again, ready to use.

Read more »


The mystery of the unsharable Google Apps calendar

Just a few days ago I had an interesting problem with sharing a Gmail calendar. The calendar belonged to a client with a corporate Google account for which he was the only authorized user. He’d recently acquired another company and wanted to create a shared calendar using email addresses that differed from his company domain.

Simple enough, right?

Well, not so much.

Read more »


Goodbye to the ghosts of emails past

After using Apple Mail for a few years you may have noticed that, when adding contacts to a new email message, a long list of email addresses appears. Some of these may be in your address book, but it’s often the case that these names are people you haven’t sent messages to in years or that you emailed once, but have no intention of emailing ever again.

Why the long memory? Apple’s Mail app, for the sake of convenience, collects the names of everyone you send email to so you don’t have to chase down an email addresses for people who aren’t in your Contacts app. It’s a nice feature, but may make addressing email messages a little messy after a few years go by. Fortunately, you have a couple of options for cleaning up the mess.

Get smart with Smart Addresses

Read more »


Mystery of the unmovable mail (and how to sync iOS email folders across all your devices)

If you’re using email on your iOS devices it’s likely you’ve encountered the following scenario: You’re going through your inbox, try to delete an email when the following message appears, “Unable to Move Message -> The message could not be moved to the mailbox Trash.”


Moving to your Mac, you discover you can delete the message without a hitch and that the message you delete from your Mac also disappears from your iOS device. But none of your iOS devices will let you delete the file.

Read more »


How to use a VPN to keep your network data safe

We’ve spent the last two weeks looking at applications you can use to protect your computer from unauthorized access: Apple’s built-in firewall for incoming access and Little Snitch for monitoring both inbound and outbound network access. But how do you keep people from looking at your network traffic while you’re on public Wi-Fi networks, such as those provided by your ISP, your favorite coffee shop, or the local library?

When you’re on public (read that untrusted) networks it’s possible for someone on the same network to capture and unwrap your network traffic and essentially ”listen” to your network conversations. This could potentially expose data you’re sending and receiving if your network data isn’t encrypted in some fashion.

When you connect to sites such as Amazon.com or your web banking service your network traffic is usually encrypted to keep your data safe, but there are many instances when sites you’re connecting to may be allowing that data to travel from your computer to their servers in the clear. On untrusted public networks this means it’s possible for nefarious individuals using packet sniffing software, such as Wireshark, to look at your private data. To avoid this kind of exposure on public networks it’s wise to use a Virtual Private Network (VPN) to keep your data safe.

Read more »