SlideShare a Scribd company logo
How to Lock Photos App
with Password on Mac
In this slideshow, we will show you two ways to
password protect Photos app on Mac.
It Is Imperative to Keep Your Photos
from Prying Eyes
Approximately 90,000 photos and 9,000 videos were leaked in the form of
a massive 13.6 GB file that was then posted on viralpop.com, a site created
exclusively to host the cache of personal photos. Much like its namesake,
“The Fappening” (which claimed a variety of celebrities as victims) and
“the Snappening” (the Snapchat equivalent of photo hacks), these leaks
have raised serious concerns regarding personal privacy and corporations’
ability to protect private information.
--From Attn
On August 31, 2014, a collection of almost 500 private pictures of
various celebrities, mostly women, and with many containing nudity,
were posted on the imageboard 4chan, and later disseminated by other
users on websites and social networks such as Imgur and Reddit. The
images were believed to have been obtained via a breach of Apple's cloud
services suite iCloud. Apple later confirmed that the hackers responsible
for the leak had obtained the images by phishing iCloud usernames and
passwords.
--From Wikipedia
After all these photo leakage events happened, many users may not
post their photos on various photos websites or platforms that can
store photos, they choose to store their photos on Mac. But is it really
safe to store photos on Mac? That may not be. Everyone around you
can see your photos when using your Mac. So it is imperative to lock
your Photos app to keep your Mac photos from prying eyes. When you
lock the Photos app, no one can view your photos. You can follow
below two methods to lock your Photos app on Mac.
Method 1:
Create a password for Photos app with Mac
Parental Controls
Intro:
1. Apple's user management system for
controlling which system functions and applications are available to a
managed user.
2. Prevent user accounts from accessing inappropriate content on Internet
or apps and manage, monitor, control the time the users spend on the
Mac, the websites they visit, the apps they access and the people they
chat with.
Steps:
1. Choose Apple menu > System Preferences, then click Parental Controls. Click the
lock icon to unlock it, then enter your administrator name and password.
2. Select a user, then click Enable Parental Controls. If there is no user in the list, click
Add + button , then fill in the name, account, and password information to create a
new user.
3. After you select a user, click “Apps” of the tabs along the top. Check “Limit
Applications”. And choose the app you want the user to access, so please unselect
Photos app when you don’t want to others to see your privacy photos.
4. At last, don’t forget to click button to prevent further changes. This can help
improve Mac security and privacy.
Screenshot:
Tip:
1. It can not be enabled for administrator accounts. So
when you lend your Mac to others, you have to change
your user account.
2. If you are working or learning with the administrator
account and leave the Mac for a while, there are some
possibility that someone can open Photos and view your
privacy photos on your Mac.
Method 2:
Password protect Photos app on Mac
with AppCrypt
Intro:
1. Safely lock applications like Photos, Contacts, Google, Quicken, iPhoto,
iTunes, Safari, Mail, YouTube, etc.
2. Allows you to set just one password to lock individual, multiple or all apps
on your Mac to safeguard them from access by unauthorized users.
3. Set a schedule for each app (or all apps) to allow unblocked usage for
specific days and times.
Steps
1. Install and launch AppCrypt on Mac. Then
AppCrypt will ask you to set a password which
will be used to access the blocked Mac apps and
change AppCrypt settings.
2. Click OK to confirm and click “Add App” on the
top menu bar to add the Photos app. And the
Photos app will be listed on the left column. Once
you add a app to the block list, the app will be
protected with the AppCrypt password.
Free download address:
https://www.cisdem.com/download/cisdem-appcrypt.dmg
Screenshot:
Screenshot:
Tip:
AppCrypt is 100% safe to use and user-
friendly. It will not modify any Mac
system or application files. You can lock
all your apps with one password. By the
way, the free trial version of it always
allows you to lock one app without
expiring date.
How to lock photos app with password on Mac

More Related Content

What's hot

Job Satisfaction of Employees
Job Satisfaction of EmployeesJob Satisfaction of Employees
Job Satisfaction of Employees
DG Vaishnav College
 
TMJ Ankylosis.pptx
TMJ Ankylosis.pptxTMJ Ankylosis.pptx
TMJ Ankylosis.pptx
DentalYoutube
 
Mandibular Condylar fractures & its Management
Mandibular Condylar fractures & its ManagementMandibular Condylar fractures & its Management
Mandibular Condylar fractures & its Management
Mehul Hirani
 
Diabetes and its oral complication
Diabetes and its oral complicationDiabetes and its oral complication
Diabetes and its oral complication
Dr. Monali Prajapati
 
Oral ulcers part (1)
Oral ulcers part (1)Oral ulcers part (1)
Oral ulcers part (1)
Dr. Osama El-Shall
 
MBA HR Project Topics
MBA HR Project TopicsMBA HR Project Topics
MBA HR Project Topics
MBA Dissertation Help
 
Service quality of hdfc bank..
Service quality of hdfc bank.. Service quality of hdfc bank..
Service quality of hdfc bank..
Preet Kaur
 
summer-internship-project-report-axis-bank-for-mba-student.pdf
summer-internship-project-report-axis-bank-for-mba-student.pdfsummer-internship-project-report-axis-bank-for-mba-student.pdf
summer-internship-project-report-axis-bank-for-mba-student.pdf
gauravmishra407740
 
HEMANGIOMA / oral surgery courses
HEMANGIOMA / oral surgery courses HEMANGIOMA / oral surgery courses
HEMANGIOMA / oral surgery courses
Indian dental academy
 
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
Ronit Kharade
 

What's hot (10)

Job Satisfaction of Employees
Job Satisfaction of EmployeesJob Satisfaction of Employees
Job Satisfaction of Employees
 
TMJ Ankylosis.pptx
TMJ Ankylosis.pptxTMJ Ankylosis.pptx
TMJ Ankylosis.pptx
 
Mandibular Condylar fractures & its Management
Mandibular Condylar fractures & its ManagementMandibular Condylar fractures & its Management
Mandibular Condylar fractures & its Management
 
Diabetes and its oral complication
Diabetes and its oral complicationDiabetes and its oral complication
Diabetes and its oral complication
 
Oral ulcers part (1)
Oral ulcers part (1)Oral ulcers part (1)
Oral ulcers part (1)
 
MBA HR Project Topics
MBA HR Project TopicsMBA HR Project Topics
MBA HR Project Topics
 
Service quality of hdfc bank..
Service quality of hdfc bank.. Service quality of hdfc bank..
Service quality of hdfc bank..
 
summer-internship-project-report-axis-bank-for-mba-student.pdf
summer-internship-project-report-axis-bank-for-mba-student.pdfsummer-internship-project-report-axis-bank-for-mba-student.pdf
summer-internship-project-report-axis-bank-for-mba-student.pdf
 
HEMANGIOMA / oral surgery courses
HEMANGIOMA / oral surgery courses HEMANGIOMA / oral surgery courses
HEMANGIOMA / oral surgery courses
 
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
INTRODUCTION TO HUMAN RESOURCE MANAGEMENT
 

Similar to How to lock photos app with password on Mac

IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET Journal
 
Effortless Ways of Removing and Changing Image Background-slideshare.docx
Effortless Ways of Removing and Changing Image Background-slideshare.docxEffortless Ways of Removing and Changing Image Background-slideshare.docx
Effortless Ways of Removing and Changing Image Background-slideshare.docx
RachelWang856621
 
How to Delete Apps in 2023
How to Delete Apps in 2023How to Delete Apps in 2023
How to Delete Apps in 2023
Captivating Info
 
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDERINSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
MdAyazQureshi
 
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET Journal
 
Building Your Own Instagram Clone A Comprehensive Guide (1).pdf
Building Your Own Instagram Clone A Comprehensive Guide (1).pdfBuilding Your Own Instagram Clone A Comprehensive Guide (1).pdf
Building Your Own Instagram Clone A Comprehensive Guide (1).pdf
OmninosSolution2
 
Huawei mate 20 pro manual/user guide
Huawei mate 20 pro manual/user guideHuawei mate 20 pro manual/user guide
Huawei mate 20 pro manual/user guide
manualsheet
 
Mac document recovery
Mac document recoveryMac document recovery
Mac document recovery
alace messi
 
Ollie long unit 35 (changed)
Ollie long unit 35 (changed)Ollie long unit 35 (changed)
Ollie long unit 35 (changed)
olong17
 
New Microsoft Office Word Document.pdf
New Microsoft Office Word Document.pdfNew Microsoft Office Word Document.pdf
New Microsoft Office Word Document.pdf
OmninosClone1
 
insta.pdf
insta.pdfinsta.pdf
insta.pdf
sam german
 
Social media comm photo sharing project
Social media comm photo sharing projectSocial media comm photo sharing project
Social media comm photo sharing project
EmilyHart4
 
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DMOpfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
gsdcougar8040f
 
Marketing plan for a mobile app
Marketing plan for a mobile app Marketing plan for a mobile app
Marketing plan for a mobile app
Keshav Agarwal
 
Facebook Open Graph Overview
Facebook Open Graph OverviewFacebook Open Graph Overview
Facebook Open Graph Overview
Cory OBrien
 
Instagram Business and Revenue Model
Instagram Business and Revenue ModelInstagram Business and Revenue Model
Instagram Business and Revenue Model
Mohit Singla
 
Blogging today
Blogging todayBlogging today
Blogging today
francizzzek
 
Creating Your Own Instagram Clone: A Step-by-Step Guide
Creating Your Own Instagram Clone: A Step-by-Step GuideCreating Your Own Instagram Clone: A Step-by-Step Guide
Creating Your Own Instagram Clone: A Step-by-Step Guide
OmninosSolution3
 
What You Didn't Know About Your Smart Phone and Tablet
What You Didn't Know About Your Smart Phone and TabletWhat You Didn't Know About Your Smart Phone and Tablet
What You Didn't Know About Your Smart Phone and Tablet
Jonathan Bacon
 
Data Portability for Educators
Data Portability for EducatorsData Portability for Educators
Data Portability for Educators
Ian Forrester
 

Similar to How to lock photos app with password on Mac (20)

IRJET- Hampering the Cloning Attacks in Online Social Networks
IRJET-  	  Hampering the Cloning Attacks in Online Social NetworksIRJET-  	  Hampering the Cloning Attacks in Online Social Networks
IRJET- Hampering the Cloning Attacks in Online Social Networks
 
Effortless Ways of Removing and Changing Image Background-slideshare.docx
Effortless Ways of Removing and Changing Image Background-slideshare.docxEffortless Ways of Removing and Changing Image Background-slideshare.docx
Effortless Ways of Removing and Changing Image Background-slideshare.docx
 
How to Delete Apps in 2023
How to Delete Apps in 2023How to Delete Apps in 2023
How to Delete Apps in 2023
 
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDERINSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
INSTRAGRAM | BUSINESS MODEL | COMMUNITY PROVIDER
 
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...IRJET -  	  Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
IRJET - Blur Me: Automatic Tagging Framework for Securing Photo Sharing i...
 
Building Your Own Instagram Clone A Comprehensive Guide (1).pdf
Building Your Own Instagram Clone A Comprehensive Guide (1).pdfBuilding Your Own Instagram Clone A Comprehensive Guide (1).pdf
Building Your Own Instagram Clone A Comprehensive Guide (1).pdf
 
Huawei mate 20 pro manual/user guide
Huawei mate 20 pro manual/user guideHuawei mate 20 pro manual/user guide
Huawei mate 20 pro manual/user guide
 
Mac document recovery
Mac document recoveryMac document recovery
Mac document recovery
 
Ollie long unit 35 (changed)
Ollie long unit 35 (changed)Ollie long unit 35 (changed)
Ollie long unit 35 (changed)
 
New Microsoft Office Word Document.pdf
New Microsoft Office Word Document.pdfNew Microsoft Office Word Document.pdf
New Microsoft Office Word Document.pdf
 
insta.pdf
insta.pdfinsta.pdf
insta.pdf
 
Social media comm photo sharing project
Social media comm photo sharing projectSocial media comm photo sharing project
Social media comm photo sharing project
 
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DMOpfu to I’ll t  u eh bc I’m gm I’m ref sf t as you DM
Opfu to I’ll t u eh bc I’m gm I’m ref sf t as you DM
 
Marketing plan for a mobile app
Marketing plan for a mobile app Marketing plan for a mobile app
Marketing plan for a mobile app
 
Facebook Open Graph Overview
Facebook Open Graph OverviewFacebook Open Graph Overview
Facebook Open Graph Overview
 
Instagram Business and Revenue Model
Instagram Business and Revenue ModelInstagram Business and Revenue Model
Instagram Business and Revenue Model
 
Blogging today
Blogging todayBlogging today
Blogging today
 
Creating Your Own Instagram Clone: A Step-by-Step Guide
Creating Your Own Instagram Clone: A Step-by-Step GuideCreating Your Own Instagram Clone: A Step-by-Step Guide
Creating Your Own Instagram Clone: A Step-by-Step Guide
 
What You Didn't Know About Your Smart Phone and Tablet
What You Didn't Know About Your Smart Phone and TabletWhat You Didn't Know About Your Smart Phone and Tablet
What You Didn't Know About Your Smart Phone and Tablet
 
Data Portability for Educators
Data Portability for EducatorsData Portability for Educators
Data Portability for Educators
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdfCodeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Semiosis Software Private Limited
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Codeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdfCodeigniter VS Cakephp Which is Better for Web Development.pdf
Codeigniter VS Cakephp Which is Better for Web Development.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 

How to lock photos app with password on Mac

  • 1. How to Lock Photos App with Password on Mac In this slideshow, we will show you two ways to password protect Photos app on Mac.
  • 2. It Is Imperative to Keep Your Photos from Prying Eyes Approximately 90,000 photos and 9,000 videos were leaked in the form of a massive 13.6 GB file that was then posted on viralpop.com, a site created exclusively to host the cache of personal photos. Much like its namesake, “The Fappening” (which claimed a variety of celebrities as victims) and “the Snappening” (the Snapchat equivalent of photo hacks), these leaks have raised serious concerns regarding personal privacy and corporations’ ability to protect private information. --From Attn
  • 3. On August 31, 2014, a collection of almost 500 private pictures of various celebrities, mostly women, and with many containing nudity, were posted on the imageboard 4chan, and later disseminated by other users on websites and social networks such as Imgur and Reddit. The images were believed to have been obtained via a breach of Apple's cloud services suite iCloud. Apple later confirmed that the hackers responsible for the leak had obtained the images by phishing iCloud usernames and passwords. --From Wikipedia
  • 4. After all these photo leakage events happened, many users may not post their photos on various photos websites or platforms that can store photos, they choose to store their photos on Mac. But is it really safe to store photos on Mac? That may not be. Everyone around you can see your photos when using your Mac. So it is imperative to lock your Photos app to keep your Mac photos from prying eyes. When you lock the Photos app, no one can view your photos. You can follow below two methods to lock your Photos app on Mac.
  • 5. Method 1: Create a password for Photos app with Mac Parental Controls Intro: 1. Apple's user management system for controlling which system functions and applications are available to a managed user. 2. Prevent user accounts from accessing inappropriate content on Internet or apps and manage, monitor, control the time the users spend on the Mac, the websites they visit, the apps they access and the people they chat with.
  • 6. Steps: 1. Choose Apple menu > System Preferences, then click Parental Controls. Click the lock icon to unlock it, then enter your administrator name and password. 2. Select a user, then click Enable Parental Controls. If there is no user in the list, click Add + button , then fill in the name, account, and password information to create a new user. 3. After you select a user, click “Apps” of the tabs along the top. Check “Limit Applications”. And choose the app you want the user to access, so please unselect Photos app when you don’t want to others to see your privacy photos. 4. At last, don’t forget to click button to prevent further changes. This can help improve Mac security and privacy.
  • 8. Tip: 1. It can not be enabled for administrator accounts. So when you lend your Mac to others, you have to change your user account. 2. If you are working or learning with the administrator account and leave the Mac for a while, there are some possibility that someone can open Photos and view your privacy photos on your Mac.
  • 9. Method 2: Password protect Photos app on Mac with AppCrypt Intro: 1. Safely lock applications like Photos, Contacts, Google, Quicken, iPhoto, iTunes, Safari, Mail, YouTube, etc. 2. Allows you to set just one password to lock individual, multiple or all apps on your Mac to safeguard them from access by unauthorized users. 3. Set a schedule for each app (or all apps) to allow unblocked usage for specific days and times.
  • 10. Steps 1. Install and launch AppCrypt on Mac. Then AppCrypt will ask you to set a password which will be used to access the blocked Mac apps and change AppCrypt settings. 2. Click OK to confirm and click “Add App” on the top menu bar to add the Photos app. And the Photos app will be listed on the left column. Once you add a app to the block list, the app will be protected with the AppCrypt password. Free download address: https://www.cisdem.com/download/cisdem-appcrypt.dmg
  • 13. Tip: AppCrypt is 100% safe to use and user- friendly. It will not modify any Mac system or application files. You can lock all your apps with one password. By the way, the free trial version of it always allows you to lock one app without expiring date.