How to resolve problems with a Mac

There are four ways to resolve problems with a Mac. 

1) Turn it off and back on. 

2) When powering on, do a PRAM reset (holding down the Command, Option, P, and R keys together and wait for the second start-up sound before releasing). 

3) Before powering up, do a SMC reset (holding down the Command, Shift, Option, and power keys together for 10 seconds, then release and press power again to start up). 

4) Delete and reinstall the problematical app. 

If any of these fail to resolve the problem, try to isolate the source of the problem by logging in with a different account to see if the problem exists with the system or the individual account. Then call Apple support to have them help find the problem. A worst case scenario to resolve a system-related problem is to re-install the OS. A worst case scenario to resolve a user login related problem is to delete that login and recreate it from a Time Machine backup selecting only documents, music, and photos to be restored.

This should not be considered as a full analysis or troubleshooting procedure. However, if your Mac appears to be sluggish, either a PRAM reset or a SMC reset or both can restore performance.

John R Carter Sr

Webcam Problem?

With the proliferation of virtual meetings, like with Zoom, as one example, if your webcam stops working, the following article discusses possible fixes:

https://www.howtogeek.com/682516/mac-camera-not-working-heres-how-to-fix-it/ 

The following article also explains how to use your iPhone as a webcam:

https://www.howtogeek.com/669589/how-to-use-your-iphone-as-a-webcam/  

Hopefully, you'll never have to use either article, but you might save them, just in case. Maybe the easiest fix is just to use your iPad instead of your Mac.

Jim Hamm

iOS 14 Review

Here is one writer's opinion of his testing of the upcoming iOS 14 update. And, I'll give you a sneak preview.

Jim Hamm

"In a sense, I still think that. Apple’s keynote presentation was full of pizzaz, while the reality is much more prosaic. iPadOS 14 is very much an incremental update rather than a revolutionary one, and I still think Apple is a very long way short of taking full advantage of the capabilities of the hardware.

But as I mapped out the changes I like, I realized that though they may be individually rather small, most of them make a surprisingly big difference. Take all of them into account, and I think it’s a solid and welcome update, with five notable upgrades…"

https://9to5mac.com/2020/07/27/ipados-14-review/

Video of 250+ Changes in iOS 14

Get ready to spend more than 94 minutes on the 250+ changes in iOS 14 in this video:

https://www.youtube.com/watch?v=F1fkkT85hQE

Whew! I’m tired just thinking about it!

This video is really easy to follow at normal playback speed. And the presenter’s voice is a natural, calm tempo that doesn’t make you feel like he’s rushing through the steps just to keep the video short. You can still slow the playback to a sleepy 0.75 with the Settings (gear) in YouTube.


John R Carter Sr

Zoom 5 Moves Toward Security

Zoom has become quite popular, had some security issues early on, and now has addressed those in release #5. The following article has summarized the improvements.

Jim Hamm

Comment from John R Carter Sr:

It should be noted that Mac Users should NEVER accept an update for the Zoom client from ANY source other than zoom.us. A bug was found last April that allowed third party pranksters to take control of a Mac computer by installing a bogus Zoom app.

Zoom developers have made their service more secure. We review what’s changed.

Technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers have, as promised, given the app a data-protection makeover. As a result, version 5.0 has changed a lot from precoronavirus Zoom.

The change in security focus quickly bore fruit. Previously, large companies and institutions turned their noses up at Zoom, but it now has the seal of approval of New York’s attorney general and is back in NYC schools, and version 5 brings with it some useful features.

Conveniently located security settings

Starting with Zoom 5, all settings for managing conference participants appear in one place. Security does not supersede convenience.

Here you can restrict user rights, block access to meetings to keep out uninvited guests, add watermarks to screenshots and audio recordings in case someone decides to publish them, and so on. Click on the shield icon in the conference menu to open the security settings.

Anti-troll protection

A number of new settings stop invasions by anonymous trolls. First, passwords and the Waiting Room feature, which requires a host’s permission to join a conference, are now enabled by default. Second, you can now prevent participants from renaming themselves.

Owners of paid accounts can also require members to supply information about themselves: name, e-mail address, and the like. And with a business account, you can block unauthorized users or those with a certain type of e-mail address domain (for example, public instead of corporate) from connecting.

Data routing

Zoom’s approach to data routing has also changed. Now your video call will not be routed by mistake to a Chinese or other foreign server. If for some reason the conversation has to remain inside your home country, then you have nothing to worry about: Free conferences will stay in the domestic region, and paid subscribers, as of April 18, can choose which countries their information goes through.

In addition, all conference participants can now see which data center they are connected to by clicking the “i” icon within the upper left corner of the screen. So, if your data is routed somewhere else, you can find out about it and complain to the developer.

Screen sharing security

The old Zoom always showed previews of chat messages in notifications. That could lead to an awkward situation if, say, someone wrote you a personal message during screen sharing. Now, during free conferences the service does not display notifications at all and does not show chat when screen sharing, even if it is open.

Updated encryption

The developers have upgraded the encryption algorithm as well. First, Zoom now uses longer (and hence more reliable) encryption keys. Second, the integrity of transmitted data is now checked — a protection measure against intruders who might corrupt or alter an encrypted message without deciphering it.

If you like such esoteric details (and who doesn’t?), you’ll be interested to learn that Galois/Counter Mode now handles the integrity check. In addition to being more secure, GCM is considered less demanding on resources, so better encryption doesn’t mean sacrificing computer performance.

End-to-end encryption

Lastly, users will soon be able to communicate without anyone — outsiders or Zoom employees — being able to eavesdrop. The service plans to add end-to-end encryption of video calls, for which purpose it has even acquired Keybase, a company specializing in secure messengers and apps for data exchange.

At first, Zoom planned to provide maximum-level privacy to paid subscribers only. But the news that it was going to leave free users without end-to-end encryption provoked a lot of criticism: Zoom was accused of collaborating with intelligence agencies, or at least of leaving the door open for them.

Those accusations conveniently ignore an important point: Practically none of Zoom’s competitors provide e2e, either. End-to end encrypted video calls are available only in instant messengers with limited video call capability or in high-cost business tools that offer it only on request and clearly not free.

Developers have good reason not to love end-to-end video encryption, which is incompatible with many useful features including the ability to record conferences in the cloud, broadcast them on YouTube, or join meetings by phone — anything that requires management through a server. In terms of convenience, most users are better off without it.

That said, on June 17, Zoom announced that end-to-end encryption would be made available to all, including those who use the service free. It won’t happen overnight though, the company plans to start early beta testing in July.

No time to relax

All in all, Zoom 5 is far more secure than past iterations. Its developers have approached security in a very responsible manner, promptly fixing most of the issues that surfaced during the lockdown period.

However, that doesn’t mean that you can take your eye off the ball. Is your conference open or closed? Is recording allowed or not? The developers can’t answer these and some other questions for everyone. So you need to configure conference calls according to your own requirements. Thankfully, Zoom now has more settings to help you get it right.

Second, absolute security does not exist. For example, two vulnerabilities were discovered in the relatively recent Zoom 4.6.10. One of them allowed a malicious chat message to execute arbitrary code on the Zoom server. That bug was fixed before the release of version 5.

The second vulnerability was related to the integration of the chat feature with online GIF repository GIPHY. The bug allowed arbitrary files to be downloaded to conference participants’ computers instead of animated images. The developers temporarily disabled the vulnerable function, and they promise to return it as soon as the problem is fixed.

So far, no horrors have been found in Zoom 5, but that doesn’t mean there aren’t any. As long as the service remains in the spotlight, there will be no shortage of people trying to find its soft spots. Therefore, if you use Zoom, be sure to keep an eye out for updates and install them immediately.


Apple Shifting Away from Intel Chips on their Computers

“The Apple just announced the fact that they are shifting away from Intel chips for their computers and replacing them with their own ARM chips that are in all the iPhones, iPads and Watches. So, am I going out to buy the new computers based on the ARM chips? My past experience says no. Here is why:

I have bought a new Apple laptop computer every 2-3 years since 1992. One of them was based on a PowerPC G4 chip. I bought it just before the G5 chip was announced which had tremendous problems, and the reason why Apple went to Intel. So, I waited till the first Intel based laptop came out and bought it immediately! It had a LARGE number of problems which were not solved for over a year. It was another year beyond that before Apple successfully married all of its hardware and software. I was also a beta user of the “new MacOS ten” when it arrived in 2010. It was also a couple years before it was stable.

Given my experience with new architecture, I am not going to run out and buy the new ARM based computers. Not if my current one is running fine. If my current one needs to be replaced, I will still wait till all the reviews of the new ones are in, and the applications I need to run are stable on the new platforms. In my mind, given my experience with Apple, that means 1-2 years after release of the new computers.”

Frank Croft

Google Chrome Flaw Results in 32 Million Malware Downloads

An article in the New York Post draws attention to a Google Chrome security flaw that results in 32 million malware downloads. Read the article in the link below.

Frank Croft

https://nypost.com/2020/06/18/google-chrome-flaw-results-in-32-million-malware-downloads/

John Carter commented:

The issue is not with the browser as much as it is with the extensions from third party vendors. Now, it should be Google’s primary objective to vet all extensions that they put in their Google App Store. But how many of the faulty extensions came from other places? There’s really no detail about which extensions were involved and where they came from. For me, this is mostly fear-mongering.

Printing from an iPhone or iPad

FYI and possible interest, here is an article with tips on how to print from an iPhone, iPad, or even an 

Android device. At home, this hasn't been an issue for us, for if we need to print something, we just grab a laptop computer and use this to print over our wifi network to our old Brother printer.

But just to see if/how one of these methods might work for us, I plan to give one a try -- probably

starting with my iPad.

Jim Hamm

https://gizbuyerguide.com/6-ways-to-print-from-a-smartphone-or-tablet-complete-guide/

Google Just Gave Millions Of Users A Reason To Quit Chrome

If you use the Chrome Browser, here's an article from Forbes you may want to read:


https://www.forbes.com/sites/gordonkelly/2020/05/26/google-chrome-critical-security-vulnerability-warning-firefox-update-chrome-browser/

While I haven't read of any security issues using Chrome, if this is a concern to you, the author mentions a safer browser is Firefox. And while not mentioned, Safari is built on a different programming platform and would be safer also.

For years I've used the Chrome Browser, and like it, but recently I've also been using the Brave Browser, just to try it out. It's fine, and I'll continue to use both, and just remain aware of the issues with Chrome.

Jim Hamm