Keeping Up to Date

It is a pain sometimes trying to keep the OS you're using up to date -- whether it be macOS, Windows or Linux. On a Mac forum I belong to, one fellow was having difficulty doing a few things with his OS, which happened to be an older version of macOS. Another member posted the following comments, which I thought were interesting, and possibly a reason to keep your OS current.

I thought it worthwhile to pass these along, albeit maybe more of interest to 'techies' than casual computer users.

Jim Hamm


I think part of the answer to this is that Safari is integrated into the operating system a bit, from the point of view of Apple. What that means is that when you have a fully updated Operating System, then your version of Safari (whether MacOS or iOS) is also up to date, and is a very good browser.

But, as time goes on, website creators create and use new browser features. This means that browsers gradually get out of date.

For people who are updating a device every time, this never makes any noticeable browser problems. But for those of us who choose to keep using an older version of the OS, that means that (while Firefox can generally still get updated), Safari cannot get updated, and thus does NOT acquire the features expected in a modern browser.

So when you go to a web site with modern downloading and security protocols, any modern browser will likely work.

Every version of Safari was likely state of the art at the time, but gradually falls behind if one is sticking with an old OS.

Eventually, for certain websites (such as those with the latest ads trying to grab your browser’s attention), the old browser won’t be able to handle something.

If the site allows ads to be displayed while it downloads (and who else would be paying for this), then a download process can be like running two different YouTube channels and Apple Music streaming in the background all at once, and as a small side priority, the one old browser trying to handle all of this is also trying not to get distracted doing the actual download.

So folks might need to get newer browsers, or ad-blockers, or differently-funded download hosts, or newer devices with updated OS software.

There are likely good reasons for each of these different choices, but it is useful to be aware of this as a potential issue.

Thanks for reporting your observations on this.

Ways to Save an Email

Here are some simple ways to save emails.

1. Don’t delete it.

2. Drag it to a different folder in Mail.

3. Print it, but instead of actually printing it, select the option to save as a PDF, and save the PDF in a folder on your computer.

4. Copy the content and paste into a text file using Pages, TextEdit, Notes, Stickies, or any app that accepts pasting content, such as ...

5. Create a calendar event and paste the content into the notes section.


Your imagination can probably find a dozen ways.

John Carter Sr.

A Browser Battle

The most popular browser, I believe, is Chrome, which I used for years and liked, but it was/is a memory hog. What is a good alternative browser, you might ask? This article discusses this question, and compares the attributes of three alternative browsers: Vivaldi, Opera, and Brave.

I've used all three, thought all were fine, but have settled on Brave as my browser of choice, at least for right now. If interested, read the article to see what you think.

Jim Hamm

Lime VPN Hacked

In years past, when we traveled, and I was using any public wifi, I'd use a VPN for extra security against hackers 'listening' in to my internet connection. Although all VPN's promise security and no logging of confidential info on a user of the VPN, one must take these promises with a huge grain of salt, as the following story so well illustrates. I hadn't used or ever heard of Lime VPN, and thank goodness for that.

I just took a look at the Lime VPN website, and they clearly state 'no logging of info'. Hmmm? What, then, are the hackers of Lime VPN trying to sell for $13 million, do you suppose?.

Jim Hamm

A hacker just took down LimeVPN’s website, stole over 69,400 sensitive user logs, and is looking to sell them for a $400 Bitcoin payment on a hacker forum. While breaches like this are increasingly commonplace, the real news is how the hacker got the logs since LimeVPN says it is a no-log service.

LimeVPN confirmed that its backup server is what got hacked. PrivacySharks, who initially reported the breach, talked with the alleged hacker who then confirmed that they were able to gain access to the site and shut it down through a security hole.

That backup server contained a database filled with sensitive user account data like email addresses, passwords, and payment information from its WHMCS billing system. The hacker also claims to be in possession of every user’s private key, meaning they are potentially able to decrypt any traffic passing through the VPN service. And now, that hacker is attempting to sell this information to the highest bidder on a renowned hacker forum. They are asking for $400 Bitcoin, which is roughly $13.4 million.

After touting on its website that it didn’t keep logs, LimeVPN is certainly under suspicion now since the hacker was able to jump in and scrape its entire database. Its customers were under the impression that none of their information or activity would be stored on the company’s server and are now the ones having to pay for LimeVPN doing so anyway.

Unfortunately, there isn’t much LimeVPN users can do at this point to stop the breach. However, just to be safe, we recommend users of the service stop using it immediately, take action to protect payment information (like order a new credit card), change the passwords of any sites visited while using the VPN, and watch out for potential identity theft.

The breach serves as a reminder that the vast majority of VPNs are not trustworthy. Most lure customers in with cheap prices and hollow promises of security and privacy without actually being able to back them up. If you’re looking for a (new) VPN service we recommend taking a look at our best VPN services, especially our best overall pick, ExpressPVN. This service regularly undergoes independent security audits to back up its no-log policy.

iO App Store

Apple recently released a 'white paper' on their position regarding their tight control of iOS apps, which can be somewhat summarized in the following quote:

"Apple’s white paper proposes that, were iOS to allow the sideloading of apps, users’ iPhones would be subjected to a relentless onslaught of scams and security exploits, rendering all of their sensitive personal data subject to invasive collection from malicious actors. The paper suggests that a shadowy army of security exploiters and hackers is drooling over the opportunity to invade the 1 billion iPhones that are currently active, and all that is keeping them at bay, currently, is the App Store’s position as the sole legitimate distribution point for apps on iOS devices."

Should you have an interest in reading it, the following article from the TidBITS newsletter discusses this in some detail.

Jim Hamm

https://tidbits.com/2021/07/02/apple-justifies-ios-app-stores-tight-control-in-white-paper/

Apple's M1 Chip

The following Macworld article gives a good summary of probably everything you'd want to know about Apple's new "System on a Chip", also known as the M1 chip. Although the new chip has mostly favorable attributes, it is limited to 16GB of RAM, which apparently is of some concern to some users, who want more RAM. The article mentions that a revised design of the M1 chip might have 64GB of RAM, available by the end of next year. The article also speculates that all Macs will have the M1 chip in about two years.

Jim Hamm

https://www.macworld.com/article/234860/apple-silicon-m1-system-on-chip-macbook-air-macbook-pro-mac-mini-imac-m1x-specs-features-intel-apps-rosetta-2.html

SSD in macOS X

In the past, I have mentioned that enabling TRIM in the OS should not be done if the SSD in question is from Crucial. I contacted Crucial support today to confirm this because I see a lot of articles on how to enable TRIM in a Linux OS and also configure several options to reduce the number of read-write cycles to an SSD. The purpose in reducing the read-write cycles to increase the life span of the SSD.

Recent articles on read-write cycles of an SSD have given rise to a concern that the way Apple has implemented SSDs in computers is going to substantially reduce the life span of the SSD. The culmination of all the articles seems to allay the concerns somewhat by indicating that even under heavy use an SSD will outlast the usable life of the computer.

Here are two short articles provided to me by Crucial:

https://www.crucial.com/support/articles-faq-ssd/trim-and-os-x-operating-systems

https://www.crucial.com/support/articles-faq-ssd/trim-and-ssd-performance-importance

What must be kept in mind regarding SSDs installed in any computer is that in order for either TRIM or Crucial’s Active Garbage Collection to work at all, the computer must be turned on and be left idle for enough time to allow the operation to actually complete the task of garbage collection. The suggestion is to leave the computer turned on and not allowed to go to sleep, either overnight or during the day for several hours. Using the computer and then turning it off or putting it to sleep right away actually prevents garbage collection from happening. Sitting idle for a few minutes at a time might not help either. There is no data on how long a computer must be left idle for garbage collection to work since the factors include computer speed, the size of the SSD, and how much data has to be managed. And herein lies the importance of leaving a minimum of 20% free space in an SSD - to allow garbage collection to properly manage the storage.

With the advent of the M1 (Apple Silicon on a Chip), memory is now embedded in the same chip as the CPU. That memory operates in the same manner as a solid state drive. TRIM is enabled by default. Here’s a system report of my M1 found under NVMExpress:
APPLE SSD AP0512Q:
Capacity: 500.28 GB (500,277,792,768 bytes) TRIM Support: Yes Model: APPLE SSD AP0512Q
For any external SSD, be sure to find one that has garbage collection built in, like the Crucial SSD. If you install an SSD that doesn’t have an internal garbage collection routine, you will need to enable TRIM in the OS (“sudo trimforce enable” which is a command executed in Terminal). Enabling TRIM in the OS does not affect any garbage collection routine built into an SSD.

John R. Carter, Sr.



iPhone/iPad Tip

Here's a tip on how to easily check the temp and air quality index (AQI) on your iPhone or iPad. I just tried it on my iPhone, and it's pretty slick, I must say. I didn't know this prior to reading the article. I opened Apple Maps and there in the lower right corner was the temp and AQI -- 109 and 41, respectively..

Jim Hamm

What To Do When Software Stops Working

The article in the following link is worth reading. As the author says, do not get carried away with the details of his specific problem. What is being shared is a process.
https://askleo.com/what-i-do-when-software-stops-working/

But what I see missing are the fundamental questions one should be asking themselves and others when a problem, any problem, arises.

  1. What can you see that causes you to think there's a problem?

  2. Where is it happening?

  3. How is it happening?

  4. When is it happening?

  5. With whom is it happening? (HINT: Don't jump to "Who is causing the problem?" When we're stressed, blaming is often one of our first reactions. To be an effective manager, you need to address issues more than people.)

  6. Why is it happening? (Now that’s an interesting question. If you knew, you might be able to solve the problem, right?)

  7. Write down a five-sentence description of the problem in terms of "The following should be happening, but isn't ..." or "The following is happening and should be: ..." As much as possible, be specific in your description, including what is happening, where, how, with whom and why. (It may be helpful at this point to use a variety of research methods.

To understand more about “Problem Solving and Decision Making,” see:

https://managementhelp.org/personalproductivity/problem-solving.htm

In addition, when asking others for help, the following information should be included:

  1. What I did (Include name of app: Finder, Safari, Mail, Notes, etc.)

  2. What happened

  3. What I expected to happen

  4. Error messages or a screenshot

  5. Current OS version

  6. Current app version

  7. Computer make/model

  8. Installed memory size

  9. Available storage space and type of storage (HD or SSD)


That information is especially important when asking Apple Support for help. And they will also want to know the serial number of your computer.


In some cases, it might require a detailed step-by-step notation of the actions involved, such as when attempting a complex set of actions that then results in the error condition. If you can successfully repeat the steps and always get the same result, then someone else should also be able to reproduce the problem.

John R. Carter, Sr.

ACR (Automatic Content Recognition)

Regarding “smart TVs,” they come from the factory with ACR (automatic content recognition) which collects viewing information for more targeted ads.

Here’s how to opt out:
https://www.consumerreports.org/privacy/how-to-turn-off-smart-tv-snooping-features/

Here’s another similar article.

https://www.zdnet.com/article/how-to-keep-your-smart-tv-from-spying-on-you/

The best way to prevent this is to disable the smart TV features entirely - or don’t get a smart TV. Why pay extra to be part of some marketing scheme? And watch out for those streaming devices like Roku, Firestick, and Chromecast, because they do the same thing.


John R Carter Sr



An Un-hackable Computer?

Here is quite an article discussing a computer processor that thwarts hackers by randomly changing its microarchitecture every few milliseconds. Read about the testing it went through against potential hackers, and successfully. The one downside, it appears, is this process slows the processing down about 10%, which seems to be a small price to pay. Let’s see what develops out of this.

Jim Hamm

https://newatlas.com/computers/morpheus-processor-secure-darpa-hackers/

Google Photos

If you use Google Photos to store your photos, their free, unlimited storage ends at the end of May. This article discusses some alternatives you might consider. If you're already an Amazon Prime subscriber, it looks like this is a great alternative, but other options are available.

Jim Hamm