Should you have a technical question on an Apple product, here is a website that might be helpful.
Jim Hamm
Should you have a technical question on an Apple product, here is a website that might be helpful.
Jim Hamm
Here's something I just became aware of, and mention it FYI and possible consideration: Google One has an app for iOS on the iPhone wherein you can backup your iPhone for free. it includes 15 GB of storage. Why do this, you might ask, if one can just back up to iCloud? Good question, and I don't have an answer except perhaps the concept of suspenders plus a belt -- extra security. I've not used it yet, but probably will give it a try.
One feature that I might find handy is apparently one can save an email in Gmail directly into Google One. That could be handy as I use Gmail for my email client. More info in the links below.
Jim Hamm
https://blog.google/products/google-one/free-features/
https://www.theverge.com/2020/7/30/21347769/google-one-phone-backups-ios-android-free-account
This is just my opinion based on how I use my computer.
I have now had this computer for just over 6 months, and I have been monitoring the RAM (using Activity Monitor) that is used by my normal applications. I have open all the time the following: Mail, Calendar, Contacts, and Messages. I also use a VPN that is always connected.Then I open and close those apps that I am using. I often have Safari and either pages, numbers or Keynote open at the same time. I use many others, but the numbers below are based on these basic applications.All the above takes consistently 22 GB of RAM. That is why I have been recommending when someone looks at a new computer that they get the maximum RAM they can afford or that the computer supports, even if they have to scale back on the internal SSD or disk (which can be added externally after purchase). 8 GB is NOT ENOUGH in today’s RAM intensive software.
Frank Croft
I tried switching from the 13-inch MacBook Pro to the 12.9-inch iPad Pro. This article tells why I failed.
While my own investigation used an older iPad Pro, I generally agree with most of what he said in the article comparing a MacBook Pro and an iPad Pro.
Frank Croft
As ransomware exists in our computer society more and more frequently, I have been wondering what can be done. This is the statement made by a Malwarebytes researcher after the Garmin ransomware meltdown:
That says to me, UNPLUG your Time Machine disk when you are not using it. That will preserve your data that needs to be reloaded, and prevents it from being affected!
Frank Croft
Comments from John S Carter:
I completely agree. However, I am not in the habit of disconnecting my Time Machine Drive - but will start doing so. Since, for me, I do not see any reason to have even day-to-day updates, I will connect my Time Machine drive just once a week to get a backup and also after any new OS update. Keeping app updates in Time Machine are not that critical since any app can be easily reinstalled and updated.
When you are not using your computer and leaving it powered on, it might be a good idea to disconnect from the Internet completely (but leaving Bluetooth enabled). That also keeps you from being distracted by “You Have Mail” and other notifications besides keeping your computer safe from possible hacks getting through your modem and computer firewalls.
I use Sophos Home (free) which has some useful degree of malware and virus protection. The paid version also protects against all other possible forms of intrusions.
There are four ways to resolve problems with a Mac.
1) Turn it off and back on.
2) When powering on, do a PRAM reset (holding down the Command, Option, P, and R keys together and wait for the second start-up sound before releasing).
3) Before powering up, do a SMC reset (holding down the Command, Shift, Option, and power keys together for 10 seconds, then release and press power again to start up).
4) Delete and reinstall the problematical app.
If any of these fail to resolve the problem, try to isolate the source of the problem by logging in with a different account to see if the problem exists with the system or the individual account. Then call Apple support to have them help find the problem. A worst case scenario to resolve a system-related problem is to re-install the OS. A worst case scenario to resolve a user login related problem is to delete that login and recreate it from a Time Machine backup selecting only documents, music, and photos to be restored.
This should not be considered as a full analysis or troubleshooting procedure. However, if your Mac appears to be sluggish, either a PRAM reset or a SMC reset or both can restore performance.
John R Carter Sr
With the proliferation of virtual meetings, like with Zoom, as one example, if your webcam stops working, the following article discusses possible fixes:
https://www.howtogeek.com/682516/mac-camera-not-working-heres-how-to-fix-it/
The following article also explains how to use your iPhone as a webcam:
https://www.howtogeek.com/669589/how-to-use-your-iphone-as-a-webcam/
Hopefully, you'll never have to use either article, but you might save them, just in case. Maybe the easiest fix is just to use your iPad instead of your Mac.
Jim Hamm
Here is one writer's opinion of his testing of the upcoming iOS 14 update. And, I'll give you a sneak preview.
Jim Hamm
"In a sense, I still think that. Apple’s keynote presentation was full of pizzaz, while the reality is much more prosaic. iPadOS 14 is very much an incremental update rather than a revolutionary one, and I still think Apple is a very long way short of taking full advantage of the capabilities of the hardware.
But as I mapped out the changes I like, I realized that though they may be individually rather small, most of them make a surprisingly big difference. Take all of them into account, and I think it’s a solid and welcome update, with five notable upgrades…"
Another caution article about no-log VPNs. Read article about how users’ logs are exposed when using these no-log VPNs.
https://www.vpnmentor.com/blog/report-free-vpns-leak/
Frank Croft
Below is a link to an important article about scams that are on the rise in 2020. Many are targeted at iPhone users. Even though users are cautious, we can all be caught while not paying close attention.
https://www.idropnews.com/news/iphone-users-be-warned-these-9-scams-are-on-the-rise-in-2020/139559/
Frank Croft
If you're the adventurous sort, Apple's iOS 14 is available for beta testing now. More info in the article.
Jim Hamm
Get ready to spend more than 94 minutes on the 250+ changes in iOS 14 in this video:
https://www.youtube.com/watch?v=F1fkkT85hQE
Whew! I’m tired just thinking about it!
This video is really easy to follow at normal playback speed. And the presenter’s voice is a natural, calm tempo that doesn’t make you feel like he’s rushing through the steps just to keep the video short. You can still slow the playback to a sleepy 0.75 with the Settings (gear) in YouTube.
John R Carter Sr
So the big issue here is if you use your clipboard for copying your passwords to plug into websites, or copying other personal information like bank account numbers, don’t use one of these apps after you do the clipping!!!
https://wccftech.com/ios-14-exposes-apps-that-spy-on-your-clipboard-data/
Frank Croft
Zoom has become quite popular, had some security issues early on, and now has addressed those in release #5. The following article has summarized the improvements.
Jim Hamm
Comment from John R Carter Sr:
It should be noted that Mac Users should NEVER accept an update for the Zoom client from ANY source other than zoom.us. A bug was found last April that allowed third party pranksters to take control of a Mac computer by installing a bogus Zoom app.
Zoom developers have made their service more secure. We review what’s changed.
Technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers have, as promised, given the app a data-protection makeover. As a result, version 5.0 has changed a lot from precoronavirus Zoom.
The change in security focus quickly bore fruit. Previously, large companies and institutions turned their noses up at Zoom, but it now has the seal of approval of New York’s attorney general and is back in NYC schools, and version 5 brings with it some useful features.
Starting with Zoom 5, all settings for managing conference participants appear in one place. Security does not supersede convenience.
Here you can restrict user rights, block access to meetings to keep out uninvited guests, add watermarks to screenshots and audio recordings in case someone decides to publish them, and so on. Click on the shield icon in the conference menu to open the security settings.
A number of new settings stop invasions by anonymous trolls. First, passwords and the Waiting Room feature, which requires a host’s permission to join a conference, are now enabled by default. Second, you can now prevent participants from renaming themselves.
Owners of paid accounts can also require members to supply information about themselves: name, e-mail address, and the like. And with a business account, you can block unauthorized users or those with a certain type of e-mail address domain (for example, public instead of corporate) from connecting.
Zoom’s approach to data routing has also changed. Now your video call will not be routed by mistake to a Chinese or other foreign server. If for some reason the conversation has to remain inside your home country, then you have nothing to worry about: Free conferences will stay in the domestic region, and paid subscribers, as of April 18, can choose which countries their information goes through.
In addition, all conference participants can now see which data center they are connected to by clicking the “i” icon within the upper left corner of the screen. So, if your data is routed somewhere else, you can find out about it and complain to the developer.
The old Zoom always showed previews of chat messages in notifications. That could lead to an awkward situation if, say, someone wrote you a personal message during screen sharing. Now, during free conferences the service does not display notifications at all and does not show chat when screen sharing, even if it is open.
The developers have upgraded the encryption algorithm as well. First, Zoom now uses longer (and hence more reliable) encryption keys. Second, the integrity of transmitted data is now checked — a protection measure against intruders who might corrupt or alter an encrypted message without deciphering it.
If you like such esoteric details (and who doesn’t?), you’ll be interested to learn that Galois/Counter Mode now handles the integrity check. In addition to being more secure, GCM is considered less demanding on resources, so better encryption doesn’t mean sacrificing computer performance.
Lastly, users will soon be able to communicate without anyone — outsiders or Zoom employees — being able to eavesdrop. The service plans to add end-to-end encryption of video calls, for which purpose it has even acquired Keybase, a company specializing in secure messengers and apps for data exchange.
At first, Zoom planned to provide maximum-level privacy to paid subscribers only. But the news that it was going to leave free users without end-to-end encryption provoked a lot of criticism: Zoom was accused of collaborating with intelligence agencies, or at least of leaving the door open for them.
Those accusations conveniently ignore an important point: Practically none of Zoom’s competitors provide e2e, either. End-to end encrypted video calls are available only in instant messengers with limited video call capability or in high-cost business tools that offer it only on request and clearly not free.
Developers have good reason not to love end-to-end video encryption, which is incompatible with many useful features including the ability to record conferences in the cloud, broadcast them on YouTube, or join meetings by phone — anything that requires management through a server. In terms of convenience, most users are better off without it.
That said, on June 17, Zoom announced that end-to-end encryption would be made available to all, including those who use the service free. It won’t happen overnight though, the company plans to start early beta testing in July.
All in all, Zoom 5 is far more secure than past iterations. Its developers have approached security in a very responsible manner, promptly fixing most of the issues that surfaced during the lockdown period.
However, that doesn’t mean that you can take your eye off the ball. Is your conference open or closed? Is recording allowed or not? The developers can’t answer these and some other questions for everyone. So you need to configure conference calls according to your own requirements. Thankfully, Zoom now has more settings to help you get it right.
Second, absolute security does not exist. For example, two vulnerabilities were discovered in the relatively recent Zoom 4.6.10. One of them allowed a malicious chat message to execute arbitrary code on the Zoom server. That bug was fixed before the release of version 5.
The second vulnerability was related to the integration of the chat feature with online GIF repository GIPHY. The bug allowed arbitrary files to be downloaded to conference participants’ computers instead of animated images. The developers temporarily disabled the vulnerable function, and they promise to return it as soon as the problem is fixed.
So far, no horrors have been found in Zoom 5, but that doesn’t mean there aren’t any. As long as the service remains in the spotlight, there will be no shortage of people trying to find its soft spots. Therefore, if you use Zoom, be sure to keep an eye out for updates and install them immediately.
These Apple Watches won't be getting watchOS 7 (but a public beta Is coming next month)
Frank Croft
Should you have 18 minutes and the interest, here is a video with the 18 biggest announcements
from Apple at this year's developers conference.
Jim Hamm
“The Apple just announced the fact that they are shifting away from Intel chips for their computers and replacing them with their own ARM chips that are in all the iPhones, iPads and Watches. So, am I going out to buy the new computers based on the ARM chips? My past experience says no. Here is why:
I have bought a new Apple laptop computer every 2-3 years since 1992. One of them was based on a PowerPC G4 chip. I bought it just before the G5 chip was announced which had tremendous problems, and the reason why Apple went to Intel. So, I waited till the first Intel based laptop came out and bought it immediately! It had a LARGE number of problems which were not solved for over a year. It was another year beyond that before Apple successfully married all of its hardware and software. I was also a beta user of the “new MacOS ten” when it arrived in 2010. It was also a couple years before it was stable.
Given my experience with new architecture, I am not going to run out and buy the new ARM based computers. Not if my current one is running fine. If my current one needs to be replaced, I will still wait till all the reviews of the new ones are in, and the applications I need to run are stable on the new platforms. In my mind, given my experience with Apple, that means 1-2 years after release of the new computers.”
Frank Croft
An article in the New York Post draws attention to a Google Chrome security flaw that results in 32 million malware downloads. Read the article in the link below.
Frank Croft
https://nypost.com/2020/06/18/google-chrome-flaw-results-in-32-million-malware-downloads/
John Carter commented:
The issue is not with the browser as much as it is with the extensions from third party vendors. Now, it should be Google’s primary objective to vet all extensions that they put in their Google App Store. But how many of the faulty extensions came from other places? There’s really no detail about which extensions were involved and where they came from. For me, this is mostly fear-mongering.
For your possible interest, here are two links with more information about the upcoming Apple event on June 22nd.
Jim Hamm
https://www.macworld.com/article/3252331/apples-event-calendar-when-is-the-next-apple-event.html
Here is an article discussing that Apple may switch to its own processors next year, to the detriment of Intel. And it's interesting to note the processors will use the same chip-architecture as the iPhone.
Lots of money potentially involved in this shift. Intel's management has got to be sweating a bit hearing about this.
Jim Hamm
https://finance.yahoo.com/news/apple-mac-chip-switch-double-180459743.html