Welcome to Mac OS X

So, you’ve finally decided to switch to Mac OS X and your trying to figure out how to get around? I just helped my good friend Aeron through this experience and I’ve got a few notes to help you on your way.

The “Finder” is that funny looking face on the far left of your dock. To connect to a windows server, select “Go” and “Connect to Server”. In the Connect box, just type “smb://” then the IP address just like you would type in Windows.

Picture 5

Picture 6

Now you need to figure out what programs you’ll need to get by. • For video, check out VLC (freeware). • For MSN Instant Messaging, check out Adium X (freeware). • For web browsing, check out Camino. Based on Firefox, part of the Mozilla project but built for OS X (freeware). • Above all else, replace the Finder with Path Finder and use Quicksilver instead of Spotlight.

Enjoy you’re trip to Taiwan Aeron…

4 thoughts on “Welcome to Mac OS X”

  1. Oh it’s right, File Encryption is the best encryption software to encrypt, lock and hide files, folders, drives in a convenient method. This encryption software is compatible with all popular versions of Windows OS

  2. Full disk encryption is encryption in the hard disk level. This software performs by automatically converting data on a hard drive into a form that can not be comprehended by everybody who doesn’t have the essential to “undo” the conversion. Without the correct authentication essential, even when the difficult hard drive is taken away and used in a different machine, the data remains inaccessible.

  3. Oh it’s right, File Encryption is the best encryption software to encrypt, lock and hide files, folders, drives in a convenient method. This encryption software is compatible with all popular versions of Windows OS

  4. Whole Disk Encryption Each day, millions of people go to online to work, do homework, purchase products, manage devices in their homes, and connect with friends. Technology such as the big information are modifying our everyday life at a quick speed, while exponentially increasing the quantity of private data that is attained, used, and shared.

Leave a Reply

Your email address will not be published. Required fields are marked *