Showing posts with label Mac. Show all posts
Showing posts with label Mac. Show all posts

Tuesday, February 25, 2014

OS X Mavericks Update and Security Fixes

apple-logo

I recently wrote about the major security whole in the latest version of OS X – read my last post. It appears Apple has released the fix finally. Although the ‘fix’ comes not in a simple ‘patch’ but in an entire Operating System upgrade!

After several months of testing, Apple has released OS X version 10.9.2. The MAJOR (and very dangerous) SSL bug isn't mentioned in the release notes that appear in Software Update, but the bug is mentioned on Apple's security page for the update. Seems Apple is being their usual shity selves when it comes to security - hide or lie about it, sort of hiding the fact that this is so important.

To be a 'little' fair, this update does add some features but over all is really a bug fix of many major issues with the new Operating System. In Windows terms it would be called a full Service Pack.

As with any large Operating System upgrade/update you should of course back up your system – Use Time Machine or any other method I’ve described in previous posts.

Run the Software Update to update your system to 10.9.2 and if any other software shows updates available, select them too. If you’d like you can grab the full Combo update here.

If you have Mountain Lion it too has an update available - run Software Update to get it.

Please make sure if you run an Apple desktop or laptop computer that you update as soon as possible.

Be safe, Peace.

Wednesday, January 30, 2013

Disable UPnP to Protect Yourself from New Security Hole Found in Wi-Fi Routers.

If you don't know. And most of you probably don't. There is a major security flaw that has been recently aggressively exploited. It could allow people with malicious intent access your system(s). Mac, Windows PC and Linux, all are vulnerable because this is NOT a OS flaw, but a router flaw! So please don’t think you are safe just because you by into the belief (very wrong by the way) that ‘your’ type of Operating System ‘doesn’t get infected…’.  Scans from security companies have shown about 50 MILLION vulnerable access points already.

It is strongly suggest that end users, companies, and ISPs take immediate action to identify and disable any internet-exposed UPnP endpoints in their environments.
UPnP is pervasive - it is enabled by default on many home gateways, nearly all network printers, and devices ranging from IP cameras to network storage servers.

Rapid7.com has an online tool here  that can check the external interface of your router and let you know if you are vulnerable.

To fix/resolve this issue all you need to disable UPnP on your wireless router.
Since each router is different, you’ll need to login to your wireless router’s admin panel (use the manual to figure that out), and then find the UPnP setting. This may require someone with more skills (like your teenager) or an IT professional (preferred method) to turn this off for you you. But however you do it, please do it.

Be safe. Smile

Tuesday, January 1, 2013

Tech power and input deals.

For those with laptop/portable computers you know what it's like to always have to pack everything in your bag for each trip.

Why not keep have an extra power supply so that you can have one at home AND the office (or in your bag) always waiting? No constantly having to reach and dig behind the desk to unplug the power supply. And then do the same when you get to the office.

Here is a super solution. And right now this is on sale for only $19.99 w/free shipping at Newegg.com.
Rosewill RMNA-11001 Universal automatic Notebook Power Adapter 90W
http://bit.ly/KSUOpD

And while your at it how about an additional mouse? I use this one on PCs and Macs. Works great. I have a few of these too – home, office and travel bag.
http://bit.ly/UBT2ib

Just thought I'd pass this on.

Wednesday, June 6, 2012

Avoid Internet Doomsday: Check for DNSChanger Malware Now

Some background:
The DNS system is a network of servers that translates a web address -- such as http://www.google.com -- into the numerical addresses that computers use to locate actual websites, computers and servers. It is known as the Internet's phone book, which translates URLs to the IP address for the server hosting the Web site. This is not only true for Web sites, but also for any other Internet-based service being used, including servers for e-mail, backups, synchronization, chat programs, and calendars AND antivirus programs to update themselves.

Back in November, law enforcement authorities working with the Federal Bureau of Investigation arrested six of the seven individuals in Estonia responsible for infecting millions of Windows and Mac machines worldwide with the DNSChanger Trojan. As part of the "Operation Ghost Click" raid, FBI agents also seized over 100 servers at data centers throughout the United States masquerading as legitimate DNS servers.

If the FBI were to simply shut down the DNS network, then the millions of computers that had been affected by the malware would instantly no longer be able to access the Internet, and given the scope of this malware infection, would suddenly cut off many and very likely have a notable negative impact globally. Being infected with the malware, these systems would not benefit from users checking for and changing their DNS settings, since the malware would continually revert it and thereby continually disrupt communications.

To prevent this, the FBI instead chose to keep the rogue DNS servers active and convert it to a legitimate DNS system for infected computers. Since November 2011, there has been a campaign by the government, security agencies and MANY high profile internet service providers (ISPs) to notify users of the DNSChanger malware and offer services to help users identify systems that are infected.

Most victims don't even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.

To quickly and easily see if this may affect you and what you can do about it visit this site

Click on the link in the middle of the page and you will be notified if you are currently infected.

If you are infected/compromised you can visit this page for resolution tips and instructions.

Remember this trojan/virus will affect PC's AND Macs. Better safe than sorry. Or you could always call me for a hou$e call when your system won't connect to the internet.

You can read the FBI's page here.

Google has one here

Facebook also has one here.

Tuesday, April 24, 2012

Another Flashback Variant - 2nd in two days!

Hey Mac users who still haven't taken the hint and update your systems' security there's yet another version of the Flashback Trojan for you to enjoy.

It infects unprotected Macs in the same way Flashback.K did, through a Java applet exploit, and installs itself without the need of your password.
And, just as its predecessor, Flashback.K erases its footprints by deleting the Java cache and ensures its propagation by installing into the Java Update folder. You can read more here.

Apple released a Java patch in early April, as well as a Flashback removal tool, but clearly not all Mac users patched.

But many Mac users don't even qualify for the patch—it was only available to systems running OS X 10.6 (from 2009) and later. Mac users running OS X v.10.5 and earlier were advised to disable Java altogether. WTF!! However, it's quite possible that many users of these older systems just didn't get the memo and are still running insecure software.

Here is F-Secure’s site that has the checker and removal tool. Check that out too. And please update your systems folks.

Thursday, April 12, 2012

Windows AND Mac System Security News 04-12-2012

For OSX users:
Apple just released Java for OS X 2012-003, an update to the Java implementation in OS X. The update removes "the most common variants of the Flashback malware." Check that out here. You should definitely update your Java NOW!

For Windows users.
It's even scarier again. Trend Micro has found some scary ass Ransomware.

You can and SHOULD read the scary details here.

From TrendMicro’s blog, here is some of the details.

"We have encountered a ransomware unlike other variants that we have seen previously. A typical ransomware encrypts files or restricts user access to the infected system. However, we found that this particular variant infects the Master Boot Record (MBR), preventing the operating system from loading. Based on our analysis, this malware copies the original MBR and overwrites it with its own malicious code. Right after performing this routine, it automatically restarts the system for the infection take effect. When the system restarts, the ransomware displays the following message:

This message prompt informs affected users that the PC is now blocked and that they should pay 920 hryvnia (UAH) via QIWI to a purse number (12 digits) – 380682699268. Once paid,they will receive a code that will unlock the system. This code will supposedly resume operating system to load and remove the infection. This particular variant has the “unlock code” in its body. When the unlock code is used, the MBR routine is removed.

Bottom line PLEASE keep your security software, Operating Systems and Browsers (including and especially browser plug-ins like Java, Flash etc.) up to date and patched.

Peace.

Wednesday, February 1, 2012

CCleaner for OSX out of Beta

I written previously about a great tool I regularly use for Windows PCs now being available to OSX called CCleaner here. The application is now out of beta and adds a full set of features! Yay!

With the full version CCleaner adds cleaning capabilities for Safari, Google Chrome, Opera  and Firefox. This final release for Mac offers cookie management – you can always keep all or some cookies for persistent logins where by default cleaning tool clears all cookies. It also features and improvements include: Repair permissions, Wipe free space,  stability fixes on 0.5  and 10.7.2, cleaning of Chrome’s omnibox and other minor  fixes. You can get it here or from the link in my previous post.

Tuesday, August 23, 2011

Another OS X tool updated for Lion

The folks at Titanium’S Software have a new version of a great tool out for the latest version of OS X - Lion. The tool is called 'Deeper'. It gives you quick access to a number of Mac OS system options and tools that are normally buried in different utilities and menus. You can find the Lion version and versions that work on older OS X systems here along with Onyx for all versions of OS X.

As I have written about before, Titanium makes some great software. I put Onyx, a multifunction utility for Mac OS X, on every Mac I work on or own.  [Read more here]

The guys at Addictive tips have a super run down on how to use Deeper. You can read and should read about that here.

Also, all their software is FREEWARE!

Saturday, June 4, 2011

Latest Mac Malware news 06-04-2011

The Mac Trojan/Malware 'MacDefender' now calls itself 'Mac Shield'.

The malware keeps changing names and looks but still is relatively the same as before. However it is still infecting loads of machines and is, in my opinion very dangerous; it lures users into providing sensitive financial information to thieves.

Sophos for Mac will remove it. (free) Get it here.

So will Virus Barrier Express from the Apple App Store; here. also free.

Here is my previous article too.

Thursday, May 26, 2011

MacDefender Trojoan Strikes Again!

Apple and Mac folks I'd like to welcome you to the Windows world of malicious and pernicious attacks - even 'drive bys'. For over two decades I and the rest of the security world have been trying to inform people that NO networked system is safe from attack. Because of the sheer number and percentage of Windows machines vs. Mac and Linux machines, they have been the most easily targeted and exploited target. But that is changing! With the spread of OSX on the desktop and the realization by the malicious software vendors that Mac people are VERY EASILY duped and exploited because of their false sense of security, they are coming on strong and fast!

I recently wrote about the new Mac Trojan out and how to defend against it and remove it – read here. After 25 days Apple finally did put a notice and instructions on how to remove it. BUT only after telling their technicians AND users that 1st it didn't exist and then that they would not provide help!

Mac malware authors have released a new, much more dangerous version of MacDefender trojan variant:

"Unlike the previous variants of this fake antivirus, no administrator’s password is required to install this program. Since any user with an administrator’s account – the default if there is just one user on a Mac – can install software in the Applications folder, a password is not needed. This package installs an application – the downloader – named avRunner, which then launches automatically. At the same time, the installation package deletes itself from the user’s Mac, so no traces of the original installer are left behind."
Please read this from ZDnet

Apple is promising an update to OS X "in the coming days" that will detect the malware and its known variants, remove it, and remain in order to warn the user if they download it again. But don’t hold your breath!

I've spent years worth of time dealing with people who have been 'sold' on the false idea that "Macs don't get viruses or hacked". Wrong wrong wrong! OS X is built on a '*nix' core - one of the oldest operating system architectures in the world. How could you NOT think that there are exploits around that are just waiting to be ported to the newest derivatives? What type of systems do you think the hackers/crackers where getting into in the 70's and 80's?
I fault Apple a great deal for this. They have been literally selling the LIE that Macs are not susceptible to hacks for years. AND people believe them!

Again welcome to the world of Windows PC responsible computing. Be careful or get burned.

Please practice safe computing folks.

Friday, May 20, 2011

MacDefender trojan/malware is currently spreading on Mac systems - let’s kill it!

MacDefender, is the rogue antimalware trojan currently spreading on Mac systems. This malware is known by a variety of names, including "Mac Defender", "MacProtector", "Mac Security", "Apple Security", and "Apple Security Center".  It is a great example of how ‘social engineering’ can be used to trick people into harming themselves. Below are clear and easy procedures for removing it, read the quick summary or follow the links at the end for walk-throughs with loads of screen shots

I have written recently about this here, but it appears more people are being ‘snagged’.

Apple support is being of absolutely NO help either! In fact they are telling their people,"Do not attempt to remove malware.." Read about that BS here if you wish. So I thought I'd again provide some tips.

Here is the simple summary of what to do:

  1. In Safari under "Preferences", at the bottom of the "General" tab (the first tab), uncheck "Open safe files". This will prevent Safari from starting threats like MacDefender automatically after downloading them.
  2. Open up "Activity Monitor" (this is in your Utilities folder within Applications)
  3. Find "MacDefender" (or whatever the malware is being called, MacProtector, Mac Security, etc)
  4. Highlight it then click "Quit Process" which looks like a big red stop sign at the top right of the Activity Monitor screen.
  5. Next, open System Preferences, and go to "Accounts". When it appears click on the "Login Items" button, select the program, and then click the "minus" button to remove it from Login Items.
  6. Next, navigate to your Applications folder, find the program, drag it to the trashcan, and then empty the trashcan. Yes. It's really that simple to remove.

Here are the two best links I could find for simple walk-throughs. I would rather not repeat the tutorials they have already taken the time to do.
Their work is much appreciated.

Now the super links with detailed screen shots and some additional tips:
The HowToGeek.com site has a great walk through here.

VRT-blog has some good information on this also, read that here.

Folks, if you use a Mac and you connect it to any systems – especially the internet, please realize that you are vulnerable to attacks and hacks. NO system is immune to attack! Although Mac’s and Linux systems have benefited by a more secure file system/OS structure (for the most part) than previous Windows systems AND the fact that their numbers were small - about 8% of all network connected desktop machines and presented a ‘low volume’ target they are now increasingly being attacked. This is especially true since many Apple uses have been lied to and told they are invulnerable to attacks.

BE SAFE FOLKS!

Friday, May 6, 2011

How to create a VPN Connection on MAC OS X 10.5 Leopard

How to create a VPN Connection on MAC OS X 10.5 Leopard

This is a step-by-step guide on how to create a VPN Connection on a MAC OS X 10.5 Leopard System.

I recently had to do this again for some of our remote staff, so I thought I’d post it as a reminder to me and maybe help others who have asked in the past.

1. Go to ‘Apple’ –> ‘System Preferences’

clip_image002

2. Select ‘Network‘ from system preferences

clip_image003

3. In ‘Network‘ system preferences, click the ‘+‘ icon on the bottom left cover of window to make a new VPN Conection.

clip_image005

4. As shown in the image below, a new window appears. Click on the ‘Interface’ menu and see the list of choices and select ‘VPN’.

clip_image007

5. Next, Change the ‘VPN type‘ from ‘L2TP over IPSec’ to  ‘PPTP‘. And then In the ‘Service Name’ field, type in ‘VPN Office’ or ‘Company Name VPN’ or make one up. Once you have done, Click on ‘Create’

clip_image009

6. Next, we need to make a configuration. Select the ‘Confguration’ drop menu and select ‘Add Configuration’

clip_image011

7. A window will pop up, asking to name your new configuration. Type you ‘Company Name VPN’ here and then click ‘create’

clip_image013

8. Next, enter in your company’s ‘Server Address’ example; ‘server.domain.com’ or ‘72.14.213.x’ and ‘Username’, for example ‘administrator’ or ‘LarryHolmes’ or what ever

clip_image015

9. Next, Select the ‘Authentication settings’ button

clip_image017

10. Enter in Your ‘password’ and click ‘OK’

clip_image019

11. Next, Click on the ‘Advanced’ Button

clip_image021

12. Make sure that ‘Send all traffic over VPN Connection’ is unticked. Then Click ‘OK’

clip_image023

14. Once you have done that, click ‘Apply’. And connect to your New Vpn Connection by clicking on ‘Connect’.

There you go…

Tuesday, May 3, 2011

New Mac Trojan horse and Security tips from the NSA

There is a new Mac Trojan horse masquerades as virus scanner – read about that here . This is another example of social engineering - tricking users into making security mistakes.
Users looking for legitimate protection against viruses on their Macs might be duped into downloading and installing this. Essentially this is ‘ransomware’. It requires payment to ‘stop’ the ‘infection’. AND the payment information is often then sold to other nefarious people.

Remember that NO operating system is immune to attack. And since every system is utilized by humans they remain the biggest weak link - humans that is.

Also in other security news the NSA has released some good advice and documents for better security practices with your home network, and Operating Systems (including Mac OSX).
Read about that here. [via PCMAG Security watch blog].

Nearly all of this contains information that I and other security people have been saying for years but is well worth reading.

Tuesday, April 26, 2011

Consolidating and Cleaning up iTunes library and files

After consolidating, merging and updating a bunch of separate iTunes libraries and directories I was annoyed at how messed up my iTunes library and directories had become. I tried moving and ‘consolidating’ my library as described here for PC here for Mac go here. This method should retain all your playlists and remove many duplicates. There is also an Apple script to help if you are on Mac.

If you are on a Mac you can probably get by with using the move/consolidate technique and some GREAT script/apps located here. Doug’s main site is here  and worth checking out. I can’t say enough about the value of these tools – well worth the low price!

But sadly for me and many others nearly all my music is on (and managed) via Windows machines and *nix storage. So that still left me with loads of duplicates and entries with no actual files (file not found in iTunes). I also had come across loads of other music folders and libraries on old machines – many which had music that I didn’t in my current library but of course loads of duplicates.

So I was off to create a ‘clean’ iTunes library – No duplicates and all files correctly tagged. There are some applications that may do what I need for PC (as I’ll mention at the end) but I wanted to try and do it via freeware tools. [Take note that the following will eliminate your playlist and counts! So if you really need to have your playlist or play counts preserved don’t go further and try one of the paid options!]

Now, on to my adventure….

I deleted the original library. The location of your library files can be found here.

I then installed the latest greatest version of iTunes. After install, I set my directory options [in advanced preferences] to a new clean location on my HDD. I also set the option to ‘import new music to iTunes directory’.

I copied all my various music directories (from all machines and drives – both networked and external] to a temporary location; I ended up with about 7 different folders with loads of iTunes music directories.

I would then used that location to ‘import’ back into iTunes by selecting the ‘File’>Add Folder to Library’ option.

After all the importing was done I could see LOADS of doubles and garbage. So I set off to first remove the actual EXACT file duplicates.

Remember that many songs have the same Title, Artist and description tags (musically speaking) but may actually be different versions – live, acoustic, re-mastered etc., or from different albums such as compilations or soundtracks. So in iTunes you may see many doubles (if you go to File>Show Duplicates) that are really not actual duplicates!

My goal was to first delete the actual files that were exact file duplicates.

To do this I used the freeware tool Duplicate Cleaner download here. This looks for files based on their MD5 hash signature – so the file it finds are EXACTLY the same.

Download and install it and then run it. Select the location of your iTunes music folder and Choose scan.

clip_image002

When the scan is complete you should all your duplicate files.

Then you can highlight the ones you want to mark for deletion. Click on first item then the space bar and use the arrow key to move up or down to highlight next selections and press the space bar to ‘check’ the next and keep going till you have all your doubles or others you want removed highlighted.

clip_image004

Choose your delete or ‘move’ options. You may want to just move the items if you are really concerned about deleting files you might really want or need to keep.

clip_image006

clip_image008

Then I used the tool called iTunes Library Updater from here.

Download and install it.

Then open iTunes and minimize it.

Then open the iTunes Library Updater and run it.

Locate your iTunes music directory, as I mentioned, I put mine to a different location for easy sharing/backup/cleanup.

clip_image010

Select the folder

clip_image012

Here I chose the above options. Then ‘Start’

clip_image014

Then wait till done

clip_image016

Click close, close the application and then close iTunes.

Then reopen and check iTunes.

I actually did the above a few times and it made a HUGE difference in my library!

Real duplicates seem to be gone and my music tags appear to be much more in order too!

As I’ve mentioned, there are many other articles and some tools that are supposed to do all of this.

There are two highly rated applications – TuneUp is one and the other is Rinse, which may even do this even better, but they are not free (both run $39.00 I think). And I haven’t used either of them yet.

Here is Tune Up and over Here is Rinse.

Here is one such article with another tool.

But, I still haven’t found anything that has done as well a job as my above method for FREE.

I hope this helps some. Next time I might spring for the paid apps but I did learn something and maybe you will too! Good luck!

Tuesday, March 22, 2011

Updating to Firefox 4

I’ve written previously of my heavy reliance on Firefox and the many add-ons I use to make my time more productive and enjoyable while using the Internet.

Read here.

Now Mozilla has release the final version of Firefox 4.

Firefox 4 provides a MUCH faster and integrated browsing experience than version 3.x. The speed improvement will be noticed more on systems that allow for ‘hardware acceleration’ (more on that later) but it is still much faster on older systems.

Here is how I went about doing the upgrade.

1st download and install the latest version of Mozbackup here:

Download location here 

Information page here

This application is wonderful. It completely backs up your profile; bookmarks, settings and extensions.

Run Mozbackup and back up your profile(s) completely.

Download/install Add-on Compatibility Reporter. This requires a few Firefox restarts to be properly loaded.

This add-on will let extensions that are not explicitly ‘approved’ for version 4 to run.

And it will provide a nice interface to report those that don’t work correctly to Mozilla and/or the developer.

[If you use LogMeIn (and you should, if you need remote access to machines – Mac or PC!) here is the process to get the older add-on working in version 4:

Download by right-clicking and choosing to ‘save link as’ to your desktop or wherever this file: https://secure.logmein.com/activex/npRACtrl_ff3.xpi and then open the file with a zip extractor:  (this is zip-file, you can use Winzip, 7-Zip or Winrar. I use 7zip,)

extract the file:

install.rdf

modify it the part ‘3.6 – to read 4.6 here: <em:maxVersion>4.6.*</em:maxVersion>

Then save the file and ‘put it back into the xpi (zip file) overwriting the original.

In the xpi file (opened via 7zip or whatever) delete zigbert.rsa in /META-INF folder

Save all back to single xpi file.

Open Firefox then go to the menu bar on top and choose ‘File>Open File’ and select the xpi file and install it.]

OK so let’s get to it!

Download Firefox 4 here and install/upgrade.

I had very few issues with the upgrade on all my machines. So I’ll address them here.

Once installed there are a few things that may need adjusting. I had to do this on some machines and not others.

If your ‘Menu’ bar disappears it can be brought back very simply. Just right-click on free space in one of the toolbars and the selection of ‘Menu Bar’ switches back to the old layout. I also check the ‘Navigation Toolbar’, the ‘Add-on Bar’, and the ‘Bookmarks Toolbar’.

clip_image002

By choosing ‘Customize’ you can select more items to add to the toolbar and place them where you like.

If you have ‘blurry fonts’ you may have an issue with ‘hardware acceleration’.

Simply go to the Options section from the ‘Tools’ context menu. Then in the Advance then General tab you can ‘uncheck’ the ‘Use hardware acceleration when available’.

clip_image004

Tabs on top? The new version puts them there. I don't like that, you may. Firefox displays tabs on top by default which is a big change for Firefox 3 users. The customize menu has an option to move tabs back down. The entry Tabs on top needs to be unselected to move them below the address bar again.

On my OS X Machines there was one peculiar thing during the installation. Once the dmg was downloaded and mounted I could not copy the install to the applications directory until I trashed the existing Firefox application. Once installed, most of the above still apply.

On Linux (at least on my Ubuntu installs) Firefox 4 is real fast too!

Well I hope this help some.

Sunday, March 6, 2011

Mac OS X Trojan catches Sophos' eye

Two very recent article point out what most security people know and the rest should knowNO technology, especially computers connected to any network, are completely secure!

An article here points this out:

"It appears there is a new backdoor Trojan in town and it targets users of Mac OS X. As even the malware itself admits, it is not yet finished, but it could be indicative of more underground programmers taking note of Apple's increasing market share."

And from another one here:

"More than half of Americans believe that PCs are "very" or "extremely" vulnerable to cybercrime attacks, while only 20 percent say the same about Macs, according to this ESET survey.
(Credit: ESET)"

ESET released the results of a survey in November related to awareness of cybercrime in the U.S. The survey of more than 1,000 people found that while both PC and Mac users perceive the Mac as being safer, Mac users are victims of cybercrime just as frequently as PC users.

Meanwhile, Mac users are just as vulnerable to Web-based attacks like phishing as PC users are, and Mac users who fall prey to phishing tend to lose more money on average than PC users do, the survey found. "Viruses are a diminishing percentage of what we're seeing," said Randy Adams, director of technical education at ESET. "A lot of attacks have to do with social engineering and that kind of attack is platform agnostic."

Please folks, practice safe computing practices. I’ve written extensively on that so I won’t go into that here, just search my blog(s) for security items.

For those of you that are interested in an antivirus product for Mac Eset makes a fantastic one. You can check it out here.

By the way Eset’s products are top notch! If I were to buy a security solution it would be theirs.

Keep safe folks.

Tuesday, January 11, 2011

Great Simple How To & Tech Support videos from Google

These videos are from Google's "Send Your Parents A Tech Support Package" site.

Basically it is a site that lets the techies (usually the younger generation) send some 'canned support' to their parents and elders. But these are also especially useful to those that are either new to computers and technology or just a little less tech savvy.

The short videos are actually very well thought out and clearly and quickly presented so that just about anyone can learn from them.

I believe that many folks who 'think they know it all' should just take a look anyways. In my line of work I am amazed that people who literally work for 8+ hours on a computer do not know how to do many of these simple tasks.
The reasons, I think, are that many people are afraid to ask for help, they think they can just 'figure it out', or truly don't care to learn how to more efficiently or properly use technology. Some people refuse to learn out of some warped sense of ego or pride too.
Don't be one of those. No one’s head has every exploded from learning how to do something new or more efficiently.

I am going to link to all the videos directly so you can peruse them at your leisure. This is very large post with LOADS of great information. I really hope many of you will take the time and view these very short helpful videos. If you wish to watch them full screen you can click on the ‘arrow’ below the YouTube icon on the lower right hand corner and choose ‘full screen modes’.

So let’s start with the first category - THE BASICS:

COPY & PASTE

ADJUST THE TIME ON YOUR CLOCK

CHANGE YOUR DESKTOP BACKROUND – MAC

CHANGE YOUR DESKTOP WALLPAPER – PC

MAKE TEXT BIGGER OR SMALLER

TAKE A SCREENSHOT

CHANGE YOUR SCREEN SAVER – MAC

CHANGE YOUR SCREEN SAVER – PC

Next - WORLD WIDE WEB (INTERNET)

CREATE A STRONG PASSWORD

MAKE BOOKMARKS

MAKE A BLOG

SHORTEN A LONG URL

CHANGE YOUR DEFAULT HOME PAGE

CREATE AN ONLINE CALENDAR

BROWSE THE WEB WITH TABS

Next – COMMUNICATION

SET UP AN EMAIL AUTO-RESPONDER

TRANSLATE TEXT

MAKE CALLS FROM YOUR COMPUTER

CHECK YOUR SPELLING

http://www.youtube.com/watch?feature=player_embedded&v=En8e79YvA0Y

CHAT

VIDEO CHAT

GET A NEW PHONE NUMBER

CREATE A MAILING LIST

CREATE AN EMAIL SIGNATURE

CHECK YOUR EMAIL ON YOUR PHONE

Next – MEDIA

RESIZE A PICTURE

SHARE A BIG FILE

ATTACH A FILE TO AN EMAIL

SHARE PHOTOS

CROP PHOTOS

SHARE VIDEOS

TRANSFER FILES BETWEEN COMPUTERS

KEEP TRACK OF FREQUENT FLIER MILES

Lastly - FINDING INFORMATION

FIND A PIZZA(OR OTHER) RESTAURANT NEAR YOU

GET MOVIE SHOWTIMES

FIND THE DEFINITION OF A WORD

GET DRIVING DIRECTIONS

TRACK A FLIGHT'S STATUS

CONVERT CURRENCY

USE GOOGLE AS A CALCULATOR

GET PUBLIC TRANSPORTATION DIRECTIONS

FIND A BUSINESS'S PHONE NUMBER

GET STOCK QUOTES

FIND RESTAURANT REVIEWS

VIEW LIVE TRAFFIC

Wednesday, October 13, 2010

Jailbreaking iDevices Continues

Ok iPhoners and iPaders if you have a new device and/or the latest iOS installed (4.1.x) you can now 'jailbreak' them easily with the latest 'GreenPois0n' Jailbreak tool.

Greenpois0n  jailbreaks the iPhone 4/3GS, iPod touch 4G/3G, and the iPad. Their blog is here.

Here is a video of it in action.

Currently the crack is Windows only so (Mac and Linux users will have to borrow a Windows computer or run Windows in virtualization. They should be porting to all other OS's soon.

I don’t have have an iDevice anymore but couldn’t imagine being locked into Apples restrictive use policies – and now the courts agree too. Article here and here.

You can Google the benefits yourself but here is a good quick article.

Thursday, October 7, 2010

Simple Performance Tips

I am asked a few times a week at minimum “how can I speed up my system?” by friends, family and colleagues alike. Here are some very simple performance tips I perform on nearly all Windows systems I work with.

Before starting any system modifications please make sure you have a recent backup. Follow my previous posts here and here on backups and images. Run Windows update and update your Antivirus/Antispyware apps and other applications like Adobe Reader [launch the app, go to Help on the menu bar and go down to ‘Check For Updates’ and run and install.] Also update Adobe flash by opening your browser and going to Adobe’s site and getting the latest version. PDF and Flash are the most common vector for malicious code.

BE CAREFUL WHEN INSTALLING ADOBE PRODUCTS!!! They like to include ‘SHITWARE’, third party applications YOU DON’T NEED OR WANT', like McAfee scanner or other ‘toolbars. Make sure to ‘uncheck’ any options to download AND install these when updating Adobe (or any others for that matter) applications. Be careful they are tricky and put other toolbar installers in the application updates – so before ‘just clicking’ ok/next make sure NOT to install any toolbars or other applications.

The run an Anti-virus and Anti-spyware scans to make sure your system is clean.

OK now for the meat:

First go to Mike Lin’s home page and get his great little ‘startup’ application.

http://mlin.net/StartupCPL.shtml

Download the standalone application here.
It's in a zip file.

Extract and save somewhere like 'My Documents' or your desktop.
Then just double click to launch it. If you are on Windows Vista or Windows 7 right-click and run as administrator.

4_run_as_administrator

You will then be shown all the different start up parameters for your system and the applications which are scheduled to start at various events - login, machine startup, user login etc. Simply click on an item to highlight it, right click and choose and option.

StartupCPL

Using

The dialog contains six to seven tabs, depending on your system configuration. Each tab represents one place where a program can be registered to run at system startup. These include:

    * Startup (user) - the current user's Startup folder in the Start Menu.
    * Startup (common) - the common (all users) Startup folder in the Start Menu.
    * HKLM / Run - the Run registry key located in HKEY_LOCAL_MACHINE. These apply for all users.
    * HKCU / Run - the Run registry key located in HKEY_CURRENT_USER. These apply for the current user only.
    * Services - system services that are started before the user logs in. This appears only in Win9x; on NT/2000/XP, use the Services control panel, or the Services item in Computer Management.
    * Run Once - started once and once only at the next system startup.
    * Deleted - programs go to the Deleted tab when you remove them from another location. They will not run at system startup, but will merely be stored should you ever want to use them again. If you delete an item from the Deleted tab, it is removed permanently.

Each page contains a list of the programs registered at that location. Use the checkbox to enable or disable individual items. Additional operations are available by right-clicking an item. You can select multiple items using the Shift and Control keys. Options include:

    * New... - create a new entry. You can also drag & drop files from My Computer or Explorer.
    * Edit... - edit an existing entry.
    * Delete - delete the currently selected entry.
    * Disable / Enable - disable or enable the selected entry. A disabled program will appear in the list with a special icon, and will not run at system startup. You can also use the checkbox next to an item to enable or disable it.
    * Run Now - executes the program now.
    * Send To - moves the entry from the current location to another.

Press F5 to refresh the list at any time.

Be careful to NOT remove items critical to Windows and your Antivirus/Antispyware applications. Things that should stay are things like 'ctfmon.exe (an office application), and your sound and /or track pad drivers.
Please note:
Before you disable or delete any listed startup items 'Google' the exact 'exe' file located in the path and FIND OUT WHAT IT IS AND DOES FIRST!

Here is and example of what I mean.

I usually find dozens of items that do NOT need to be starting at startup and/or login. Things like Adobe Acrobat 'speed loader’, Adobe Updater, Google Updated, QuickTime, Messenger, Yahoo Toolbar, HP Image Center apps etc.

Another source of system hogging apps at startup are printers. HP (and nearly all software nowadays) is notorious for loading as many as a dozen ‘helper’ applications that you don’t need to run at start up. Things for updates, scanner updates, help desks, online help files and the like. All these items put a strain on system resources.

I find I can often dramatically increase the performance of most peoples machines by stopping all this ‘crapware’ from loading in the first place.

Once you have unchecked or deleted all the crapware from loading at startup restart your machine to make sure all works. If something is amok you can start in SafeMode (hold F8 before Windows starts) and run the app again and recheck or undelete any items as needed. If all is working time for next step.

Next item is clearing out temporary files. I use CCleaner. In fact I run this application EVERYTIME I close any browser, before I log off or shut down!

Here is the line for the application. Download, install, run and choose  ‘Run Cleaner’.

The first time this is run many people are stunned by the size and amount of files it cleans out.

Then it’s time to do a ‘super defrag’ on your system.

I like Defraggler a lot.

Get it here. Since this is an intense defragmenter – it makes files ‘contiguous’ on the disk, it can take a long while the first time it is run. Sometimes all night! But definitely run this.

Please read my other posts on resolving Windows problems too.

I you have a Mac check out this article here.

Well that is all for now have a save fun computing experience.

Sunday, August 8, 2010

Getting started Blogging with MS Live Writer

I won't go into a long winded explanation of 'why' you should have a blog, or many blogs, if you are a person with many fields of interest and or a business owner, so I will provide a few links to some good reasons but you can find many more yourself.

I blog for a few reasons; get my ideas on paper(albeit digital paper), share news and ideas with others and probably the primary reason is that it allows me to put information into a place that then allows ME to easily find that information I know I have 'somewhere' into an easily 'searchable' format. I often go back to my own blogs to find technical information on how to do things I know I have done in the past but can't remember exactly how to now. By putting this information online I can easily find that information. A recent example was trying to help someone share an external Mac Volume. I couldn't remember the  terminal syntax. But I know I've done it many times before in the past. So I just searched my blog for 'external Mac volumes' and found what I was looking for! For business owners, special interest groups and artists blogs can be an invaluable method for connecting with the public!

Here is a good article on 10 reasons a small business should have a blog:

Here is another guys blog with 33 good reasons:

Of course you can do this: http://tinyurl.com/2vs5trg and find many more.

There are some other ‘rules’ or tips you can find via the search engines too. Two which I will mention are; adding content on a regular basis and having others provide links to your content on their sites. These two things will, more than anything short of paid advertising, get your blog ‘noticed’. If your desire is to actually make money (monetize your blog) you can also find that via the search engines too. Though that subject is way too convoluted and complex for me to handle here, there are hundreds of thousands of sites to explain that. Just Google ‘how to monetize your blog’. Even then 99.999% of blogs will never generate real revenue anyways. [If you are nice you’ll click on my adds here in the hope I might though :) ha ha]

So let's get started. Virtually all blogging services offer a simple ‘new post’ option to add new entries. It’s as simple as logging into your Blogger, LiveJournal, Wordpress or other account, going to the ‘dashboard’ and choosing ‘new post’. Simple and easy but not that customizable or feature packed. For many people this is usually more than enough to get started. But once you decide you really want to continue your writing you should look at some other ‘publishing’ tools.

My favorite tool for creating posts/blog entries - Windows Live Writer. Live Writer makes it easy to share your photos and videos on almost any blog service—Windows Live, WordPress, Blogger, LiveJournal, TypePad, and many more. Live Writer lets me truly create the post I am looking for. It also allows me to create ‘drafts’ that I can work on as time permits and review them before publishing.
You can get Live Writer here:

The following videos directly from the Live Writer Team are excellent and way better than anything I could have done by just doing screen captures and writing explanations. They are short and very instructional and well worth bookmarking and watching several times.

Note that if you use Google's Blogger blog service or Wordpress (or even host your own) blog you do NOT have to set up a Windows Live blog.
Make sure to click on ' I already have a weblog set up' and go from there.

Basic Authoring:

Live Writer is VERY much like MS Word in it's formatting options. This makes it very easy to get the look and feel you are shooting for much easier than trying to do this via the 'dashboard' of your blog account.

Inserting Rich Content:
How to insert images, video and other content into your post.

And the last video in the series - Saving drafts, printing, modifying existing posts and categorizing posts:

 

If you really want your blog to be 'found' by people searching and actually read you should make a concerted effort to create appropriate 'categories' or 'tags' for you posts.
Just like you organize your hard copy files in a file cabinet, you can organize blog posts into categories or with tags, so they're easy to find by people using search engines (Google, Bing, Yahoo etc.) and by people searching your blog site in the future. Tags are often listed on blogs 'sidebar'.
In order for your blog's categories to be helpful to your readers, they need to be fairly intuitive, meaning it's obvious what kinds of posts are included in each category. As you create your categories, think like your readers would. It's also important to strike a balance between creating categories that are too broad and therefore don't help readers narrow their searches and those that are too specific and offer so many choices that readers are confused.

I could go on and on but I just wanted to get this out there for those that were looking for some good directions to start.

For now LiveWriter is still only a Windows application – Sorry Mac enthusiasts. But you can run it from a Virtual Machine ‘inside’ OS X. Or use the Firefox plug-in ‘ScibeFire Blog Editor’ for LiveWriter ‘like’ functionality. But I’ll save that for another post.