If you have an iPhone 15 Pro or later, Apple makes it possible to record videos directly to external storage devices. Here’s how to record iPhone videos directly to an external drive.
Continue readingCategory: Tips
Finding and fixing duplicate images in Photos
Duplicate images in Photos suck up disk space and can mess up your viewing experience when you look back through your images. Apple provides a tool to find and manage duplicate images in Photos.
Continue reading
Can an iPad mini replace a proper computer?
The iPad mini is not meant to replace a computer. But a recent experiment proved it could do the job – at least for a short time.
Continue reading
5 ways to secure your Safari experience on Apple devices
For most people, their web browser is the main window into the internet. That puts securing your web browsing activity one of the top priorities for your Mac, iPhone or iPad.
Continue reading
How to protect user accounts on an iPhone, Mac or iPad
Apple provides some simple tools to protect user accounts on your Mac, iPhone and iPad.
Continue reading
Five ways to update your Mac on a budget
How do you update to a newer Mac on a budget? You can upgrade to a newer machine without having to break the bank.
Continue reading
How to get the full benefit of the NBN speed boost
NBNCo boosted broadband speeds for hundreds of thousands of Australians on 14 September 2025. The free speed boosts are great news but not everyone will feel the full benefit.
Continue reading
The NBN speed boost could be hamstrung by your network
The NBN might have a speed boost. But your network might be stopping you from getting the full benefit.
Continue reading
Maintain domain records or risk some big down time
While we might see the internet as a complex, modern miracle, the reality is that many of its foundations were laid more than five decades ago. By modern computing standards,…
Continue reading
5 ways to protect your online accounts
It’s a well-worn axiom in cybersecurity circles that criminals don’t hack – they log in. They do this by stealing usernames and passwords or other information that enables them to…
Continue reading