Last week, most of the servers around the world were found to have a serious vulnerability which is trivial to exploit. Even iCloud was affected. How does it affect you?
iCloud
Understanding how iCloud works, and how files can be downloaded or evicted. Basic tests which are essential preliminaries, and using Cirrus to help.
Turning the data blocks into files and directories, these have common functions and additional features which can give rise to tricky problems.
This free service doesn’t use up any of your iCloud space allowance, and can send attachments of up to 5 GB in size. Here’s how to use it on the Web, and in the Mail app.
If you last backed up an iOS/iPadOS device to iCloud over 6 months ago, or backed up to a WD My Book Live, those backups have probably vanished. How to safeguard them.
Important rule: third-party apps can’t use your regular Apple ID password to connect to services, but use an app-specific password.
Updates recommended for all users. They finally address problems with using 12-hour and other clocks. Log handling code has been refactored to improve performance.
An important feature for many iOS users, this has now appeared in macOS, despite not apparently being exposed to the user. Here’s what I know.
How can you check the integrity of important files you have stored in iCloud, or in a Time Machine backup, such as those made by Big Sur to APFS?
Can you use Big Sur’s Content Caching Server to save and retain updates which can substitute for ‘delta’ and Combo standalone update packages?
