Kibbles & Bytes Blog
Apple news, tech tips, and more…
Apple news, tech tips, and more…
 
	
	I was one of the lucky million who was able to download the Public Beta of Apple’s new OS earlier this month. I have only installed it a few days ago and I must say, so far so good. While I have not explored all of the new features of the OS, I must say I have been very drawn to the changes they made to Spotlight.
Spotlight has always been a favorite of mine, but now it’s only getting better. When you hit the Command+Space key a nice window pops up right in the middle of your display. Start typing in anything you want, and within seconds, a list with a full preview to the right of it will begin to appear. In the older version of Spotlight, to activate the preview function you would need to hold your cursor over the line for a few seconds then a very small preview would pop out of the menu. Now its automatic and the preview is nearly full size.
For example, when looking up a contact, it displays all the information, just the same as if I had opened up the app and searched for it in there without all the hassle, and it’s fully interactive. This means that right from Spotlight you are able to find your contact, click on their email address, and Mail will open a new message addressed to that person. For those of us who use keyboard shortcuts all the time, this is a real time saver.
If you are using a PC there is some nasty ransomware and malware stuff out there. There are some that can actually hijack and encrypt your files and then ask for $350 or $500 to unlock them. Fortunately, you are on a Mac ??(editor’s note: you are on a Mac, right?)?? and that is not going to happen. But there is an annoying piece of software out there that claims to do something similar.
This software takes advantage of a JavaScript exploit in Safari. Basically, it is a JavaScript popup that presents you with a message that your files and browser are locked unless you pay up. *DON’T PAY!* There is a much simpler way to deal with this annoyance.
You need to first Force Quit Safari by going to the Apple menu in the upper-left corner of your screen, choose Force Quit, select Safari and hit Return. Then you want to relaunch Safari BUT this time hold down the Shift key as you launch Safari. This will load Safari without loading previous content. We also recommend resetting Safari by going into the Safari menu, selecting Reset Safari, leave all boxes checked and click Reset.
Unless you are a celebrity it is likely no one will bother trying to get your “special” photos from your iCloud account but just how safe are your photos that ARE stored in the cloud? With all of the news this week about the posting of nude photos of some celebrities the debate is on. So, here are some suggestions for best practices:
Most importantly, keep in mind that if you are using iCloud and Photo Stream, whatever photos you take will be on all your devices and in the cloud so think about that as you take that selfie!
_Dear Friends,_
I saw a gaggle of Canada geese in the field by the warehouse as I drove in this morning. It is a bit early for their annual trek south but they are gathering. The big apple tree outside my window here at the office has some apples on it and some have fallen to the parking lot so apple picking season is rapidly approaching. Apple picking season is also coming to the tech world as Apple has confirmed their special event on Tuesday September 9th where we are likely to see some of the great new products, especially the iPhone.
I am getting literally dozens of offers each day from suppliers overseas for cases for these unannounced products. I even got an offer to supply replacement parts for these new iPhones. Once the announcements are made we will be making some cases under our “*Hammerhead brand.*”:https://www.hammerheadcase.com It is clear that the new iPhone will be bigger physically and better certainly. While many people want a bigger iPhone, I don’t think I am one of them. I like the current size and actually might even like something smaller but that might be were Apple is going with wearables. Nevertheless, we will all be watching the Apple event on Tuesday.
One of the most persistent rumors is that Apple has made agreements with American Express, Visa, and MasterCard to launch a mobile payment system. While this may require some new hardware in retailers, my guess is that will come quickly, too. I have gotten very used to using my iPhone at Starbucks and I think the day where I will not need my wallet anymore is coming faster than I thought.
I downloaded a really handy app for my iPhone when I noticed it was on sale at the App Store: “*PDF Scanner*”:https://itunes.apple.com/us/app/pdf-scanner-easily-scan-books/id784454179?mt=8&at=11lb7k is a neat app that uses the iPhone’s camera as a scanner and converts the photo to a PDF document. It can scan multiple pages, save them, and share via “*Dropbox,*”:https://itunes.apple.com/us/app/dropbox/id327630330?mt=8&at=11lb7k email, print, or store in folders you create. Maybe, just maybe, I will be able to get rid of the flatbed scanner on my desk.
This week’s Kibbles & Bytes special is the Audioengine A2 Speaker system with the DS1 Stand for $199.99! This is a great speaker system for your office or dorm and has a 3-year warranty. I use Audioengine in my shop and love the big sound. That is $80 off the regular price!
“*See this fantastic and exclusive deal here!*”:http://www.smalldog.com/wag900001571/at_kb
My article from the “July 29th edition of Tech Tails”:http://blog.smalldog.com/techtails/tt909/ received some interested responses from you the readers. Apparently I’m not the only one concerned about all my information floating out there for everyone to read. Last article I touched on TOR, the onion router and its use in keeping identities anonymous while browsing the internet. One thing I didn’t mention at the time is that its service is primarily supported by volunteers and anyone can volunteer to be a ‘node’, a point at which other service users will either bounce off of within the TOR network or a point where the user traffic will leave the TOR network and reenter the “clear net”, or normal internet. A researcher looking into online anonymity volunteered to be a node in order to see if it could be cracked and what he found out was quite interesting. Though his node was an exit point into the normal internet, he couldn’t determine who the traffic belonged to, but he could read the traffic. TOR data is encrypted while it bounces around inside the TOR network in order to try and protect it from node to node, however that data needs to be unencrypted or in the correct encryption for the destination server to read. Someone managing the exit node is capable of reading the unencrypted data packets, gleaning private information that was intended to not be read by the user using the service. Though the source of the data was hidden from the researcher, what was contained within the data was not.
This is the Achilles heel of the TOR network: one bad apple can spoil the entire recipe. However, there are many good apples trying to make a great dish. Many volunteers that manage network nodes are doing it correctly and maintaining the network so that average users can take advantage of TOR’s designed purpose. TOR is constantly the target of agencies and corporations. If it can be cracked there are organizations out there that want to know that it can be done and how to do it.
TOR isn’t just a tool to hide your identity when browsing the normal internet. It is also the host of many websites that are not indexed by major search engines, i.e. Google or Bing. These sites are privately maintained and in many cases contain illegal content. A few years ago during the rampage of Anonymous, the nefarious hacker group, many sites hosting illegal content on the TOR network were attacked and taken down for periods of time. TOR isn’t the only “Deep Web” network that hosts non-indexed websites and in fact, the statistic is that around 90% of the internet is actually contained in these “Deep Web” networks. These networks aren’t all that easy to get to and can open you up for attack if you are not careful.
I myself haven’t done more than learn how to connect to these networks, and just the three most known networks at that. I’m still researching how to protect myself and how to know if I am in fact coming under attack. Knowing is half the battle, and knowing when someone is trying to connect to your machine is crucial in protecting yourself. Once they are in, usually there is nothing they can’t do to harm everything on it. A lot of this still makes me nervous whenever I attempt to connect because my specialization is primarily hardware and I don’t have all the proper knowledge to protect myself. I hear either on the news or read online about hackers getting all this information and account passwords to all the most commonly used services and I wonder how it’s done. What do I need to know to better protect myself? How are malicious cyber-geniuses able to get into my system and through what vulnerabilities? While on this quest of knowledge seeking I have learned quite a bit about the different types of attacks, but not how they are executed. If the interest is there I will continue this line of research. Or if there is enough interest in another area that people want to know about, please let me know.
I was one of the lucky million who was able to download the Public Beta of Apple’s new OS earlier this month. I have only installed it a few days ago and I must say, so far so good. While I have not explored all of the new features of the OS, I must say I have been very drawn to the changes they made to Spotlight.
Spotlight has always been a favorite of mine, but now it’s only getting better. When you hit the Command+Space key a nice window pops up right in the middle of your display. Start typing in anything you want, and within seconds, a list with a full preview to the right of it will begin to appear. In the older version of Spotlight, to activate the preview function you would need to hold your cursor over the line for a few seconds then a very small preview would pop out of the menu. Now its automatic and the preview is nearly full size.
For example, when looking up a contact, it displays all the information, just the same as if I had opened up the app and searched for it in there without all the hassle, and it’s fully interactive. This means that right from Spotlight you are able to find your contact, click on their email address, and Mail will open a new message addressed to that person. For those of us who use keyboard shortcuts all the time, this is a real time saver.
The trash feature of any operating system is quite vital. Sure, we all take for granted the fact that we can delete files as quickly as we create them, but what if you couldn’t move a file to the trash or worse empty the trash successfully?
Well, I’m happy to inform you that there are ways to resolve this issue, one that if it goes unresolved, can create a space limitation on your hard drive. Think of it this way, simply because you put trash in a garbage can doesn’t mean the trash collector is going to come each week. Here are a few tips/tricks that can resolve your trash can issue. In the case of owning a computer, you are essentially the trash collector that’s responsible for emptying your trash. This might seem like common sense but you’d be surprised how many people operate on a “out of sight, out of mind” mentality when it comes to file organization.
Hopefully the following tips and tricks help provide you a resolution:
In Mac OS X, each user account has a separate, invisible Trash folder that is in the home folder. When you view contents of the Trash, you see only items you placed there and not the Trash folder of any other accounts. If other writable volumes are present, you may also have individual Trash folders on these volumes.
*How to delete a file:*
1. Drag an item’s icon to the Trash (in the Dock), or select the item and press Command-Delete.
2. Choose *Empty Trash* from the *Finder* menu.
Note: If you’re trying to delete a file that wasn’t completely downloaded or copied, check out “*this document.*”:http://support.apple.com/kb/TS1988
Tip: In Mac OS X v10.3 or later, you can securely delete items by choosing *Secure Empty Trash* from the *Finder* menu.
If you change your mind about deleting the item before you choose Empty Trash:
1. Click the Trash icon in the dock.
2. Drag the item out of the Trash.
 
*If you can’t empty the Trash or move a file to the Trash:*
For example, this message might appear when you try to empty the Trash: “The operation could not be completed because the item ‘(item name)’ is locked.”
First, try holding the Option key as you choose *Empty Trash* from the *Finder* menu.
If that fails, check for these conditions:
*Is the file locked?* If files are locked, unlock them before deleting or delete using the tips in the “Deleting locked files” section below. Also, see “this article.”:http://support.apple.com/kb/TS1402
*Do you have correct permissions to modify the file?* Every file and folder in Mac OS X has some permission settings to help define what you or other users can do with the file or folder, for example whether you may modify it or not. If see an alert box with a message that says you do not have “sufficient” privilege or permission, see the tips in the “Emptying the Trash” section of “this article.”:http://support.apple.com/kb/HT2963
*Does the file or volume have special characters?* Usually, Mac OS X can delete files whose names contain special characters, but sometimes you might need to follow this advice.
1. Note the name of the volume which the files are being deleted from. If you are not sure of the item’s location, you can verify that by selecting it then choosing Show Info from the File menu. If the name of the volume contains any special ASCII characters, such as a bullet or trademark character, temporarily rename the volume so that it does not contain these characters.
*Example:* If you cannot delete files from a volume named “·Dox”, rename the volume to “Dox”. After the Trash is empty, restore the volume’s original name as desired.
2. Examine the name of the files or folders you cannot delete. They should not contain a solidus (“slash”, “/”) character or any other special ASCII character such as a trademark, quotation mark, or copyright symbol. If the file does, remove the special character or slash from its name, then delete it.
*Example:* If you cannot delete a file named “Things/stuff·”, rename the file to just “t”, then delete it.
Remember to always delete your trash as the files/data that can accumulate in there are still taking up space on your hard drive.
The very first computer I used was an Apple IIc. There was no modern internet at the time, so I wasn’t browsing the web, and I wasn’t old enough to have any writing or computing to do, so there was only one thing left: playing video games. But the blocky 2D graphics of Lode Runner and similar titles are very different in appearance from the realistic 3D renderings of today’s offerings. And these graphics aren’t the only thing that have changed since video games went mainstream more than 20 years ago.
In a YouTube video titled, “*Women as Background Decoration: Part 2 – Tropes vs Women in Video Games*,”:http://youtu.be/5i_RPr9DwMA blogger and media critic “*Anita Sarkeesian*”:https://twitter.com/femfreq brought into light the ubiquity of violence against women as a method of adding authenticity to modern video games. The video catalogs instances where women are used as a prop to indicate a non-player character is evil or some similar effect. A small group of people on the internet vehemently disagreed and the backlash against Sarkeesian was swift and frightening. Threats became so severe that she left her home temporarily.
Some argued that these instances of violence were only added to these games to make them seem realistic. But how realistic is a game where a driver mows down a sidewalk of people only to escape by painting his car a different color or for that matter a fantasy RPG pitting sorcerers and knights against skeletons and dragons? In an excellent analysis of the situation, Adi Robertson in “*an article on The Verge,*”:http://www.theverge.com/2014/8/28/6078517/stop-ruining-my-escapist-fantasies-sarkeesian-haters states: “Games with realistic stories are still built on unrealistic mechanics and stylized environments…Realism is as much about what you leave out as what you put in, and an unfortunate number of games pare down the feminine experience to nothing except sex, childbirth, and vulnerability.”
I love the world of technology, and it has allowed me to play some pretty epic games, including some of the ones on Sarkeesian’s list. But I also live in a world where women are people, not props to cheaply develop a protagonist’s character. The more we remove these misogynistic depictions from the media we consume, the less they pervade our real lives.
Please keep reading for less ranting about important topics and more tips, reviews, and stories about the technology that you use. Today we’ll talk about managing your digital garbage, check out the next operating system from Apple, and further explore TOR networks and internet privacy.
_Mike D_
“miked@smalldog.com”:mailto:miked@smalldog.com
All of us here at Small Dog wish you a Happy Labor Day weekend. I see motorcycling, barbecue and sweet corn in my future and plenty of downtime looking at the trees changing or finishing the book I started on the flight back from Key West.
Thank you for reading this issue of Kibbles & Bytes and have an awesome weekend!
Your Kibbles & Bytes Team,
_Don & Mike_
Our friends over at “*95 Triple X*”:http://www.95triplex.com/common/page.php?id=931 came in and bought a $1000 Small Dog gift card that they are going to give away to a lucky listener. If you listen in and are the 15th caller when they solicit calls, you will be entered in the pool to win the shopping spree. This contest runs from now until September 6th!
I’m going to try to explain something crucial to computers that I’m sure many people have heard of: the mighty transistor. What are transistors? How do they work? What makes them so useful in computers?
First, what a transistor is…actually, that’s very easy. At the end of the day, a transistor is basically a switch. It can turn things on and off. The only difference between a transistor and a light switch is that to turn a light switch on or off, you use your hand. A transistor is turned on or off by the presence (or lack of presence) of an electrical signal. That really is all they do. By itself, switching something on and off isn’t that useful but when you start combining multiple switches together, or using different kinds that switch on and off gradually, cool things start to be possible.
A good way to explain a common transistor application is with a record player. On the record player, there’s a tiny stylus that vibrates based on the bumps in the record grooves. As it vibrates, a magnet attached to the stylus vibrates near tiny wire coils. This creates an electrical charge, or signal which represents the music, but this charge is extremely weak, on the order of a few millivolts. A few millivolts is not enough to power speakers or headphones, so we have to amplify that signal. We do that using transistors. That tiny millivolt signal is used as the electrical signal that turns our transistor on or off (in this case, on to off is a range of values). So what are we switching on/off in this case? A much larger power source such as wall outlet power. That’s more than enough to power the speakers. The wall-level power is controlled and will be directly proportional to the tiny signal from the stylus. The transistor can change the output level thousands of times per second without a problem. Try doing that with a light switch.
You may have heard things about how many transistors are on a chip or “*CPU die.*”:http://en.wikipedia.org/wiki/Die_(integrated_circuit) These are the same transistors I just talked about. They’re just switches. The A7 chip in the new iPhone for example contains over 1 billion of them. In computers, they’re basically used to compare binary (on or off) signals. This allows you to create AND gates, OR gates, multiplexors, adders, flip-flops and more. Those pieces go on to form things like RAM, registers, arithmetic logic units, controllers and much more. Transistors are perfectly suited for computers because they can be made extremely small, they consume almost no power, and they’re extremely reliable because they are solid state.
The modern-day silicon-based transistor wasn’t born until the mid 1950s, but there were obviously computers before that, so what’s the deal? Things like the Colossus (what a great name) and the famous ENIAC were built in the 1940s and used vacuum tubes and mechanical relays as switches. These early computers worked on the exact same principles as modern computers. They had many of the same things like memory, arithmetic logic units, registers, etc. The problem with vacuum tubes and relays was that they were prone to failure and consumed an enormous amount of power. The single ENIAC alone had over 17,000 vacuum tubes and consumed around 150 kilowatts of power.
It’s amazing to think that such a simple microscopic component is capable of doing so much. The entire modern world is utterly dependent on them, and the rate at which computational power has increased thanks to better and smaller transistors is mind boggling. The ENIAC could perform up to thousands of operations per second (depending on complexity) and it used a 100kHz clock. It’s almost inconceivable that 60 years later CPUs with clock speeds in the billions of cycles per second are so commonplace (and cheap) we hardly even think about it. I can get an Intel Core-i7 with 4 independent computing cores and a clock speed of 3.9GHz for just over $300. The ENIAC cost millions of dollars to build.
So whether your using a Cray supercomputer to run global climate model simulations, or watching cat videos on your iPhone, don’t forget the mighty little transistor that makes it all possible.
Get out the grills because it is Labor Day Weekend and the unofficial end of summer. All of “*Small Dog Electronics’ retail stores*”:http://www.smalldog.com/retail/visit-us-in-store-at-any-of-our-locations and corporate offices will be closed on Monday September 1st so that our employees can enjoy this last weekend of summer. As I have said many times, Small Dog Electronics measures its success on the triple bottom line of PEOPLE, planet and profit. The people portion is so important and while that means community, customers and vendors, the most critical to our success is our people: “*the employees of Small Dog Electronics.*”:http://www.smalldog.com/team/meet-the-small-dog-team
We honor them this Labor Day and thank them for their commitment to the company, our community and our customers!