Sunday, September 30, 2018

How to use Wipe Info for Norton nu16? | Norton.com/setup

Wipe Info is one of the many parts of Norton Utility 16 (Norton nu16) and knows for smashing or deleting the entire data, unlike the other utilities of Norton which help you to protect, rescue, and enhance your data. It is recommended to use it, in case you’re sure enough that the file or folder doesn’t need to be recovered at any cost.
Wipe Info
Norton utility actually cleans up the unused space on the hard disk to make sure that no important data are present on any of such files like invisible, temporary, or unwanted. It completely removes the old data and writes or label over it as new and meaningless data.
Every time before Wipe Info performs the action, it asks for your confirmation. After it removes the entire data, you can’t recover it at any cost and calling up Symantec technician wouldn’t help you out. The Wipe Info allows you to access with Wipe File, Wipe Disk, and Wipe Unused Space, the three disk wiping operations.
In order to download any Norton products to enjoy its features, you need to visit norton.com/setup
Here, in this article learn about the Wiping Info and how it wipes the file or folder and the entire disk.

Wiping a file or folder

You can actually go for erasing a particular file or a folder that is packed up with the files. In order to do this alternatively in future, you can create a ‘Wipe Info Trash can’ on the desktop to erase the unwanted data without selecting Wipe Info every time.
Check out the steps to wipe a file or folder-
  1. Open the Wipe Info main window.
  2. Select the ‘Wipe File’ in the Wipe Info window.
  3. Choose and select the file or folder to delete it completely.
  4. Click on the ‘Wipe’ option.
  5. You’ll be asked for the confirmation on the choice, you made.
  6. Select the ‘Wipe’ option to remove the selected the file or folder, completely.

Wiping an entire disk

The moment you choose Wipe Info, it deletes everything present on the disk. After your confirmation on the action, all the data on the disk will get removed, permanently.
Follow the steps to wipe a disk-
  1. Open the Wipe Info main window.
  2. Select the ‘Wipe Disk’ in the Wipe Info window.
  3. Click on the ‘disk drive’ option –
  • Select ‘Drive’ to revolve around all the available disks.
  • Put a removable disk to add it to the selected cycle.
  1. Select ‘Wipe Disk’ option.
  2. You need to put a new name on the disk wipe.
  3. Click on the ‘Wipe’ option to delete the selected disk, permanently.
In case you wish to purchase any Norton products, you need to first sign-in into Norton my account page.

Friday, September 28, 2018

Privacy Concerns Regarding Ride sharing Apps

In places across the world, making use of car-pooling apps has become prevalent. Similar to how Google has become a household name, Uber and Lyft have earned their space in the lives of most people.
The advantage of perpetually accessible cabs and cabbies joined with user-friendly applications, along with a variety of transportation and pricing alternatives offers a large combination of technology and transit. But, as these services need passengers’ information, like their real-time location and payment methods, they may potentially put the passengers’ data and security in danger if the data gets abused.
Privacy Concerns Regarding Ridesharing Apps

Ride Share Apps: Boon or Bane?

Conventional automobile services such as cabs have declined in popularity mostly since ridesharing services extend significant benefits: instant approval of trip requests, affordable charges, and generally a current and more diverse “fleet” of automobiles because they hire individual drivers who work with their own automobiles.
Despite their widespread popularity, carpooling services come with their own set of problems, as they operate without regulation. But, it is still within the company’s scope to determine how to handle background checks for candidates or what kind of insurance is required. Fortunately, there is a human “safety check” method that a majority of cab pooling services employ. Every passenger can rate their driver, and the driver can evaluate the customers in a similar way. When a driver drops under a particular rating, they are not able to work for the service.

What kind of information do ridesharing systems collect?

To book a ride from peer-to-peer ridesharing companies such as Ola, Uber, and Lyft, users need a smartphone with GPS so that the location of drivers and potential passengers can be tracked. But, if the passenger does not disable GPS tracking even when their ride has ended, the applications are capable of monitoring and collecting information 24/7 on the passenger’s real-time location.
Apart from tracking and storing location, some ridesharing companies need the potential passengers to link to their social networking account, such as Facebook, in order to verify their identities. In such cases, people allow these services to access their personal data present in their social media accounts.
Since ridesharing companies allow users to go cashless, people need to save their bank card credentials in their ridesharing apps.

What are the security and privacy threats?

Once upon a time, a ridesharing firm threw a party in a different town where they presented in real-time the complete names and destinations of their customers. Fortunately, nothing except a bit of intense fury from the media arose from the privacy indiscretion. However, it raised the problem of how the ridesharing businesses save, manage and also protect the privacy of their customers.
Irrespective of what kind of service is offered by a firm, one should always carefully go through their privacy policy. A well-made privacy policy will explicitly mention the information the company plans to access, store, and transfer to 3rd parties.

Conclusion

Before downloading a ride sharing application and registering for its services, you must go through the app reviews. Check the reviews that are poorly rated, and see if other users have raised any privacy concerns.
About us :
Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup.

Wednesday, September 26, 2018

How to Set Up a New Phone to Protect it Against Threats

Did you just get a new phone? Congratulations! Well, before you get all excited and start using it, you must take steps to make it secure. With so many threats lurking around every corner, you should take preventive and precautionary measures. Here are some tips for setting up your new phone to protect it against threats:
  1. Safely transfer the data from the old phone
In all likelihood, when you buy a brand new mobile or tab, you will wish to move the data from your old phone to the new one. And for that, you will have to copy the data in the older phone. Now, transferring data can be a bit more complicated for handheld devices, since frequently users purchase a different phone than their older one. It might seem challenging to move data when your new phone is different from your previous possession. Transferring files and apps is a time-consuming process. You should do it carefully so that you do not miss something out.
  1. Install operating system updates
There might be a significant time gap between the manufacture and sale of phones. Therefore, the operating system may be outdated. When you buy a new phone, install any available operating system updates. System updates may consume significant data. Hence it is recommended to install updates over Wi-Fi.
  1. Add password protection
Pocket-sized devices should always be kept locked with a password. While adding passcodes, fingerprint, password, etc., to unlock the screen may seem inconvenient, it is crucial for security and privacy purposes. You can add multi-factor authentication to make your phone more secure.
  1. Get security protection
Everybody knows how important it is to have an anti-malware program on desktop computers and laptops. There are various sorts of malware threats, and one needs to secure their devices against them. You need to install an anti-malware software on your phone or tab as these devices are exposed to malware threats. You can unknowingly download a malicious application from the app store. Therefore, invest in a reliable anti-malware for your phone.
  1. Do not download from 3rd party app stores
When downloading applications, it is crucial to verify them. 3rd party app stores contain malicious applications. Even though some apps are authentic and safe, many of them are injected with a malicious code. Therefore, iPhone and iPad users should install applications from the Apple App Store and Android users from Google Play Store.
  1. Turn off Bluetooth
When you are at a public place, turn off Bluetooth. To be safer, keep the Bluetooth disabled when you are not using it. By turning off Bluetooth, you are giving hackers a way to enter your device. Therefore, to make yourself less vulnerable to digital threats, turn on Bluetooth only when absolutely necessary. =
  1. Get a sturdy phone case
Investing in a good quality cover for your phone will protect it from physical damage. The days of bulky and iron-strong Nokia phones are long gone. Presently, phones are much slimmer and sleeker. Therefore you must invest in a proper case which adds bulk to the phone. Phone cases cushion the phone and save it from damage when the phone falls down.
About us :
Mir Ariif is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup

Monday, September 24, 2018

How to Delete Facebook Account Permanently?

Now, we are at the stage where we spend more time on social media sites than our real life. We can also say that social sites have become our life. For many users, social media has become more important than their real life. We are connected more peoples on Facebook than in reality, which is just a digital life. We are spending more time updating our profile and following other people’s lives, then we actually spend on living. Maybe there are some privacy concerns for deleting the Facebook account permanently.
If you are tired of using it and you want to take a break from Facebook, then there is also an option of “deactivate your Facebook account.” By using this option you can ‘reactivate’ your account when you want. If you’re going to delete your account permanently, then you can’t reactivate it. The information on your account and your profile will be permanently removed from Facebook. And it will not be recovered in future.
There is the big difference between ‘deactivating your account’ and ‘permanently deleting your account.’

What is ‘deactivate your account’ and how you can deactivate it?

Deactivating your account means:
  1. When you want, you can reactivate your account.
  2. Individuals cannot see your Facebook profile, and also cannot look you up.
  3. Some information remains visible like the messages that the user has sent.
  4. User’s all information remains saved on Facebook, and when they reactivate their account, they will get access to their old account.

Steps for Deactivating your Facebook account:

  1. Click on the account menu button.
  2. Select ‘settings.’
  3. Choose ‘general.’
  4. Click ‘manage your account.’
  5. Press ‘deactivate your account’ after that follow the steps to confirm your deactivation.
To reactivate your account, simply log in on the Facebook.

What is ‘Permanently delete your Facebook account’ and how you can delete it?

Permanently delete your account, which means:
  1. Once your account is permanently deleted, you can’t regain access to your Facebook account.
  2. It takes a few days for deleting your account after your request. If you log in between this period the deletion request is canceled.
  3. It takes around 90 days to delete your all backup system data. However, your info is not accessible in this period.
  4. The info which is not stored in your account, like your sent messages, will remain.
  5. Copies of some materials stay in Facebook’s database, like your log records.

Steps for deleting your Facebook account permanently:

  1. Click on the account menu button.
  2. Select ‘Account settings.’
  3. Choose ‘general.’
  4. Choose ‘Delete my account’ option.
  5. Click ‘Download a copy of your Facebook data’ at the bottom.
  6. Choose ‘Start my archive.’ The files which begin to download will contain your Facebook profile information. So store it carefully.
There may be difficulties in finding the link to delete your account permanently; you can also do it by ‘Clicking on the help menu and then search for “delete account.” In the following screen, you will find a link stating the following: “let us know.” Go to the link, and you will get redirected to a webpage which will ultimately enable you to delete the Facebook account permanently.
Now, click on “delete my account,” enter the password, and your request is submitted.
Deactivating your account is a flexible way to take rest from Facebook, after deleting your account you may miss your Facebook account, friends. So before deleting your account permanently think carefully.
Contact us :
In case you have demonstrated Norton Setup from nortoncom.org in your System, you will dependably trade from PC Threats, Viruses, and trade that can hurt or pound the records that you kept on your structure.

Sunday, September 23, 2018

How to installed & download Norton Anti-Theft agent on Windows?

Norton Anti-Theft is one of the prime features of Norton mobile security that ensures the total protection of your Android and iOS devices from thieves. It comes up with an agent that tracks your device location, captures the photo of the person trying to access your device without your permission and automatically locks it to prevent such unauthorized accesses.
Norton Anti-Theft
Like any other security software you download via www.norton.com/setup, Norton Anti-Theft Agent also needs to be downloaded and installed on the device you want to cover under the security umbrella. Performing both these processes is required as it authorized the agent to track your device location and opt other security measures for your device.
This article will provide you with the step-by-step instructions to download the Norton Anti-Theft agent on a Windows device. Have a look:
  1. Visit the https://antitheft.norton.com in any web browser on your device
  2. You will see a Norton Anti-Theft page
  3. Hit Sign In Here
  4. Now enter your Norton account details to log in to your account
  5. Choose any of the following:
    1. Go to Setting Up Norton Anti-Theft page and hit Start Download (Valid if you are adding a device for the first time)
    2. Click Add Device, go to Setting up Norton Anti-Theft page, and now click Start Download (Valid if you have already added a device and want to add one more device to the Norton Anti-Theft)
  6. Provide the Product Key by redeeming it from your Norton account that you might have created during the purchase of the Norton products via com/setup
  7. Now, follow the on-screen instructions
  8. Double-click the downloaded Norton setup file and hit Run
  9. Go through the Norton License Agreement and click Close
  10. Hit Agree & Install
  11. Wait until the process finishes!
  12. It’s done!
For further queries or guidance on any other Norton product, visit the contact us section at Norton.com/setup.

Friday, September 21, 2018

Norton Power Eraser- How to begin an unwanted Application scan in it?

Norton Power Eraser is a specialized tool developed by Norton to make your PC virus free. Accessible via Norton.com/setup, this virus removal tool is easy to download and install on your device. After the successful installation, you can scan all your files, folders, software, and applications merely by running a quick scan. Please note that this tool is compatible only with the Windows PCs.


You can also run an unwanted application scan in Norton Power Eraser. With this, the security program will look up only for the Potentially Unwanted Program, which is abbreviated as PUP. Additionally, it also checks out Potentially Unwanted Applications. Before you proceed to the steps for running a scan, let’s have a brief overview of what PUP is?
A PUP or Potentially Unwanted Program or Application is a program that gets automatically downloaded when you attempt to download a software or application from any website. This program may include viruses, spyware, and Trojans. Such programs may create security holes and leave your PC vulnerable to the cybercriminals. Now, check out the process to begin the special scan for this program:
  1. Get Norton Power Eraser from the official website of Norton
  2. Once you download the Norton setup, do the following:
    • Run- In the case of Internet Explorer
    • Double-click the downloaded setup file- In case of Mozilla Firefox or Safari
    • Click the downloaded setup file- In the case of Google Chrome.
  3. Now, hit Yes or Continue on User Control Window
  4. Go through the license agreement
  5. Hit Accept
  6. You will now see Norton Power Eraser window
  7. In this window, select the Unwanted Application Scan icon
    • After the scan completes, you can see the results in Unwanted Apps Scan Complete Window
      • However, if you there is no unwanted applications on your computer then the scan results will display “No Risks Found”
      • Go Back
    • On the contrary, if the results displayed any unwanted application then click Uninstall
  8. Now, follow the onscreen instructions to finish un-installation
  9. Restart your device and it’s good to go!

Thursday, September 20, 2018

Things to know about YouTube Premium

In 2015, YouTube Red has launched as a way to get a better YouTube experience than what was the offered in the free version. YouTube Red gave access to ad-free videos and all new original shows. YouTube Red has now being replaced by YouTube Premium, and its definitely worth checking out.
Things to know about YouTube Premium
On 29 August 2018, YouTube Premium expanded to 4 more countries. As YouTube Premium rollout continues, it has now been confirmed that the service is available in four other countries namely, Denmark, Belgium, Netherlands, and Luxembourg. Recently Google launched YouTube and YouTube Premium. One of those is streaming music service that offers features similar to what you will expect in the Google Play music. The other one is streaming music service, with the bonus of an ad-free Youtube experience. Google has so many names for so many functions. It makes everything very confusing.

Youtube Music

Think about YouTube Music as a competitor to Apple Music or Spotify. Users can stream music, sign up or watch music videos on YouTube. There are two plans. One free, ad-supported plan and a $9.99 program for those who want background playback and ability to download music without the ads. There is an app for Android and iOS. YouTube Red is now YouTube Premium. You must be remembering YouTube Red? It is no more now. The ad-free Youtube service now is called YouTube Premium.

What is YouTube Premium?

YouTube Premium includes everything a Youtube contains. Music subscription- ad-free streaming, content which is downloadable, background playback and an ad-free Youtube experience and access to the Youtube Original content. You can also gain the ability to download YouTube videos for viewing them online. Youtube premium is priced higher than the YouTube Music. It costs $11.99 per month.

What about the Play Music?

It is included already. If you sign up for the YouTube Music or the YouTube Premium, you will also have access to Google Play Music. But Unfortunately, Music library and the playlist remain separate in two services. Google is now working towards merging the two, and they will be able to move forward with one solution.
About us :
Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at www.norton.com/setup

Wednesday, September 19, 2018

How to back up your files manually in Norton Online Backup?

Norton Antivirus is the most trusted antivirus that ensures the protection of your important data and software available on your computer system. The worldwide popular cybersecurity brand also offers a specialized product named Norton online backup to make you create the backup of your confidential files and media.
Norton Online Backup
With the help of Norton online backup (accessible via Norton.com/setup), you can prevent your important data from any type of theft, loss, and virus attacks. Once installed, it automatically backs up your data; however, you can also choose to back up your files manually. All you need to ensure is the successful installation of this program on to your device. Don’t worry; it won’t take too long to manually back up the required files.
Check out these steps to keep a copy of the files to Norton cloud storage:
  • In case you want back up from your computer follow these steps:                                        
    1. First, make sure you quitted all the running applications and programs
    2. Now, select any of the followings depending on the operating system you are using
      1. For Windows- Go to the notification area
      2. Now, right-click the online back- up
  • Click on the back up now
  1. For Mac-Go to the Menu bar
  2. Right-click the Norton Online Backup
  3. Click on the Back Up Now.
  • To back up files from the website accessed via a remote computer system
  1. Visit the official website of Norton Online Backup
  2. Now, sign in by entering your registered email ID/username and password
  3. Hit Back Up Now
  4. Wait until the backup process is done
For more information about Norton online backup or Norton.com/nu16, you can avail Norton support services that are available 24*7*365. A support technician will be glad to assist you with the best possible solution.

Monday, September 17, 2018

How to Enable and Use Screen Time on iOS 12

The most appreciated feature which people noticed in iOS 12 is the Parental Control. But there is another controlling option that people may not have noticed yet. The Screen Time feature which made the control over the device usage more convenient and comfortable. The Screen Time enables you to see which app you opened in your iOS device and how often you use it.
How to Enable and Use Screen Time on iOS 12
Apple Corporation recently releases the iOS 12 and the Screen Time feature in it is quite appreciative. The feature works on setting time limits for the apps and monitors the total time spent by a user on the device. If you think that your children or younger siblings are spending too much of time on the device instead of studying, then enabling the Screen Time feature will definitely going to help you. All you need to do is set up a daily time limit on an app, and when that running exceeds the limit, it will stop working anymore.
Many are trying to use the feature in their iOS device but enabling the Screen Time feature seems to be a hard task. The article will guide you the steps to enable the Screen Time feature in the new iOS 12 devices.
Here, how to enable screen time on iOS 12

Through iOS Device Settings

  1. Launch the Settings app on your iOS device.
  2. Select Screen Time Option.
  3. Now tap Turn On Screen Time option.
  4. Now, the feature will provide two options-
  • Set this feature as a parent.
  • Continue as a general user.
  1. Tap on Continue from the bottom of the box popped up.

Screen Time Passcode

Since the feature is about parental control, you can keep strict control of the apps and the device. Giving the Screen Time passcode protection will prevent the saved settings from any changes by another user.
  1. Go to the Settings and select Screen Time.
  2. Now, select the Use Screen Time Passcode.
  3. Enter a Passcode and tap to Confirm.
  4. Re-enter the Passcode to ensure the correct password.
  5. Now, only you are able to change the Screen Time settings.

Downtime Setup

  1. Launch the Settings apps in iPhone.
  2. Scroll down Screen Time.
  3. Now, go to the Downtime.
  4. Enter the Screen Time Passcode that you just created.
  5. Now turn on the Downtime toggle button. It will Green in color. Tap Start and End button to enter the time limit for the app.
  6. Time Limit Reached screen will appear when you tap on an app.
  7. Here, you will see two options-
  • Remind Me in 15 minutes.
  • Ignore Limit For Today.
  1. Select either of the two.
  2. If you select the first option, then you have to enter the Passcode.
  3. Now, you can allow the apps during Downtime.
  4. Go to the Screen Time menu and select Always Allowed.
  5. Now, enter the Passcode.
  6. Tap the + or  button next to the apps to allow or delete from the list.

Setting up the limits

  1. Tap App Limits in the Screen Time menu.
  2. Enter the passcode to access.
  3. Tap Add Limit
  4. Now, you can select the categories of the apps.
  5. Set up a time limit on the apps and customize with days by tapping Customize Days.

Screen Time Syncing

The Screen Time will collect the data from all the iOS 12 devices which you used with the iCloud account. The synchronization enables you to keep an eye on the other devices. When you tap and open All Devices from the main Screen Time display, you can choose the Devices from the upper right corner of the Screen Time menu.
That’s it! You have successfully enabled the Screen Time to take control over the apps. Thanks to iCloud sync which allows you to inspect the other devices with the same iCloud account.
About us :
Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at norton.com/setup.

Sunday, September 16, 2018

How can I Download Norton Antivirus product purchased from retail shop?

To download, activate and install Norton product purchased from a retail shop or a third-party affiliated website (Online).
You need to create a Norton account or add the purchased subscription to the existing account.
During the Norton setup process, you will be provided to enroll in the Norton Automatic Renewal Service.

Download, install and Setup Norton Product

  1. Login Into Norton.
  2. If you don’t have a Norton account, click “Create account” and complete the signup steps. Login if you already have a Norton Account.
  3. In the Norton Setup window, click on Enter a New Norton Product Key.
    • Fill the product key and click >.
    • If a boxed product CD bought by you online or at a local retail store, your product key is inside the CD box either on a sticker on the back of the CD sleeve or DVD case or printed on a card in the CD box.
    • Your Norton product key is a combination of numeric and alphabetic characters. It doesn’t contain any special type of characters.
    • Note that your subscription starts when you enter the 25-character of Norton key found on your subscription retail card or order confirmation e-mail.
  4. To register in Automatic Renewal Service for your Norton Product, Get Started. If you don’t prefer to register in Automatic Renewal Service, click “Do this Later” and proceed to point 9.Download and install your Norton product
  5. You should read the Automatic Renewal Terms and Conditions and click on “Agree” button and Continue.
  6. Fill out your Credit Card information and click Next.
  7. Fill your Billing-Address and click Enroll in Automatic Renewal.
  8. In the enrollment confirmation window, click Continue to Download.
  9. Click on “Agree” button & Download.
  10. Follow the instructions displayed on the screen to Run or Save the Downloader file. These can be different. It’s depending on your web browser.
  11. If you save the file, make sure that you double-click the save file from the saved location or folder after the download is finished or completed.
Once the Downloader is started, your subscription will be downloaded, installed, setup and activated automatically.
Your device will show on screen its current protection status and additional subscription software can be installed from within your Norton Account.
Note: Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, its products’ image, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners.
To Know more about, Click Norton Setup installation
or visit official Norton.

Saturday, September 15, 2018

How to Keep iPhone More Secure

What if you get up one fine day and find out that you have lost your iPhone? What if somebody steals it? Do you think it will be returned safely? It is our responsibility to keep our iPhones safe and secure. Here are some tips through which we can keep our data safe in troubled times, it will also help in tracking lost iPhone.
  • Say “yes” to a passcode

Always set a passcode, Do not walk around with an iPhone that anyone can access. Protect it, preferably with a six-digit passcode. You may also go for a custom numeric or an alphanumeric code. With the Face ID or Touch ID, you won’t be required to enter your passcode unless your finger is wet and your face is obscured. You may set passcode by going to Settings>Touch ID> & Passcode or Settings>Face ID & Passcode and enroll your face or fingerprint.
  • Make your iPhone lock soon

If your iPhone has been left in a public place, restaurant or bus, someone could quickly get into your device before the passcode is required. You can set your passcode required after a specific time has passed since you last unlocked your phone so that you aren’t asked continuously to punch your passcode. Try setting it up to for four hours. This setting will make you require to enter your passcode no matter how long ago you lastly unlocked your phone. Enable this by going to the “Settings” page and set “Require Passcode” to immediately.
  • Disable the options of the lock screen

Disable Siri from the lock screen. You may be having a rock solid passcode, but Siri still can share too much information from the lock screen. Another way the hackers can get into your iPhone is by enabling Airplane mode via Control Center from the lock screen. With your iPhone in the airplane mode, you won’t be able to track it via find my iPhone. To disable the access, go to Settings>Touch ID>& Passcode and toggle off the Control Center in the allow access when locked list.
  • Turn on Find My iPhone.

This probably is the most critical step, enable Find my iPhone. It is neither inconvenient nor challenging to set up. With this application, you can track your lost device from another iOS device. You also can play sound on your lost phone to help your search efforts. Go to Settings>( your account name)> iCloud > Find My iPhone and adjust the switch on for Find My iPhone.
About me :
Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at www.norton.com/setup.

Thursday, September 13, 2018

The most effective method to Format an External Hard Disk or USB Flash Drive on Mac OS

Quite often, when you purchase a new USB flash drive or an external hard disk, you may have to format it to ensure that it is compatible with your Mac device. This happens mostly because of the fact that they are all configured to be compatible with Windows device. While the disk may operate in a completely flawless manner, there may be some Windows components like MSDOS, FAT32, ExFAT, NTFS, and FAT formats that Mac cannot read. Therefore, formatting the external hard disk or USB flash drive can make it easier for the device to run on the Mac environment.
norton.com/setup

Here is a step-by-step guide on how to format an External Hard Disk or a USB Flash Drive on Mac

  1. Connect the hard drive to your Mac device.
  2. Head over to Applications, then Utilities to launch the Disk Utility.
  3. Identify your drive from the menu on the left hand side of the Disk Utility.
  4. Click on the name of your drive.
  5. In the top tab, select the Erase
  6. Click on field next to the Format From the drop-down menu, choose the Mac OS Extended (Journaled) option.
  7. If you wish to name the drive, you can do it now. However, if you opt out of naming the drive, you can also do it any time later.
  8. Click on the Erase button on the bottom-right corner.
  9. Confirm the action by clicking on Erase in the pop-up screen.
  10. Your system will begin formatting your external hard disk. The time taken depends on the size of the drive and the volume that has been occupied.
Remember, formatting a disk will result in loss of any data stored on the drive. You will also lose all disk partitioning. Therefore, create a backup of your data to ensure that you do not lose all your data. Following the process outlined above will make your external drive compatible with your devices running on Mac OS. Do keep in mind that this would be an unnecessary step if you wish to use your external hard disk or USB flash drive interchangeably between Windows and Mac devices. This procedure is exclusively for using these drives on Mac supported devices.
Also, if you intend to create a Mac OS installer drive or a bootable Mac OS drive, you will first have to format the disk drive by following the steps mentioned above.
About us :
Mir Ariif is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at norton.com/setup.