Johnny Winter
A regular contributor to Mac, iPad and iPhone AppStorm sites, Johnny has been online since 1995 aiming to use the internet for the creation and sharing of knowledge for the greater good. Via setting up forums and e-commerce businesses, Johnny is an accidental podcaster and Editor of Mac Computer Skills at
  • Computer Skills
    How to Enable AirDrop on Ethernet Connected and Unsupported MacsAirdrop 200x200
    AirDrop has been designed to be the quickest way to share files between two Macs, whether or not they are on the same network, even if there is no wi-fi network present. AirDrop creates an immediate, temporary, ad-hoc connection when the users of both Macs navigate to AirDrop in Finder. This is great for MacBook users on a train or plane wanting to share a file quickly and easily. But what if you want to use AirDrop and Apple tells you that it is not supported on your Mac? Why won't AirDrop let you easily share files over an ethernet network in the office? It turns out, it is possible to enable AirDrop on some Macs that don't currently have it. Read on to see how.Read More…
  • Computer Skills
    How to Set Up and Use VoIP on Your MacTlphn icon
    With the advent of faster broadband, the viability of using your data connection for voice communications has become increasingly reliable. VoIP has lower startup and ongoing costs than traditional, fixed-line telephones and has a wealth of flexible features that are often additional cost options from your dinosaur-era fixed-line phone network. If you are a freelancer, a business owner, or even just home user who requires a separate telephone from your home number, then VoIP is for you.Read More…
  • Computer Skills
    How to Keep Your MacBook Safe: Theft Prevention and Recovery Tactics200x200 findmymac
    Many thieves are opportunists. They will steal your Mac, given the opportunity, if it is left alone at the coffee shop, in the workplace, in your car or even in your home. There are deterrents that you can use to prevent your Mac from being stolen and there is technology that can be employed to locate your Mac (and even who is using it). Let's examine the deterrents and technology.Read More…