A warning of a trojan comes from Jim Hamm. The Mac blog he subscribes to sent this, ""Today the Black Hat Trojan infected a Mac OS X server at a company that I work with in Washington, D.C. The company has about 65 Macs at this location. The Trojan came in via an unknown attachment to an email message and then infected 15 Macs that had been asleep during the night. When employees arrived for were five were tricked by the Trojan into keying in their Admin password at which point the entire HD was wiped clean including OS and the Trojan itself."
Jim adds, "Along the same vein are comments on a backdoor trojan from this website." And Jim concludes, "No great cause for alarm, just something to be aware of. From further reading on the blog, one should be careful if all of a sudden you're asked to enter your admin password -- especially when, at that point in time, it isn't normal for you to do so."
Bargain Magazine Subscription
Jim Hamm notifies us of a bargain subscription deal for MacLife. It's only $8.69 when you enter the discount code MAC. Jim's extended his subscription for a year, remarking, "MacLife is a good magazine, in my opinion."
Six Ways to Clean Your Mac
No, not soap and water! Jim Hamm suggests we read the helpful article from MacWorld on how to get rid of old files and make more room on your hard drive.
Solved: Damaged SD Card Problem
"You might some day discover that the SD card in your digital camera appears to be damaged," John Carter gets our attention! "You put it your computer and the computer says that the card has to be initialized. But you know there are hundreds of photos on it that haven’t yet been transferred off the SD card. Not to worry. There’s a free solution to recovering photos from what appears to be a damaged SD card. A recent article in Digital Photography School describes the application and how to use it."
All of our PMUG photography buffs thank you, John.
How Does the Internet Work?
Wondering how the Internet works? Does it keep you up at night, thinking about it? Jim Hamm calls this an "informative overview," and now John Carter adds two other sites to check out -- an image showing the intricacies of the Internet here, and an explanation about the coming iPv6.
Gmail Solution is Posted
Having a problem with Gmail? Never fear, John Carter to the rescue. John has been accepted as a writer for the popular WikiHow, and he introduces his topic, "I posted an article here that goes into some detail about working with a Gmail IMAP account in Mail. It discusses a major issue regarding the ALL MAIL mailbox wherein you might be thinking that, try as hard as you can, you can’t delete a message from that mailbox, or that after deleting a message from another mailbox it still shows up in All Mail. Don’t worry about it. There is a solution."
Mac Cheat Sheet
Helping us get better organized, John Carter writes, "Have you ever wanted all the right information about your Mac in one place? Apple put a very useful page online in its support section. It’s a form that appears to be the Mac owner’s dream come true to keep the kind of information at your fingertips that you need -- especially when calling Apple support."
John goes on to suggest, "If you print directly from the web page, the information on the printed page comes out jammed to the left edge of the paper and some text is lost. In order to get a decent print, I had to copy the text and the form off the web page and paste it into TextEdit, then print from TextEdit." (Elaine adds, "I pasted to Pages and found it came out printed in larger size type, 2 pages, two-sided.")
More on the iPad 2
A real geek who is a first time tablet user passes along his experience with apps on the iPad 2. Photos and descriptions pique our interest in this piece sent to us from Jim Hamm.
Time to Invest?
With a title like, "The most misunderstood stock on Wall Street: Apple" this investors' article recommended to us from Bill Williamson does deserve mention. Four reasons are analyzed and shown to be wrong. Keep informed; this will bring a smile to your face.
Solid State Drive in Your Future?
"I think it's the technology of the future," comments Jim Hamm about SSD, as he sends us this article from Small Dog Tech Tails. Scroll down to "Just a TRIM." It explains why a Solid State Drive (SSD) needs a TRIM (or a similar function) to prevent the degradation, over time, of the write function. (TRIM, while capitalized, is not an acronym for anything; its purpose is to trim old data from the SSD.)
I asked Jim about replacing an existing drive in a Mac with a SSD. He says it's not commonplace, but several new Macs, including the new MacBook Pros with SSD come with Thunderbolt and do support TRIM. He thinks SSDs are available to be used as an exterior drive of Time Machine, and suggests this info from NewEgg.
Decisions Due on Domain Names
The article begins, "Decisions made this week in the meeting rooms of a San Francisco hotel could dramatically change how the world experiences the internet." The writer advances the idea that more top-level domain names means more openings for cybercrime. Not a pretty story, but a topic to follow in the news. Thanks to Jim Hamm for alerting us to this issue.
Not one to procrastinate, we've already heard from John Carter this morning who offers a blow-by-blow rebuttal. His comments have already been posted on globalpublicsquare, (same link as above). After opening that site do Command + F and enter "John" in the Search box to quickly find John Carter's comments.
Here's John's assessment:
"A quote from the article: Right now, there are 21 top-level domains. If ICANN’s new policy is implemented, we will see top-level domains such as .car, .newyorkcity, .hotels and hundreds more. Internet real estate will grow exponentially, creating a more complex experience for every user.
"That part about this being a more complex experience for every user is really unnecessary. It sounds like negative press, and for what purpose? I don’t get it. This would be like saying, “If 5,000 new words were added to the English dictionary, people will have a more difficult time trying to communicate.”
"The addition of the new top-level domains actually simplifies a user’s experience because it aids in identifying the nature of the connection. Just because we are all familiar with and got used to .com and .org doesn’t mean we can’t change and expand our horizons. I think a Republican wrote that article.
"The author goes on to give a more negative meaning to the decision by inferring that only certain people stand to gain financially from the decision (emphasis mine): Those in the business of making money by selling domain names agree, and, unfortunately, they have inserted themselves into ICANN’s policy-making process. For example, the Generic Names Supporting Organization (GNSO) in ICANN's multistakeholder operational model is responsible for introducing and developing the top-level domain policy at hand. The GNSO, however, is largely composed of the same registries and registrars that stand to gain financially by the proposed massive introduction of new top-level domains.
"So what? Is the author complaining that the financial gain isn’t being spread around to everyone? Now I think the author is a Democrat!
"Oops! Wait a minute! Here’s more doom and gloom: This new policy will have great social, economic and security costs. If these new top-level domains are introduced, opportunities for cybercrime and fraud would be increased substantially.
"His question: How would you determine which are fraudulent sites actively misinforming the public?
"The answer simply is: call the supposed owner of the site and get confirmation. What’s so difficult about that? People get scammed every day simply because they don’t bother to verify the source of the so-called official email or URL. The courts have a saying for this: Caveat emptor.
"The author goes on. A massive introduction of top-level domains will overwhelm the existing framework for combating cybercrime, putting millions of internet users at unnecessary risk.
"No more than what is already happening. Just because the 400 new top-level domains introduces more opportunities for scamming doesn’t mean that scamming will increase anymore than it is already. It doesn’t even mean that it will add to the workload of authorities trying to pin down and stop scammers. It only means what you and I and the author want it to mean. If the public gets swayed by this article to join some movement to stop this decision, it would be like asking Webster to stop adding new words to the dictionary.
"More: In addition, consumers will be forced to take extensive measures to protect themselves from fraud and other malicious activities on the internet.
"Extensive measures? What? Name them! Yes, I can make up a lot of scenarios wherein the Internet Public has to protect themselves from nefarious activities. That list won’t increase one iota by adding 400 new top-level domains. The number of directions from where one can get scammed doesn’t change how one avoids being scammed. Where is there any sanity in this author’s comments? Doom and Gloom seems to be his favorite perspective. Who taught this guy to see things objectively? That lesson obviously failed.
"The final blow: ICANN’s original mission – as a domain name regulator with a policy-making process inclusive of all internet users – was well-intentioned, but it has been polluted by constituents primarily concerned with financial gain, leaving the rest of us bearing the cost.
"What cost? Where’s the facts behind this statement? Is it the potential cost of being scammed? I can’t see that there is any out-of-pocket cost to the Internet Public for adding new top-level domains!
"The variety of comments on this article seems to indicate that there are about as many people who agree with the author as disagree with him. Some people are clearly confused by saying they don’t like the idea of a small group of people making decisions like this. To get a Democratic version of this decision would require a majority of the world’s population to know as much about the Internet as that small group of people - good luck on that one!"
And so concludes John's comments. Anyone else want to jump in?
Let's Summarize
Why not see how the auto-summarize does it? It might give you some ideas, it might even suffice, thus saving you time.
You want to send a brief overview of your piece of writing? Let auto-summarize do it; see if your main points pop out, as you wanted them to.
You have a huge backlog of writing in various folders, and you want to get organized so you can find what you want. Consider using auto-summarize as a preview page in the folder with your notes and various versions of the writing.
This is a handy article.
Try it out. Go to System Preferences > keyboard > services > keyboard shortcuts. Click to put a check mark in front of Summarize. Close, and go to some document to experiment.
(You can double click on the illustrations to enlarge them.)
1. Next, I’m looking at a story I wrote in Pages. Highlight the whole story. Go to the top menu where it says Pages and put cursor on Services. In the list under Text choose Summarize. Up comes a box with a slider so you can choose Summary Size. You can choose from 100% way, way down to one sentence.
After you've done a summary you can save it and put your summary in a Note or even in email. Give it a title and save to your Desktop for now.
2. You can summarize in Safari.
Open a site, highlight what you want, then go to Safari > Services > Summarize. Note you can “stretch” out the box to view that summary
3. In Microsoft Word highlight what you want in your document, then go to Tools > AutoSummarize. This is what comes up. Make your selection and proceed.
Have Mac? Have Fun!
Let us know how you’re using your Mac. Keep informed on what your PMUG friends are doing. Look us up at www. pmugnews.blogspot.com/ and better yet, subscribe to be notified when something new is posted to our newsblog.
(This was the handout at today's March 18, 2011 PMUG meeting. If you missed the meeting we hope to see you next time!)
Phone Security Issues
A link to ABC news comes from Ginger Carlson. It's a report on security issues with GPS and smart-phones.
Security Advisory
Don't miss reading this security advisory from Adobe. Thanks, Jim Hamm, for forwarding this to us.
View the Calendar
Click and hold down with your cursor on the Calendar in your Dock. You get 3 choices: Quit, Hide, Options. Options gives you the choice to Open at Login. This is a handy way to quickly view the month each morning when you turn the computer on. It’s a reminder about all those family birthdays you’ve entered, along with SIGs upcoming from Bobbie Pastor and John Carter. (You did update the Calendar, didn't you?)
Reader Ad-blocker
Thanks to Sandra Garramone for this next reminder. You've probably noticed the word READER in the address field of a Safari page. This came as Safari 5's ad-blocking feature. (Does it also come up in FireFox and other browsers?) Here's an article about it.
Sandra says, ". . . I have found reading some web pages easier when I pressed the 'Reader' button where the 'RSS' button is. The page that opens has no advertisements and the print is aligned across the page."
This is also handy if you're printing off an article, but note that the URL isn't automatically printed on those pages.
Look What's Inside!
Want to see what's inside? Of course, you do! Jim Hamm fixes us up with this nifty site so we can see inside the iPad 2. But with a little searching I was able to find the innards of my MacBook Pro on that site. See if you can find your computer.
eBook Possibilities
Even without an iPad we want to get informed about eBooks. There was mention of Calibre in an article from a previous email from Jim Hamm, and now Zee writes, "I have used Calibre as a software to import ebooks and change whatever form they are in, to the correct form for my Kindle... It worked well the few times I actually used it. I am definitely not an expert!"
Keyboard Shortcut
Here's a keyboard shortcut from Allen Laudenslager who writes, "After reading Art Gorski's post about boot commands, I thought some members might not be familiar with the most useful keyboard shortcut.
"Press the command key (the one with a little apple on it) and hold while you press the space key. This will open Spotlight in the top right corner of your screen. What good is Spotlight? You don't have to search for the application or file you want to open. For example to open mail, you don't have to take your hands off the keyboard and use the mouse to select mail from your tool bar, just open Spotlight, then type the word 'mail.'
"For your word processor, open Spotlight and type in the name of the file (for a new document type in the name of your word processor - Pages or Word). If you click on the name of the document, the word processor will automatically open for you.
"What is really neat is that as you type, Spotlight will create a list of files and apps that match what you have typed so far, including web pages from your browser history. Just use the arrow keys in the bottom right corner of your keyboard and arrow down to highlight the file, app, or webpage you want to open and then just press the enter key - you will open whatever you were looking for."
Allen closes with, "Once you get used to it, you'll never search through finder looking for a file again. Unless, of course like me, you forget what you called the file last month and have to look for dates to jog your memory."
And this just in from John Carter: "The tip that Allen gave about Command-Space to open Spotlight does not work on applications that have been newly installed or never opened since being installed. For all new or never-before opened applications, you have to launch the application from the Applications folder. I have been stunned by this short-coming more than once."
Boot Commands List
Art Gorski comments about boot commands for Mac OS X that provide different functionality for your system. "The following is a more comprehensive list of the keyboard commands you know and many you may not. If you don't understand why some of these might be useful, use Google to get more information."



