Kibbles & Bytes Blog

Apple news, tech tips, and more…

KB Dog
  • All Natural, Organic Radition

    You can’t buy it at a farmer’s market, but it’s all around us. Last week I discussed I discussed the electromagnetic radiation spectrum in a fairly broad, general sense (it’s a big spectrum). Early on, I made a passing reference to natural forms of electromagnetic radiation, especially natural radio waves, x-rays and gamma rays. As I also discussed, visible light, as well as infrared and UV, are also electromagnetic radiation, but since they’re visible, I think there’s less need to really explain their natural sources.

    Let’s start with conventional radio waves. Recall that these waves are typically categorized as those with frequencies ranging from about 3kHz to 300GHz. Another thing worth mentioning is that just like visible light, all electromagnetic radiation travels at the speed of light. Now, on to natural radio waves. Artificial radio waves were first discovered in the early days of electricity experimentation. As anyone who’s experimented with electricity will tell you, one of the inevitable effects is creating a spark. These early experimenters learned that these sparks actually created radio waves that could be picked up by a receiver device. Early radios used this phenomenon to function and they were often called spark-gap transmitters. They quickly fell out of use though because they tend to transmit over a very broad band, which makes interference inevitable. Earth naturally creates its own spark gaps as well during lightning storms. Just like the tiny spark gaps in early radio transmitters, a bolt of lightning will also create a radio wave, albeit a broad band and chaotic one.

    The other primary sources of naturally occurring radio waves are astronomical objects. These need not even be local objects, since radio waves travel at the speed of light. The universe is pretty old, and while our neck of the woods has been relatively quiet in the past few billion years, the rest of the universe has been ??very?? busy. Our greatest local source of astronomical radio waves is the sun. In fact, all stars will give off radio waves, being the hot balls of nuclear fusion that they are. Other sources include supernova remnants, pulsars, star-forming regions as well as echoes from the Big Bang itself.

    All of that stuff is just radio waves though–pretty harmless. We do study and listen to them though, to learn more about the universe beyond what we can see with telescopes. From an astronomical perspective, most of the things that generate radio waves also generate natural x-rays. Another minor source of local naturally-occurring x-rays are cosmic rays. This is where things get a bit confusing, so let me clarify some of this. X-rays as we’ve already learned are electromagnetic radiation. As such, they are not composed of matter. They are essentially the propagation of an electromagnetic field. They require no specific medium for transport (air, water, vacuum) and in the case of higher energies, can pass straight through solid materials. ??Cosmic rays?? on they other hand are not rays in the same sense. Cosmic rays are actually composed of charged particles (protons and high-energy atomic nuclei) which are physical.

    Cosmic rays interact with the earth’s atmosphere and magnetosphere in a variety of ways. This is difficult to describe without diagrams, but I’ll try my best. Because cosmic rays are charged particles, they are subject to the influence of electromagnetic fields, including the giant magnetic field that surrounds the entire earth. The shape of this field (with poles situated at roughly the north and south geographic poles) channels and directs most of these particles away from the earth’s atmosphere and surface. However, particles are able to trickle down to lower altitudes at the poles. When these particles interact with molecules in the atmosphere, many things can happen, including generation of x-rays, gamma rays and other secondary particles (muons, alpha particles, electrons and neutrons). This is also what causes the polar luminescence known as the “northern lights”.

    So that’s one way gamma rays can be generated naturally. Almost all astronomical sources of gamma rays (like x-rays) are screened by our atmosphere and magnetosphere. If this weren’t the case, we wouldn’t be alive as a species. Gamma rays are also generated via gamma decay of naturally occurring radioisotopes. There are even rare conditions that occur on earth that can create gamma rays including lightning strikes and so-called “terrestrial gamma ray flashes”. Both of these are the result of specific conditions in the atmosphere resulting in the availability of natural high-energy voltages. These events are particularly rare though, and are primarily of interest from a theoretical perspective. The actual amount of danger presented by these natural terrestrial gamma rays is very low. Artificial sources of gamma rays such as nuclear fission are far more dangerous because of the amounts of radiation involved.

    High-energy electromagnetic radiation is not only dangerous to biological material but it can also wreak havoc on electronic systems. Semiconductor junctions are particularly susceptible to ionizing radiation (which includes high energy gamma rays). The mechanisms at work are far too complex to explain here, but on a macro level, the issue becomes that if components in digital circuitry (semiconductors) cannot be relied upon to maintain their bits (0s and 1s) the entire circuit becomes useless. In April of 2010, the Voyager 2 space probe (well out of our solar system at that point) experienced some data formatting issues. Those with more active imaginations postulated that the probe had been “attacked” by aliens, but engineers traced the problem to a single bit that had been flipped by ionizing radiation.

    I think I might try to come up with a simpler topic next week, because this article even has my head spinning. Hopefully I’ve been able to at least illuminate a bit more about electromagnetic radiation for you.

  • Mark and Navigate

    Most of us have used and know how to search in Maps where specific locations, maybe you even use Siri to help you look up directions for places you are going. But have you ever wanted or needed directions when you did not have an address or a name of a business? On a recent vacation to Disney I had an opportunity to use Maps without having a specific address address. If you’ve ever been to a large theme park or just a big venue you know how hard it can be to navigate back to a location. Amongst a maze of unnamed aisles or streets of vendors and endless lines of cars in parking lots it can be easy to get twisted around.

    Luckily, the Maps app in iOS has you covered for these situations with a feature that allows you to mark any location and then get directions back to that point. It’s easy to use and provides several enhancements, but like many things in iOS, you might not be aware of these features from the beginning.

    First, marking locations might be easier for you if you use the satellite view in Maps. If you’re in the standard Map view that shows just the street, tap the “i” button in the upper-right corner and you can get the satellite view. I discovered this feature by accident myself. OK, it wasn’t me, it was my 6 year old! Sometimes kids really are the best teachers.

    p{text-align: center;}. !http://blog.smalldog.com/images/5006.png!

    Once in the satellite view, position the map over the area you want to navigate to, and then pinch to zoom in. To mark the location, press and hold the exact spot. You can do the same thing in the regular Map view, so don’t feel like you have to be in the satellite view to do this. A pin will appear on the map at the marked location. On the iPad, a panel appears on the left side of the screen with controls and more options. With the iPhone these options appear at the bottom of the screen. From this panel:

    **Get directions:** Tap directions to start navigating to the marked location. The button defaults to tell you how long a drive will be but you can easily switch to walking distances and other means of transportation. You can also tap the route summary to see more details and perhaps choose a different route if that option is available.

    **Move the marker:** To reposition the marker slightly, tap edit location; for a more significant change in location press and hold on a new spot.

    **Share the marker:** If you’re trying to explain to others how to get to you or your marked location, tap the share icon and then an app like messages or mail will appear so you can send the link to your directions.

    **Delete the marker:** Simply tap on remove marker

    **Make a favorite:** For a marked location that you might want to use repeatedly, tap add to favorites and give it a name. After that, you’ll be able to search for the location by name. Maps automatically syncs your favorites via your iCloud account. You can then access your location from another device at a later date if you want.

    p{text-align: center;}. !http://blog.smalldog.com/images/5007.jpg!

    As I mentioned in the beginning of my article I utilized many of these features on my recent vacation. I literally would have been lost without them! I have navigation built into my car, but found Apple Maps to be significantly more useful when driving as it provided me with multiple routes for most destinations and was fairly accurate for traffic issues and potential faster routes. I easily navigated back to our parked car when we left the theme park also easily located points of interest in our surrounding area. Living in a rural state I don’t always get to use all the features in my devices and apps. It was comforting to know thanks to my devices this country girl could make it in the hustle and bustle of busy cities!

  • You're My Firewall

    A firewall is a piece of software or hardware that monitors incoming and outgoing network traffic using rules set up by the user or administrator. You can go and buy a fancy 3rd-party firewall, but Apple has one built into MacOS. With this built-in software firewall you can set what applications can have incoming and outgoing connections.

    Most of the time you don’t have to worry about a firewall because MacOS doesn’t have potentially vulnerable services listening to the outside by default. However, depending on what 3rd-party software you have or if you are running a web server, applications could potentially be communicating in the background with the outside so you might want to limit communication for security reasons.

    Your built in firewall settings are found in the *Security and Privacy* pane in *System Preferences.* At the most basic level, all you have to do is click the button to turn on the firewall. Now that the firewall is on, click the button *Firewall Options.* Here you have some options to customize your level of protection. We will be discussing the firewall settings in MacOS Sierra, but the settings are similar for earlier operating systems.

    The first is *Block all incoming connections* which blocks everything except basic internet services. Most of the time you won’t need lock the system down that much, but the option is there.

    Next is *Automatically allow built-in software to receive incoming connections.* This is referring to the apps that are included with MacOS, so this usually a good thing to leave checked as this software has been designed with security in mind by Apple.

    The next option is *Automatically allow downloaded signed software to receive incoming connections.* Digitally signed software is software that contains a code which MacOS uses to verify the developer. Apple maintains a list of developers that it considers trustworthy so this is typically a safe option to leave checked as well.

    The last option is *Enable stealth mode.* When this is enabled your computer will not acknowledge attempts to access this computer from the network by test applications using ICMP (Internet Control Message Protocol) methods such as ping. Enabling this helps keep you safe by making a DOS (Denial of Service) attack method known as PoD (ping of death!) useless to the attacker.

    In the middle of the menu box you can see big box with a plus and minus box at the bottom. This is where you can choose specific apps you that want to add or remove network access to or from. This would primarily be used if you have an application that you trust but is not from a trusted developer and you need it to have network access.

    Most users don’t have to worry about a firewall. Since the MacOS is so secure most attacks are done through social engineering. This is when someone tricks you into revealing your password, basically making you open the door for them either by fear or manipulation. Software and hardware can help, but only you can prevent this type of security breach by not revealing your password to untrusted persons.

  • What the heck is Adobe Flash Player?

    As a computer technician, one of the most common questions I am asked is “What is Adobe Flash Player?”Almost everyone has seen a message on their computer at some point telling them that Adobe Flash Player needs to be installed or updated, but few people seem to understand what it actually is or what it does.

    Flash Player is an application that is currently developed and maintained by Adobe Systems. The original purpose of Flash Player was to play files that were created by another Adobe application called Flash. Flash was very popular in the 2000s for creating animations, videos, games, and other interactive web content.

    Over the years, Flash has been criticized many times, for various reasons. Most famously, in April 2010, Steve Jobs published a document explaining his reasons for not supporting Flash on the iPad. He cited the proprietary nature of Flash, as well as technical issues with it. He also explained that if Apple supported Flash applications on iOS, it would severely hinder Apple’s ability to control the quality of the iOS experience. “*You can read the full document here.*”:http://www.apple.com/hotnews/thoughts-on-flash/

    Today, Flash content on the Internet has largely been replaced with HTML5. HTML5 is the newest version of the HTML coding language and includes new standards for displaying animated and interactive content. With these new standards, HTML5 can display just about everything that Flash used to, and more. HTML5 content is more efficient and open than Flash, and supported on virtually every modern Internet-enabled device. The main use for Flash today is to run older Flash-based games and applications that have not been converted to HTML5.

    You may be thinking “If Flash is so old and most websites have moved past it, why does my computer keep telling me to install Flash Player?” That is a great question. In the last couple of years, various scams have emerged on the Internet where the scammer buys advertising space, and uses it to display a fake message indicating that Flash Player needs to be installed. As most people do not know what Flash Player is, just that it used to be important, this is a very effective scam. When the victim clicks on the advertisement, malware will be downloaded to their computer.

    There are still some older websites that do require Flash Player to function properly, but these are becoming increasingly uncommon. If you do need to install Flash Player, make sure you are downloading it from “*https://get.adobe.com/flashplayer/*”:https://get.adobe.com/flashplayer which is the only trusted source. If you ever have any questions about whether you need Flash Player or if a download is legitimate, feel free to email the Small Dog tech team at “*support@smalldog.com*”:mailto:support@smalldog.com

  • _Hello Fellow Technophiles,_

    I would like to start out by saying that I am not sharing this to offer evidence that Apple is superior to Microsoft even though that is CLEARLY the case. I am merely sharing information…

    Yesterday, the 7th of March, Microsoft had a major service outage that affected many of their services. This included the Outlook email service (which includes Hotmail), Office 365 (their cloud-based Office service), the Xbox Live gaming service, and Skype. These services were completely down or had limited functionality for hours.

    Normally this would not affect me in any way as I do not use any of these services, but I was working with someone who was trying to set up her Hotmail account on her new Mac. She was sure that the password was correct, but it would not let us sign into this account in the Mac mail program. I double-checked all of the IMAP and SMTP settings and these were all correct, so I was sure that the password was in fact the issue. My suspicion seemed to be confirmed when we tried to log into Hotmail.com and the password didn’t work. The next step was to reset the password, but this process kept failing. At this point, I started to get suspicious and a quick Google search revealed the outage.

    The lesson here is that if an online service does not seem to be working correctly, it is definitely worth looking into whether or not that service is down before diving into more in-depth troubleshooting. Apple maintains a page where you can check on all of its service is one place. “*Click here to see the current service status.*”:https://www.apple.com/support/systemstatus/

    Thanks for reading!

    Mike
    “*michaeld@smalldog.com*”:mailto:michaeld@smalldog.com

  • Managing Your Apple ID

    Too many times when I am helping customers I get a blank stare when I ask for their Apple ID. Some quickly look…

  • My daughter Autumn and my granddaughter, Gracie have been visiting this week. Jezebel has been in heaven playing with Gracie and they have quickly bonded. I’ve tasked Gracie with teaching her to “roll over” and she is making progress.

    Gracie celebrated her 13th birthday down here. She is a leap year baby so we celebrated both on the 28th and March 1st. They went off kayaking while I work today.

    My feed is full of Cubs spring training news even while the Boston Celtics are finishing up the season and gearing up the the post season. I love this time of the year!

    Thank you so much for reading this issue of Kibbles & Bytes!

    Your Kibbles & Bytes team,

    _Don, Emily & Hadley_