Photo Editing in Photos App

I am not much of a photo-taker, and know nothing about photo editing. But this newsletter, from Small Dog Electronics, has an article on photo editing in Apple's Photo App that I thought might be of some interest to you. Scroll down about halfway to get to the article. If interested, one can also subscribe to their newsletter, which contains interesting articles relating to Apple products, which, BTW, they sell. They are a very reputable dealer, and you can trust what they say, IMHO (In my humble opinion).

Jim Hamm

http://smalldog.biz/newsletter/kibbles-bytes-1112/

Mac Tip

Here's a tip for your Mac that you might find helpful.

To automatically delete items in the trash, click Finder preferences>advanced>check auto remove items in trash after 30 days. This way, you won't have to remember to delete the items in trash periodically. This will keep trash from building up and soaking up storage space.

Jim Hamm

Google One

Here's something I just became aware of, and mention it FYI and possible consideration: Google One has an app for iOS on the iPhone wherein you can backup your iPhone for free. it includes 15 GB of storage. Why do this, you might ask, if one can just back up to iCloud? Good question, and I don't have an answer except perhaps the concept of suspenders plus a belt -- extra security. I've not used it yet, but probably will give it a try. 

One feature that I might find handy is apparently one can save an email in Gmail directly into Google One. That could be handy as I use Gmail for my email client. More info in the links below.

Jim Hamm

https://blog.google/products/google-one/free-features/  

https://www.theverge.com/2020/7/30/21347769/google-one-phone-backups-ios-android-free-account

RAM memory in my computer

This is just my opinion based on how I use my computer.

I have now had this computer for just over 6 months, and I have been monitoring the RAM (using Activity Monitor) that is used by my normal applications. I have open all the time the following: Mail, Calendar, Contacts, and Messages. I also use a VPN that is always connected.Then I open and close those apps that I am using. I often have Safari and either pages, numbers or Keynote open at the same time. I use many others, but the numbers below are based on these basic applications.All the above takes consistently 22 GB of RAM. That is why I have been recommending when someone looks at a new computer that they get the maximum RAM they can afford or that the computer supports, even if they have to scale back on the internal SSD or disk (which can be added externally after purchase). 8 GB is NOT ENOUGH in today’s RAM intensive software.

Frank Croft

Switching from a 13-inch MacBook Pro to the 12.9 iPad Pro

I tried switching from the 13-inch MacBook Pro to the 12.9-inch iPad Pro. This article tells why I failed.

While my own investigation used an older iPad Pro, I generally agree with most of what he said in the article comparing a MacBook Pro and an iPad Pro.

https://www.macworld.com/article/3566323/13-inch-macbook-pro-ipad-pro-magic-keyboard-multitasking-cursor-face-id-safari.html

Frank Croft

Recovering from Ransomware

As ransomware exists in our computer society more and more frequently, I have been wondering what can be done. This is the statement made by a Malwarebytes researcher after the Garmin ransomware meltdown:

Image 7-28-20 at 2.48 PM.jpeg

That says to me, UNPLUG your Time Machine disk when you are not using it. That will preserve your data that needs to be reloaded, and prevents it from being affected!

Frank Croft

Comments from John S Carter:

I completely agree. However, I am not in the habit of disconnecting my Time Machine Drive - but will start doing so. Since, for me, I do not see any reason to have even day-to-day updates, I will connect my Time Machine drive just once a week to get a backup and also after any new OS update. Keeping app updates in Time Machine are not that critical since any app can be easily reinstalled and updated.

When you are not using your computer and leaving it powered on, it might be a good idea to disconnect from the Internet completely (but leaving Bluetooth enabled). That also keeps you from being distracted by “You Have Mail” and other notifications besides keeping your computer safe from possible hacks getting through your modem and computer firewalls.

I use Sophos Home (free) which has some useful degree of malware and virus protection. The paid version also protects against all other possible forms of intrusions.

How to resolve problems with a Mac

There are four ways to resolve problems with a Mac. 

1) Turn it off and back on. 

2) When powering on, do a PRAM reset (holding down the Command, Option, P, and R keys together and wait for the second start-up sound before releasing). 

3) Before powering up, do a SMC reset (holding down the Command, Shift, Option, and power keys together for 10 seconds, then release and press power again to start up). 

4) Delete and reinstall the problematical app. 

If any of these fail to resolve the problem, try to isolate the source of the problem by logging in with a different account to see if the problem exists with the system or the individual account. Then call Apple support to have them help find the problem. A worst case scenario to resolve a system-related problem is to re-install the OS. A worst case scenario to resolve a user login related problem is to delete that login and recreate it from a Time Machine backup selecting only documents, music, and photos to be restored.

This should not be considered as a full analysis or troubleshooting procedure. However, if your Mac appears to be sluggish, either a PRAM reset or a SMC reset or both can restore performance.

John R Carter Sr

Webcam Problem?

With the proliferation of virtual meetings, like with Zoom, as one example, if your webcam stops working, the following article discusses possible fixes:

https://www.howtogeek.com/682516/mac-camera-not-working-heres-how-to-fix-it/ 

The following article also explains how to use your iPhone as a webcam:

https://www.howtogeek.com/669589/how-to-use-your-iphone-as-a-webcam/  

Hopefully, you'll never have to use either article, but you might save them, just in case. Maybe the easiest fix is just to use your iPad instead of your Mac.

Jim Hamm

iOS 14 Review

Here is one writer's opinion of his testing of the upcoming iOS 14 update. And, I'll give you a sneak preview.

Jim Hamm

"In a sense, I still think that. Apple’s keynote presentation was full of pizzaz, while the reality is much more prosaic. iPadOS 14 is very much an incremental update rather than a revolutionary one, and I still think Apple is a very long way short of taking full advantage of the capabilities of the hardware.

But as I mapped out the changes I like, I realized that though they may be individually rather small, most of them make a surprisingly big difference. Take all of them into account, and I think it’s a solid and welcome update, with five notable upgrades…"

https://9to5mac.com/2020/07/27/ipados-14-review/

Video of 250+ Changes in iOS 14

Get ready to spend more than 94 minutes on the 250+ changes in iOS 14 in this video:

https://www.youtube.com/watch?v=F1fkkT85hQE

Whew! I’m tired just thinking about it!

This video is really easy to follow at normal playback speed. And the presenter’s voice is a natural, calm tempo that doesn’t make you feel like he’s rushing through the steps just to keep the video short. You can still slow the playback to a sleepy 0.75 with the Settings (gear) in YouTube.


John R Carter Sr

Zoom 5 Moves Toward Security

Zoom has become quite popular, had some security issues early on, and now has addressed those in release #5. The following article has summarized the improvements.

Jim Hamm

Comment from John R Carter Sr:

It should be noted that Mac Users should NEVER accept an update for the Zoom client from ANY source other than zoom.us. A bug was found last April that allowed third party pranksters to take control of a Mac computer by installing a bogus Zoom app.

Zoom developers have made their service more secure. We review what’s changed.

Technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers have, as promised, given the app a data-protection makeover. As a result, version 5.0 has changed a lot from precoronavirus Zoom.

The change in security focus quickly bore fruit. Previously, large companies and institutions turned their noses up at Zoom, but it now has the seal of approval of New York’s attorney general and is back in NYC schools, and version 5 brings with it some useful features.

Conveniently located security settings

Starting with Zoom 5, all settings for managing conference participants appear in one place. Security does not supersede convenience.

Here you can restrict user rights, block access to meetings to keep out uninvited guests, add watermarks to screenshots and audio recordings in case someone decides to publish them, and so on. Click on the shield icon in the conference menu to open the security settings.

Anti-troll protection

A number of new settings stop invasions by anonymous trolls. First, passwords and the Waiting Room feature, which requires a host’s permission to join a conference, are now enabled by default. Second, you can now prevent participants from renaming themselves.

Owners of paid accounts can also require members to supply information about themselves: name, e-mail address, and the like. And with a business account, you can block unauthorized users or those with a certain type of e-mail address domain (for example, public instead of corporate) from connecting.

Data routing

Zoom’s approach to data routing has also changed. Now your video call will not be routed by mistake to a Chinese or other foreign server. If for some reason the conversation has to remain inside your home country, then you have nothing to worry about: Free conferences will stay in the domestic region, and paid subscribers, as of April 18, can choose which countries their information goes through.

In addition, all conference participants can now see which data center they are connected to by clicking the “i” icon within the upper left corner of the screen. So, if your data is routed somewhere else, you can find out about it and complain to the developer.

Screen sharing security

The old Zoom always showed previews of chat messages in notifications. That could lead to an awkward situation if, say, someone wrote you a personal message during screen sharing. Now, during free conferences the service does not display notifications at all and does not show chat when screen sharing, even if it is open.

Updated encryption

The developers have upgraded the encryption algorithm as well. First, Zoom now uses longer (and hence more reliable) encryption keys. Second, the integrity of transmitted data is now checked — a protection measure against intruders who might corrupt or alter an encrypted message without deciphering it.

If you like such esoteric details (and who doesn’t?), you’ll be interested to learn that Galois/Counter Mode now handles the integrity check. In addition to being more secure, GCM is considered less demanding on resources, so better encryption doesn’t mean sacrificing computer performance.

End-to-end encryption

Lastly, users will soon be able to communicate without anyone — outsiders or Zoom employees — being able to eavesdrop. The service plans to add end-to-end encryption of video calls, for which purpose it has even acquired Keybase, a company specializing in secure messengers and apps for data exchange.

At first, Zoom planned to provide maximum-level privacy to paid subscribers only. But the news that it was going to leave free users without end-to-end encryption provoked a lot of criticism: Zoom was accused of collaborating with intelligence agencies, or at least of leaving the door open for them.

Those accusations conveniently ignore an important point: Practically none of Zoom’s competitors provide e2e, either. End-to end encrypted video calls are available only in instant messengers with limited video call capability or in high-cost business tools that offer it only on request and clearly not free.

Developers have good reason not to love end-to-end video encryption, which is incompatible with many useful features including the ability to record conferences in the cloud, broadcast them on YouTube, or join meetings by phone — anything that requires management through a server. In terms of convenience, most users are better off without it.

That said, on June 17, Zoom announced that end-to-end encryption would be made available to all, including those who use the service free. It won’t happen overnight though, the company plans to start early beta testing in July.

No time to relax

All in all, Zoom 5 is far more secure than past iterations. Its developers have approached security in a very responsible manner, promptly fixing most of the issues that surfaced during the lockdown period.

However, that doesn’t mean that you can take your eye off the ball. Is your conference open or closed? Is recording allowed or not? The developers can’t answer these and some other questions for everyone. So you need to configure conference calls according to your own requirements. Thankfully, Zoom now has more settings to help you get it right.

Second, absolute security does not exist. For example, two vulnerabilities were discovered in the relatively recent Zoom 4.6.10. One of them allowed a malicious chat message to execute arbitrary code on the Zoom server. That bug was fixed before the release of version 5.

The second vulnerability was related to the integration of the chat feature with online GIF repository GIPHY. The bug allowed arbitrary files to be downloaded to conference participants’ computers instead of animated images. The developers temporarily disabled the vulnerable function, and they promise to return it as soon as the problem is fixed.

So far, no horrors have been found in Zoom 5, but that doesn’t mean there aren’t any. As long as the service remains in the spotlight, there will be no shortage of people trying to find its soft spots. Therefore, if you use Zoom, be sure to keep an eye out for updates and install them immediately.


Apple Shifting Away from Intel Chips on their Computers

“The Apple just announced the fact that they are shifting away from Intel chips for their computers and replacing them with their own ARM chips that are in all the iPhones, iPads and Watches. So, am I going out to buy the new computers based on the ARM chips? My past experience says no. Here is why:

I have bought a new Apple laptop computer every 2-3 years since 1992. One of them was based on a PowerPC G4 chip. I bought it just before the G5 chip was announced which had tremendous problems, and the reason why Apple went to Intel. So, I waited till the first Intel based laptop came out and bought it immediately! It had a LARGE number of problems which were not solved for over a year. It was another year beyond that before Apple successfully married all of its hardware and software. I was also a beta user of the “new MacOS ten” when it arrived in 2010. It was also a couple years before it was stable.

Given my experience with new architecture, I am not going to run out and buy the new ARM based computers. Not if my current one is running fine. If my current one needs to be replaced, I will still wait till all the reviews of the new ones are in, and the applications I need to run are stable on the new platforms. In my mind, given my experience with Apple, that means 1-2 years after release of the new computers.”

Frank Croft