How to enable Root User and access the parts of Mac?

Mac users often wonder how to enable the Root User account in the system. Hence this guide is mentioning the methods and steps to enable the Root User account in Mac systems. You need to go deep into your Mac to enable this account, but before proceeding with the method, you should know the reason for enabling the account.

Mac has some files which cannot be accessed through a user account. The Root User account allows you to access these files and move them without setting any complexities. The file deletion, recovery and scanning becomes easier in the account. But, the modification or changes in these files can cause severe damage or harm to the Mac system. So you must acknowledge the necessity to enable the Root User account and access the files.

Here is how to enable Root User and access the parts of Mac

Create the Root User Account

To create the Root User account, you will require to refer the System Preferences of your Mac.

  1. Click the Apple logo and a drop-down menu list will open.
  2. Now, click System Preferences from the menu.
  3. Select the Users & Groups.
  4. Move to the bottom left of the window and click the lock icon.
  5. Enter the Admin username and password.
  6. Click the Login Options and click to Join tab.
  7. Click the Open Directory Utility tab.
  8. Again, click the lock icon from the left bottom of the corner.
  9. Enter the password and go to Directory Utility.
  10. Click Edit from the toolbar and select Enable Root User option.
  11. Type a password. Ensure that the password should not match with the admin account and you can remember it.
  12. When you are done with providing the password, click Ok.
  13. You just created the Root User account.

The Terminal is an alternative method to create a Root User account.

Press Command + N key combination to open Finder window in your Mac.

  1. Click Application and move to click Utility option.
  2. Now click to launch Terminal.
  3. Type the command – dsenableroot and press the Return or Enter key.
  4. The admin username will display.
  5. Now, enter the admin password.
  6. Press Return key.
  7. You may require to enter the password again and press Enter.
  8. The Terminal will pop up the Root User message.

Log into Root User account

It is not complicated to log into the Root User account on the Mac system. The login is similar to other accounts.

  1. Log out of the current account from your Mac.
  2. Now, the Mac login screen will appear.
  3. Click the Other option.
  4. Now enter the login credentials which you recently created for your Root User account.
  5. The account will look like a regular user account, but the difference is that the account is allowing to access every file in the system.

If you do not require the Root User, then you can disable the account.

  1. Click the Apple logo and open the drop-down menu.
  2. Click System Preferences and move to Users & Groups option.
  3. Click the lock icon and proceed to enter the admin password.
  4. Click the Login Options and select Join tab.
  5. Go to the Open Directory Utility and click the Edit tab.
  6. Now select Disable, the Root User.

Remember, you must access the Root User account only when it is necessary or else the modification in the files may change the settings of the system. The Root can make the system vulnerable and easy prey to malware, hence it is a piece of advice to log out of the account and return to the regular account on your Mac system.

About us:

Dawn Martin is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup

Different Ways to Connect Xbox One Controller with Windows Computer

A few years ago, Microsoft rolled out Windows drivers for Xbox One controllers. This enabled users to use it as a wired controller for desktop gaming. Moreover, some more recent versions of Xbox controllers include Bluetooth. Users can also hook up their Xbox One Controllers using a regular micro-USB cable. Here are the ways for connecting your Xbox One controller to Windows PC:

Connect Xbox One Controller with Windows Computer

How to Connect Xbox One Controller to Windows Computer via a USB cable?

Whether your Xbox One controller is wired or wireless, you can it using a USB cable. Here’s how:

  1. For wireless Xbox one controllers, simply insert a micro USB charging cable into the front side of the Xbox One Controller.
  2. After that, attach the other end to the USB slot present in the Windows computer.
  3. Now, the Xbox One Controller driver will automatically get installed.
  4. You will get a message that the device driver software has been installed.
  5. Congrats! You can now play Xbox games.

How to Connect Xbox One Controller to Windows Computer via a wireless Xbox adapter?

If you do not have a USB cable, then you can connect the Xbox controller to the computer with an Xbox adapter. Here’s how:

  1. Insert the Xbox wireless adapter into the appropriate slot in the computer.
  2. After that, tap on the button located at its end.
  3. You need to ensure that the controller has batteries.
  4. Now, in the Xbox One Controller, tap on the X button located in the center.
  5. After that, the controller will power up.
  6. Now, just tap on the controller bind button located at the head of the controller.
  7. You will notice the adapter blinking for a short while.
  8. Wait for the LED light to power up.
  9. When the LED lights have properly lightened up, it means that the controller is connecting to the computer.

How to Connect Xbox One Controller to Windows Computer via Bluetooth

If your Xbox One controller is Bluetooth-enabled and the Windows computer is also Bluetooth-enabled, then you can connect both of them using Bluetooth. Here’s how:

  1. Firstly, you need to ensure that your operating system is up-to-date.
  2. After that, enable Bluetooth on your Windows PC.
  3. Now you need to power on your Xbox One controller. Hit the X button located in the center.
  4. After that, long press the controller bind button for a couple of moments.
  5. In the Windows computer, open the Start menu and click on Settings.
  6. Select Devices from Windows Settings screen.
  7. Now, click on Add Bluetooth.
  8. Just choose the Xbox One controller from the list.
  9. Hit the Pair button.

About us :

Purchase Norton Antivirus for Norton Setup Online Method :- Buying Norton Antivirus from an online store is the wisest option. Reason being is the comfort and convenience that let the user buy the product from any of their preferred places.

How to use Wipe Info for Norton nu16?

Wipe Info is one of the many parts of Norton Utility 16 (Norton nu16) and knows for smashing or deleting the entire data, unlike the other utilities of Norton which help you to protect, rescue, and enhance your data. It is recommended to use it, in case you’re sure enough that the file or folder doesn’t need to be recovered at any cost.

Wipe Info

Norton utility actually cleans up the unused space on the hard disk to make sure that no important data are present on any of such files like invisible, temporary, or unwanted. It completely removes the old data and writes or label over it as new and meaningless data.

Every time before Wipe Info performs the action, it asks for your confirmation. After it removes the entire data, you can’t recover it at any cost and calling up Symantec technician wouldn’t help you out. The Wipe Info allows you to access with Wipe File, Wipe Disk, and Wipe Unused Space, the three disk wiping operations.

In order to download any Norton products to enjoy its features, you need to visit norton.com/setup

Here, in this article learn about the Wiping Info and how it wipes the file or folder and the entire disk.

Wiping a file or folder

You can actually go for erasing a particular file or a folder that is packed up with the files. In order to do this alternatively in future, you can create a ‘Wipe Info Trash can’ on the desktop to erase the unwanted data without selecting Wipe Info every time.

Check out the steps to wipe a file or folder-

  1. Open the Wipe Info main window.
  2. Select the ‘Wipe File’ in the Wipe Info window.
  3. Choose and select the file or folder to delete it completely.
  4. Click on the ‘Wipe’ option.
  5. You’ll be asked for the confirmation on the choice, you made.
  6. Select the ‘Wipe’ option to remove the selected the file or folder, completely.

Wiping an entire disk

The moment you choose Wipe Info, it deletes everything present on the disk. After your confirmation on the action, all the data on the disk will get removed, permanently.

Follow the steps to wipe a disk-

  1. Open the Wipe Info main window.
  2. Select the ‘Wipe Disk’ in the Wipe Info window.
  3. Click on the ‘disk drive’ option –
  • Select ‘Drive’ to revolve around all the available disks.
  • Put a removable disk to add it to the selected cycle.
  1. Select ‘Wipe Disk’ option.
  2. You need to put a new name on the disk wipe.
  3. Click on the ‘Wipe’ option to delete the selected disk, permanently.

In case you wish to purchase any Norton products, you need to first sign-in into Norton my account page.

Privacy Concerns Regarding Ride sharing Apps

In places across the world, making use of car-pooling apps has become prevalent. Similar to how Google has become a household name, Uber and Lyft have earned their space in the lives of most people.

The advantage of perpetually accessible cabs and cabbies joined with user-friendly applications, along with a variety of transportation and pricing alternatives offers a large combination of technology and transit. But, as these services need passengers’ information, like their real-time location and payment methods, they may potentially put the passengers’ data and security in danger if the data gets abused.

Privacy Concerns Regarding Ridesharing Apps

Ride Share Apps: Boon or Bane?

Conventional automobile services such as cabs have declined in popularity mostly since ridesharing services extend significant benefits: instant approval of trip requests, affordable charges, and generally a current and more diverse “fleet” of automobiles because they hire individual drivers who work with their own automobiles.

Despite their widespread popularity, carpooling services come with their own set of problems, as they operate without regulation. But, it is still within the company’s scope to determine how to handle background checks for candidates or what kind of insurance is required. Fortunately, there is a human “safety check” method that a majority of cab pooling services employ. Every passenger can rate their driver, and the driver can evaluate the customers in a similar way. When a driver drops under a particular rating, they are not able to work for the service.

What kind of information do ridesharing systems collect?

To book a ride from peer-to-peer ridesharing companies such as Ola, Uber, and Lyft, users need a smartphone with GPS so that the location of drivers and potential passengers can be tracked. But, if the passenger does not disable GPS tracking even when their ride has ended, the applications are capable of monitoring and collecting information 24/7 on the passenger’s real-time location.

Apart from tracking and storing location, some ridesharing companies need the potential passengers to link to their social networking account, such as Facebook, in order to verify their identities. In such cases, people allow these services to access their personal data present in their social media accounts.

Since ridesharing companies allow users to go cashless, people need to save their bank card credentials in their ridesharing apps.

What are the security and privacy threats?

Once upon a time, a ridesharing firm threw a party in a different town where they presented in real-time the complete names and destinations of their customers. Fortunately, nothing except a bit of intense fury from the media arose from the privacy indiscretion. However, it raised the problem of how the ridesharing businesses save, manage and also protect the privacy of their customers.

Irrespective of what kind of service is offered by a firm, one should always carefully go through their privacy policy. A well-made privacy policy will explicitly mention the information the company plans to access, store, and transfer to 3rd parties.

Conclusion

Before downloading a ride sharing application and registering for its services, you must go through the app reviews. Check the reviews that are poorly rated, and see if other users have raised any privacy concerns.

About us :

Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup.