If you have a Windows laptop, there may be some scenarios under which you may prefer that the computer not go to sleep when you close the lid. One example could be if the laptop is connected to a dock and being used as a workstation with an external monitor. Here’s how to change that behavior:
First, what is a MAC address and why might you want to alter, clone, or spoof it? MAC stands for Media Access Control and it’s a (theoretically) unique 12 hexadecimal digit identifier for a specific piece of network hardware. An example could look like 01-23-45-67-89-AB (remember hexadecimal digits range from 0 to F).
Now why might you want to spoof, clone or alter it? Some examples may include avoiding having to register a new router’s MAC address to an internet service provider, or to obfuscate a network monitor’s ability to tie traffic to a particular piece of hardware, or to circumvent a MAC address blacklist filter preventing a device from connecting.
Strangely, there’s no single option in OS X which you can toggle to have your Mac automatically sign out after a certain period of inactivity. The functionality is still there though, you just have to adjust two settings. Here’s how:
Unlike Windows, Mac OS X does not provide a radio button or switch to show hidden files, instead the functionality is hidden within a terminal command. Here’s how:
A cryptographic hash value can be thought of, and is often referred to as, a fingerprint. They are also referred to as simply hashes or check-sums. What they are though are alphanumeric identifiers produced by a cryptographic function being run on a file.
In addition to just being plain cool, this can be very useful if you have an occupation where you may need to verify updated versions of a particular file, or if you need to differentiate unique files of the same name.
Without a moments notice, your life could be thrown into chaos. A thief nabs your laptop. It’s not just that the computer itself is valuable, it’s not even the lost family photos or essays in progress, it’s your passwords, identity information, enough for a savvy thief to ruin your finances. But then you breathe a sigh of relief as you remember that your computer’s hard drive had full-disk encryption enabled. That’s the kind of peace of mind that encryption can offer. Without your master password, you could hand over your hard drive to a would-be thief and rest easy knowing that should they decide to snoop around your hard-drive, all they would be met with is unintelligible gobbledygook.