Category Archives: Apple

Is Your Mac Running Low on Disk Space? Here’s How to Delete Unnecessary Files

Between apps, photos, videos, music, and downloads, it’s easy to fill up your Mac’s drive, particularly one with just 128 or 256 GB of drive space. macOS warns you when you get too low on space, but those warnings may come late—for optimum Mac performance, we recommend you keep at least 10–20% of your drive free for new downloads and virtual memory swap files. There are excellent utilities that help you find and delete unnecessary files, such as the free GrandPerspective, the $9.99 DaisyDisk, and the $14.99 WhatSize, but Apple’s built-in storage management capabilities will likely be all you need.

Apple first introduced its Storage Management tool in the System Information app in macOS 10.12 Sierra, making it accessible from the About This Mac dialog. Starting in macOS 13 Ventura, Apple moved those capabilities to System Settings > General > Storage, providing a quick overview of your drive usage at the top. Hover over each colored bar to see how much space is taken up by a particular type of data. The light gray space at the end of the bar is what’s still available.

Below the graph, macOS may offer some recommendations for reducing storage over time, but they come with tradeoffs. Storing files in iCloud and optimizing Apple TV videos will replace local files with stubs pointing at a version stored in the cloud. That’s OK, but you then have to download the original before you can use it. Deleting files automatically after they’ve been in the Trash for more than 30 days is also fine but could have undesirable results if you ever want to recover older files from the Trash. Enable these if you wish, but the real work happens farther down on the screen, where you find all the categories of files you can explore. Depending on what apps you use, they will vary a bit between Macs, but they correspond to the colored bars you saw in the storage graph. Double-click each one to see what it displays.

For a few app-specific categories, like Mail and Podcasts, you merely learn how much space the app’s data occupies—to save space, you must delete unnecessary data from within the app itself. iCloud Drive and Photos are similar but also let you enable space optimization, which stores only placeholder files or smaller optimized photos on the Mac, leaving the originals in iCloud for later downloading whenever you access them.

More interesting are the Applications, Documents, and iOS Files categories, each of which may reveal gigabytes of unnecessary data. iOS Files, for instance, shows any device backups and software updates stored on your Mac’s drive. It’s worth keeping the latest backup of devices you still use, but delete any older backups and updates that are just wasting space—well over 8 GB in the screenshot below.

The Applications category lists your apps and is sorted by size by default. But try clicking the column header for Kind and scrolling down. You can probably delete most apps tagged as Unsupported, Duplicates, or Older Versions. Similarly, click the Last Accessed column header to see which apps you haven’t launched in years. Many of them can probably go, too.

In Documents, you’ll see four buttons: Large Files, Downloads, Unsupported Apps, and File Browser.

  • Large Files shows huge files regardless of where on your drive they’re located.
  • Downloads shows you the contents of your Downloads folder, much of which you likely don’t need.
  • Unsupported Apps lists any PowerPC or 32-bit apps that won’t run on your Mac. You can delete them.
  • File Browser provides a column view sorted by file size and shows sizes next to each item. It’s great for trawling through your drive to see what’s consuming all that space.

In any of these views, click Delete or Move to Trash to remove the file or Show In Finder to see it in its native habitat, which may help you decide if you should keep or delete the file. To delete multiple files at once, Command-click or Shift-click to select them and then click Delete to remove them all at once.

You may find it worth using GrandPerspective to get a visual overview of how space is used on your drive. After scanning, which can take a long time, it uses tiny colored blocks to represent files, collecting multiple blocks into bigger rectangles to show folder size. Toolbar buttons let you open, preview with Quick Look, reveal location, or delete whatever file block you click. Look in the status bar at the bottom of the window to see the path to the file.

In the screenshot below, the big boxes of color are massive virtual machine disk images, and the selected folder outlined in white at the right contains desktop pictures downloaded by an app that rotates them regularly—gigabytes of old files that can easily be deleted.

If your Mac’s drive has less than 10% free space, consider using Apple’s storage management capabilities—perhaps supplemented with OmniDiskSweeper or another utility—to find and delete files that are wasting space.

Two final notes: Don’t get too wrapped up in the exact numbers in the storage graph matching what the Finder reports, and give the Mac some time to update its free space amounts after deleting files directly or emptying the Trash.

(Featured image based on an original by iStock.com/Bet_Noire)

Faster Copying of Two-Factor Authentication Codes from Messages

One welcome feature of Safari is its automatic detection and auto-filling of SMS-based two-factor authentication codes you receive in Messages. It allows you to complete your login quickly, without having to retrieve the code from Messages. But what if you use a different Web browser, like Google Chrome, Firefox, Brave, or Arc? Apple doesn’t allow other developers access to those codes in Messages, but Messages itself recognizes the verification code, marking it with an underline. Rather than transcribing the code manually like an animal, you can Control-click the underlined numbers and choose Copy Code. Then, switch to your Web browser and press Command-V to paste it. Not all websites accept pasted codes, but most will, even if they present a custom interface.

(Featured image by iStock.com/Galeanu Mihai)

Networking Gear Does Wear Out—Suspect It in Internet Slowdowns and Dropouts

We’ve helped some clients recently with networking problems that seemed to be related to Internet connections. Most notable was intermittently slow Internet performance, causing the client to call their ISP to upgrade to a higher bandwidth connection with guaranteed throughput. But that extra monthly expense turned out to be unnecessary once we tracked the problem to a malfunctioning cable modem. Other problems we’ve seen involved occasional network dropouts (a bad Ethernet switch), flaky Wi-Fi access (a dying AirPort base station), and Internet slowdowns (squirrels gnawing on an outdoor coaxial cable).

Networking infrastructure is often the very definition of “out of sight, out of mind.” Modems, routers, and switches are usually hidden away in corners, closets, or machine rooms where few people notice them regularly. In addition, most users rely on Wi-Fi–equipped laptops, tablets, and smartphones and put no thought into how those Wi-Fi connections get their Internet access. Nor do many people realize the extent that physical cables—Ethernet, coaxial, fiber optic—are required.

Plus, because network cables and gear are so hidden, they tend to stay in place for years. For the most part, that’s fine. Most network devices other than those involving network-attached storage have no moving parts to fail, and cables that aren’t exposed to extreme environmental conditions or physical movement will last for a long time. But even solid-state electronic devices wear out, and while cables seldom degrade on their own, they’re easily damaged by movement. And never underestimate the damage mice and squirrels can inflict!

It’s worth making sure you or someone in your organization has a solid knowledge—and documentation—of your network infrastructure. For instance, can someone answer these questions:

  • Where does your Internet connection come into the building?
  • What cable modem or other router are you using? Do you own or rent it?
  • Does your network rely on multiple Ethernet switches? Other networking gear?
  • Is your Ethernet cabling Cat 5 (obsolete, limited to 100 Mbps), Cat 5e (capable of 1 Gbps), Cat 6 (up to 10 Gbps), Cat 6a (10 Gbps at longer distances), or Cat 6e (a meaningless marketing term)?
  • Where is your Ethernet cable strung, and is it reasonably accessible? Can you isolate portions of your network for testing?

We also recommend putting an installation date sticker on the bottom of your network devices. That way, if you’re troubleshooting a problem like poor performance or intermittent connections, you can check quickly to see if any suspect devices are truly ancient. Even when older devices like cable modems seem to be working correctly, they may lack support for newer standards or firmware updates that provide better stability and throughput. We’ve also seen that issue with powerline networking adapters that are useful for extending connectivity to areas that can’t easily be served by Wi-Fi or Ethernet—newer adapters can provide significantly more performance. Plus, hardware does degrade over time—in particular, we’ve seen Ethernet switches and Wi-Fi routers get flaky as they age.

Finally, if solving a network problem requires new gear or cables, we strongly encourage purchasing quality hardware and cabling. Spending a little more upfront can save a lot of money in troubleshooting down the road, especially when it comes to pulling new cables.

(Featured image by iStock.com/klmax)

Stay Alert! Voice Phishing Used in Recent Ransomware Attacks

All it took for MGM Resorts International to be compromised with ransomware was a quick phone call, which some now call “voice phishing” or “vishing.” An attacker using LinkedIn information to pose as an employee asked MGM’s help desk for a password change, after which they were able to install ransomware. MGM is now up to $52 million in lost revenues and counting. Two takeaways. First, if you call support for a manual password reset, expect to be asked for a lot of verification, such as a video call where you show your driver’s license. Second, if you receive a call at work from an unknown person asking you to do anything involving money or account credentials, hang up, verify their identity and authorization, and proceed accordingly only if they check out.

(Images by iStock.com/1550539 and HT Ganzo)

Tired of Nonstop Cookie Popups? Dismiss Them Automatically with These Extensions

The European Union has for many years required that websites—at least those serving European users—gain informed consent before storing the personal data of those users. That data includes cookies, which are bits of information stored in Web browsers that websites can read and write. Cookies are widely used for remembering login information, saving user account information, maintaining a shopping cart, and other legitimate purposes. However, they’re also used to target advertising at you by tracking your behavior across websites, which many people consider to be an abuse of user privacy. Hence the EU’s ePrivacy Directive, which resulted in the proliferation of cookie consent popups like this one.

Websites that rely on advertising or user tracking prefer that everyone click Accept All, but because of the EU requirement for informed consent, they have to tell you more about the cookies they use, explain why they want to use them, and allow you to reject types of cookies. Clicking Customize in the cookie consent popup above presents this expanded view. So many details!

On the one hand, thanks to the EU for working to safeguard user privacy. Without laws like the ePrivacy Directive and the overarching General Data Protection Regulation (GDPR), the Web would be even more of a sausage factory that grinds up and sells our personal data.

On the other hand, could cookie consent popups on nearly every website be any more annoying?!? While it’s a nice idea that we provide informed consent for cookies, few people have the time and inclination to read all this and make an informed decision. If you’re like us, you’re probably mashing Reject All as fast as you can. And even that is more effort than you’d prefer to expend.

Happily, there are Web browser extensions that can simplify your life, responding to cookie consent popups automatically using preferences you set once. Why can’t Web browsers do this themselves? They could, and the privacy-focused Brave does, but the W3C’s Platform for Privacy Preferences working group’s recommendations for standardizing behavior around privacy were ignored by browser makers and dropped back in 2006.

Two browser extensions we’ve tested successfully in multiple Mac browsers are Consent-O-Matic and Super Agent. They work by learning how to interact with the common consent popups (many of which come from Consent Management Platforms like Osano and CookieYes) and automatically clicking the switches to match your preferences. More specifically, the Hush extension blocks cookie consent popups in Safari on the iPhone, iPad, and Mac.

Consent-O-Matic

The open-source Consent-O-Matic is free from privacy researchers at Aarhus University. It comes as a Chrome extension that works with Google Chrome (and other Chromium browsers like Arc, Brave, and Edge, shown below), as an add-on for Firefox, and as an extension for Safari on the Mac and Safari in iOS and iPadOS. Consent-O-Matic works reasonably well on the Mac; in testing, it wasn’t effective enough in Safari on the iPhone and iPad to be worth installing. Installation and interface vary by browser—the Chrome extension is shown below.

By default, Consent-O-Matic allows no cookies, though we recommend enabling the Preferences and Functionality option and, if you’re feeling generous toward websites, the Performance and Analytics option. The first option improves your experience on any site where it’s helpful for it to remember information about you, and the second allows the website admins to collect metrics on how the site is being used. If a site doesn’t work correctly with Consent-O-Matic enabled, you can turn off the extension for just that site. In the Display preferences, you can choose whether Consent-O-Matic minimizes consent popups or hides them entirely, and on the About screen, you’ll see how many clicks it has saved you.

Super Agent

Super Agent seems to focus its paid plans on its version for the iPhone and iPad, but we didn’t find it effective enough there to install. On the Mac, however, Super Agent is free and works well, perhaps a bit more so than Consent-O-Matic. It’s available as a Chrome extension for Google Chrome and other Chromium browsers, as a Firefox add-on, and as a Safari extension. Installation and interface vary by browser—the Chrome extension is shown below.

Your first task in Super Agent is to set your preferences for cookies to accept. Again, we recommend enabling Functional cookies; turn on Performance cookies if you wish. Leave Advertising and Other cookies off.

Although it’s not required, you can create a Super Agent account and enable the Consent Trail switch to see a list of the sites whose cookie consent popups Super Agent filled out for you. It’s end-to-end encrypted so that only you can see the data, but if you’re particularly concerned about privacy, don’t turn it on.

Hush

What about the iPhone and iPad, or those who care only about Safari on the Mac? We recommend Joel Arvidsson’s Hush, which bills itself as a nag blocker. It’s a free download from the App Store, and once it’s on your device, you enable it in Settings > Safari > Extensions > Hush (iOS/iPadOS) or Safari > Settings > Extensions (Mac).

That’s it. From then on, it silently blocks cookie consent popups—it doesn’t attempt to register your preferences like Consent-O-Matic and Super Agent. As a result, it might cause problems if a site requires that you accept some cookies for it to function correctly. We haven’t encountered such a site yet, but it’s not impossible. If that happens on an iPhone or iPad, tap the AA button in the Safari address bar and then Turn On Content Blockers; on the Mac, choose View > Reload Without Content Blockers.

The Web is an ever-evolving place, so there’s no guarantee that these extensions will respond to or block every cookie consent popup. But you can report missed sites to the Content-O-Matic and Super Agent developers, and Joel Arvidsson releases regular updates to block more nags and fix partially broken websites.

If you use only Safari for Web browsing, Hush could be all you need on all your Apple devices. Those who rely on other Web browsers on the Mac can pick either Consent-O-Matic or Super Agent to supplement Hush on the iPhone and iPad.

(Featured image by iStock.com/Pla2na)

Keep a USB Keyboard and Mouse for Troubleshooting

Steve Jobs famously railed against cable clutter, and it’s now easy to use a desktop Mac with a wireless keyboard and mouse, either from Apple or another manufacturer. That’s fine for regular usage, but Bluetooth keyboards and mice aren’t always sufficient. Batteries wear out, pairing can fail, and wireless interference can cause lags or spurious inputs. Plus, if you need to boot into macOS Recovery, wireless input devices may not work. We recommend keeping an extra USB keyboard and mouse—preferably from Apple, but any brand will work—to use in case you have problems with your wireless versions. If you don’t have a keyboard and mouse left over from an old Mac, a friend or family member may be happy to give you theirs, or you can probably find them for next to nothing at a local reuse store.

(Images by iStock.com/Jeffrey Glas and RafalStachura)

Want to Password-Protect a PDF? Follow These Best Practices

We periodically field questions about password-protecting a PDF to prevent the wrong people from reading it. Lawyers want to ensure that drafts of legal documents don’t fall into the wrong hands, financial advisers want to keep confidential financial information private, and authors want to prevent their writing from being shared broadly on the Internet. Others don’t worry so much about a document being read but want to ensure that it can’t be changed or printed.

PDF provides options for password-protecting documents for just these reasons, and you can add such protection to your PDFs in both Apple’s Preview and Adobe Acrobat. We’ll explain how to do that, but before we do, we want to share some best practices to increase the likelihood that your PDFs will remain protected as you wish.

Also, if you’re looking for a comprehensive solution to protecting lots of documents for a wide variety of situations, you’d be better off investigating document digital rights management systems along the lines of LockLizard and Vitrium.

Best Practices for Password-Protecting PDFs

There’s no such thing as perfect security, especially when you want to share information with others rather than just keeping it as your own secret. But you can increase the security of shared documents with these best practices.

  • Use strong passwords: All PDF passwords should be longer than 12 characters and include uppercase and lowercase letters, numbers, and punctuation, without using dictionary words or well-known number/letter substitutions. A plethora of online PDF unlocking tools can remove weak passwords, and passwords should be strong enough to withstand brute force and dictionary attacks from a determined attacker who could bring significant computing resources to bear.
  • Focus on Document Open passwords: PDFs can have two passwords: the Document Open password that users must enter to open the document and a Permissions password that restricts actions like editing, printing, and copying. Even if you mainly want to restrict actions, it’s worth setting a Document Open password because the Permissions password’s restrictions can be bypassed by third-party utilities or by screenshots and Live Text.
  • Share passwords out of band: When sharing a protected PDF with someone, send them the password via a different communications channel. So, if you email the PDF, give them the password via Messages or a voice call. That way, if an attacker gains access to the PDF, they won’t also have the password sitting next to it.
  • Educate recipients: When you share a user password with someone else, they can give it to anyone they want and, depending on how you set things up, remove the protection from the document. In short, your document security is only as strong as your recipients want it to be, so make sure to communicate your wishes to them.
  • Watermark documents: Along those lines, it may be worth adding a header/footer or watermark that identifies the document as Confidential or Draft to clarify why it shouldn’t be shared.
  • Avoid online tools: Numerous websites offer PDF utility functions, such as adding passwords, watermarking, merging and splitting, conversion, and more. There’s no harm in using them with documents you don’t care about, but if you’re concerned enough to password-protect a PDF, don’t upload it to a website with unknown security and document retention policies.
  • Clear metadata: Passwords protect PDF content, but not necessarily metadata that might include the author’s name, employer, and keywords.
  • Use Adobe Acrobat: Apple’s Preview is a decent PDF app and offers basic password-protection capabilities, but for more protection capabilities and options, use the full-featured Adobe Acrobat. Preview is OK for those who need to protect an occasional PDF, but Acrobat is a better choice if protecting PDFs is essential for your situation.

Password-Protect a PDF Using Preview

It’s easy to add password protection to a PDF with Preview. Apple recommends a slightly fussier approach that involves setting the permissions during an export, although we didn’t find that it made any difference. Apple is likely trying to get you to make a copy so you don’t password-protect your original, but it’s easier to duplicate the file in the Finder first with File > Duplicate. Here’s the simple method:

  1. With a copy of a PDF open in Preview, choose File > Edit Permissions to display the permissions dialog.
  2. Select Require Password To Open Document, and enter the desired Document Open password twice.
  3. Deselect desired checkboxes in the Permissions section to restrict those activities.
  4. Enter the Owner (Permissions) password twice at the bottom of the dialog. It should be different from the Document Open password. Either will open the document, but only the Owner (Permissions) password will allow the document to be printed, copied, or edited as per those checkboxes.
  5. Click Apply and save the document.

Password-Protect a PDF Using Adobe Acrobat

Adobe has extensive instructions on password-protecting PDFs using Acrobat in different scenarios, but the basics are still simple.

  1. With a copy of a PDF open in Acrobat, choose File > Protect Using Password to open the password dialog.
  2. Select Viewing to add a Document Open password or Editing to add a Permissions password.
  3. Enter the password, and retype it to confirm it.
  4. Click Apply and save the document.

For a simple Document Open password, you’re all done, but if you want to set specific printing, editing, and copying restrictions, follow these steps:

  1. Choose Edit > Protection > Security Properties to open the Document Properties dialog with the Security tab selected.
  2. Next to Security Method (which should be set to Password Security), click Change Settings to open the Password Security – Settings dialog.
  3. In the Permissions section, select the desired options to restrict printing, editing, and copying text in various ways.
  4. Click OK and, when prompted, confirm the passwords you’ve entered.
  5. Dismiss the Document Properties dialog and save the document.

Password-protecting a PDF can be helpful when you want to ensure a PDF containing sensitive information can’t be viewed or edited by the wrong people. Make sure to use strong passwords since weak passwords are so easily removed!

(Featured image based on an original by iStock.com/Thitichaya Yajampa)

With Storms Increasing, Protect Your Tech Gear from Damaging Power Fluctuations

It has been a tough year for extreme weather events. While the connection between weather and technology may seem tenuous, heat waves, high winds, and lightning strikes can play havoc with all sorts of powered and networked electronic devices.

Anything that causes power fluctuations—spikes, surges, sags, brownouts, and blackouts—can hurt your tech gear. Protecting your most vulnerable devices doesn’t have to be expensive, but don’t be complacent because you plug your Mac into a cheap surge protector you’ve had since college. And note that many power strips offer no surge protection at all.

First off, why are power fluctuations problematic? There are two scenarios:

  • Too little power: Sags and brownouts are drops in voltage; a sag is a short-term dip, whereas brownouts last longer. Blackouts are complete power outages. Although they’re less damaging than surges, sags and brownouts can cause electronic devices to behave erratically or crash, and the fluctuation in voltage—particularly when coming back from an outage—can stress components. Losing power entirely will cause you to lose any unsaved work and possibly end up with document or even drive corruption.
  • Too much power: Spikes and surges are sudden, brief increases in voltage; the difference is that spikes are shorter than surges. Either way, the excessive power can degrade or damage sensitive electronic components, reducing lifespan or causing immediate failures.

The best solution to these scenarios is an uninterruptible power supply (UPS). Put simply, a UPS is a big battery into which you plug your Mac and other peripherals. It then plugs into a wall outlet and monitors the incoming power. If the power surges, falls below a certain threshold, or fails outright, the UPS switches the power source to its internal battery. This happens so quickly that your Mac never even notices.

If your gear is plugged into a UPS when a blackout hits, you get some time to save your work and shut down gracefully, ensuring that you don’t lose data or flirt with drive corruption. A UPS also protects against spikes and surges, filtering out the excess voltage so it can’t harm the devices plugged into it. The downsides to UPSes are that they’re an extra expense, their batteries need replacing every few years, and they take up space under your desk. For a home or small office UPS, consult Wirecutter’s recommendations.

If power outages are rare in your location, you may prefer to rely on a surge protector instead of a UPS. As the name implies, surge protectors filter out voltage spikes and surges so they won’t damage your gear. Surge protectors are smaller and less expensive than UPSes, and while they don’t have batteries to fail, their protection circuitry degrades over time, so they should be replaced every few years as well. Better surge protectors alert you or stop working entirely when they can no longer provide protection. Again, Wirecutter has good recommendations.

If most of your expensive tech gear is battery-powered, you could forgo even a surge protector. Outages aren’t an issue, and a MacBook or iPhone power adapter will protect against most sags, brownouts, spikes, and surges. The power adapter may incur damage, but it’s inexpensive to replace.

One final thought. No UPS, surge protector, or power adapter can protect against a direct lightning strike. Lightning is too fast and too powerful—it’s millions or even hundreds of millions of volts. Even turning your equipment off isn’t sufficient because lightning that has traveled miles through the air to hit the ground can easily jump across an open switch. If lightning strikes are common in your area, unplug your most expensive devices entirely during severe storms.

To sum up:

  • For a desktop Mac and peripherals, a UPS is a worthwhile investment if you ever suffer from power outages. Also, consider a UPS for essential networking gear—cable modems, routers, switches, and network-attached storage.
  • If power outages are extremely rare, or for equipment that doesn’t need to remain on during an outage, get a good surge protector. If it doesn’t automatically disable itself when it’s no longer effective, write the date on the bottom and replace it in a few years.
  • Although there’s no harm in doing so, it’s not necessary to plug battery-powered device chargers into a surge protector or UPS. A spike or surge may damage them, but they’ll probably sacrifice themselves to protect your gear.
  • When in doubt during severe storms, unplug your most valuable equipment to protect against a direct lightning strike.

(Featured image by iStock.com/HardRockShotz)

What Should You Do about an Authentication Code You DIDN’T Request?

We strongly encourage using two-factor authentication (2FA) or two-step verification (2SV) with online accounts whenever possible. The details vary slightly, but with either one, after you enter your password, you must enter an authentication code to complete the login. Although it’s always best to get such codes from an authentication app like 1Password (which enters codes for you), Authy, or Google Authenticator, many websites still send codes by the less secure SMS text message or email. They’re better than nothing.

But what if you receive a 2FA code that you didn’t request?

  1. Don’t panic. Although receiving the code means that someone is trying to log in to your account and has your password, the extra authentication step has done its job and protected your account from being compromised.
  2. Never share an authentication code with anyone! A hacker could attempt to break into your account, be foiled by two-factor authentication, and then email or text you with a trumped-up story about why you should send them the code. Authentication codes are short-lived, so if this is going to happen, it will happen right away.
  3. Independently from the message with the code, go to the account website, log in, and change the password. As always, make sure the password is strong, unique, and stored in your password manager. If the account used an old password that was shared with other accounts, change passwords on those accounts as well.

There are a handful of scenarios that could generate such an authentication code:

  • Stolen credentials: The most likely scenario, which the advice above addresses, is when your email address and password have been stolen, probably in a significant site breach. You can check the Have I Been Pwned site to see if your account is floating around on the “dark Web.” Password managers often perform similar checks. Changing the password on any breached sites is essential.
  • Identity theft: You started receiving authentication codes from TikTok, but you don’t remember creating a TikTok account. Someone might be trying to create an account to impersonate you but cannot complete the account creation without the authentication code. There isn’t much you can do to stop such attempts, although if an account has been created, you should be able to change the password (since it’s using your email address or phone number), log in, and either just let the account sit in your password manager or try to delete it.
  • Accidental or random triggering: If you have a common email address or phone number, someone could have accidentally entered your address or number instead of theirs while trying to create an account. It’s easy to type marsha32@example.com instead of marsha23@example.com or mistake the Boston 617 area code for the upstate New York 607 area code. If you’re sure you don’t have an account at the site in question and you only get one authentication code, you can probably ignore it.

Regardless of the cause, don’t ignore 2FA codes you didn’t request for sites where you have an account. It’s not hard to change a password, particularly if you use a password manager, and the extra piece of mind is worth the few minutes of work.

(Featured image based on an original by iStock.com/Kateryna Onyshchuk)

Erase Image Content in Preview with Copied Color Blocks

Apple’s Preview is a surprisingly capable graphics editor for making quick changes to screenshots and other illustrations, but it lacks a built-in way to delete content while leaving the background. Here’s the workaround—select a rectangle of the background color, copy it, paste it, and then move it over the undesirable content—as shown in the After screenshot below, where blue selection dots denote the pasted box. As you resize the box, press Shift to prevent it from resizing proportionally, which helps you make it the shape you want. If you need a second box of the same color, Option-drag the first box to copy it. When you save and close, your boxes will be merged into the image, permanently removing the content underneath, so make sure they’re in the right spot before moving on.

(Featured image based on an original by iStock.com/Seetwo)


Social Media: Have you ever needed to remove some content from a screenshot or other illustration? There’s no need for a fancy graphics app—you can do it quickly in Preview with this little-known trick.