Apr 12, 2017
Technology Of Travels!
What> Vista Dead? And what’s this Windows 10 Creator Update?!
And by the way… ‘Don’t Be Evil‘ (Transmogirfied into “Do the Right THing?!”)
Google is now pushing its Google Express shopping opportunity!!!!
Instant Vulnerability in WORD
Notifications of new show notes and edits are tweeted at: twitter.com/ddhart.
– They’re tagged with #Zentech.
– When what’s said is unclear to me (or I’m unfamiliar with a topic) I tend to quote (” “) verbatim.
– Editor’s comments are delimited by < >
For a couple of months, the audio of today’s show is here. Recent shows are here.
The intro & outro music was by Pentatonix.
Paul was in the studio. Glenn called in from Point Richmond in the Bay Area.
Siri uses the Microsoft Bing search engine by default, which Paul thinks is useless. If you want it to use Google, prefix your query by saying ‘google’.
Glenn reminded listeners that they may view show notes by going to zen.kvmr.org. And you can send email to the guys at zen at kvmr dot org.
There have been 2 major updates to Windows, Paul said — Windows 10 Anniversary, which “broke a lot of stuff” and Windows 10 Creators Update that came out in the last few days.
Big updates like these are a compilation of all the patches that have come out in the mean time and usually just fix thing under the hood. But the Creators Update actually adds some features. See the link at the top of this page. Paul said he would prefer to wait on doing the Creators Update.
<Here are a few articles I’ve come across (but didn’t read)…
Yes, Another Windows 10 Update Is Here. By Biersdorfer
Windows 10 Creators Update. A David Pogue review
New Creators Update build lets you block Windows 10 updates
Today’s the day to block Windows 10 Creators Update
>
Microsoft has been working on Cortana, their personal assistant, Paul says it’s not as good a Siri. Glenn said hasn’t tried it yet. Glenn said he uses Siri while driving but prefers Google search.
If you use Microsoft Office or its components, it will not be updated in conjunction with a Windows update. There is an option to select <Paul didn’t say where> that will make other Microsoft products update when the operating system is updated. In particular, there is a vulnerability in Word that needs attention, and there’s a link about it at the top of this page.
Google is pushing its shopping service called Google Express. There’s a link about it at the top of this page. Paul wasn’t clear about it but somehow it’s tied in with doing a Google search by voice.
The Microsoft tablet called Surface used to run a version of Windows 8 called Windows RT (runtime). It was different than the Windows for the desktop/laptop. The current model of the Surface uses a version of Windows 10 that is the same as the desktop version. Paul had a chance to try one of these tablets and thought it would have been great if it had come out a few years ago. It seems that he likes it but said the tablet is pricey — in the $900 – $1200 range.
Last night Glenn updated his iPad to version 10.3.1 of the operating system and it slowed it tremendously.
Paul said Apple recently came out with a new iOS filing system for solid state flash drives called APFS. <Talked about during the 3-29-17 show>. And he suggested that Glenn shut down and restart the iPad.
Paul said he’s more familiar with Android, but there are apps for Apple’s iOS to clean up the junk an operating system tends to accumulate. He mentioned an article from Mac World — ‘How To Clear Out Your iPhone’s Memory And Cache’.
One of the things iOS 10.3 does is to recognize incompatible apps. Each new version of iOS gives apps additional resources to run more efficiently. Apps written for an older version may not have been updated to take advantage of a newer iOS. Version 10.3 will notify you that you have one of these older apps, though you may still be able to use it.
Glenn restarted his iPad and said it seems to be a little faster.
In the Linux world, the Unity user interface has been discontinued, Paul said. There are at least 10 window managers (the user interfaces) for Linux that show you the desktop, its icons and allow you to operate the computer. Gnome & KDE are the mainstream interfaces for Linux. And there are lightweight interfaces like XFCE & LXDE, which work even on an old Intel 386 or 486 computer. If you replace Windows XP with Lubuntu on an older machine and use the LXDE window manager, it will run even faster that it did under XP.
Glenn told us about a project where he used Kunbuntu to copy the user files from a machine that would no longer run Windows. After reinstalling Windows, the user files were then returned to their correct location and the machine’s operation was restored.
Paul noted that Microsoft now allows you download the ISO image of Windows for free. It’s what the guys used for reinstalling Windows the just-mentioned project. You can search for the words: microsoft 10 iso image. Make sure it comes from the Microsoft website. Paul said, “the reason they give it to you free is because you are tied down with the whole key mechanism.” For the particular machine the guys worked on, the key was stored, as it came from the manufacturer, in the UEFI partition of the hard drive <I think he meant the firmware >.
If you tried to boot the ISO image on a machine that doesn’t already have a key, you’ll end up with an unregistered version of Win10 and it will be missing some of the customizing options. You can get a key from Microsoft for no less than $99, Paul surmised.
The type 6 Kindle Paperwhite Reader that Paul has (mentioned on the 3-29-17 show) runs a slimed-down version of Linux. The current version of their operating system is 588. Amazon makes the souce code available and there is a hacker community called Kindle Hackers dedicated to modifying the Kindle. One such modification makes the Kindle into a message board that you can stick on a refrigerator with double-sided tape. The newest Kindles can run for 1 month between recharges. That’s reduced to 10 days if the backlight is on and it’s using wi-fi.
Dennis called about his a 2007 iMac running Mountain Lion OS. He’s not been able to upgrade to a newer OS. Also, he gets black squares and flashes while running the browser. He wanted to know if there is something like Ccleaner he can run to get rid of junk files. Paul said that there are cleaners but the Mac should do its own cleaning.
– Read carefully the error message you get when trying to upgrade to narrow down the problem.
– People tend to think upgrading the operating system is the way to fix a problem. “If you’re not careful it will just go wrong faster”.
– Find out if the machine is overheating. The machine has several internal temperature sensors. It’s not just a matter of feeling the outside of the machine.
– The storage system (like the hard drive) may be messed up. Tech Tools Pro for Mac will check the hard drive and give you a report. You can first try the built-in program called Disk Utility (go to the Applications folder -> Utilities folder). There’s also Disk Warrior for Mac.
– Paul said he’ll put links to utilities for smart drive checking & temperature monitoring on this page.
Paul mentioned H2O Wireless that he and Glenn use for their cellular provider. You get 3gig of data & unlimited calling & texting for $27/mo.
Things are finally starting to get competitive in the cell phone market in the USA, Paul said. Most use the AT&T network, some use Verizon. If you currently have poor connections to AT&T, for instance, you’ll have trouble using a provider that run on the AT&T network. And you’ll have to unlock your AT&T phone to switch over to a second tier provider that’s using AT&T.
Glenn gave the disclaimer:
The opinions and thoughts you that you hear on KVMR are those of the speaker only and not necessarily those of staff, management, underwriters or board or other broadcasters
The cell phone companies, especially with the the latest phones, are able to “lock down what you do”. <I think he meant cellular providers>. So you can’t do any tethering — can’t use it as a hotspot. And they shut down Apple’s Facetime — a video conferencing feature. But Paul discovered that the free app called Whatsapp is a fine replacement. And it allows Apple users to communicate with not just other Apple users but the rest of the world.
Glenn was at first hesitant in using Whatsapp because it wanted to use his contact list. But since Paul had been using it for a while with no problems, Glenn is OK with it now. You don’t have to allow access to your contacts but you’ll then have to key in the phone numbers manually.
Tim called. He had sent an email last week about a problem and wondered if there was a solution. He has Windows 10 but he can’t access anything on the internet from a desktop icon. He just gets a white screen and a spinning wheel. Paul suggested he google the words: chkdsk windows 10. This is a utility that will check the underlying file system to see if the files are stored properly. Also look up ‘safe mode’, Paul said. Glenn said he’ll take a look at the email Tim sent and get back to him in the next couple of days.
Last Updated 12:06 AM 4-13-2017
Mar 29, 2017
Kudos for last week’s guests and project about “Screen Dependency” (not “Addiction” as I might have Said)
– there was enough material for several hours of programming, but there is a Town Hall hosted by KVMR in April in person about this and I mean to be there in the Audience with Questions:
– So Kindles Count? Is a Kindle a Book? Weren’t book once dreaded as an alienator of storytelling traditions?
After all it’s always Books that get Burned when Trouble Starts, right?
– Does each new generation tax the previous with progressions like these?
BBC article on newly scrapped internet privacy laws So what does this mean to Anonymous Browsing? how about SSL pages (which are increasingly prevalent).. In general your Destinations can be tracked, but what exactly you are looking at, less so. IE I can tell you are visiting parts of San Francisco but not what you are looking at there….
Backlash will hopefully kill this. Can you Subvert it? TOR Browser is a Risky Proposition
So that was what the “Do Not Track” Cookie Setting was about?
Now companies can legally ignore it (as it was only an Advisory) which they likely did anyway
Next wil likely be the Do NOT CALL Telephone listing: http://www.donotcall.gov (another Program covered Spoofed Caller ID’s-)
TAILS is an Internet Browser on a Stick to sidestep untrustworthy operating systems using Debian Linux
IOS 10.3 now out using a NEW Filing System called APFS better geared to flash memory, etc. Thought to only activate on newer devices like iPhone 6 & above. Protracted Update
WhatsApp now prominently does Video very well, circumventing possible FaceTime Blocking by cell phone company. Works Across Platforms and uses Encryption as the attack on Westminster Bridge in London showed (the attacker used WhatsSapp)
Notifications of new show notes and edits are tweeted at: twitter.com/ddhart.
– They’re tagged with #Zentech.
– When what’s said is unclear to me (or I’m unfamiliar with a topic) I tend to quote (” “) verbatim.
– Editor’s comments are delimited by < >
For a couple of months, the audio of today’s show is here. Recent shows are here.
The intro & outro music was by Pentatonix.
Glenn was in the studio. Paul called in from the Salton Sea in Southern California
If you’d like to call in to the show during the broadcast, call 530-265-9555. Or you can email the guys anytime: zen at kvmr dot org
Instead of using the regular studio lines, Paul called in using WhatsApp. The quality was much better this time.
Referring to last week’s show, Paul reminded listeners that George Lynn will be at a local town hall meeting at the Nevada Theater April 18 6pm to 9pm, adding that the event will be broadcast on KVMR. The topic will be screen dependencies (dependency we have on our gadgets).
Paul said he was intrigued by the subject of last week’s show and wondered if a Kindle ebook reader leads to screen dependency. He’s read many books with his Kindle while on his RV excursions and he asked “do I have screen dependency? I don’t know”.
He has a Paperwhite Kindle, an Amazon product that sells for $120. The screen looks like paper — a white screen and very sharp text for which you can select fonts of different sizes. It’s a welcome feature for Paul’s problematic eyesight.
The Kindle screen is not very responsive, but it’s not intended to show animation or even webpages. It was specifically designed for reading. Paul finds it easier to read than a book, even in bright sunlight. He loves it.
Because of his attraction to bargains, Paul got a collection of Dickens’s classics for 99 cents. They were cheap because their copyright has expired, he said. There’s free material available for the Kindle, too. And you can put your own documents on it, with some fiddling. However, there is no way to edit something on the Kindle; it’s for reading only.
There’s a link to a BBC article at the top of this page about a coming change to internet privacy laws. If it gets signed into law, your ISP (internet provider) will be permitted to keep a log of where you go. Although pages whose addresses start with https (not http) are encrypted and the ISP won’t see what you send or receive, they can tell that you used, for instance, Facebook to post an article. They “may even, in some circumstances be able to read back the URL“.
<Congress Moves to Overturn Obama-Era Online Privacy Rules>
It won’t help to anonymize your web surfing by using the incognito mode of your browser, as in Firefox. This mode only prevents the local machine (your laptop/desktop) from storing browsing information. The ISP can still tell where you go. And using the Tor browser (link at the top) makes you stand out as someone trying to hide something.
If you don’t trust your operating system <or suspect you have malware>, Tails (link at the top) is a browser on an memory stick. From the way Paul described it, it comes with the Linux operating system as well as the browser. You can then boot your computer from the stick (flash memory) to run Linux & the browser. Tails uses the Tor network.
Don called to describe his efforts to stay anonymous. He bought a computer & cell phone with cash. He then went to Microsoft Live and got an email account. “Now I never use this device with my home wi-fi”, he said. He only gets on the internet when he’s at a library or a coffee shop. “I don’t think they can catch up with me”, he said. At this point Glenn accidentally dropped Don’s call.
Paul responded by saying “I tend to avoid anything except a local login”. Microsoft tends to badger you to login with Microsoft Live. But during the setup process there’s tiny option at the bottom that says “create a local account”. “You authenticate the account name like Don with possibly a password, but you don’t need to be online to do it. And, in fact, there’s no other reason to have an online Live account for Windows 10 or 8 or 7. There’s no other reason to do it than that Microsoft wants to sell you stuff and they want to track you”. Using access points away from home “won’t help much with the fact that Microsoft actually knows where he is”.
Paul said if you’re already set up, you can convert to a local account without losing your data. Paul said to google the words: revert windows 10 account to local. The instructions he found are at HowToGeek.
<Possibly this>
Mark called. His Firefox browser is notifying him to upgrade and he wanted to know if that’s a safe thing to do. Paul said it’s probably legitimate, but to find out, first dismiss any warning about updates. Then go to the help menu -> About. That will tell you what version of the browser you have, and you’ll know if you’re due for an update. In the same menu there’s an option to “update now”. Use that to do your update.
Paul said there’s an update to the IOS (operating system) on the iPhone 6. It’s now up to version 10.3. In this version there’s a substantial change to the underlying file system, the first change in 30 years. It used to be HPFS+ (High Performance File System). It’s now APFS (Apple filing system), which is more suited for flash drives. When Paul did his update, it took a while because it had to rewrite the entire file system. He said it freed up some memory and it runs a bit faster.
<A ZFS developer’s analysis of the good and bad in Apple’s new APFS file system>
Pilar called in from Sacramento. Her family has Mac computers and she’s looking to use a VPN (Virtual Private Network). She’s read a review of The Best VPN Services of 2017 in PC Magazine. She asked for suggestions.
Paul said that a VPN will keep an ISP from tracking you, but “the other end of a VPN now knows where you are”. What a VPN does is take the outbound data, “crams it inside the packet that goes thru the phone company with encryption, scuttles it thru the internet, god know where, it will pop somewhere completely different”. “But the place where it comes out is no longer AT&Ts IP address. It could now be somebody else’s IP address”. The point of a VPN is to look like you are in a different location, even a different country. You can make it seem your IP address is in Britain so you can get to content that’s only available to people living in Britain, for instance.
In the end, the VPN company itself can sell your information. Paul suggested a VPN called TunnelBear. He said it’s pretty easy to use. It gives you the 1st .5gig/mo of data for free. PCs & Macs have VPN built-in, but it takes some persistence to get it working. Most VPNs cost about $5/mo. A VPN will slow things down, no way around that. Some content providers can tell if you’re using a VPN. So, for instance, the BBC might deny you access after all.
<Help file for TunnelBear
Tunnelbear for Android here>
Don called back. He said his strategy for anonymity involves using a fake ID when signing up at Microsoft Live email. Then he can use that account to sign up at, say, Facebook. Paul countered by saying you’ll be followed around the internet by the cookies placed on your machine, despite having a fake email account.
Glenn read a question by Andy who said he has a 2011 iMac with OS version 10.7.5. He needs to go up to at least 10.9 to install some tax software. An Apple rep told him versions 10.8 & 10.9 are no longer available to download but can take his 10.7 directly to 10.11.
Paul said, if he has 10.7, that probably has the application called “app store” which should offer an upgrade. Click the banner at the top of the “app store” and it says get Sierra (10.12) now, but it may not allow an older machine to upgrade. So “look up in the search window 10.11 and low and behold there will be a not very prominent icon that does allow you to download 10.11, if 10.12 is too new for your machine”. It will be a free download. Also, Paul has seen someone selling flash drives with the operating system on them for about $19.
Ralph called. He has a fairly new Windows 10 machine. And about 10 days ago he could no longer connect to the internet. He tried Ethernet & wi-fi. He just gets a spinning icon that says “waiting for…(whatever your homepage is)”
– one of the Microsoft patches broke DHCP — the ability of your machine to get an address from your router.
– You have to go into Windows 10 and hard code an IP address into your Ethernet interface to get the internet working so you can then get the updates to fix the problem.
– Try unplugging then plugging in the Ethernet cable.
<This was mentioned during the 12-14-16 show>
Last Updated 12:09 AM 3-30-2017 now prominently does Video very well, circumventing possible FaceTime Blocking by cell phone company. Works Across Platforms and uses Encryption as the attack on Westminster Bridge in London showed (the attacker used WhatsSapp)
Mar 22, 2017
Notifications of new show notes and edits are tweeted at: twitter.com/ddhart.
– They’re tagged with #Zentech.
– When what’s said is unclear to me (or I’m unfamiliar with a topic) I tend to quote (” “) verbatim.
– Editor’s comments are delimited by < >
For a couple of months, the audio of today’s show is here. Recent shows are here.
NOTE: There is another Zen Tech show scheduled next Wednesday 3-29-17
Glenn was joined in the studio by author Jordan Fisher Smith (twitter: @JordanFSmith). Paul called in from Southern California. Jordan interviewed two guests by phone.
The entire show, including the callers toward the end, focused on addiction to the internet and to electronic gadgets. Jordan led the interview of George Lynn & Cynthia Johnson authors of the book “Breaking The Trance. A Practical Guide For Parenting The Screen-Dependent Child”. I’ll just outline the highlights of the show. For details please listen to the audio.
George Lynn is a mental health counselor from Bellevue Washington who pioneered the use of psychotherapy for people with neropsychological issues and who authored 5 books on parenting children with behavioral problems.
Cynthia Johnson is the founding director of The Venture Program at Bellevue College, the nation’s first degree program for student with learning & intellectual disabilities. She’s also a therapeutic tutor of challenged students in pre-kindergarten, elementary and secondary school.
George will be at a local town hall meeting at the Nevada Theater April 18 6pm to 9pm. Parents, teachers and mental health professionals should make an effort to attend, Jordan said.
Jordan asked Cynthia to name some typical behavioral or learning challenges that are the marks of screen dependence in children.
– High disorganization
– Apathy toward school
– Failure or low performance in school
– Sleep deprivation
– Memory issues
– Reading & writing issues
– Issues in problem solving & critical thinking skills
George was asked to describe the nature of screen dependence. He said that games are designed to create a dependence. They are created to have what he called compulsion loops to give kid the feeling of not wanting to break away but to stay engaged. He said that once the kid is hooked into playing a game, the brain releases adrenaline — the neurochemical of excitement that’s also perceived as pleasure. Eventually, the brain expresses dopamine that locks in the need to stay engaged with the activity. Adrenaline goes up, dopamine goes up, pleasure goes up and then, as the compulsion loops kick in, frustration begins, bringing on the need to master the game. The kid can spend up to 8 hours with recreational screen media, which includes social media.
Cynthia said kids are a great marketing target for these electronic baby sitters. George said he’s talked to some Microsoft people who told him that the child’s brain normally thinks at about 600 words per minute, but the games are designed to overclock the brain, in terms of stimulus response, to about 1000 words per minute. In the long run that creates brain exhaustion and a whole variety of psychiatric symptoms that go along with that. He said that kids need to learn self control, with the help of the parents.
Cynthia said that some students find school boring because it doesn’t provide the stimulus the screen-dependent child had gotten used to.
Glenn asked if the adoption of digital devices in schools contributes to the problem. Cynthia said it does and some parents produce printed material for their kids so they won’t focus on using a device. She said that there are other workarounds.
Cynthia said that kid with autistic spectrum disorder may be more at risk for screen dependence. These kid tend to be more socially isolated and the parents think the kid’s screen time is better than no social contact at all, so they tend to let their kids indulge.
Paul asked what a parent should do to limit or block the use of screen media. George said there should be a plan. There should be rules as to content and times of access. There are some good apps to monitor the usage of screen media. <He didn’t mention specific ones.>
Jordan brought up the issue, and Cynthia confirmed, that kids get manipulative and parents don’t know what to do. Having a plan for screen time does much to mitigate the situation, Cynthia said.
Parents sometimes feel a sense of guilt that they have a problem with a screen-dependent child at home and they are reluctant to communicate with other parents. George said this is a huge problem. He said support groups could help. Many parents themselves use electronic devices to work after hours and that makes it hard to set an example for the kids.
Rick called. He has 2 15-yearolds and has had battles over the use of electronic devices. He wondered if there are subliminal messages embedded in the screen images that contribute to screen addiction. George said that the media itself is what’s addictive. And also, the blue tint of screens tends to keep people awake and interferes with sleep. He’s not aware of any subliminal messages. They’re not needed to make the applications a huge hit.
Clay called. He has no TV, no cell phone and no computer. He confirmed what was said earlier, the kids seem to be in charge.
George reiterated that self-control takes a while to develop and the parents can help their kids by setting limits.
George said that too much recreational screen media sabotages identity development. Kids go thru predictable stages of maturity to adulthood. You don’t want a kid to get stuck at a particular stage because they don’t get out enough in the real world.
Don called. He’s taught <sp> at CSU in Sacramento for 17 years and in the last 10 years he’s noticed more inattention and distraction in his classes. He thinks the factors discussed today have contributed to the situation where students are incapable of 15 minutes of sustained critical thinking. He characterized it as a disaster.
George concluded by saying that parents can take back the authority and that they shouldn’t give up.
Last Updated 9:54 PM 3-22-2017
Mar 8, 2017
TODAY!
Claim Misplaced Fund from the California State Controller– (Check URL Carefully) but
WATCH FOR SCAMS! .. Usually done state by state but use
Caution Throughout! Other States
Hey Look– POWERPOINT (.pptx) files can be taken to bits! They are actually ZIP files,
so rename them that way (Slideshow.pptx -> Slideshow.zip) & open ’em up with the likes of free IZARC (Windows) to extract all that lovely Content from the Archive
TRAVEL! Yea!!
Icelandic Airlines? WOW! !s that Low Cost? Or Not.. Actual Cost of Living? accomodations: AirBNB? Couchsurfing? Sleep inthe jungle- it’s free. Further north like oh say Iceland… not so easy… Then: Is the Airline Trustworthy? Remeber ICEBANK?
Home Automation & the Woes of the Internet of Things— Internet connected Gadgets with backdoors and schemy schemes. How about going Open Source? Strictly Hackers!
Superwonderful YOuTube Documentaries about the Apollo 11 computers and here about Linux Opensource
Additional notes
Notifications of new show notes and edits are tweeted at: twitter.com/ddhart.
– They’re tagged with #Zentech.
– When what’s said is unclear to me (or I’m unfamiliar with a topic) I tend to quote (” “) verbatim.
– Editor’s comments are delimited by < >
For a couple of months, the audio of today’s show is here. Recent shows are here.
Both Paul & Glenn were in the studio today.
A link at the top of this page goes to a California government page where, if you enter your name, it will tell you if you have unclaimed property.
If you’re going to use the site, Glenn suggested entering your name in various ways — 1st name then last name, last name then 1st name, with or without middle initial, etc.
Glenn also mentioned a couple other websites where you might find forgotten or missing assets — unclaimed.org and missingmoney.com.
Paul cautioned listeners about fake websites, saying you can be more (but not entirely) confident about a website if the address ends in .gov. “Even having a secure certificate, that you can click up on the left, even having that secure certificate is not an absolute guaranty you are at the right place.”
Using the website, Glenn said he found $20 of a rebate he never received. Paul figured the state will hold on to unclaimed property for 6 or 7 years before it goes into the general fund.
Paul had a couple of other warnings. Don’t enter any personal information unless you’re sure you’re on the right site. There no need for a third party to get involved to reclaim the property.
Glenn told of a time he had an inheritance coming from a cousin. The information made it into the media and some companies got in touch with him saying they could help claim the inheritance for a 25% to 35% cut of the proceeds. Glenn contacted the a county office that handles these situations and got a resolution without the help of a third party.
Paul said that when something goes to probate it’s supposed to be published. When you’re contacted by someone offering to help you, assume it is a scam and don’t give away any personal information. Take the time to track down the sources of the information.
You can email the guys with your questions at any time using the address zen at kvmr dot org.
Paul said he added unclaimedmoney.org to the notes above <I don’t see it there>. One of the purported government sites Paul saw was virginiagovernment.org and he said he doesn’t trust that address. Glenn added that state websites that don’t end in .gov should be suspected. An address may have .gov in it, but if there is anything after that (like xxx.gov.org) you may be dealing with a scam site.
Paul said that later versions of Microsoft Word or Powerpoint use the file extensions .docx & .pptx, which are a modified XML format. Paul looked at the raw data in a .pptx file and found it started with the letters ‘PK’. That reminded him of a .zip file, which also begins with ‘PK’. So, he renamed a .pptx file to .zip and had Windows open as if it were a .zip file. To his surprise, he found all of the components (the text, graphics, movies, etc.) that make up the Powerpoint file. You can try the same thing with .docx files. Paul said the utility Izarc enhances your Windows machine “to do more things with more archives.” <The link to it is at the top of this page>.
Related to this are files resulting from pictures that you take with a phone. They will have exif data inside. The data will contain such info as the latitude & longitude of where the pictures was taken. Usually, you can change the phone settings to exclude this extra data from pictures you take.
Glen threw out the quote “oh, I wasn’t naked. I had the radio on”. He asked listeners to call if they know who said it. The answer is at the bottom of this page.
The guys talked about budget airlines. Glenn mentioned an airfare he saw for $65 from a out-of-the-way airfield in New York to Edinburgh. Paul found that the Icelandic airline named Wow has cheap fares. <Link at the top of this page>. The airfare Paul saw to Iceland restricted your baggage to 1 bag that you have to carry and must be smaller than what you can stuff into the overhead bin.
And he warned that nothing is cheap in Iceland. The cost of living is high, which Paul found from another website, which gives you the cost of living in every country in the world. <Link at the top of this page>
Paul mentioned a couchsurfing website that works by referral of both guests and hosts. <Link at the top of this page>. Similar to AirBNB, the idea is to put up travelers for a short time to avoid the cost of more traditional accommodations such as hotels.
Paul said that though HDMI cables are all the same type, DVI comes in different flavors. Be careful to get the right kind when you order one online. Some current displays are 2HD, which require cables to carry 4 times the data rate of HD. Some DVI cables may not handle the higher rate.
Glenn updated us on the Mac Mini he bought recently. As mentioned on the on 2-8-17 show, he found out the RAM was not upgradable. He exchanged the one he bought for the next higher model for $200 more. It has 8gigs of RAM, a 1 terabyte hard drive and an iris video card.
Paul again talked about home automation and internet of things <IOT>. He expressed concern about security. Firewalls are supposed to keep your home devices from being reached from the internet. But all bets are off if the devices are reaching out to a proxy server on the internet. If you buy devices from China, the proxy servers are in China. The data the device sends would normally be what’s required to get the expected service from the device, but who know what else it’s sending.
There are open source projects to perform home automation. But there’s is no guaranty of safety and they’re strictly for hackers. Paul listed a few links at the top of this page. Paul named some of the projects: Calaos, Domoticz, Home Assistant, OpenHAB and OpenMotics. The intention of the open source projects is to avoid having the device communicate with Chinese servers. <Paul talked about home automation on the 1-11-17 show>
Paul likes the documentaries he finds on Youtube from AME, Discovery and National Geographic. One in particular he liked talked about the computer subsystems that helped send Apollo 11 to the Moon. Some of those early computers had only 76K of memory.
The answer to the quote puzzler is Marilyn Monroe. Paul said wikiquote.com is a good place to look up quotes.
It was noted that today is Women’s Day. In that regard, both the guys said they enjoyed the movie ‘Hidden Figures’, which was about women who did, by hand, the math for the Apollo projects. The women themselves were called computers.
Last Updated 12:25 AM 3-9-2017
Feb 22, 2017
TODAY!
- Slide Scanners– Any Good?
- Cheap Cine Film Converters– any good? Consider Provenance AND “ICE”
- See: Chinese company WOLVERINE
iPhone pList Hacking- for Tethering AND to Allow FaceTime over Cell!
- Glenn return a non upgradeable Mac Mini.
- Google Drive App as backup??
Additional notes
Notifications of new show notes and edits are tweeted at: twitter.com/ddhart.
– They’re tagged with #Zentech.
– When what’s said is unclear to me (or I’m unfamiliar with a topic) I tend to quote (” “) verbatim.
– Editor’s comments are delimited by < >
For a couple of months, the audio of today’s show is here. Recent shows are here.
Both Glenn & Paul were in the studio today.
If you want to contact the guys by email use zen at kvmr dot org. Glenn said he’s not sure the email issue mentioned on the last show has been resolved. <I think they’ll get the mail eventually>.
Glenn reminded listeners that there’s a KVMR app for both Android & Apple devices that lets you listen to the live broadcasts <and offers additonal features.>
Glenn thanked those who support KVMR. There was a membership drive last week that was a great success.
Paul warned listeners about popups or even audio recordings in their webpage warning them that their computer has been compromised and that they should call an 800 number. When you call, they might say they’re from a well-known company like Microsoft, but they can be anywhere in the world. They tell you that you can’t continue until you give them access to your computer to fix it, for a price. Paul said, Mac users are more likely to fall for the scam because they don’t encounter these types of scams as often as PC users, who have learned to be more suspicious.
When asked what he would do in such a situation, Glenn said he would call his computer technician. Glenn went on to say no major company would call you to say they’ve detected a problem with your computer. It’s always a scam. You might get a similar scam in an email. Paul said that webpages themselves might be subverted as was the case with the Zen Tech site 2 weeks ago when someone broke in because Paul didn’t do a timely update of WordPress. <See last week’s show for more details>
Paul went on to say that LexisNexis & the New York Times web sites have been broken into in the past. You might not notice it right away but eventually a malicious page would popup that might be hard to close of because it won’t have a close button. He said Firefox had tried to deal with such pages but it reduced usability.
When you don’t see a way to close the offending webpage, try the following. On the Mac use the key combination Option + Apple + Escape and kill the browser you were using. On the PC you can do essentially the same thing, but use the keys Control + Alt + Delete to bring up the task manager. You can even shut down your computer, “in a orderly way”, Paul said. <You might try closing just the tab in your browser that has the bad webpage>. 99% of the time your machine is not infected, it’s just displaying a scam page, he said.
Glenn suggested to talk to a computer technician and discuss the situation, if you are already paying someone who initiated this ploy. Remember you might have 60 to 90 days to dispute credit card payments you’ve already made to the scammers.
Paul said Ublock Origin, mentioned on last show, will help prevent these popups. It uses a database of places that originate ads & popups. But the database, by its nature, is always a little behind so it won’t include the newest popups. It works in Chrome, Safari, Firefox and, with a bit of work, in Explorer.
If you’d like to talk to the guys during the show, call 530-265-9555.
On the 1-25-17 show Glenn talked about the Android smart watch he bought, At that time, he forgot to say he paid $14.99 for it. He bought it off a Chinese website called newfrog.com.
He said it’s pretty useless. About all he can do is use Bluethooth he can answer his iPhone, but it has to be so close he might as well just pick up the iPhone. Everything else requires a data source. But without built-in wi-fi, he’ll need a SIM card and cellular service to go online and get apps. <Last week’s show mentioned a cheap cellular plan>.
Paul noted that these sorts of devices get such wide distribution that communities form to hack them <to add functionality>.
Paul mentioned that the internet of things (IOT) devices, which includes watches, have been used to launch denial of service (DDOS) attacks. But, he noted, if you can’t get on the internet, the problem doesn’t occur. <There was some discussion about IOT on the 1-11-17 show.>
Paul bought a knockoff of the Fitbit device for about $15 and it works pretty well, he said. It has an has accelerometer to detect movement and keep track of his sleep/wake cycles and count his foot steps. Some of these devices (but not his) can record heart rate and other “activity”. At the end of the day, it can send the data it’s recorded to an Android or Apple device for further inspection.
Tony called. He said Siri can tell you what planes are now flying over head. The guys tried it in the studio and Siri came back with the website www.rsvlts.com. <Maybe this> The search site used by Siri to find the website was bing.com.
Paul said he doesn’t like Bing. He said he discovered how get Siri to use Google instead — put the word google in front of your search terms.
Paul said the tail numbers on an aircraft can be looked up to get info about it. You can find out the history of the plane you’re about to board.
Tony said a friend of his had to upgrade to the Sierra operating system to get the latest version of Final Cut to work. When he did that he was also required to buy a $9.95 iCloud account for more drive space that Sierra required. Normally, you get 5 gig on iCloud for free. Paul’s solution was to use the properties (the cog icon) to find the iCloud settings. There are check boxes you can set to specify what gets synched. You can uncheck what you don’t want to be backed up. With fewer things to back up, Sierra won’t require the upgraded iCloud account.
Paul said it’s ok to buy the extra storage but be aware of how it’s being used. It may be unnecessary and, if you don’t keep track of what’s going on, you may eventually need even more storage space. Consider storing your data locally, not on iCloud. To see how much of iCloud you’re using, on the iPhone go to setting -> iCloud -> manage.
Glenn went online to get more details about the extra iCloud storage and found it’s 99 cents a month for 50 gig.
Glenn also suggested looking at the settings in Final Cut and seeing if it can be set to store its data locally and not on iCloud.
Paul had encountered the problem of not having enough free memory on his iPhone when trying to install the 1.6 gigs of the IOS 10 upgrade. He removed about 2 gig of data to gain back some space but the free space only changed from .5 gig to about .75 gig. He discovered he had to do a factory reset of the phone to gain back the space he thought he should have. The steps are…
1) Back up the phone. Plug the iPhone into iTunes and choose the option to “back up to this machine”.
2) Do a cleaning of unwanted data & apps and back up again.
3) Reset the phone completely by going to settings -> general -> reset and pick “erase all content and settings”. It will then ask you for your Apple ID and password.
4) Plug it back into iTunes and choose the option to “restore it from a backup”.
Glenn said not everything is backed/restored. Personal preferences like font size & accessibility have to be set again.
Paul said he avoids using iCloud for backing up pictures thru Photo Stream because they won’t be deleted from the phone. Instead, he plugs it into a Mac to pull the pictures off. The Mac itself has a Time Machine backup. <I assume he then deletes the photos from the phone>.
Donna called. She bought a Mac to replace and older one and is having problems she hasn’t encountered before. When she has her mouse cursor over a link, the link will open without being clicked. She’s used to clicking on links.
– Glenn vaguely recalled that there is a setting in Safari to tell it to open a link if the mouse is over it for a specified amount of time
– Be sure the Mac is up to date. Go to the Apple logo and check for updates. You may have to go to the Apple logo -> About -> updates.
– You can also go to the app store and get the Sierra operating system.
Donna uses a trackpad and Paul thought there might be a problem with it. He suggested trying an external mouse and see if the problem persists. Or go to preferences and reset the trackpad settings or maybe experiment with different settings. Paul said command + shift + 3 on the Mac will take a screenshot of what you’re looking at, <Presumably to keep track of your settings so you can put them back>.
Paul also mentioned a $99 slide scanner and a cine film scanner for $200 from Wolverine. The link is at the top of this page
Last Updated 12:10 AM 2-23-2017