Keychain Access, an Essential Tool

I have been doing more onsite installations and lessons down here in Key West. So many times as I start to help a customer we run into the password roadblock. I was at a customer’s home yesterday and needed to set up her email and iCloud account. I asked for the administrator password for her Mac and she went to a little pile of sticky notes and tried to find the right one and the scene was repeated for each password we needed. I then proceeded to show her Keychain Access and I could see the light bulb hovering above her head as she understood the value of this app from Apple.

Mac OS X supports what are known as keychains: secure storage lockers for certificates, passwords, or any small bits of information to be kept private. The primary purpose of a keychain is to remember passwords for various applications and accounts such as mail and ftp servers, web sites, or encrypted disk images. The basic idea is that a single password, the keychain password, is used to unlock access to all passwords stored in that keychain.

I keep Keychain Access in my dock and use it all the time to find passwords, banking information, or secure notes. To find Keychain Access you follow this path: Finder > Applications > Utilities > Keychain Access. I do recommend that once you find it that you drag it to your dock, because once you start using it, you will wonder how you ever lived without it.

With the advent of iCloud and OS X 10.9 Mavericks, Apple made Keychain even more valuable as iCloud Keychain lets you share your Keychain in the iCloud so you can access it from all of your devices. I wish there was an app like Keychain Access on your iOS devices but still, it is awful handy to have your device automatically remember your password for websites, etc.

When you launch Keychain Access you will see that the window is divided into three panes. The top-left pane lists keychains accessible to you. Below this is the Category pane. Here you can choose to view specific kinds of things stored in the keychain: passwords, secure notes, certificates associated with your account, encryption keys, and certificates used by your Mac. The largest pane, to the right, displays the contents of selected category items—for example, all of the items that have a password associated with them. Except in the case of certificates, you can double-click on one of these items to open a window where you can view the item’s attributes: name, kind, associated account, location (a website or network address), as well as its access control.

Keychain Access can do a lot of useful things. For example, if you’ve forgotten a password and would like to recover it, Keychain Access is the place to go. To learn the identity of a password, select All Items or Passwords in the Category pane, then find the the item you want the password for and double-click it. In the resulting window, enable the Show Password option. You will be prompted for the password for the login keychain which is either your login password or the administrator password (which will be the same if you are an admin user on your machine). Enter that and click Allow, and the password will be revealed in the Password field.

I have just scratched the surface of this great utility, perhaps we will go into some more technical detail in our sister eNewsletter, Tech Tails or in a future issue of Kibbles & Bytes. But if you are not using Keychain to its full potential, I suggest dragging it to your dock and checking it out!

Similar Posts

  • Use Old iOS Devices as Security Cameras!

    Are you one of those people who have old iOS devices laying around your house just waiting to be brought to the recyclers or given to a friend in need? I have always kept my old devices as a backup in case I ever need to send my new one out for repair.

    For those of you planning on upgrading your iPhone, iPad or iPod touch soon, you might rethink selling or recycling it, and instead, turn it into a home security system. Huh? Yes, you heard me.

    With a new app by “*People Power*”:https://itunes.apple.com/us/app/presence-by-people-power/id618598211?mt=8 you can easily make an old iOS device your new home security system. The system supports the iPad 2 and newer, iPod touch (5th gen.) and newer and iPhone 3GS and newer.

    The app is called “*Presence*;”:http://peoplepowerco.com/products/ it’s free and it has some seriously great reviews. All you need to do is download the app on at least two devices, connect over Wi-Fi and set up your device in the desired spot you wish to watch. You can then set up specific alerts for when motion has been detected.

    The alerts might be for when your kids get home from school, if someone breaks into your apartment, or maybe you have elderly parents who you’d like to make sure are up and moving that day. Throw a waterproof case on the phone and you can set it up outside and get video clips to see what kind of animal is eating your freshly sprouted blueberries.

    People Power will soon have a subscription, allowing you to upgrade to Presence Pro for more storage and added features. Even if you don’t feel the need to monitor any activity going on, it might be fun just to play around with the app since it is free, and who knows, you may just find a cool use for it!

  • Green Mountain Software Can Write an App for That

    We have a guest post from the “*developers at Green Mountain Software!*”:mailto:john@greenmountainsoftware.com

    *****

    Certainly you’ve heard the expression: “There’s an app for that!” but if there __isn’t__ currently an app for that, Green Mountain Software can write one for you.

    Now located in the Innovation Center in Burlington, Vermont, Green Mountain Software (GMSW) was founded in 1993 by Lou Krieg and his wife, Ann Pettyjohn after attending the ’93 MacWorld trade show where the Apple “Newton” was first introduced. Lou and Ann realized that mobile technology was going to be a huge part of the future, so Green Mountain Software was formed to fill that need. They were right. Mobile technology is changing the world and how business is done. The number of mobile users is predicted to surpass the number of desktop users by 2014.^1^

    It is apparent that simple email access is no longer enough. Mobile technology allows companies to have an unprecedented level of connectivity between employees, vendors, and customers.^2^ In 2012, Gartner Research predicted that sales of mobile tablet devices would top $120 million – double that of 2011. In addition, the number of active smartphones is currently over 1 billion worldwide.^3^

    During the past eighteen years, companies such as EcoLab, Electric Power Research Institute (EPRI), Coffee Lab International, Pro-Cut International, United Technologies, Bio Tek Instruments, Leica, the Indy Racing League, and many others have trusted GMSW with their app development. In fact, even other software development companies such as Palm have relied on the expertise of Green Mountain Software to develop their mobile device apps.

    Today’s technology includes iPhones, iPads, Androids, Blackberry, Windows Mobile and others. These devices have thousands of times more advanced computing power that the computers NASA used to get to the moon! In the hands of good software engineers, there isn’t much these devices can’t do, and combining these capabilities to achieve the results you need is what GMSW does best.

    Do you have an idea for an app for your company? Are you wondering how can mobile technology can increase your productivity and profitability? Mobile technology can measure, compute, exchange data with machines, utilize GPS location services, interact with servers, be Web-based or native within the device, communicate through the Internet or cell systems, take photos, be used for medical diagnoses, and so much more.


    If you’re interested in more information, or just want to discuss your idea, Green Mountain software is on the Web at “www.GreenMountainSoftware.com”:www.GreenMountainSoftware.com. We can be reached at 802-865-2728, or email “john@greenmountainsoftware.com”:mailto:john@greenmountainsoftware.com.

    ^1^ Morgan Stanley Research
    ^2^ “http://www.strategicgrowthconcepts.com/growth/increase-productivity–profitability.html”:http://www.strategicgrowthconcepts.com/growth/increase-productivity–profitability.html
    ^3^ “http://mashable.com/2013/01/04/mobile-2013/”:http://mashable.com/2013/01/04/mobile-2013/

  • Keep Your Passwords!

    You have a password for the online banking, one for your Apple ID, one to log into your retirement amount. Your password for your bank has to have have at least one numeric number, but can’t start with a number and it can’t have any more than two of the same characters found in your username. Your retirement account must include at least 3 numbers and one special character but they can’t be consecutive.

    Does this sound familiar? In the perfect world we would only need one password, but unfortunately for security purposes and as hackers get better at what they do password strength has become critical and part of our everyday lives. The hassle with this is that most sites have their own sets of rules for password strength leaving many of us to peck away at our keyboards or devices in a sometimes endless game of “remember how you manipulated your favorite password 16 different ways and can’t remember if your banking site used the password with the capitalization or the one with the ampersand”.

    For a very long time I will admit my method of keeping track of my usernames and passwords was the stickies program on my Mac, much to the dismay of our IT manager! While stickies are easily accessed they are not secure and I do not recommend this method. Where you should keep them is in your keychain. You can access your keychain through applications and then utilities. Once you are in your keychain you can manually add preferred sites, accounts and passwords you wish to store. Another huge benefit is secure notes. Secure notes allow you store additional confidential information. Keychain is safe and secure because in order to view any of the passwords stored there you need to enter your administrator password. Within keychain you can make sure to safely and securely keep your passwords, and when you forget if you needed that capitalization or ampersand in your password you can simply open keychain and enter into the search field the website for which you need to confirm the password.

    Now what if you don’t have a mac? The loss of passwords, and most often your Apple ID password is a huge concern with users of iOS devices only. Luckily there is an easy solution for that, iCloud and iCloud keychain. Simply go to settings, iCloud and then select keychain. Your iOS device will begin to store your logins and websites. Additionally you can add specific websites and passwords manually to your phone or iPad under safari and then selecting passwords. This is also where you would look if you can’t remember login information.

    Recording safely your logins and passwords is an often overlooked step, especially when users of iOS devices accidentally have the device damaged or lost. Saving your passwords safely and using iCloud keychain can avert your being logged out of accounts.

  • Soapbox: Refugees, Fear and Who We Are

    If the sadness and shock of the terrorist attacks in Paris were not enough, I was in shock this week as Islamaphobia and fear overwhelmed politicians and citizens. Some politicians were tripping over themselves to stoke the flames of fear by turning on the Syrian refugees. I don’t know about you but if I lived in Syria and there was a war in my neighborhood with madmen from both sides going berserk, I’d be a refugee, too. Oh, by the way, did you know that Steve Jobs father was a Syrian refugee?

    This was seemingly fueled by what turns out to be a very sketchy report that one of the terrorists posed as a refugee. That has since been discredited but the conclusion jumping was already in full swing. Some politicians tried even to separate their distain for refugees by religion but there is no religion that makes terrorism its creed and there have been terrorist from many religions. It is when hypocritical fanatics of any religion feel that they can impose their will upon others that conflicts arise.

    Way back when the USA was young, our friends in France sent us a gift. The Statue of Liberty proudly stands by our shores with the inscription that defines who we are as a nation:

    Give me your tired, your poor,
    Your huddled masses, yearning to be free,
    The wretched refuse of your teeming shore,
    Send these, the homeless, tempest tost to me,
    I lift my lamp beside the golden door.

    When we succumb to the fear the terrorists win. When we change who we are, the terrorists have won. When we let prejudice trump common sense, the terrorists have won. We must lead by example and the example of shunning refugees is the wrong one. In the height of the worst terror since WWII, President Hollande of France recommitted to taking Syrian refugees saying “We have to reinforce our borders while remaining true to our values.”

    We cannot change who we are – unless you are a native American, you are a descendant of refugees and immigrants. This anti-immigrant, anti-Islam, anti-refugee wave of fear is unAmerican and is born of ignorance and hate.

    How do you feel about this trend towards exclusion of refugees and immigrants? Share your opinion at our blog – blog.smalldog.com

    End Soapbox

  • Seven Siri Tricks

    Siri is great for resolving trivia disputes, setting reminders and even texting or sending email but Siri is also a talented assistant. Here’s a few of the more non-intuitive tasks Siri can accomplish:

    1) Split up that restaurant bill and add a tip

    Ask Siri “What’s a 20% tip on a $105 bill split among 3 people and Siri will not only tell you what the total tip would be but also how much each of the 3 owes.

    2) Flip a coin

    Siri will bail you out if you do not have a coin to flip if you ask her to flip a coin. Or if you are killing time and want to play dice, ask Siri to “throw the dice”.

    3) Counting Calories

    Siri can help! Ask Siri how many calories are in that Big Mac and Siri will tell you that you are consuming 520 calories.

    4) Take a Selfie

    Ready to take that selfie and find yourself looking for the camera app? Just tell Siri to take a selfie and boom!, the camera app will open. Siri isn’t smart enough, yet, to ensure you have the front facing camera active so you might have to click that first.

    5) Name that Tune

    Siri integrates with Shazam to listen to the music. Ask Siri “What is this song?” and with some help from Shazam, Siri will let you know and if you click on the result it will play that song if you are a subscriber to Apple Music.

    6) Find your Friends

    If you use the Find My Friends app you can ask Siri to find them by asking “Where’s my wife?” and assuming that your wife has agreed to share her location in the Find My Friends app, Siri will let you know where she is.

    7) Convert Currency

    If you are traveling out of the country you can use Siri to make those currency conversions. Asking Siri “What is 100 euros worth?” today reveals it is worth $112.49.